Best Marketing Strategy for Bitcoin Marketing Agency - How ...
About Bitcoin Magazine – Bitcoin Magazine
4 Ways in Which Blockchain Impacts Digital Marketing ...
(PDF) An Analysis of Cryptocurrency, Bitcoin, and the Future
What I see when I see a student with ADHD
I have ADHD. I was diagnosed at age 12. What happened is I got to middle school, and my life fell apart. It came on like a typhoon. Things seemed alright as I started, but I still remember that October when my family went to sixth-grade check-in. My twin sister went first. The meeting lasted about four minutes. She and my parents left with smiles all around and talk of getting In N Out on the way home. Then it was my turn. Every teacher I had stood in a circle. They seemed...different. One by one, they went around and told me that I was shit. Some were nicer than others, but everyone had the same message to convey: Doesn't complete his homework all the way Distracts others trying to learn Unable to follow along in class Not sure if he can keep up I then heard my grades: C-, D+, C+, A in PE, C, and an F in Social Studies. I don't remember being ashamed or embarrassed or anything. I remember being confused. I had gone to school every day and tried hard and thought I was doing what the teacher asked. Nope. Guess I wasn't. Nobody had much advice for me. They just wanted me to know that I sucked. And that my parents should understand so. I don't know if my parents freaked out or punished me or what. But they weren't happy. The last to go was my social studies teacher, Sven. He asked me if I knew how to read. I politely nodded my head. But he wasn't sure. He talked about all the symptoms he had seen from me. To counter, I pulled a grad-level book on the Cold War off a shelf and read a page aloud while trying not to cry. People were even more confused. Some estimate that a child with ADHD will receive 20,000 more negative comments before the age of 12 than a non-ADHD child will. I can't speak to that exactly, but I can say that this was not the only time I've had a room full of people upset with me for reasons I never saw coming. It doesn't get much easier. Sven caught up to us as we walked to the car. He was cagey with his reasoning, but he told us that there might be something up with my brain. He recommended I get tested by a psychiatrist and see what she had to say. I've since come to my conclusions where he got such an idea. The testing was fun. I've always liked tests. Didn't mention it, but they also thought I couldn't read in 2nd grade. Lol. That one went away after I took a standardized exam and scored in the 99th percentile of the nation in reading. I thought standardized tests were fun, you see. I moved a bunch of colored balls into colored holes and tried to remember what color things were after 10 minutes and everything else you might expect. I didn't know what I was even doing, but I felt I could hang. Three weeks later, I got my results. The only part I remember is that my psychiatrist noted that in her entire career, she had never met someone who scored higher on specific tasks and yet lower on others. My chart looked like OJ Simpson’s polygraph. I could keep going, and in another article, I will. But this is how I got diagnosed. And the key to all of it was Sven. Everything makes perfect sense after the fact, but only when you realize that a single teacher served as the link that completes the narrative. I do not know where I am today without him. I got lucky that this story takes place in 2003, and at a private school with teachers who genuinely cared about me. For reasons a lawyer in the comments needs to help me understand better, public school teachers seem loath to alert students of disabilities of any kind. This includes ADHD but also things like autism, dyslexia, and mood disorders. Things that seem apparent to me in a way that makes it seem impossible that no other teacher in the past 13 years hasn’t also picked up on them. That means many students go through primary schooling while having no idea they have a problem at all. When I mention to a student they might have ADHD, they are first confused, but then some memories come back. The first is that someone, usually a sports or music coach, had once told them the same thing. The other is that they remember a lot of teachers saying weird stuff they didn't understand at the time. Stuff like, "You’re so talented. I just wish you could be better focused. Have you talked to anyone about why you could be having trouble?" To me, those sound like hints from a teacher who has been told by her bosses not to put the school at risk. I am not a teacher. I'm a private consultant and can pretty much say whatever I want. I am also not a doctor - people would die - but I am a concerned adult who has taken courses in spotting learning disabilities. I'm also someone who will do absolutely anything to make sure his students have the best chance for success now and in the future. I'm also someone who asked both my ADHD-psychiatrist (hi!) and ADHD-therapist (hi!!!!!) if I had the right to tell students if I suspected something; they both went, Ya, dude. Totally. So I try to be Sven. I try to pay attention to what my students do and say and provide feedback that can help them. I'd like to note what that feedback is here to make sure people don't miss it because my pieces go on for way too long. If you are a high school student who suspects he or she has ADHD, your best course of action is to talk with your parents and look into being tested by a professional psychiatrist who specializes in the topic. These tests are expensive, and mental health insurance in America sucks balls. But this is the fastest, most straightforward route to getting the help you need. Option two is to try and work with/through your public high school to get them to pay for it.This site has some good info. My guess is that this method will suck. Public schools don't have a lot of funding and will not want to spend it on you. That's not your problem. You will almost certainly need your parents to back you up on this one and sit through a lot of boring meetings. I assume a lot of people will tell you a lot of reasons why they can't help you. Your response every time should be some version of, "Sure. But I need help with this. And I'm not going to stop until I get the support I need. So what do I do from here?" Then you blankly stare at them and refuse to leave until they get you at least to the next step. I'm not sure how well this will work. If you do attempt or have attempted this method, please DM me or contact my Email with your experience. I want to know if this is even worth my student's time. If you can not afford traditional testing or do not feel your parents would support such testing, your best option is to wait until the day you turn 18 and then register for a telehealth company specializing in ADHD. The one I use and recommend isHelloAhead.com. They're neat. They do not take traditional insurance, but their rates are much lower than most doctors. They are cheap enough that I feel an average 18-year old who wants help could find a way to afford it on his or her own. The downside with these sites is the waiting times can be long. Took me like five months. Other such sites are popping up, and while I can't vouch for them, they all seem to offer a similar service. Those paragraphs are what I want every student here to know. I'm much more comfortable having a trained doctor tell you what the deal is than I am trying to do it myself. But I have to see something if I want to be Sven. The question then is, how do I see it? For spotting ADHD, it's shockingly simple. And I'll get to the real reason at the end. But for now, here is what I see when I see a student with ADHD. The best way I can describe their lives is "endless chaos" The chaos isn't always bad! Rarely it's fun chaos, but often it's just chaos chaos. This chaos exists in both physical and mental forms. Physical: Their shit is such a mess. Everything. Most of the work we do is digital, so I see the Google Doc version of their mind. Folders make no sense. Things are labeled inaccurately or not at all. Schools get combined, or separated, or forgotten altogether. It is not a single type of error, but instead a collection of small mistakes and poor decisions that make the work impossible to corral. I have some kids that are messy or lazy, but this is different. It's like if the original folder system I built for them was an amoeba in a petri dish. Leave that dish out for a weekend and come back. The patterns will be remarkably similar to the organizational gore that they then try to utilize. Mental: There's always a story. "I was late because my car has a flat tire, and the guy was late, so I had to take an Uber." "I didn't know my music essays were due a month early because the form only mentioned there being a recital." "My friend is mad at me, but it's only because she didn't tell me we were the first group presenting, so I spent more time preparing our project". These stories make sense at first. But after a few weeks, they start to pile up. Then I become the one hearing a story about why they didn't do what I wanted, and I stop being so forgiving. ADHD is a neurological disorder. Not a mental illness. It's closer to diabetes than it is bi-polar. "ADHD" is a fairly garbage name for the condition because A) it has a stigma, and B) it isn't even accurate. Both attention deficit and hyperactivity are symptoms of ADHD, but they are not the problem itself. It would be like calling clinical depression "low energy and excessive guilt disorder". ADHD is actually an issue involving improper dopamine regulation in the brain combined with under-activity of the brain's executive function component. The executive function center is the part of your brain that is in charge of making sure all the other parts of your brain play nice and communicate. When the executive function center breaks down...those other parts don't. The result is a failure to plan or coordinate + a need for impulsive stimulation, thus resulting in endless chaos. This is what I’ll ask you if you DM me, btw. Is your life endless chaos? Sometimes do you like the chaos? Sometimes do you get bored and create the chaos yourself just to see what might happen? But when that chaos stops being so fun, can you make it stop? They're very, very intelligent You've probably heard about the "gifted ADHD genius" thing before. I don't think it exists. My theory has always been that the "gifted ADHD child" is a victim of survivorship bias. The research states that ADHD has either no or a negative correlation with intelligence. There is also a startling overlap with ADHD and incarceration. This means that students who still manage to succeed despite their disorder tend to have advantages that keep them in the game. Namely that they're smart as hell. The other saving grace is that they come from secure support networks that prevent them from unraveling completely. I've heard from such students that their mom or dad works tirelessly to keep their life in order and to make sure they're getting things done. I do not think it is a coincidence that when ADHD students leave for college, things often fall apart. The fact that there are ADHD kids that others know and still like makes some think ADHD isn't so bad or comes with natural cognitive advantages. Those same people do not become friends with the ADHD dumb kids who would disprove those perceptions. Do you remember that kid in elementary school who was his own worst enemy? He never had friends, and everyone was kind of afraid to even talk with him? He was kind of a bully but mostly just awful? He invited you to his house one time, but your mom wouldn’t let you go? That is my best guess of what a dumb kid with ADHD is like. It sounds cold writing it, but you know which kid I'm talking about right now. Where do you think that kid is today? I end up with the smart ones—the ones with parents who care. And God damn are these kids smart. They're brilliant, and funny, and likable, and charming. They have something different about them that makes them undeniable. And it's not just me. I worry I play them up too much in my mind, but then I chat with a teacher or coach of theirs. It's always the same thing: Oh, she's brilliant. She can be so frustrating sometimes, tho. They can be so frustrating sometimes, tho The word is frustrating. Now bad. Not nasty. Not unlikeable. Frustrating. I have some students I just don't like that much (no, not you). What tends to be the common theme with them is that they don't have much interest in my help and display a work ethic to match. On the other spectrum are the world beaters (totally you). These kids kick ass and not only follow my advice but often take that advice to the next level in ways that awe and inspire me. And then there are the kids I think have ADHD. They don't do stuff all the time. They don't finish an essay, or they forget to spell check like I asked, or they write about something that has nothing to do with the outline we built the week before. That's not necessarily the frustrating part. You kids are 17; you make mistakes. Early on, I try to spot these mistakes and point them out. Even the students who don't like me seem to get my point after enough prodding and the problem goes away. With these kids, the problem does not go away. Or if it does, another problem pops right back up to replace it. It makes me feel like there's nothing I can do. It would be easier if the student was just a brat. Then I could either become a brat myself or mentally check out because "hey man, your future”. I need a name for kids I suspect have ADHD…"MaybeHD"? Ya. That’s super funny. Say it out loud and try not to laugh. But these MaybeHD kids do like me. And they do want to get into school. And they do feel bad when I get upset with them. I end up in long, drawn-out conversations with them about why this is important and why they need to make specific work a priority to get into the schools they want to go to. Then they nod meekly and head home. Then they come back next week, and it's the same story. Frustrating. They are randomly awesome at the weirdest things I love weird talents. Things that no one offers up immediately, but then you're chatting, and it comes up naturally. "Oh ya, I love animals! I raise baby pigs in my backyard!" "You do?" "Ya!" At some point, the MaybeHD kid read something or watched a Youtube video that he or she liked. Then they wanted to try it. Six months later, they're making 4k a month selling custom bathrobes on Etsy. There's rarely any logic. "Do you like baths? Or making clothing? "Not really. I just thought it looked fun, so I bought a sewing kit and started making things." There is a noted link between ADHD and entrepreneurship. I see it with my MaybeHD students. They have an insatiable drive and passion for following up on curiosities that other students don't possess. Passion is the wrong word. They have obsessions with mastering concepts in a way that feels beyond their control. The obsession itself drives them to be great. The literature on the subject is cloudy. But there exists a term in ADHD circles called "Hyperfocus". If you know what "flow" is, it's kind of like that. Only more intense and less controllable. I often see the remnants of past hyperfocuses in their stories. They used to run that pig farm. They used to sell bathrobes. They used to be really into getting good grades at school. But then one day, just as quickly as they picked the skill up, they dropped it. They can seldom tell me why. Their priorities are completely out of whack The downside of hyperfocus is that it can be so all-encompassing that other priorities fall by the wayside. One of my favorite students ever is named Elleway. We chatted in our first meeting, and I was instantly intrigued by her background. She said she had designed and prototyped a unit that would automatically roll under parked electric cars for hands-free charging. I hear a lot of impressive stuff in my job, and a lot of it ends up being not that impressive. But then Elleway showed me the prototype video she made back when she was a high school freshman and it blew my mind. https://youtu.be/Y5Ap2uMbWL4 Can you do that? I sure as hell can't. She wasn't even an engineer. She calmly explained that she had partnered with several older male engineers who had helped turn her idea into reality. Then she had done all