Bitcoin Price Explosion a Trap, Smart Money Awaits ...
Bitcoin Price Explosion a Trap, Smart Money Awaits ...
The Truth about Bitcoin’s Future - Is It THAT Bad? 
The Bitcoin Futures Trap - CryptoIzzy
Mayer Multiples: The Metric That Assists Phone Bitcoin ...
Bitcoin Chart Analysis: How to Trade Bitcoin Using Charts ...
New husband vs kids
I am remarried and I need advice on the most recent situation of Husband vs kids. Some background. I've had 2 previous marriages each resulting in 1 kid. Was a single mom for 10 years before marrying for the 3rd time. My kids are pleasant with my current Husband but don't love him & tolerate him only for myou sake I think. They just never bonded. Kids are 19 & 16. Been married 5 years. My husband is foreign. I got married too fast without fully knowing him. I thought we'd learn & grow from our differences and being from different cultures & backgrounds would be interesting....but it's just a mess. He is selfish as far as only doing what he wants when he wants, close minded, judgemental, not nurturing or caring, lazy as far as holding down a job...then comes up with shady business ideas or loses money on bitcoin or stock market thinking he's some financial guru, we don't share money btw and I pay a larger percentage of the bills due to my kids living in the house he insists I should pay more to cover them, despite him earning more when he actually works, he does not do any daily tasks of cleaning laundry cooking errands ect. He does not really add anything of value to my life. I'm happy in general and have a good life, he's not out drinking, drugs, cheating, ect. He just isn't a good loving Husband. It's like a 1950s marriage where he has very outdated ways & believes he is the boss. Even though he is not the breadwinner or providing what I think a man should to the household or relationship. He is demanding and controlling & I've known he spies on my phone & tracks everything I do, but tonight I find out he's doing the same spying & tracking to my 16yr old daughter despite her being on her dad's cell phone plan. Apparently there's Spyware he uses without even accessing our phones. He is pissed off because she's been texting with a black boy from school. My husband is from South Africa and very anti black, openly prejudice. He's threatening divorce because my daughter is involved with a black boy & says I promote it & people in his home country are being killed by blacks daily & he will not tolerate this under his roof. Well, I have a problem with him spying on my daughter without my permission & when I questioned how he does it or why he was doing it without my knowledge or permission, he gets angry. After some heated discussion (more like him expressing his demands while I stood there) I said I'd talk to my daughter about the situation and discourage the relationship as well as not allow her phone use over night, he said some of the texts were at 3am. I do not want to spy on my kids, I trust them, I don't want to damage my relationship with my daughter cuz teens already pull away & rebel. This is a critical time in her life & I want a good relationship, but I also don't really want another failed marriage. I have listed some of his bad qualities & there are even more...and only a few things I actually like about him. But I feel trapped. We invested in an old house that needs more work before we could sell it. It's impossible for me to even attempt so see a lawyer or look for an apartment with out him knowing. He will make life a living hell if he suspects I'll leave. He's threatened in the past to post personal things all over social media or call family & friends spreading half truths if we ever go thru a divorce. The scary thing to me is that he has full access to all our phones thru this spy software, so how would I ever be free of him??? I know in the long run this is not a healthy marriage and since he is not willing to ever learn or compromise it will likely end. Now just isn't the right time, for a few reasons. How can I deal with the current situation of him spying on my daughter's phone & forbidding the texting with the kid he doesn't approve of?? I don't know what to do in order to keep our living situation peaceful for now. Does anyone agree with him? Was it ok for him to spy on her without my permission?