the promotional and marketing work herself. Then she got second out of 300 students at a young entrepreneur contest held at Columbia University. Shortly after, a tech CEO came up to her and asked if she would like to work with him to file a patent for the invention. She agreed and is now a trademark holder. That was all in our first 10 minutes. She then went on to share the half dozen corporations she had worked for. And the three businesses she started. And the graphic design work she made for her website. She told me how she was a Nationally ranked fencer until she lost interest. She was now merely a Nationally ranked golfer. Then I saw she had a 2.9 GPA and thus zero shot at getting into NYU like she hoped. I did not initially think Elleway had ADHD. I thought she was a pathological liar. It seemed impossible to me that this same girl who had already taken a grip on the world was then unable to keep up her grades in math. That just isn’t how any -any- of my other ultra high-achieving students behave. Then Elleway showed me pictures of her casually hanging out with Andrew Yang. And then her LinkedIn With a lot of people who do not accept your request unless they want to. I had to figure out what the hell led to all this. Elleway’s patent and ambition to work on it had taken up all her time. She was so singularly focused on doing what she cared about that the world behind her didn't seem to exist. She was hyperfocused on a goal, but once she reached it, she woke up to a reality that punished her for ignoring everything else. That's the longing writer's version of the story. The more popular one is that she didn't give a shit about school, was warned repeatedly about the consequences, and ignored them. She got what she deserved. That’s the version the rest of the world had for her. It goes back to frustrating. I've gotten kids into NYU that don't show a fifth the potential that Elleway did. Those kids went to all the camps their parents paid for and entered competitions with a tech doorbell or something lame, and they're just fine. But MaybeHD students are often world-beaters in ways that make them seem so special. They talk endlessly not just about what they're into but how they figured it all out and why it is all so important to them. I believe them, and I want to fight for them. So I give them as much assistance as I possibly can. But then they don't do the increasingly easy tasks I ask for them to complete. Then they suffer the consequences. Elleway didn't get into NYU. She didn't get in much of anywhere. It eats me up inside, and I feel like I failed her. I don't know how many other people in my position would feel the same way. That's why I have to be Sven. This is getting long, and I'm getting depressed. Here's the TL: DR of what I see when I see a student with ADHD ... Me. I see me. And it can hurt really bad knowing what a condition like ADHD does to a young person's life. My life is endless chaos. I've been out of food for nine days. My house looks like Badger from Breaking Bad bought a loft in Palo Alto. I am still writing this at 3:25 AM when I have to be up for work at nine. My cat has started doing this thing where she sleeps in her food bowl when it gets empty. It's equal parts adorable and humiliating. I'm smart as shit. I know it. I made up half-ideas. That article is absolute fire. I got published on Cracked.com five times in 2011 when that meant something. I went to Tulane on a half-ride merit scholarship, used to win creative writing contests, and have done a bunch of other writery stuff that made people stand up and go, "Woah". But I only made it to college because my mom carried me there, kicking and screaming. She packaged my life together, and I held on for the ride. Then I got to school and made it two months before she got an Email alerting her that Tulane was planning to revoke the remaining $70,000 of my $80,000 scholarship due to my grades. I barely scraped by and survived. But the shame and frustration in her voice when she read me that letter over the phone haunts me to this day. I analyze handwriting. And I turned a Reddit account into a successful business in four months. And I collect college T-shirts from schools my students go to. And I own Bitcoin I bought in 2011 for $4.50 each. And I'm teaching myself piano with a video game. And I'm exercising with a video game. And I'm ranked 42nd in Northern California at Super Smash Bros Ultimate. And I’ve tried the nachos at over 100 Taquerias in the Bay Area. And I own a really cute cat. But I've spent 15* hours this week writing this instead of a sequel to that Costco piece. I have one coming where I edit my Common App essay from 2009. It's a great idea and a great article. One that will drive significantly more business to my site than this piece will. Hell, I predict this piece is likely to lose me business because I come off like a mess in it. But it's what I want to write, so I feel like I have no choice. *The 15 hours is a guess. I have no idea how long it takes me to write and edit these things. I start typing and X hours later look up and realize how hungry I am and how much I need to pee. The writing controls me. I see myself in my MaybeHD students. I see their unfettered curiosity and flair for taking as much good from the world as possible. I see their infectious enthusiasm and ability to quickly forgive others because they know too well how it feels to want forgiveness themselves. Yet I also see their inattention to detail, their weak excuses, and their general confusion that makes me realize they couldn't fix some problems if their lives depended on it. I see their sadness and shame when those mistakes pile up. I see when the chaos stops being fun, and they want out, but they don't know how. I don't know what I, as their consultant, can do. But as Sven, I can recommend they go talk to someone else... Hey, so, I was considering hiring you and all...but you seem kind of bad. Why should I trust you? Because a couple of years ago, I got back on my medication and turned my life around. You aren't reading this if I don't reach out for help and trust a trained psychiatrist to guide me. There are no groups of friends in Delaware or Connecticut comparing their half-ideas lists. There sure as shit isn't a CollegeWithMattie.com. I still have ADHD. But one of the greatest things about ADHD is that it is -without rival- the most treatable form of mental illness or dysfunction known to man. It is not curable, but there are endless medical and non-medical options available for those willing to reach out and get the help they need. My story is that it was only by getting re-medicated that I then could learn and use coping mechanisms that allow me to achieve the type of life I've always wanted. Christ, 4,400 words. You know, I'm also submitting this for a class I'm in. That's why all the backlinks are to actual sources instead of links herding you into my website. Hi Amy! That's one more thing. ADHD people are hyper-efficient...Kind of. Alright. If you're still here reading this, you might be suspecting some things about yourself. My DMs are open if you want to chat, but again, I am not a doctor. I will say that right now, as you prepare to head to college, is a really good time to get this all figured out. College is a giant reset button on your life. Figure these problems out now so that by the time you head off for your next chapter, you will have given yourself the best possible chance to succeed. Endless chaos. Here is the bold part again: If you are a student in high school who suspects he or she has ADHD, your best course of action is to talk with your parents and look into being tested by a professional psychiatrist who specializes in the topic. These tests are expensive, and mental health insurance in America (still) sucks balls. But this is the fastest, most straightforward route to getting the help you need. Option two is to try and work with/through your public high school to get them to pay for it.This site has some good info. My guess is that this method will kind of suck. Public schools don't have a lot of funding and will not want to spend it on you. That's not your problem. You will almost certainly need your parents to back you up on this one and sit through a lot of boring meetings. I assume a lot of people will tell you a lot of reasons why they can't help you. Your response every time should be some version of, "Sure. But I need help with this. And I'm not going to stop until I get the support I need. So what do I do from here?" Then you blankly stare at them and refuse to leave until they get you at least to the next step. This will suck and I'm not sure how well it will work. If you do attempt or have attempted this method, please DM me or contact my Email with your experience. I want to know if this is even worth my student's time. If you can not afford traditional testing, or if you do not feel your parents would support such testing, your best option is to wait until the day you turn 18 and then register for a telehealth company that specializes in ADHD. The one I use and recommend isHelloAhead.com. They're neat. They do not take traditional insurance, but their rates are much lower than most doctors. They are cheap enough that I feel an average 18-year old who wants help could find a way to afford it on his or her own. The downside with these sites is the waiting times can be really long. Took me like five months. Other such sites are popping up, and while I can't vouch for them, they all seem to offer a similar service. Update: The lines aren't that long anymore! Monday was Elleway's 18th birthday. She sent me a screengrab of her upcoming Ahead appointment in early September. She told me she spent the entire day crying because all her friends were going off to great schools and that she was stuck at home. I've told Elleway that I plan to help her reapply to NYU this year. I doubt I will ever want to see another student succeed as much as I will with her.
Cosmos is a heterogeneous network of many independent parallel blockchains, each powered by classical BFT consensus algorithms like Tendermint. Developers can easily build custom application specific blockchains, called Zones, through the Cosmos SDK framework. These Zones connect to Hubs, which are specifically designed to connect zones together. The vision of Cosmos is to have thousands of Zones and Hubs that are Interoperable through the Inter-Blockchain Communication Protocol (IBC). Cosmos can also connect to other systems through peg zones, which are specifically designed zones that each are custom made to interact with another ecosystem such as Ethereum and Bitcoin. Cosmos does not use Sharding with each Zone and Hub being sovereign with their own validator set. For a more in-depth look at Cosmos and provide more reference to points made in this article, please see my three part series — Part One, Part Two, Part Three (There's a youtube video with a quick video overview of Cosmos on the medium article - https://medium.com/ava-hub/comparison-between-avalanche-cosmos-and-polkadot-a2a98f46c03b)
Polkadot is a heterogeneous blockchain protocol that connects multiple specialised blockchains into one unified network. It achieves scalability through a sharding infrastructure with multiple blockchains running in parallel, called parachains, that connect to a central chain called the Relay Chain. Developers can easily build custom application specific parachains through the Substrate development framework. The relay chain validates the state transition of connected parachains, providing shared state across the entire ecosystem. If the Relay Chain must revert for any reason, then all of the parachains would also revert. This is to ensure that the validity of the entire system can persist, and no individual part is corruptible. The shared state makes it so that the trust assumptions when using parachains are only those of the Relay Chain validator set, and no other. Interoperability is enabled between parachains through Cross-Chain Message Passing (XCMP) protocol and is also possible to connect to other systems through bridges, which are specifically designed parachains or parathreads that each are custom made to interact with another ecosystem such as Ethereum and Bitcoin. The hope is to have 100 parachains connect to the relay chain. For a more in-depth look at Polkadot and provide more reference to points made in this article, please see my three part series — Part One, Part Two, Part Three (There's a youtube video with a quick video overview of Polkadot on the medium article - https://medium.com/ava-hub/comparison-between-avalanche-cosmos-and-polkadot-a2a98f46c03b)
Avalanche is a platform of platforms, ultimately consisting of thousands of subnets to form a heterogeneous interoperable network of many blockchains, that takes advantage of the revolutionary Avalanche Consensus protocols to provide a secure, globally distributed, interoperable and trustless framework offering unprecedented decentralisation whilst being able to comply with regulatory requirements. Avalanche allows anyone to create their own tailor-made application specific blockchains, supporting multiple custom virtual machines such as EVM and WASM and written in popular languages like Go (with others coming in the future) rather than lightly used, poorly-understood languages like Solidity. This virtual machine can then be deployed on a custom blockchain network, called a subnet, which consist of a dynamic set of validators working together to achieve consensus on the state of a set of many blockchains where complex rulesets can be configured to meet regulatory compliance. Avalanche was built with serving financial markets in mind. It has native support for easily creating and trading digital smart assets with complex custom rule sets that define how the asset is handled and traded to ensure regulatory compliance can be met. Interoperability is enabled between blockchains within a subnet as well as between subnets. Like Cosmos and Polkadot, Avalanche is also able to connect to other systems through bridges, through custom virtual machines made to interact with another ecosystem such as Ethereum and Bitcoin. For a more in-depth look at Avalanche and provide more reference to points made in this article, please see here and here (There's a youtube video with a quick video overview of Avalanche on the medium article - https://medium.com/ava-hub/comparison-between-avalanche-cosmos-and-polkadot-a2a98f46c03b)
Comparison between Cosmos, Polkadot and Avalanche
A frequent question I see being asked is how Cosmos, Polkadot and Avalanche compare? Whilst there are similarities there are also a lot of differences. This article is not intended to be an extensive in-depth list, but rather an overview based on some of the criteria that I feel are most important. For a more in-depth view I recommend reading the articles for each of the projects linked above and coming to your own conclusions. I want to stress that it’s not a case of one platform being the killer of all other platforms, far from it. There won’t be one platform to rule them all, and too often the tribalism has plagued this space. Blockchains are going to completely revolutionise most industries and have a profound effect on the world we know today. It’s still very early in this space with most adoption limited to speculation and trading mainly due to the limitations of Blockchain and current iteration of Ethereum, which all three of these platforms hope to address. For those who just want a quick summary see the image at the bottom of the article. With that said let’s have a look
Each Zone and Hub in Cosmos is capable of up to around 1000 transactions per second with bandwidth being the bottleneck in consensus. Cosmos aims to have thousands of Zones and Hubs all connected through IBC. There is no limit on the number of Zones / Hubs that can be created
Parachains in Polkadot are also capable of up to around 1500 transactions per second. A portion of the parachain slots on the Relay Chain will be designated as part of the parathread pool, the performance of a parachain is split between many parathreads offering lower performance and compete amongst themselves in a per-block auction to have their transactions included in the next relay chain block. The number of parachains is limited by the number of validators on the relay chain, they hope to be able to achieve 100 parachains.