How to Explain Bitcoin: 3 Tips to Have Better Bitcoin Conversations
BTC Friends, Let’s be honest, Bitcoin is confusing. Not to you (you are on this / after all), but to the people who have no idea what it is. Trying to explain Bitcoin is even harder. I’m sure we’ve all had those long, complicated, drawn-out conversations which leave people more confused than when it started. To aid its adoption WE HAVE TO GET BETTER AT EXPLAINING WHAT BITCOIN IS. Here are a few tips that should, hopefully, help you manage a simple and easy to understand discussion about Bitcoin. Before we get to that, a few things to remember: Bitcoin is afundamentalchange from what most people believe. An explanation about Bitcoin shouldn’t be about “being right” or “winning the argument.” Instead, it should be about helping someone explore a new idea and begin to understand that there are actually different alternatives to the only “money” they’ve ever known. Bitcoin is complicated. It’s important to remember that this is as much of an emotion transformation for someone as it is a logical one. A CONFUSED MIND ALWAYS SAYS NO. If you leave a person confused or frustrated about what Bitcoin is, they are more likely to build up a resistance to it and become close-minded because “it’s just too complicated.” Adoption is a marathon, not a sprint. Don’t feel the need to word vomit all of your intense 1337 cypto-knowledge in a single conversation. Slow and steady. Like a good story-teller, keep them wanting more. Now, some tips to consider: 1. Start with ‘WHAT is Bitcoin?,’ not ‘WHY is Bitcoin?’ A fundamental mistake that people make is to try to justify WHY something exists before even explaining WHAT something is. Your explanations need to act as a building blocks of knowledge which means you have to have a very clear, very easily understood, fundamental premise: Bitcoin is…: Digital coins that exist on the internet that you can spend and save just like the paper money in your wallet. An alternative form of money than what you are given by your local government. That's it. That's Bitcoin. While I’m sure we can, and probably will, argue about what that base, fundamental definition is, it’s important to start with WHAT, not WHY. While hyperinflation, store of value, scarcity, the Federal Reserve, and how the printing of fiat devalues currency are all important, it does not answer the question of WHAT is Bitcoin. If you start with WHY, you are skipping a major building block in the mind of the listener and are on your way to creating confusion. And remember, a confused mind always says no! Here is an example. (Now, don’t go full-internet on me. I’m not degrading this person or this video THANK YOU PERSON FOR MAKING THIS VIDEO. This video is awesome! I only bring it up because it is a recent video that got some attention. It also demonstrates this point.) When asked to explain Bitcoin, here is the opening line: “The FED…is out of control with printing money…” This is a ‘WHY is Bitcoin’ response. Already, the listener is probably thinking, ‘what the heck does the FED have to do with anything? I just wanted to know what Bitcoin was…’ and you may just lose your listener right there. Furthermore, this video never actually says “Bitcoin IS…” While there is an implied comparison to gold, there is never a fundamental definition of WHAT Bitcoin is. Start with a clear, concise definition of WHAT Bitcoin is before moving on to WHY Bitcoin is. 2. Let Them Lead / Gauge Their Interest / Know When To Stop When explaining any topic to someone who doesn’t understand it, there is a very strong temptation to TELL everything you know. This is human nature. We are proud of what we know. We want to display knowledge and proficiency. We must, however, understand that it is counter-productive to the learning process. Imagine that certain math teacher going over that certain math problem. They explain it. They are enthusiastic about it. They write it on the chalkboard. Yet your eyes glaze over. It’s too much too fast. You are just waiting until the end when they finally tell you the answer. All logic and reasoning and understanding is gone. This is similar. Instead of telling them everything you know, LET THEM ASK! Allowing your listener to ASK demonstrates two things: an understanding of the last thing you said and, more importantly, interest! Ultimately, that’s what we want and need; their interest. Believe me, just like that little kid asking, ‘why, why, why…?’ They will give you every opportunity to share a little bit more, and a little bit more. For example: Bitcoiner – “Bitcoin are digital coins that exist on the internet that you can spend and save just like the paper money in your wallet.” (STOP TALKING AND LEAVE SPACE FOR THEM TO ASK!!!) Noob – “Oh…ok…well…why do we need that? What's wrong with the money I have now?” Bitcoiner – “Well, there is a risk that, over time, the money that you keep in your wallet or bank account will actually be worth less and be able to buy less stuff.” (STOP TALKING AND LEAVE SPACE FOR THEM TO ASK!!!) Noob – “Wait, what do you mean?” And we are now on our way to a discussion about these messy and intense concepts of inflation vs deflation, printing of fiat currency, fractional reserve lending, etc. And through it all, LET THEM LEAD. Now this is the tough part. If their eyes glaze over, YOU HAVE TO STOP! When the questions stop, YOU HAVE TO STOP! The last thing you want to do is ramble on once they’ve stopped listening. Instead, ASK them a question: “I’m sorry, did you not understand something I said?” “Did I answer your question?” “Is this interesting to you?” By doing this, you will give them an opportunity to ASK you another question: “…back up…what did you mean when you said ‘store of value’?” Or maybe even make a comment: “…wow…this stuff is pretty complicated…” In either case, this actually helps keep the conversation going. Just back up, explain it again, keeping in mind your base concepts and definitions, and see if you can talk them past where they got stuck. Maybe they shut you down entirely: “you know what, this is crazy, it can’t be true, let’s change the subject…” To which the ONLY correct response is, “Ok!” (we’ll get to this later). Keep in mind that letting your listener lead will allow you to carry the conversation much further