Avalanche is capable of around 4500 transactions per second per subnet, this is based on modest hardware requirements to ensure maximum decentralisation of just 2 CPU cores and 4 GB of Memory and with a validator size of over 2,000 nodes. Performance is CPU-bound and if higher performance is required then more specialised subnets can be created with higher minimum requirements to be able to achieve 10,000 tps+ in a subnet. Avalanche aims to have thousands of subnets (each with multiple virtual machines / blockchains) all interoperable with each other. There is no limit on the number of Subnets that can be created.
All three platforms offer vastly superior performance to the likes of Bitcoin and Ethereum 1.0. Avalanche with its higher transactions per second, no limit on the number of subnets / blockchains that can be created and the consensus can scale to potentially millions of validators all participating in consensus scores ✅✅✅. Polkadot claims to offer more tps than cosmos, but is limited to the number of parachains (around 100) whereas with Cosmos there is no limit on the number of hubs / zones that can be created. Cosmos is limited to a fairly small validator size of around 200 before performance degrades whereas Polkadot hopes to be able to reach 1000 validators in the relay chain (albeit only a small number of validators are assigned to each parachain). Thus Cosmos and Polkadot scores ✅✅ https://preview.redd.it/2o0brllyvpq51.png?width=1000&format=png&auto=webp&s=8f62bb696ecaafcf6184da005d5fe0129d504518
Tendermint consensus is limited to around 200 validators before performance starts to degrade. Whilst there is the Cosmos Hub it is one of many hubs in the network and there is no central hub or limit on the number of zones / hubs that can be created.
Polkadot has 1000 validators in the relay chain and these are split up into a small number that validate each parachain (minimum of 14). The relay chain is a central point of failure as all parachains connect to it and the number of parachains is limited depending on the number of validators (they hope to achieve 100 parachains). Due to the limited number of parachain slots available, significant sums of DOT will need to be purchased to win an auction to lease the slot for up to 24 months at a time. Thus likely to lead to only those with enough funds to secure a parachain slot. Parathreads are however an alternative for those that require less and more varied performance for those that can’t secure a parachain slot.
Avalanche consensus scan scale to tens of thousands of validators, even potentially millions of validators all participating in consensus through repeated sub-sampling. The more validators, the faster the network becomes as the load is split between them. There are modest hardware requirements so anyone can run a node and there is no limit on the number of subnets / virtual machines that can be created.
Avalanche offers unparalleled decentralisation using its revolutionary consensus protocols that can scale to millions of validators all participating in consensus at the same time. There is no limit to the number of subnets and virtual machines that can be created, and they can be created by anyone for a small fee, it scores ✅✅✅. Cosmos is limited to 200 validators but no limit on the number of zones / hubs that can be created, which anyone can create and scores ✅✅. Polkadot hopes to accommodate 1000 validators in the relay chain (albeit these are split amongst each of the parachains). The number of parachains is limited and maybe cost prohibitive for many and the relay chain is a ultimately a single point of failure. Whilst definitely not saying it’s centralised and it is more decentralised than many others, just in comparison between the three, it scores ✅ https://preview.redd.it/ckfamee0wpq51.png?width=1000&format=png&auto=webp&s=c4355f145d821fabf7785e238dbc96a5f5ce2846
Tendermint consensus used in Cosmos reaches finality within 6 seconds. Cosmos consists of many Zones and Hubs that connect to each other. Communication between 2 zones could pass through many hubs along the way, thus also can contribute to latency times depending on the path taken as explained in part two of the articles on Cosmos. It doesn’t need to wait for an extended period of time with risk of rollbacks.
Polkadot provides a Hybrid consensus protocol consisting of Block producing protocol, BABE, and then a finality gadget called GRANDPA that works to agree on a chain, out of many possible forks, by following some simpler fork choice rule. Rather than voting on every block, instead it reaches agreements on chains. As soon as more than 2/3 of validators attest to a chain containing a certain block, all blocks leading up to that one are finalized at once. If an invalid block is detected after it has been finalised then the relay chain would need to be reverted along with every parachain. This is particularly important when connecting to external blockchains as those don’t share the state of the relay chain and thus can’t be rolled back. The longer the time period, the more secure the network is, as there is more time for additional checks to be performed and reported but at the expense of finality. Finality is reached within 60 seconds between parachains but for external ecosystems like Ethereum their state obviously can’t be rolled back like a parachain and so finality will need to be much longer (60 minutes was suggested in the whitepaper) and discussed in more detail in part three
Avalanche consensus achieves finality within 3 seconds, with most happening sub 1 second, immutable and completely irreversible. Any subnet can connect directly to another without having to go through multiple hops and any VM can talk to another VM within the same subnet as well as external subnets. It doesn’t need to wait for an extended period of time with risk of rollbacks.
With regards to performance far too much emphasis is just put on tps as a metric, the other equally important metric, if not more important with regards to finance is latency. Throughput measures the amount of data at any given time that it can handle whereas latency is the amount of time it takes to perform an action. It’s pointless saying you can process more transactions per second than VISA when it takes 60 seconds for a transaction to complete. Low latency also greatly increases general usability and customer satisfaction, nowadays everyone expects card payments, online payments to happen instantly. Avalanche achieves the best results scoring ✅✅✅, Cosmos with comes in second with 6 second finality ✅✅ and Polkadot with 60 second finality (which may be 60 minutes for external blockchains) scores ✅ https://preview.redd.it/kzup5x42wpq51.png?width=1000&format=png&auto=webp&s=320eb4c25dc4fc0f443a7a2f7ff09567871648cd
Every Zone and Hub in Cosmos has their own validator set and different trust assumptions. Cosmos are researching a shared security model where a Hub can validate the state of connected zones for a fee but not released yet. Once available this will make shared security optional rather than mandatory.
Shared Security is mandatory with Polkadot which uses a Shared State infrastructure between the Relay Chain and all of the connected parachains. If the Relay Chain must revert for any reason, then all of the parachains would also revert. Every parachain makes the same trust assumptions, and as such the relay chain validates state transition and enables seamless interoperability between them. In return for this benefit, they have to purchase DOT and win an auction for one of the available parachain slots. However, parachains can’t just rely on the relay chain for their security, they will also need to implement censorship resistance measures and utilise proof of work / proof of stake for each parachain as well as discussed in part three, thus parachains can’t just rely on the security of the relay chain, they need to ensure sybil resistance mechanisms using POW and POS are implemented on the parachain as well.
A subnet in Avalanche consists of a dynamic set of validators working together to achieve consensus on the state of a set of many blockchains where complex rulesets can be configured to meet regulatory compliance. So unlike in Cosmos where each zone / hub has their own validators, A subnet can validate a single or many virtual machines / blockchains with a single validator set. Shared security is optional
Shared security is mandatory in polkadot and a key design decision in its infrastructure. The relay chain validates the state transition of all connected parachains and thus scores ✅✅✅. Subnets in Avalanche can validate state of either a single or many virtual machines. Each subnet can have their own token and shares a validator set, where complex rulesets can be configured to meet regulatory compliance. It scores ✅ ✅. Every Zone and Hub in cosmos has their own validator set / token but research is underway to have the hub validate the state transition of connected zones, but as this is still early in the research phase scores ✅ for now. https://preview.redd.it/pbgyk3o3wpq51.png?width=1000&format=png&auto=webp&s=61c18e12932a250f5633c40633810d0f64520575
The Cosmos project started in 2016 with an ICO held in April 2017. There are currently around 50 projects building on the Cosmos SDK with a full list can be seen here and filtering for Cosmos SDK . Not all of the projects will necessarily connect using native cosmos sdk and IBC and some have forked parts of the Cosmos SDK and utilise the tendermint consensus such as Binance Chain but have said they will connect in the future.
The Polkadot project started in 2016 with an ICO held in October 2017. There are currently around 70 projects building on Substrate and a full list can be seen here and filtering for Substrate Based. Like with Cosmos not all projects built using substrate will necessarily connect to Polkadot and parachains or parathreads aren’t currently implemented in either the Live or Test network (Kusama) as of the time of this writing.
Avalanche in comparison started much later with Ava Labs being founded in 2018. Avalanche held it’s ICO in July 2020. Due to lot shorter time it has been in development, the number of projects confirmed are smaller with around 14 projects currently building on Avalanche. Due to the customisability of the platform though, many virtual machines can be used within a subnet making the process incredibly easy to port projects over. As an example, it will launch with the Ethereum Virtual Machine which enables byte for byte compatibility and all the tooling like Metamask, Truffle etc. will work, so projects can easily move over to benefit from the performance, decentralisation and low gas fees offered. In the future Cosmos and Substrate virtual machines could be implemented on Avalanche.
Whilst it’s still early for all 3 projects (and the entire blockchain space as a whole), there is currently more projects confirmed to be building on Cosmos and Polkadot, mostly due to their longer time in development. Whilst Cosmos has fewer projects, zones are implemented compared to Polkadot which doesn’t currently have parachains. IBC to connect zones and hubs together is due to launch Q2 2021, thus both score ✅✅✅. Avalanche has been in development for a lot shorter time period, but is launching with an impressive feature set right from the start with ability to create subnets, VMs, assets, NFTs, permissioned and permissionless blockchains, cross chain atomic swaps within a subnet, smart contracts, bridge to Ethereum etc. Applications can easily port over from other platforms and use all the existing tooling such as Metamask / Truffle etc but benefit from the performance, decentralisation and low gas fees offered. Currently though just based on the number of projects in comparison it scores ✅. https://preview.redd.it/4zpi6s85wpq51.png?width=1000&format=png&auto=webp&s=e91ade1a86a5d50f4976f3b23a46e9287b08e373
Cosmos enables permissioned and permissionless zones which can connect to each other with the ability to have full control over who validates the blockchain. For permissionless zones each zone / hub can have their own token and they are in control who validates.
With polkadot the state transition is performed by a small randomly selected assigned group of validators from the relay chain plus with the possibility that state is rolled back if an invalid transaction of any of the other parachains is found. This may pose a problem for enterprises that need complete control over who performs validation for regulatory reasons. In addition due to the limited number of parachain slots available Enterprises would have to acquire and lock up large amounts of a highly volatile asset (DOT) and have the possibility that they are outbid in future auctions and find they no longer can have their parachain validated and parathreads don’t provide the guaranteed performance requirements for the application to function.
Avalanche enables permissioned and permissionless subnets and complex rulesets can be configured to meet regulatory compliance. For example a subnet can be created where its mandatory that all validators are from a certain legal jurisdiction, or they hold a specific license and regulated by the SEC etc. Subnets are also able to scale to tens of thousands of validators, and even potentially millions of nodes, all participating in consensus so every enterprise can run their own node rather than only a small amount. Enterprises don’t have to hold large amounts of a highly volatile asset, but instead pay a fee in AVAX for the creation of the subnets and blockchains which is burnt.
Avalanche provides the customisability to run private permissioned blockchains as well as permissionless where the enterprise is in control over who validates the blockchain, with the ability to use complex rulesets to meet regulatory compliance, thus scores ✅✅✅. Cosmos is also able to run permissioned and permissionless zones / hubs so enterprises have full control over who validates a blockchain and scores ✅✅. Polkadot requires locking up large amounts of a highly volatile asset with the possibility of being outbid by competitors and being unable to run the application if the guaranteed performance is required and having to migrate away. The relay chain validates the state transition and can roll back the parachain should an invalid block be detected on another parachain, thus scores ✅. https://preview.redd.it/li5jy6u6wpq51.png?width=1000&format=png&auto=webp&s=e2a95f1f88e5efbcf9e23c789ae0f002c8eb73fc
Cosmos will connect Hubs and Zones together through its IBC protocol (due to release in Q1 2020). Connecting to blockchains outside of the Cosmos ecosystem would either require the connected blockchain to fork their code to implement IBC or more likely a custom “Peg Zone” will be created specific to work with a particular blockchain it’s trying to bridge to such as Ethereum etc. Each Zone and Hub has different trust levels and connectivity between 2 zones can have different trust depending on which path it takes (this is discussed more in this article). Finality time is low at 6 seconds, but depending on the number of hops, this can increase significantly.
Polkadot’s shared state means each parachain that connects shares the same trust assumptions, of the relay chain validators and that if one blockchain needs to be reverted, all of them will need to be reverted. Interoperability is enabled between parachains through Cross-Chain Message Passing (XCMP) protocol and is also possible to connect to other systems through bridges, which are specifically designed parachains or parathreads that each are custom made to interact with another ecosystem such as Ethereum and Bitcoin. Finality time between parachains is around 60 seconds, but longer will be needed (initial figures of 60 minutes in the whitepaper) for connecting to external blockchains. Thus limiting the appeal of connecting two external ecosystems together through Polkadot. Polkadot is also limited in the number of Parachain slots available, thus limiting the amount of blockchains that can be bridged. Parathreads could be used for lower performance bridges, but the speed of future blockchains is only going to increase.
A subnet can validate multiple virtual machines / blockchains and all blockchains within a subnet share the same trust assumptions / validator set, enabling cross chain interoperability. Interoperability is also possible between any other subnet, with the hope Avalanche will consist of thousands of subnets. Each subnet may have a different trust level, but as the primary network consists of all validators then this can be used as a source of trust if required. As Avalanche supports many virtual machines, bridges to other ecosystems are created by running the connected virtual machine. There will be an Ethereum bridge using the EVM shortly after mainnet. Finality time is much faster at sub 3 seconds (with most happening under 1 second) with no chance of rolling back so more appealing when connecting to external blockchains.
All 3 systems are able to perform interoperability within their ecosystem and transfer assets as well as data, as well as use bridges to connect to external blockchains. Cosmos has different trust levels between its zones and hubs and can create issues depending on which path it takes and additional latency added. Polkadot provides the same trust assumptions for all connected parachains but has long finality and limited number of parachain slots available. Avalanche provides the same trust assumptions for all blockchains within a subnet, and different trust levels between subnets. However due to the primary network consisting of all validators it can be used for trust. Avalanche also has a much faster finality time with no limitation on the number of blockchains / subnets / bridges that can be created. Overall all three blockchains excel with interoperability within their ecosystem and each score ✅✅. https://preview.redd.it/ai0bkbq8wpq51.png?width=1000&format=png&auto=webp&s=3e85ee6a3c4670f388ccea00b0c906c3fb51e415
The ATOM token is the native token for the Cosmos Hub. It is commonly mistaken by people that think it’s the token used throughout the cosmos ecosystem, whereas it’s just used for one of many hubs in Cosmos, each with their own token. Currently ATOM has little utility as IBC isn’t released and has no connections to other zones / hubs. Once IBC is released zones may prefer to connect to a different hub instead and so ATOM is not used. ATOM isn’t a fixed capped supply token and supply will continuously increase with a yearly inflation of around 10% depending on the % staked. The current market cap for ATOM as of the time of this writing is $1 Billion with 203 million circulating supply. Rewards can be earnt through staking to offset the dilution caused by inflation. Delegators can also get slashed and lose a portion of their ATOM should the validator misbehave.
Polkadot’s native token is DOT and it’s used to secure the Relay Chain. Each parachain needs to acquire sufficient DOT to win an auction on an available parachain lease period of up to 24 months at a time. Parathreads have a fixed fee for registration that would realistically be much lower than the cost of acquiring a parachain slot and compete with other parathreads in a per-block auction to have their transactions included in the next relay chain block. DOT isn’t a fixed capped supply token and supply will continuously increase with a yearly inflation of around 10% depending on the % staked. The current market cap for DOT as of the time of this writing is $4.4 Billion with 852 million circulating supply. Delegators can also get slashed and lose their DOT (potentially 100% of their DOT for serious attacks) should the validator misbehave.
AVAX is the native token for the primary network in Avalanche. Every validator of any subnet also has to validate the primary network and stake a minimum of 2000 AVAX. There is no limit to the number of validators like other consensus methods then this can cater for tens of thousands even potentially millions of validators. As every validator validates the primary network, this can be a source of trust for interoperability between subnets as well as connecting to other ecosystems, thus increasing amount of transaction fees of AVAX. There is no slashing in Avalanche, so there is no risk to lose your AVAX when selecting a validator, instead rewards earnt for staking can be slashed should the validator misbehave. Because Avalanche doesn’t have direct slashing, it is technically possible for someone to both stake AND deliver tokens for something like a flash loan, under the invariant that all tokens that are staked are returned, thus being able to make profit with staked tokens outside of staking itself. There will also be a separate subnet for Athereum which is a ‘spoon,’ or friendly fork, of Ethereum, which benefits from the Avalanche consensus protocol and applications in the Ethereum ecosystem. It’s native token ATH will be airdropped to ETH holders as well as potentially AVAX holders as well. This can be done for other blockchains as well. Transaction fees on the primary network for all 3 of the blockchains as well as subscription fees for creating a subnet and blockchain are paid in AVAX and are burnt, creating deflationary pressure. AVAX is a fixed capped supply of 720 million tokens, creating scarcity rather than an unlimited supply which continuously increase of tokens at a compounded rate each year like others. Initially there will be 360 tokens minted at Mainnet with vesting periods between 1 and 10 years, with tokens gradually unlocking each quarter. The Circulating supply is 24.5 million AVAX with tokens gradually released each quater. The current market cap of AVAX is around $100 million.
You've probably been hearing a lot about Bitcoin recently and are wondering what's the big deal? Most of your questions should be answered by the resources below but if you have additional questions feel free to ask them in the comments. It all started with the release of the release of Satoshi Nakamoto's whitepaper however that will probably go over the head of most readers so we recommend the following videos for a good starting point for understanding how bitcoin works and a little about its long term potential:
Limited Supply - There will only ever be 21,000,000 bitcoins created and they are issued in a predictable fashion, you can view the inflation schedule here. Once they are all issued Bitcoin will be truly deflationary. The halving countdown can be found here.
Open source - Bitcoin code is fully auditable. You can read the source code yourself here.
Accountable - The public ledger is transparent, all transactions are seen by everyone.
Decentralized - Bitcoin is globally distributed across thousands of nodes with no single point of failure and as such can't be shut down similar to how Bittorrent works. You can even run a node on a Raspberry Pi.
Censorship resistant - No one can prevent you from interacting with the bitcoin network and no one can censor, alter or block transactions that they disagree with, see Operation Chokepoint.
Push system - There are no chargebacks in bitcoin because only the person who owns the address where the bitcoins reside has the authority to move them.
Low fee scaling - On chain transaction fees depend on network demand and how much priority you wish to assign to the transaction. Most wallets calculate on chain fees automatically but you can view current fees here and mempool activity here. On chain fees may rise occasionally due to network demand, however instant micropayments that do not require confirmations are happening via the Lightning Network, a second layer scaling solution currently rolling out on the Bitcoin mainnet.
Borderless - No country can stop it from going in/out, even in areas currently unserved by traditional banking as the ledger is globally distributed.
Portable - Bitcoins are digital so they are easier to move than cash or gold. They can even be transported by simply memorizing a string of words for wallet recovery (while cool this method is generally not recommended due to potential for insecure key generation by inexperienced users. Hardware wallets are the preferred method for new users due to ease of use and additional security).
Bitcoin.org and BuyBitcoinWorldwide.com are helpful sites for beginners. You can buy or sell any amount of bitcoin (even just a few dollars worth) and there are several easy methods to purchase bitcoin with cash, credit card or bank transfer. Some of the more popular resources are below, also check out the bitcoinity exchange resources for a larger list of options for purchases.
Here is a listing of local ATMs. If you would like your paycheck automatically converted to bitcoin use Bitwage. Note: Bitcoins are valued at whatever market price people are willing to pay for them in balancing act of supply vs demand. Unlike traditional markets, bitcoin markets operate 24 hours per day, 365 days per year. Preev is a useful site that that shows how much various denominations of bitcoin are worth in different currencies. Alternatively you can just Google "1 bitcoin in (your local currency)".
Securing your bitcoins
With bitcoin you can "Be your own bank" and personally secure your bitcoins OR you can use third party companies aka "Bitcoin banks" which will hold the bitcoins for you.
If you prefer to "Be your own bank" and have direct control over your coins without having to use a trusted third party, then you will need to create your own wallet and keep it secure. If you want easy and secure storage without having to learn computer security best practices, then a hardware wallet such as the Trezor, Ledger or ColdCard is recommended. Alternatively there are many software wallet options to choose from here depending on your use case.
If you prefer to let third party "Bitcoin banks" manage your coins, try Gemini but be aware you may not be in control of your private keys in which case you would have to ask permission to access your funds and be exposed to third party risk.
Note: For increased security, use Two Factor Authentication (2FA) everywhere it is offered, including email! 2FA requires a second confirmation code to access your account making it much harder for thieves to gain access. Google Authenticator and Authy are the two most popular 2FA services, download links are below. Make sure you create backups of your 2FA codes.
As mentioned above, Bitcoin is decentralized, which by definition means there is no official website or Twitter handle or spokesperson or CEO. However, all money attracts thieves. This combination unfortunately results in scammers running official sounding names or pretending to be an authority on YouTube or social media. Many scammers throughout the years have claimed to be the inventor of Bitcoin. Websites like bitcoin(dot)com and the btc subreddit are active scams. Almost all altcoins (shitcoins) are marketed heavily with big promises but are really just designed to separate you from your bitcoin. So be careful: any resource, including all linked in this document, may in the future turn evil. Don't trust, verify. Also as they say in our community "Not your keys, not your coins".
Where can I spend bitcoins?
Check out spendabit or bitcoin directory for millions of merchant options. Also you can spend bitcoin anywhere visa is accepted with bitcoin debit cards such as the CashApp card. Some other useful site are listed below.
Mining bitcoins can be a fun learning experience, but be aware that you will most likely operate at a loss. Newcomers are often advised to stay away from mining unless they are only interested in it as a hobby similar to folding at home. If you want to learn more about mining you can read more here. Still have mining questions? The crew at /BitcoinMining would be happy to help you out. If you want to contribute to the bitcoin network by hosting the blockchain and propagating transactions you can run a full node using this setup guide. If you would prefer to keep it simple there are several good options. You can view the global node distribution here.
Just like any other form of money, you can also earn bitcoins by being paid to do a job.
You can also earn bitcoins by participating as a market maker on JoinMarket by allowing users to perform CoinJoin transactions with your bitcoins for a small fee (requires you to already have some bitcoins.
The following is a short list of ongoing projects that might be worth taking a look at if you are interested in current development in the bitcoin space.