than you trying to push it along on your own. 3. Know Your Role / A Little at a Time / Don’t Overcorrect So, what’s the end goal? Is it to have them whip out their phone, download an exchange, and make their first Bitcoin purchase right then and there?! No, of course not. The role of these conversations is to LEAVE THEM WANTING MORE. Your goal should be to spark interest and curiosity. If after talking with you they end up on The Google or The YouTube looking for more information, then you’ve done your part! Movies and TV condition us to want the big payoff at the end: the parade, the teary embrace, the triumphant symphony. That is not real life. Really, the best ending to a Bitcoin conversation might just be your listener making an audible, but clearly deeply contemplative, “…huh…”. You’ve done your job. You’ve got them noodling something they have never noodled before. Even once you understand Bitcoin, there is still an entirely different conversation about what the technology is, how it works, and how people interact with it. And let’s be honest, it’s complex and confusing. Exchanges, blockchain, forks, difficulty adjustments, miners, cold storage… More complicated ideas. More jargon. Make sure you throttle yourself back and explain just A LITTLE AT A TIME. It’s ok to have one conversation about the fundamentals of Bitcoin and then an entirely different conversation about blockchain technology or how people acquire BTC or the difference between storing Bitcoin on an exchange versus a cold wallet. Don’t fall into the trap of thinking you have to tackle all of this at once. While all this is happening, BE CAREFUL NOT TO OVERCORRECT. People know what they know, right? And what people know is always correct, right?? Be sensitive. If your listener makes a comment that isn’t true or is off track, don’t scold them or forcefully correct them. If your listener feels attacked or threatened, conflict will arise, and once that happens, their minds will be completely shut off. No one listens during an argument. Don’t attack. Explain. For example: Noob – “Well, the USD is backed by gold, so that will prevent it from ever devaluing!” Bitcoiner – “You know, it’s pretty interesting, a lot of people think the same thing. The truth is that while the USD was backed by gold for a long period of time, it isn’t anymore. You see, back in 1971…” Keep it simple, factual, and non-confrontational. Going back to our example from before, even if your listener shuts you down entirely, THAT’S OK! They have now experienced a Bitcoin conversation that will percolate around in their brain. And perhaps next time they hear the word Bitcoin, whether on the news or on the internet, they’ll think back to your conversation and what you shared with them. Hopefully you didn’t over-press and their memory of your conversation isn't a negative one which leaves them feeling negative about Bitcoin: “Bitcoin is stupid and people who believe in Bitcoin are arrogant and rude.” Finally, ENCOURAGE THEM TO DO THEIR OWN RESEARCH. The journey doesn’t start and end with you. You are simply a stepping stone along their path. Know that you are playing a part in their story; you are not the main character. Adoption of Bitcoin will occur over a long period of time. The conversations we have with our friends and family will create the buzz, attention, and understanding that is needed, but please be mindful that you are doing it in a helpful and productive way that leaves people wanting to know more. Oh, and step 4: Stack Sats and HODL!
The importance of being mindful of security at all times - nearly everyone is one breach away from total disaster
This is a long one - TL;DR at the end!
If you haven't heard yet: BlankMediaGames, makers of Town of Salem, have been breached which resulted in almost 8 million accounts being leaked. For most people, the first reaction is "lol so what it's just a game, why should I really care?" and that is the wrong way to look at it. I'd like to explain why everyone should always care whenever they are part of a breach. I'd also like to talk about some ways game developers - whether they work solo or on a team - can take easy steps to help protect themselves and their customers/players. First I'd like to state that there is no practical way to achieve 100% solid security to guarantee you'll never be breached or part of a breach. The goal here will be to get as close as possible, or comfortable, so that you can rest easy knowing you can deal with problems when they occur (not if, when).
Why You Should Care About Breaches
The sad reality is most people re-use the same password everywhere. Your email account, your bank account, your steam account, your reddit account, random forums and game websites - you get the idea. If you haven't pieced it together yet the implication is that if anyone gets your one password you use everywhere, it's game over for you - they now own all of your accounts (whether or not they know it yet). Keep in mind that your email account is basically the holy grail of passwords to have. Most websites handle password changes/resets through your email; thus anyone who can login to your email account can get access to pretty much any of your accounts anywhere. Game over, you lose.
But wait, why would anyone want to use my password? I'm nobody!
It doesn't matter, the bad guys sell this information to other bad guys. Bots are used to make as much use of these passwords as possible. If they can get into your bank they might try money transfers. If they get into your Amazon account they might spin up $80,000 worth of servers to mine Bitcoin (or whatever coin is popular at the time). They don't care who you are; it's all automated. By the way, according to this post (which looks believable enough to be real) this is pretty much how they got into the BMG servers initially. They checked for usernames/emails of admins on the BMG website(s) in previous breach dumps (of which there are many) and found at least one that used the same password on other sites - for their admin account! If you want to see how many of your accounts are already breached check out Have I Been Pwned - I recommend registering all of your email addresses as well so you get notified of future breaches. This is how I found out about the Town of Salem breach, myself.