One Bitcoin is quite large (hundreds of £/$/€) so people often deal in smaller units. The most common subunits are listed below:
one bitcoin is equal to 100 million satoshis
1,000 per bitcoin
used as default unit in recent Electrum wallet releases
1,000,000 per bitcoin
colloquial "slang" term for microbitcoin (μBTC)
100,000,000 per bitcoin
smallest unit in bitcoin, named after the inventor
For example, assuming an arbitrary exchange rate of $10000 for one Bitcoin, a $10 meal would equal:
For more information check out the Bitcoin units wiki. Still have questions? Feel free to ask in the comments below or stick around for our weekly Mentor Monday thread. If you decide to post a question in /Bitcoin, please use the search bar to see if it has been answered before, and remember to follow the community rules outlined on the sidebar to receive a better response. The mods are busy helping manage our community so please do not message them unless you notice problems with the functionality of the subreddit. Note: This is a community created FAQ. If you notice anything missing from the FAQ or that requires clarification you can edit it here and it will be included in the next revision pending approval. Welcome to the Bitcoin community and the new decentralized economy!
Hello visitors and subscribers of scams! Here you will find a master list of common (and uncommon) scams that you may encounter online or in real life. Thank you to the many contributors who helped create this thread!
If you know of a scam that is not covered here, write a comment and it will be added to the next edition.
Caller ID spoofing It is very easy for anyone to make a phone call while having any number show up on the caller ID of the person receiving the phone call. Receiving a phone call from a certain number does not mean that the person/company who owns that number has actually called you. Email spoofing The "from" field of an email can be set by the sender, meaning that you can receive scam emails that look like they are from legitimate addresses. It's important to never click links in emails unless absolutely necessary, for example a password reset link you requested or an account activation link for an account you created. SMS spoofing SMS messages can be spoofed, so be wary of messages that seem to be from your friends or other trusted people.
The most common scams
The fake check scam (Credit to nimble2 for this part) The fake check scam arises from many different situations (for instance, you applied for a job, or you are selling something on a place like Craigslist, or someone wants to purchase goods or services from your business, or you were offered a job as a mystery shopper, you were asked to wrap your car with an advertisement, or you received a check in the mail for no reason), but the bottom line is always something like this:
The scammer sends you a very real looking, but fake, check. Sometimes they'll call it a "cashier's check", a "certified check", or a "verified check".
You deposit the check into your bank account, and within a couple of days your bank makes some or all of the funds available to you. This makes you think that the check is real and the funds have cleared. However, the money appearing in your account is not the same as the check actually clearing. The bank must make the funds available to you before they have cleared the check because that is the law.
For various and often complicated reasons, depending on the specific story line of the scam, the scammer will ask you to send someone some of the money, using services like MoneyGram, Western Union, and Walmart-2-Walmart. Sometimes the scammer will ask for you to purchase gift cards (iTunes, Amazon, Steam, etc) and give them the codes to redeem the gift cards. Some scammers may also give you instructions on how to buy and send them bitcoins.
Within a couple of weeks, though it can take as long as a month, your bank will realize that the check you deposited was fake, and your bank will remove the funds that you deposited into your account and charge you a bounced check fee. If you withdrew any of the money from the fake check, that money will be gone and you will owe that money to the bank. Some posters have even had their bank accounts closed and have been blocked from having another account for 5 years using ChexSystems.
General fraudulent funds scams If somebody is asking you to accept and send out money as a favour or as part of a job, it is a fraudulent funds scam. It does not matter how they pay you, any payment on any service can be fraudulent and will be reversed when it is discovered to be fraudulent. Phone verification code scams Someone will ask you to receive a verification text and then tell you to give them the code. Usually the code will come from Google Voice, or from Craigslist. In the Google version of the scam, your phone number will be used to verify a Google Voice account that the scammer will use to scam people with. In the Craigslist version of the scam, your phone number will be used to verify a Craigslist posting that the scammer will use to scam people. There is also an account takeover version of this scam that will involve the scammer sending a password reset token to your phone number and asking you for it. Bitcoin job scams Bitcoin job scams involve some sort of fraudulent funds transfer, usually a fake check although a fraudulent bank transfer can be used as well. The scammer will send you the fraudulent money and ask you to purchase bitcoins. This is a scam, and you will have zero recourse after you send the scammer bitcoins. Email flooding If you suddenly receive hundreds or thousands of spam emails, usually subscription confirmations, it's very likely that one of your online accounts has been taken over and is being used fraudulently. You should check any of your accounts that has a credit card linked to it, preferably from a computer other than the one you normally use. You should change all of your passwords to unique passwords and you should start using two factor authentication everywhere. Cartel scam You will be threatened by scammers who claim to be affiliated with a cartel. They may send you gory pictures and threaten your life and the lives of your family. Usually the victim will have attempted to contact an escort prior to the scam, but sometimes the scammers target people randomly. If you are targeted by a cartel scam all you need to do is ignore the scammers as their threats are clearly empty. Boss/CEO scam A scammer will impersonate your boss or someone who works at your company and will ask you to run an errand for them, which will usually be purchasing gift cards and sending them the code. Once the scammer has the code, you have no recourse. Employment certification scams You will receive a job offer that is dependent on you completing a course or receiving a certification from a company the scammer tells you about. The scammer operates both websites and the job does not exist. Craigslist fake payment scams Scammers will ask you about your item that you have listed for sale on a site like Craigslist, and will ask to pay you via Paypal. They are scamming you, and the payment in most cases does not actually exist, the email you received was sent by the scammers. In cases where you have received a payment, the scammer can dispute the payment or the payment may be entirely fraudulent. The scammer will then either try to get you to send money to them using the fake funds that they did not send to you, or will ask you to ship the item, usually to a re-shipping facility or a parcel mule. Craigslist Carfax/vehicle history scam You'll encounter a scammer on Craigslist who wants to buy the vehicle you have listed, but they will ask for a VIN report from a random site that they have created and they will expect you to pay for it. Double dip/recovery scammers This is a scam aimed at people who have already fallen for a scam previously. Scammers will reach out to the victim and claim to be able to help the victim recover funds they lost in the scam. General fraudulent funds scams The fake check scam is not the only scam that involves accepting fraudulent/fake funds and purchasing items for scammers. If your job or opportunity involves accepting money and then using that money, it is almost certainly a frauduent funds scam. Even if the payment is through a bank transfer, Paypal, Venmo, Zelle, Interac e-Transfer, etc, it does not matter. Credit card debt scam Fraudsters will offer to pay off your bills, and will do so with fraudulent funds. Sometimes it will be your credit card bill, but it can be any bill that can be paid online. Once they pay it off, they will ask you to send them money or purchase items for them. The fraudulent transaction will be reversed in the future and you will never be able to keep the money. This scam happens on sites like Craigslist, Twitter, Instagram, and also some dating sites, including SeekingArrangement. The parcel mule scam A scammer will contact you with a job opportunity that involves accepting and reshipping packages. The packages are either stolen or fraudulently obtained items, and you will not be paid by the scammer. Here is a news article about a scam victim who fell for this scam and reshipped over 20 packages containing fraudulently acquired goods. The Skype sex scam You're on Facebook and you get a friend request from a cute girl you've never met. She wants to start sexting and trading nudes. She'll ask you to send pictures or videos or get on webcam where she can see you naked with your face in the picture. The scam: There's no girl. You've sent nudes to a guy pretending to be a girl. As soon as he has the pictures he'll demand money and threaten to send the pictures to your friends and family. Sometimes the scammer will upload the video to a porn site or Youtube to show that they are serious. What to do if you are a victim of this scam: You cannot buy silence, you can only rent it. Paying the blackmailer will show them that the information they have is valuable and they will come after you for more money. Let your friends and family know that you were scammed and tell them to ignore friend requests or messages from people they don't know. Also, make sure your privacy settings are locked down and consider deactivating your account. The underage girl scam You're on a dating site or app and you get contacted by a cute girl. She wants to start sexting and trading nudes. Eventually she stops communicating and you get a call from a pissed off guy claiming to be the girl's father, or a police officer, or a private investigator, or something else along those lines. Turns out the girl you were sexting is underage, and her parents want some money for various reasons, such as to pay for a new phone, to pay for therapy, etc. There is, of course, no girl. You were communicating with a scammer. What to do if you are a victim of this scam: Stop picking up the phone when the scammers call. Do not pay them, or they will be after you for more money. Phishing Phishing is when a scammer tries to trick you into giving information to them, such as your password or private financial information. Phishing messages will usually look very similar to official messages, and sometimes they are identical. If you are ever required to login to a different account in order to use a service, you should be incredibly cautious. The blackmail email scam part 5: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5/ PSA: you did not win a giftcard: https://old.reddit.com/Scams/comments/fffmle/psa_you_did_not_win_a_gift_card/ Sugar scams Sugar scammers operate all over the internet and usually come in two varieties: advance-fee scams where the scammer will ask for a payment from you before sending you lots of money, and fake check style scams where the scammer will either pull a classic fake check scam, or will do a "bill pay" style scam that involves them paying your bills, or them giving you banking information to pay your bills. If you encounter these scammers, report their accounts and move on. Google Hangouts Google Hangouts is a messaging platform used extensively by all kinds of scammers. If you are talking with someone online and they want you to switch to Hangouts, they are likely a scammer and you should proceed with caution. Publishers Clearing House scams PCH scams are often advance-fee scams, where you will be promised lots of money after you make an initial payment. You will never need to pay if you win money from the real PCH. Pet scams You are looking for a specific breed of puppy, bird, or other pet. You come across a nice-looking website that claims to be breeding them and has some available right now - they may even be on sale! The breeders are not local to your area (and may not even list a physical location) but they assure you they can safely ship the pet to you after a deposit or full payment. If you go through with the payment, you will likely be contacted by the "shipper" who will inform you about an unexpected shipping/customs/processing fee required to deliver your new pet. But there was never any pet, both the "breeder" and the "shipper" are scammers, typically operating out of Africa. These sites are rampant and account for a large percentage of online pet seller websites - they typically have a similar layout/template (screenshot - example) If you are considering buying a pet online, some easy things to check are: (1) The registration date of the domain (if it was created recently it is likely a scam website) (2) Reverse image search the pictures of available pets - you will usually find other scam websites using the same photos. (3) Copy a sentence/section of the text from the "about us" page and put it into google (in quotes) - these scammers often copy large parts of their website's text from other places. (4) Search for the domain name and look for entries on petscams.com or other scam-tracking sites. (5) Strongly consider buying/adopting your pet from a local shelter or breeder where you can see the animal in person before putting any money down. Thanks to djscsi for this entry. Fake shipping company scams These scams usually start when you try to buy something illegal online. You will be scammed for the initial payment, and then you will receive an email from the fake shipping company telling you that you need to pay them some sort of fee or bribe. If you pay this, they will keep trying to scam you with increasingly absurd stories until you stop paying, at which point they will blackmail you. If you are involved in this scam, all you can do is ignore the scammers and move on, and try to dispute your payments if possible. Chinese Upwork scam Someone will ask you to create an Upwork or other freelancer site account for them and will offer money in return. You will not be paid, and they want to use the accounts to scam people. Quickbooks invoice scam This is a fake check style scam that takes advantage of Quickbooks. The blackmail email scam The exact wording of the emails varies, but there are generally four main parts. They claim to have placed software/malware on a porn/adult video site, they claim to have a video of you masturbating or watching porn, they threaten to release the video to your friends/family/loved ones/boss/dog, and they demand that you pay them in order for them to delete the video. Rest assured that this is a very common spam campaign and there is no truth behind the email or the threats. Here are some news articles about this scam. The blackmail mail scam This is very similar to the blackmail email scam, but you will receive a letter in the mail. Rental scams Usually on local sites like Craigslist, scammers will steal photos from legitimate real estate listings and will list them for rent at or below market rate. They will generally be hesitant to tell you the address of the property for "safety reasons" and you will not be able to see the unit. They will then ask you to pay them a deposit and they claim they will ship you the keys. In reality, your money is gone and you will have no recourse. Craigslist vehicle scams A scammer will list a vehicle on Craigslist and will offer to ship you the car. In many cases they will also falsely claim to sell you the car through eBay or Amazon. If you are looking for a car on Craigslist and the seller says anything about shipping the car, having an agent, gives you a long story about why they are selling the car, or the listing price is far too low, you are talking to a scammer and you should ignore and move on. Advance-fee scam, also known as the 419 scam, or the Nigerian prince scam. You will receive a communication from someone who claims that you are entitled to a large sum of money, or you can help them obtain a large sum of money. However, they will need money from you before you receive