How You Can Protect Yourself
Before I go into all the steps you can (and should) take to protect yourself I should note that security is in a constant tug of war with convenience. What this means is that the more security measures you apply the more inconvenienced you become for many tasks. It's up to you to decide how much is too much either way. First of all I strongly recommend registering your email(s) on https://haveibeenpwned.com/ - this is especially important if your email address is associated to important things like AWS, Steam developer account, bank accounts, social media, etc. You want to know ASAP when an account of yours is compromised so you can take steps to prevent or undo damage. Note that the bad guys have a head start on this!
You probably need to have better password hygiene. If you don't already, you need to make sure every account you have uses a different, unique, secure password. You should change these passwords at least once a year. Depending on how many accounts you have and how good your memory is, this is your first big security vs convenience trade-off battle. That's easily solved, though, by using a password manager. You can find a list of password managers on Wikipedia here or you can search around for some comparison articles. Some notable choices to consider:
1Password - recommend by Troy Hunt, creator of Have I Been Pwned
LastPass - I use this at work and it's generally good
BitWarden - free and open source! I use this at home and in some ways it's better than LastPass
KeePass (and forks) - free, open source, and totally offline; if you don't trust "the cloud" you can trade away some more convenience in exchange for taking full responsibility of your password security (and backups)
Regardless of which one you choose, any of them is 100x better than not using one at all.
The problem with all these passwords is that someone can still use them if they are found in a breach. Your passwords are only as strong as the website you use them on. In the case of the BMG breach mentioned above - all passwords were stored in an ancient format which has been insecure for years. It's likely that every single password in the breach can be reversed/cracked, or already have been. The next step you need to take is to make it harder for someone else to login with your password. This is done using Multi-Factor Authentication (or Two-Factor Authentication). Unfortunately not every website/service supports MFA/2FA, but you should still use it on every single one that does support it. You can check which sites support MFA/2FA here or dig around in account options on any particular site. You should setup MFA/2FA on your email account ASAP! If it's not supported, you need to switch to a provider that does support it. This is more important than your bank account! All of the big email providers support it: GMail, Outlook.com, Yahoo Mail, etc. The type of MFA/2FA you use depends on what is supported by each site/service, but there is a common approach that is compatible on many of them. Most of them involve phone apps because a phone is the most common and convenient "thing you have" that bad guys (or anyone, really) can't access easily. Time-based One-time Password or TOTP is probably the most commonly used method because it's easy to implement and can be used with many different apps. Google Authenticator was the first popular one, but it has some limitations which continue the security vs convenience battle - namely that getting a new phone is a super huge chore (no backup/restore option - you have to disable and setup each site all over again). Many alternatives support cloud backup which is really convenient, though obviously less secure by some measure. Notable choices to consider:
Authy - probably the first big/popular one after Google Authenticator came out (I think) - NOTE: They let you use it on your desktop/browser, too, but this is TOO much convenience! Don't fall for that trap.
LastPass Authenticator - conveniently links up with a LastPass account, some sites support extra features (like not needing to type a code, just answer a phone notification)
Yubikey - A real physical MFA device! Some models are compatible with phones, too.
Duo - this one is more geared towards enterprise, but they have a free option
Some sites/services use their own app, like Blizzard (battle.net) and Steam, and don't allow you to use other ones. You will probably have a few apps on your phone when all your accounts are setup, but it's worth it. You'll definitely want to enable it on your password manager as well if you chose a cloud-based one. Don't forget to save backup codes in an actual secure location! If you lose your backup codes and your auth app/physical key you will be locked out of accounts. It's really not fun recovering in that situation. Most recommendations are to print them and put in a fireproof safe, but using some other secure encrypted storage is fine. There is such a thing as bad MFA/2FA! However, anything is at least better than nothing. A lot of places still use SMS (text messaging) or e-mail for their MFA/2FA implementation. The e-mail one has the most obvious flaw: If someone gets into your email account they have defeated that security measure. The SMS flaws are less obvious and much less likely to affect you, but still a risk: SMS is trivial to intercept (capture data over the air (literally), clone your SIM card data, and some other methods). Still, if you're not a person of interest already, it's still better than nothing.
What Does This Have To Do With GameDev?
Yeah, I do know which subreddit I'm posting in! Here's the section that gets more into things specific to game development (or software development in general).