the large sum. Man in the middle scams Man in the middle scams are very common and very hard to detect. The scammer will impersonate a company or person you are legitimately doing business with, and they will ask you to send the money to one of their own bank accounts or one controlled by a money mule. They have gained access to the legitimate persons email address, so there will be nothing suspicious about the email. To prevent this, make contact in a different way that lets you verify that the person you are talking to is the person you think you are talking to. Digit wallet scam A variation of the fake check scam, the scammer sends you money through a digital wallet (i.e. Venmo, Apple Pay, Zelle, Cash App) along with a message claiming they've sent the money to the wrong person and a request to send the money back. Customer service for these digital wallets may even suggest that you send the money back. However, the money sent is from a stolen credit card and will be removed from your account after a few days. Your transfer is not reversed since it came from your own funds. Cam girl voting/viewer scam You will encounter a "cam girl" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to go to their site and sign up with your credit card. They may offer a free show, or ask you to vote for them, or any number of other fake stories. Amateur porn recruitment scam You will encounter a "pornstar" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to create an adult film with hehim, but first you need to do something. The story here is usually something to do with verifying your age, or you needing to take an STD test that involves sending money to a site operated by the scammer. Hot girl SMS spam You receive a text from a random number with a message along the lines of "Hey babe I'm here in town again if you wanted to meet up this time, are you around?" accompanied by a NSFW picture of a hot girl. It's spam, and they'll direct you to their scam website that requires a credit card. Identity verification scam You will encounter someone on a dating/messaging/social media/whatever site/app, and the scammer will ask that you verify your identity as they are worried about catfishing. The scammer operates the site, and you are not talking to whoever you think you are talking to. This type of scam teases you with something, then tries to make you sign up for something else that costs money. The company involved is often innocent, but they turn a blind eye to the practice as it helps their bottom line, even if they have to occasionally issue refunds. A common variation takes place on dating sites/dating apps, where you will match with someone who claims to be a camgirl who wants you to sign up for a site and vote for her. Another variation takes place on local sites like Craigslist, where the scammers setup fake rental scams and demand that you go through a specific service for a credit check. Once you go through with it, the scammer will stop talking to you. Another variation also takes place on local sites like Craigslist, where scammers will contact you while you are selling a car and will ask you to purchase a Carfax-like report from a specific website. Multi Level Marketing or Affiliate Marketing You apply for a vague job listing for 'sales' on craigslist. Or maybe an old friend from high school adds you on Facebook and says they have an amazing business opportunity for you. Or maybe the well dressed guy who's always interviewing people in the Starbucks that you work at asks if you really want to be slinging coffee the rest of your life. The scam: MLMs are little more than pyramid schemes. They involve buying some sort of product (usually snake oil health products like body wraps or supplements) and shilling them to your friends and family. They claim that the really money is recruiting people underneath you who give you a slice of whatever they sell. And if those people underneath you recruit more people, you get a piece of their sales. Ideally if you big enough pyramid underneath you the money will roll in without any work on your part. Failure to see any profit will be your fault for not "wanting it enough." The companies will claim that you need to buy their extra training modules or webinars to really start selling. But in reality, the vast majority of people who buy into a MLM won't see a cent. At the end of the day all you'll be doing is annoying your friends and family with your constant recruitment efforts. What to look out for: Recruiters love to be vague. They won't tell you the name of the company or what exactly the job will entail. They'll pump you up with promises of "self-generating income", "being your own boss", and "owning your own company." They might ask you to read books about success and entrepreneurs. They're hoping you buy into the dream first. If you get approached via social media, check their timelines. MLMs will often instruct their victims to pretend that they've already made it. They'll constantly post about how they're hustling and making the big bucks and linking to youtube videos about success. Again, all very vague about what their job actually entails. If you think you're being recruited: Ask them what exactly the job is. If they can't answer its probably a MLM. Just walk away.
You should generally avoid answering or engaging with random phone calls. Picking up and engaging with a scam call tells the scammers that your phone number is active, and will usually lead to more calls. Tax Call You get a call from somebody claiming to be from your countries tax agency. They say you have unpaid taxes that need to be paid immediately, and you may be arrested or have other legal action taken against you if it is not paid. This scam has caused the American IRS, Canadian CRA, British HMRC, and Australian Tax Office to issue warnings. This scam happens in a wide variety of countries all over the world. Warrant Call Very similar to the tax call. You'll get a phone call from an "agent", "officer", "sheriff", or other law enforcement officer claiming that there is a warrant out for your arrest and you will be arrested very soon. They will then offer to settle everything for a fee, usually paid in giftcards. [Legal Documents/Process Server Calls] Very similar to the warrant call. You'll get a phone call from a scammer claiming that they are going to serve you legal documents, and they will threaten you with legal consequences if you refuse to comply. They may call themselves "investigators", and will sometimes give you a fake case number. Student Loan Forgiveness Scam Scammers will call you and tell you about a student loan forgiveness program, but they are interested in obtaining private information about you or demanding money in order to join the fake program. Tech Support Call You receive a call from someone with a heavy accent claiming to be a technician Microsoft or your ISP. They inform you that your PC has a virus and your online banking and other accounts may be compromised if the virus is not removed. They'll have you type in commands and view diagnostics on your PC which shows proof of the virus. Then they'll have you install remote support software so the technician can work on your PC, remove the virus, and install security software. The cost of the labor and software can be hundreds of dollars. The scam: There's no virus. The technician isn't a technician and does not work for Microsoft or your ISP. Scammers (primarily out of India) use autodialers to cold-call everyone in the US. Any file they point out to you or command they have you run is completely benign. The software they sell you is either freeware or ineffective. What to do you if you're involved with this scam: If the scammers are remotely on your computer as you read this, turn off your PC or laptop via the power button immediately, and then if possible unplug your internet connection. Some of the more vindictive tech scammers have been known to create boot passwords on your computer if they think you've become wise to them and aren't going to pay up. Hang up on the scammers, block the number, and ignore any threats about payment. Performing a system restore on your PC is usually all that is required to remove the scammer's common remote access software. Reports of identity theft from fake tech calls are uncommon, but it would still be a good idea to change your passwords for online banking and monitor your accounts for any possible fraud. How to avoid: Ignore any calls claiming that your PC has a virus. Microsoft will never contact you. If you're unsure if a call claiming to be from your ISP is legit, hang up, and then dial the customer support number listed on a recent bill. If you have elderly relatives or family that isn't tech savvy, take the time to fill them in on this scam. Chinese government scam This scam is aimed at Chinese people living in Europe and North America, and involves a voicemail from someone claiming to be associated with the Chinese government, usually through the Chinese consulate/embassy, who is threatening legal action or making general threats. Chinese shipping scam This scam is similar to the Chinese government scam, but involves a seized/suspicious package, and the scammers will connect the victim to other scammers posing as Chinese government investigators. Social security suspension scam You will receive a call from someone claiming to work for the government regarding suspicious activity, fraud, or serious crimes connected to your social security number. You'll be asked to speak to an operator and the operator will explain the steps you need to follow in order to fix the problems. It's all a scam, and will lead to you losing money and could lead to identity theft if you give them private financial information. Utilities cutoff You get a call from someone who claims that they are from your utility company, and they claim that your utilities will be shut off unless you immediately pay. The scammer will usually ask for payment via gift cards, although they may ask for payment in other ways, such as Western Union or bitcoin. Relative in custody Scammer claims to be the police, and they have your son/daughtenephew/estranged twin in custody. You need to post bail (for some reason in iTunes gift cards or MoneyGram) immediately or the consequences will never be the same. Mexican family scam This scam comes in many different flavours, but always involves someone in your family and Mexico. Sometimes the scammer will claim that your family member has been detained, sometimes the scammer will claim that your family member has been kidnapped, and sometimes the scammer will claim that your family member is injured and needs help. General family scams Scammers will gather a large amount of information about you and target your family members using different stories with the goal of gettimg them to send money. One ring scam Scammers will call you from an international number with the goal of getting you to return their call, causing you to incur expensive calling fees.
Online shopping scams
THE GOLDEN RULE OF ONLINE SHOPPING: If it sounds too good to be true, it probably is. Dropshipping An ad on reddit or social media sites like Facebook and Instagram offers items at huge discounts or even free (sometimes requiring you to reblog or like their page). They just ask you to pay shipping. The scam: The item will turn out to be very low quality and will take weeks or even months to arrive. Sometimes the item never arrives, and the store disappears or stops responding. The seller drop-ships the item from China. The item may only cost a few dollars, and the Chinese government actually pays for the shipping. You end up paying $10-$15 dollars for a $4 item, with the scammer keeping the profit. If you find one of these scams but really have your heart set on the item, you can find it on AliExpress or another Chinese retailer. Influencer scams A user will reach out to you on a social media platform, usually Instagram, and offer you the chance to partner with them and receive a free/discounted product, as long as you pay shipping. This is a different version of the dropshipping scam, and is just a marketing technique to get you to buy their products. Triangulation fraud Triangulation fraud occurs when you make a purchase on a site like Amazon or eBay for an item at a lower than market price, and receive an item that was clearly purchased new at full price. The scammer uses a stolen credit card to order your item, while the money from the listing is almost all profit for the scammer. Instagram influencer scams Someone will message you on Instagram asking you to promote their products, and offering you a discount code. The items are Chinese junk, and the offer is made to many people at a time. Cheap Items Many websites pop up and offer expensive products, including electronics, clothes, watches, sunglasses, and shoes at very low prices. The scam: Some sites are selling cheap knock-offs. Some will just take your money and run. What to do if you think you're involved with this scam: Contact your bank or credit card and dispute the charge. How to avoid: The sites often have every brand-name shoe or fashion item (Air Jordan, Yeezy, Gucci, etc) in stock and often at a discounted price. The site will claim to be an outlet for a major brand or even a specific line or item. The site will have images at the bottom claiming to be Secured by Norton or various official payment processors but not actual links. The site will have poor grammar and a mish-mash of categories. Recently, established websites will get hacked or their domain name jacked and turned into scam stores, meaning the domain name of the store will be completely unrelated to the items they're selling. If the deal sounds too good to be true it probably is. Nobody is offering brand new iPhones or Beats or Nintendo Switches for 75% off. Cheap Amazon 3rd Party Items You're on Amazon or maybe just Googling for an item and you see it for an unbelievable price from a third-party seller. You know Amazon has your back so you order it. The scam: One of three things usually happen: 1) The seller marks the items as shipped and sends a fake tracking number. Amazon releases the funds to the seller, and the seller disappears. Amazon ultimately refunds your money. 2) The seller immediately cancels the order and instructs you to re-order the item directly from their website, usually with the guarantee that the order is still protected by Amazon. The seller takes your money and runs. Amazon informs you that they do not offer protection on items sold outside of Amazon and cannot help you. 2) The seller immediately cancels the order and instructs you to instead send payment via an unused Amazon gift card by sending the code on the back via email. Once the seller uses the code, the money on the card is gone and cannot be refunded. How to avoid: These scammers can be identified by looking at their Amazon storefronts. They'll be brand new sellers offering a wide range of items at unbelievable prices. Usually their Amazon names will be gibberish, or a variation on FIRSTNAME.LASTNAME. Occasionally however, established storefronts will be hacked. If the deal is too good to be true its most likely a scam. Scams on eBay There are scams on eBay targeting both buyers and sellers. As a seller, you should look out for people who privately message you regarding the order, especially if they ask you to ship to a different address or ask to negotiate via text/email/a messaging service. As a buyer you should look out for new accounts selling in-demand items, established accounts selling in-demand items that they have no previous connection to (you can check their feedback history for a general idea of what they bought/sold in the past), and lookout for people who ask you to go off eBay and use another service to complete the transaction. In many cases you will receive a fake tracking number and your money will be help up for up to a month. Scams on Amazon There are scams on Amazon targeting both buyers and sellers. As a seller, you should look out for people who message you about a listing. As a buyer you should look out for listings that have an email address for you to contact the person to complete the transaction, and you should look out for cheap listings of in-demand items. Scams on Reddit Reddit accounts are frequently purchased and sold by fraudsters who wish to use the high karma count + the age of the account to scam people on buy/sell subreddits. You need to take precautions and be safe whenever you are making a transaction online. Computer scams Virus scam A popup or other ad will say that you have a virus and you need to follow their advice in order to remove it. They are lying, and either want you to install malware or pay for their software.
Chinese Brushing / direct shipping If you have ever received an unsolicited small package from China, your address was used to brush. Vendors place fake orders for their own products and send out the orders so that they can increase their ratings. Money flipping Scammer claims to be a banking insider who can double/triple/bazoople any amount of money you send them, with no consequences of any kind. Obviously, the money disappears into their wallet the moment you send it.
The Fed's Losing Battle with Technological Deflation
PART 1/4 - FREE MARKET? First off, let's set the scene. The stock market is telling you nothing about the real economy anymore. Economic fundamentals have never mattered as little for the stock market as has been the case during this 11-year bull market. The correlation between gross-domestic-product growth and the direction of the S&P 500 Index has only been 7% in this cycle - historically it has been 30% to 70%. Why? Well, it is the Central Banks, led by the Fed, who printed their way out of the Recession in '08. In doing so, they have papered over the cracks, and we have seen the longest economic expansion in US history. However, this is not a particularly meritocratic process: money creation itself increases inequality via the Cantillon Effect, as money printing leads to asset price inflation, which disproportionately benefits the rich and hurts the poor. Former Federal Reserve Chairman Paul Volcker told the New York Times in 2018: “The central issue is we’re developing into a plutocracy. We’ve got an enormous number of enormously rich people that have convinced themselves that they’re rich because they’re smart and constructive." The reality of course is that this is largely not the case - it is because the game is rigged in their favour. Now, it is important to emphasise the fact that the path we have taken has resulted in the highest living standards we have seen in human history. However, the issue, particularly since the US completely abandoned the gold standard in 1971, is that debt has exploded to obscene levels. We are not operating in a free market if it takes $185 trillion of debt over the last 20 years to create 'growth'. In fact, the global debt to GDP ratio hit an all-time high of 322% in the third quarter of 2019. Inflation means that your dollar loses value and thus your purchasing power goes down. Deflation means that the value of your dollar goes up and your purchasing power goes up. That's a good thing right? You get more goods and services for less. Well, no. If you have deflation, debt explodes in real terms and you can never pay it back. As the economy is based on debt, if you allow deflation, then you have to reset the debt. This is why central banks fear deflation so much. However, the major force driving the human race is technological progress - and this stops for no mortal... PART 2/4 - TECHNOLOGICAL DEFLATION: The increased abundance created by technology will result in massive job losses. Throughout history, doom porn enthusiasts have screamed that the machines are coming for jobs. This is not a new phenomenon. All technological revolutions are deflationary - since they create "supply side shocks", meaning that they allow for more intensive use of resources and thus higher production. With more goods being produced, all other things being equal, the price of those goods will fall. In the last 20 years or so, software has disrupted and replaced many established goods and services. It is in the next 20 years that another disruptive technology is set to take the stage: AI According to Steve Schwarzman, the co-founder and CEO of The Blackstone Group who has a net worth of $17.6BN: "This is going to touch everyone's life....you're not going to be able to get away from this technology" Moreover, this virus will only accelerate this trend towards tech. Zoom is a fantastic example of exactly this. Old legacy economic systems were not built for this tech deflation, and the thing about exponential growth is that we humans do not intuitively understand it. As an example, if you folded a piece of paper 51 times, of course you can only fold it seven times, but if you could fold it 51 times, it would reach the Sun! PART 3/4 - IMPLICATIONS FOR SOCIETY: The question is: how does this play out? In the long term, it is the fundamental structure of the economic system that has a significant impact on people's lives, not who is President for 4 to 8 years. In reality, politicians have limited power and are effectively all puppets. We have seen what happens when a President doesn't stay in their lane... One could argue that the two main mechanisms of control are:
As we have seen many times in the past, herd psychology is worryingly easy to manipulate... Speaking of the censorship, in his book Antifragile, Nassim Taleb discusses the anti fragility of information. Information feeds more on attempts to harm it than it does on efforts to promote it. A fantastic example of this process is what has happened with London Real: they were banned on LinkedIn and David Icke's interview was censored. Now, regardless of what you think of this particular channel or your thoughts on David Icke and the theories provided, censoring information in this way actually spreads it more virally. It's fascinating to observe how many views the videos regarding the bans and censorship have relative to the others. And the impact this has had on subscribers. It is always easier to blame a bigger enemy (or create a new one) rather than to admit it's a structural problem. Therefore, you avoid short term pain...whatever the cost. The real question is if and when this situation will lead to social unrest... PART 4/4 - INTELLECTUAL CAPITALISM: The depth and width of jobs impacted by AI will continue to increase in the future. Now this will not necessarily happen straight away. However, our transition from commodity capitalism to intellectual capitalism is inevitable and the people and nations who fight against this trend will be on the wrong side of history. From a practical investment perspective, and disclaimer this is not investment advice, network effects are a crucial aspect to consider moving forwards. Essentially, this means that the value of the network increases with each additional user - all of the tech monopolies have exhibited this property. An asset which could in time demonstrate very strong network effects is Bitcoin. Looking at the market cap relative to other asset classes, Bitcoin provides an asymmetric investment opportunity. Only time will tell... https://www.youtube.com/watch?v=7nFbKzt-uwE
Edit: Currently writing a new version of this, dont know when it will be done. Edit: Since first post I have updated a few sections with additional information. I recommend reading it all even if it is very long, I might have placed some relevant info in different sections while thinking about what else needed to be added, plenty of steps remains mostly the same except when I comment directly on it. It is not necessary to do 100% security all the time, unless you absolutely need it, combining some high and some lower security ideas for a balance of security and convenience is useful. I will base this mostly on Windows, Linux users probably know this, and I have no idea how apple machines work (tho many things in here are still relevant for other operating systems, as they are just general tips) Disclaimer: There are certainly other steps that can make you more anonymous or safer, however I think for most people this will surfice. Any software I recommend should be independently verified for security, and examples of software are not to be taken as endorsements. I simply use examples and give recommendations when I believe it necessary, or helpful. I will not really differentiate between anonymity and security, they are often the same thing. As such the word security can mean either more anonymous, less vulnerable, or both. -------- Everyday Simple Info Sec:
Password for the device is an obvious one (8+ characters minimum, best if over +12), if there is sensitive information on any of the drives, either encrypt the entire drive or just the sensitive files, and make encrypted backups on a different memory storage device (There many programs to encrypt files and drives I'm sure a search will figure it out)
-There could be a hidden administrator user on your PC, make sure to change its password
Always use the device on a non admin account
a VPN that doesn't log (use with kill switch on, should be enough for everyday stuff, more safe stuff in the high security section) (VPNs that claim they don't log sometimes do, it's bad, but I would like to point out that not using a VPN will always expose your traffic to your ISP and also remove additional encryption. Even if the VPN tracks, there is no downside because your ISP would track anyways, and VPNs can be more anonymous, and also add extra encryption)
disable location tracking (preferably make all your privacy setting to release minimal info, get rid or cortana, change privacy settings in all of your accounts as well, there's no reason why you should allow Facebook to give you target ads. Use the setting they give you.
TOR, Firefox or similar browser, stay the fuck away from Google Chrome.
your preferred search engine should be duckduckgo (other privacy focused search engines exist as well)
use an adblocker that also prevents the adding of tacking cookies
Use pgp with all your friends or messaging services that implemented end to end encryption (Implemented services can still be bypassed, but are way more convenient so for everyday use they should suffice, some examples should be Telegraph, Signal, WhatsApp etc) (more info on pgp in high security section)
(Snapchat msgs, reddit dms, discord msgs, are just a few examples of msgs that are never encrypted) -Any info even send in encrypted msgs (and obviously non encrypted) should still be kept with possible deniability, don't say "I'm gonna do MDMA", say "I'm going out with molly."
use software (like ccleaner) that purges cookies and other data after every use, before shutting down your device
use a virus scanner daily (I like spy bot Search and destroy, many other options also exist)
never use the same password/passphrase twice (I will address what passphrase are below) (Better yet use randomized passwords that are stored in a master key chain, make them as long as possible (tho it is okay to go with the minimum of 12 never go below 7, I recommend 15+ depending on how often you have to manually enter the password instead of copying/pasting it) Don't generate too long keys for things you need to access regularly without copy/paste, except your master key ring)
its ideal to never use the same email or username as well, especially username, email is obviously tricky and also very annoying, but it would be best to always change the email.
-DO NOT STORE ANY PASSWORDS ON GOOGLE, IF GOOGLE LOGIN IS AUTHENTICATED IT WILL AUTFILL ALL PASSWORDS IT HAS SAVED (same with other similar services) (This means if you are logged in to chrome and someone has access to your machine, they can auto fill passwords without entering a single password) -use a rememberable passphrase, especially for your master key ring aka password manager A long sentence that is memorable makes an okay password (decent example,: "I met my wife at Little Ceasers for the first time on 07/09/20" better even if it's just something you know, if its impersonal, and if you can add special characters or numbers that you won't forget) (A better example for a passphrase is: "There is 0nly 0ne letter that d0esn’t appear in any U.S. state nameQ")
for your main password manager(key ring), I highly recommend Keepass 2, make backups of the file save to separate devices and drives (Flash drives, phone, PC, laptop, etc, if you loose that file, you lose all of your passwords) (Other good password managers exist as well, I don't recommend online password managers as you lose the control over passwords)
-Purge your internet activity frequently, there's a reason why I only have one post, and a few comments appearing in my account, but thousands of kama. Exposing information needlessly is not good. -Never post private information publicly, and if you do, do it vaguely as possible. (Example: Not "I'm 15", say "I'm a teenager") Do not post any vital information ever, no birthdays, mother's maiden name, age, or anything you have ever seen in a security question. Never post your current activities while they are ongoing. You going on a vacation? Don't announce it to the world, taking picture there? Post them when you are home.
Any account that is supposed to remain anonymous and as secure as possible should only be used on secured devices. A unsecured device can link you to the account.
always shutdown your machine when leaving it (To prevent access, and to prevent a possible attack vector)
2 factor factor authentication is not great anymore. Unless you can do it over a anonymous source. A cell phone is usually directly connected to you, so it is not a anonymous device. There might still be secure/anonymous 2 factor authentication methods that won't expose you, for example over a secure email. (If there is 2FA that doesn't need a device that removes anonymity and is secure, use it.) (Please don't misunderstand, 2FA is great, however it can remove the anonymity that you worked hard to establish)
-Rethink how you do security questions. Many answers to security questions can be found in your internet history. One could use the first word of the security question as an answer, or a different sceme that will mean you always remember it. (Security question need to go, the amount of personal info an average person puts on the internet makes it easy to attack anything using security question) -------_ High level crimimal information security: The motto here is, "All the Security, All the Time" As one fuck up can end with you leaving a lick of traceability, and you could be fucked. Pre Note: All of your software should always be up to date. Also even perfect info sec does not guarantee you are completely safe, a new zero day (exploit) can still fuck you, but good info security makes you significantly safer, by eliminating as many attacks as possible. -Get a new device (or make a already owned device seem like you never owned it, do this only if you know how to, there's a lot of stuff that goes into that, like changing your mac adress etc) buy with cash, and your face covered, preferably far away from where you live. (Do I need to specify to not bring your phone or anything else that tracks your location to anywhere you want to go anonymously?) (Be aware that even hardware can have vulnerabilities, many cpus have known vulnerabilities, I can't list them all, do some research before buying)
Do not EVER use a high security device at any lower level of security. There are unique identifiers to your device, exposing them once can expose you for everything you do.
-If you know how to use Tails (A linux distro designed for Info sec) use that, preferably on a USB. (Or learn how to use tails, its better, but complicated) Otherwise a clean copy of windows (make sure its not in any way associated with you) can do the job too, tho not as well. (Using a VM might give extra security, since VMs usually erase all data and RAM they were using on shutdown) -Get a non tracking VPN, Enable the kill switch (a setting that disables all traffic that doesn't go through the VPN) (change your firewall settings to only allow the traffic from the VPN, windows guide (Change settings so only traffic from the tor application is send) Edit: (Due to complaints: do not use vpn over tor, use tor over vpn. tor over vpn has no notable downside, if the VPN logs it makes no difference, your ISP will always log anyways, and vpns remove other attack vectors and also provide backup security should tor fail. Again even if the VPN tracks you only change the people doing the tracking, but now you are further removed making it more anonymous and also with less vulnerabilities) -rember privacy settings, cookie cleaner, and antivirus, password (There could be a hidden administrator user on your PC, make sure to change its password) -Always use the device on a non admin account
-Ideally use this device only on networks that are not connected with you. Such as public networks (try to never use the same public networks twice, move around) (a home network should be fine now, as it should never be exposed, but more security is always better) (Its just a conveniences vs security trade) -Never use accounts that have been exposed to lower security on higher security machines -your browser is now TOR (or your preferred security focused browser, if you dont plan on using onion ) Make sure you get the standalone version of tor not the addon build (the standalone is safer, because there are less settings and options to tweak) -Change your tor settings, to safest mode, enable a bridge (to my knowledge there's no difference in security between the build in bridges in tor), enable automatic updates, set duckduckgo onion as your primary browser. Set dark.fail onion page as your home page. (Or your preferred privacy search engine and onion directory)
set up a new pgp (can't use the same one you use for regular use, again less safer accounts are never used on safer devices) Cleopatra is my choice, its simple to use. Make sure you back up the private key multiple times, on safe devices. (Dont let the private key fall into anyone's hands) Give it a generic name like "HighSecurityPGP" do not give the pgp key pair a name that could identify you. (No initials etc) (Some pgp key pair programs want an associated email for a key pair, you can create a safe email, or which I recoend you can use a different program (like Cleopatra) (Feds & LEOs are known to copy private keys if they have your machine, so you will need to set up a new key pair if they ever take a device with a private key copy)
a high security machine that facilitates criminal activity can not use many programs. Many programs collect your devices mac adress, which is a unique identifier, amongst other things. It's should be used only for the activity you want to do.
-------_ How to use dark net markets (DNMs) If you finished your High Security setup, we can dive right in. Otherwise go do that. This is where all that is essential. Quick info on Tor, and onion sites. There is no search engine. It's all based of directories and addresses you are given by others. Tor will likely not be very quick, it has to pass through multiple networks to get to the destination. DNMs sometimes exit scam, an exit scam is when a market shuts down completely and takes all the money, this is a risk when using DNMs, it's not too common but happens maybe 0-4 times a year. The admins of thoese servers need to get out at some point, before they get jailed, so they exit the game, and scam everyone out of their money. -A very useful onion directory is dark.fail it has a lot of links, for all kinds of stuff. News, email, DNMs, Psychonautwiki (harm reduction website), forums etc. (Other directories also exist) -Pick a market, preferably one that handles secure connection server side instead of requiring you to establish the secure connection. Then create an account. Your account once created should include an entry box in your profile for a pgp key, post your PUBLIC key in there. (Verify the link is not a scam, most markets should provide a pgp signature) -Next is currency setup. All major cryptocurrency exchangers can be used, I can recommend coin base but there could be better ones out there. Unless you find a small non U.S., exchange, they will always ask for your identity. So unless you can find a trustworthy exchange that doesn't ID, you will need to give it to them. (Side note, all major crypto exchangers report to the IRS, if the IRS asks you if you bought cryptocurrency and you bought while having IDed yourself SAY YES, DO NOT COMMIT TAX FRAUD WHEN THEY KNOW YOU DID)
I recommend using Monero, it's hard to track, so it makes your job a lot easier. (If you use bitcoin you should run it through a scrambler, because BTC is tracable to anyone who knows what they are doing)
-Transfer (monero you can send directly, btc you should scramble) to your wallet. There are two options a cold wallet (physical) or a software wallet. Software wallets usually dont cost anything so I recommend them, even if often less safe. Electrum is easy to use, and pretty safe. You can also do your own research and find a wallet that fits your needs.
decide where you want to ship it. You can send to your home, to a PO box, to a PO box that you opened with a fake ID (I don't recommend), an abandoned house, general mail (sending to a post office instead of a street adress) pickup up with fake ID, use a remailing service. These are some options, sending it to your own home, isn't ideal, but its pretty much the only easy way.
-now you are ready to buy, only buy using escrow (it means the money is held by the market as a middle man until the product is delivered, they will also handle any issues like wrong quantity, cuts, etc), judge the reviews for a product, and if available look at the history of the vendor, until you find a product from a vendor you trust. (I recommend to buy within your country as much as possible, so it doesn't go through customs, it's very rare that something is found, but it can happen) -now you get to buy, depending on market, you either have cryptocurrency stored in their wallets (not recommend, you will lose it in an exit scam) or you can send it every order. When you send your delivery adress (or the one you want it to go to) encrypt the adress using the sellers public key. Make sure the adress is correct. -wait for the product, make sure to extend the escrow until the product arrives, if you can't extend it anymore dispute the order, and a moderator will step in -test the product, use it, and leave a review. PLEASE LEAVE A REVIEW, DNMs only work because of reviews. Edit: Didn't imagine I would write over 15000 words. Oh well, it was fun. Hope it helps, if you have any questions feel free to ask. No idea how long this will stay up, I might purge it in 7 days, or never.
In a recent spillover of internet-based long-form intellectual new media into the mainstream, Eric Weinstein appeared as a guest on Ted Cruz's podcast. Eric was well prepared. Cruz played the role of a charitable and engaged critic while avoiding direct confrontation. The conservation laid bare the intersection of the anti-corporate socialist left and anti-government libertarian right and the potential of these forces as a combined political interest. There was a strong sense of shared acknowledgement of the current crisis and they touched on all the culture war aspects. But I'm more interested in what Eric has pointed to now several times as the root cause of the systemic decline, and what seems to be the original trigger for the slow decay and building of tension that has ultimately led to the rise of darker elements on both the left and right that we see today: a Great Decoupling of productivity (GDP) and wage growth in the early 1970's. The significance of this time period has also been highlighted by Eric's boss, Peter Thiel. We are referred to https://wtfhappenedin1971.com/, where a collection of charts give the impression that a profound change in the foundations of the economy took place, effectively causing a divergence of all kinds of metrics related to equality, wealth creation, the complexity of regulation, and implicitly downstream effects like political polarization, incarceration rates, and age of marriage. The simple, seemingly persuasive answer is that the effective cancellation of the gold standard set us on a path towards borrowing ever larger sums to avert financial crises as they arise, and the return to a currency backed by something provably scarce, i.e. bitcoin, is a solution. I can't say I'm convinced it's that simple. And Eric doesn't mention currency specifically as the problem. So what I want to know is, was 1971 a real inflection point, the real root of inequality and dysfunction we see today? Was the removal of limits on the Fed's ability to print money a mistake? Or was there some other government action or change at that time that was the real cause? Do we need to let stock market crashes happen from time to time? A year ago, u/gwern posted a 1986 Atlantic article that described a lot of the problems in black America that are still around 4 decades later and offered more in the way of nuance and insight than most of the discourse we see today. What struck me on revisiting it was how the timing of the decline of Chicago aligns with the early 1970's trigger hypothesis:
In 1970 thirty-seven percent of the population of the area was below the poverty line; in 1980 the figure was 51 percent. In 1970 the unemployment rate was 9.5 percent; in 1980 it was 24.2 percent. In 1970 forty percent of the residents of the neighborhood lived in families with a female head; in 1980 the number had grown to 72 percent. In 1980 of the 54,000 residents 33,000 were on welfare. Experts agree that all of the numbers are even worse today.
My mental model for social issues is that they are mostly rooted in economics. If you have a society that generates wealth, you can pay teachers, doctors, and police well enough to attract competent candidates and the competition necessary to create real expertise. You can afford to build and maintain good infrastructure and spend time on figuring out how to best help the disadvantaged. You have the resources to advance technology and support the arts. You get all the positive feedback loops that come with this. When wealth generation becomes concentrated and restricted, public institutions start to struggle, people feel they have less opportunity, and social issues start to bubble up like the formation of outgroups of all kinds. A massive oversimplifation, I know, but a useful general framework to approaching issues that avoids (mis)placing blame on cultural degeneracy, "evil" corporations, or other common scapegoats that are largely symptoms of greater problems. Today, this mindset seems to align with the conservative right, but in the 1986 article it's the "liberal answer" to the problem of ghettos that I identify with:
In Chicago the harbinger of the change was the closing in the late fifties of the stockyards, which for half a century were the sine qua non of lower-class grunt work and a heavy employer of blacks. Chicago lost 200,000 jobs in the seventies; small shut-down redbrick factories that used to make products like boxes and ball bearings dot the city, especially the West Side. The lack of jobs, the argument continues, caused young men in the ghetto to adopt a drifting, inconstant life; to turn to crime; to engage in exaggeratedly macho behavior -- acting tough, not studying, bullying women for money -- as a way to get the sense of male strength that their fathers had derived from working and supporting families. As Murray believes that one simple step, ending all welfare programs, would heal the ghettos, the unemployment school believes that another simple step, jobs, would heal them. "When there's a demand for the participation of the black underclass in the labor force, most of the so-called problems people talk about will evaporate in a generation," says John McKnight. an urban-research professor at Northwestern University.
Indeed, Mr. McKnight. And up until this spring, it looked like the Trump presidency's aggressively pro-jobs and pro-American workers policy was showing promise of vindicating this view - the presence of BLM and racial tensions leading up to 2016 had all but subsided by 2018-2019. I wonder just how little backlash the George Floyd incident would have caused if the pandemic hadn't undone the economic progress of the past 3 years. Mind you, that "progress" was but a tiny step in the right direction in terms of improving wages and opportunities for the lowest earners. And for all the times the "audit the fed" meme hit the top of the_donald, it now seems impossible that the current administration has any capability or willingness to take the drastic steps needed to address the real root cause that apparently started 50 years ago. To do that, we may need an actual revolution.
The Bitcoin Marketing Team is a specialist bitcoin marketing agency and has helped multiple teams over the last four years complete a wide variety of product and service launches, as well as over ten ICO/Token sales, raising in excess of $110M. Prior to the Bitcoin Marketing Team, the individual team members launched over 30 online products and services between them and managed multi-million ... Hundreds of articles speculating on how high bitcoin could go now seem to be published each week. Hedge fund manager Mike Novogratz told CNBC it could quadruple to $40,000 by the end of 2018. A ... The Cryptocurrency marketing company should implement proper measures to deal with the security issues and rules associated with the launch and running of such digital coins for their clients. Building a community. The most effective way to market your bitcoin or any crypto coin is building a community around it and promoting your bitcoin there. If you do not know how to do that, you should ... Bitcoin Magazine’s mission. Bitcoin Magazine is the oldest and most established source of news, information and expert commentary on Bitcoin, its underlying blockchain technology and the industry that has been built up around it.Since 2012, Bitcoin Magazine has provided analysis, research, education and thought leadership at the intersection of finance and technology. issues in Bitcoin and provide an evaluation framework for analyzing a variety of privacy-enhancing proposals. Finally we provide new insights on what we term disintermediation protocols, which absolve the need for trusted intermediaries in an interesting set of applications. We identify three general disintermediation strategies and provide a detailed comparison. I. WHY BITCOIN IS WORTHY OF ...
Bitcoin explained and made simple Guardian Animations ...
How Will the Coronavirus Impact the Housing Market? Get life-changing financial advice anytime, anywhere. Subscribe today: https://www.youtube.com/c/TheDaveR... Get our free Bitcoin course here - https://chrisdunn.com/free-bitcoin-course This Bitcoin basics video series will explain Bitcoin for beginners. You'll lear... Namste Dosto !! Aaj ke episode ke Special Guest Hai ek bahut hi jane mane Digital Marketer. Apni Free Courses & Transparent Income Reports Ke Liye Thode Char... Start trading Bitcoin and cryptocurrency here: http://bit.ly/2Vptr2X Bitcoin is the first decentralized digital currency. All Bitcoin transactions are docume... As Investors, we are also trying to figure out where the market is heading I have been talking about how the markets are broken. And The Fed Issues A Warning...