Secure Your Code
Securing your code actually has multiple meanings here: Securing access to your code, and ensuring your code itself is secure against exploitation. Let's start with access since that's the easier topic to cover! If you're not already using some form of Source Control Management (SCM) you really need to get on board! I'm not going to go in depth on that as it's a whole other topic to itself, but I'll assume you are using Git or Mercurial (hg) already and hosting it on one of these sites (or a similar one):
First, ensure that you have locked down who can access this code already. If you are using private repositories you need to make sure that the only people who have access are the people who need access (i.e. yourself and your team). Second, everyone should have strong passwords and MFA/2FA enabled on their accounts. If 1 person on the team does not follow good security practices it puts your whole project at risk! So make sure everyone on the team is following along. You can also look into tools to do some auditing and even automate it so that if anyone's account becomes less secure over time (say they turned off MFA one day) they would automatically lose their access. Additionally you should never commit secrets (passwords, API keys, tokens, social security numbers, etc) to your code repository. Probably 90% of cases where people have their AWS/Google Cloud/Azure accounts compromised and racking up huge bills for bitcoin mining is due to having their passwords/keys stored in their git repo. They either accidentally made it public or someone got access to the private repo through a compromised account. Never store sensitive information in your code repository! Next topic: Securing your code from vulnerabilities. This one is harder to talk about for game dev as most engines/frameworks are not as susceptible (for lack of a better word) to these situations as others. In a nutshell, you need to keep track of the following:
Is my code doing anything "dangerous"? (system-level stuff, memory access, saving passwords anywhere)
Could someone get the keys to the kingdom (API key, server password, etc) by just opening Cheat Engine and looking at memory values? Or doing a strings/hex edit/decompile/etc on my game executable?
Am I using outdated libraries/framework/engine? Do they have any known security bugs?
Secure Your Computer
I'm not going to go in depth on this one because at this point everyone should have a handle on this; if not there are limitless articles, blogs, and videos about the how/what/why. In summary: Keep everything updated, and don't open suspicious links.
Lock your computer when idle - use a password (or PIN or face unlock or whatever your OS uses) - no one should ever be able to walk up to your computer and use it if you're not looking, nor should they be able to get in if they grabbed your closed laptop off the table at starbucks (thanks u/3tt07kjt for reminding me of this one)
Use full disk encryption (especially on laptops)
Update your OS for security updates ASAP
Use anti-virus (yes, Windows Defender is fine) and keep it updated
Update your web browser ALWAYS (this is your 99% chance attack vector, so don't postpone it!)
Don't install browser extensions that you don't need - a LOT of extensions are either malware from the start or become malware later (my favorite emoji extension started mining bitcoins, FFS!) - check reviews regularly after extensions update
DO use adblock and privacy extensions - ads are a common attack vector - I recommend uBlock Origin and Privacy Badger at a minimum (note that some legit sites can break and so you'll have to fiddle with settings or whitelist)
Don't open suspicious or unknown links on e-mail, social media, discord, etc (be sure to hover over the links in this post before clicking them)
Don't open attachments, ever - unless you were expecting it from that person at that time
Don't fill out ANY forms (comments, login, registration, etc) on websites that don't have HTTPS (secure) connection - your browser will show this in the address bar, usually
In general, be suspicious of everything that comes from people you don't know - and even from people you do know if it was unexpected
E-Mail is (probably) the least secure form of communications ever invented - so try not to use it for sensitive things
Secure Your Website
I will have to add more to this later probably, but again there are tons of good articles, blogs, and videos on these topics. Hopefully the information in this section is enough to get you on the right track - if not feel free to ask for more info. Lots of guides can be found on Digital Ocean's site and they are relevant even if you don't use DO for your servers.
Use HTTPS (SSL/TLS) secure connections - it's FREE and EASY thanks to Let's Encrypt
KEEP EVERYTHING UPDATED - automate as much as you can
If you have control over the server, you MUST update the OS, the web server, and any backend application servers/languages/frameworks involved. Equifax breach was due to having out of date server software. BMG breach was worsened by having out of date server software. YOU MUST STAY UPDATED, ALWAYS
Don't store sensitive personal information - it's a huge pain to be PCI compliant, it's a huge fine if you mess it up - avoid storing any customer information that you don't actually need (see also: GDPR )
Do not allow access to SSH/Remote desktop/Database services from the whole world; the general public should only ever be able to reach ports 80 and 443 on your web server (and 80 should permanently redirect to HTTPS)
Use SSH keys instead of passwords on Linux servers
Don't run your own email server - it's just not worth it; use google apps for business, office 365, zoho, or something else for business email
Secure your domain registrar account! Don't lose your domain to a bad password or lack of MFA/2FA or an old email address! If your registrar doesn't support actual security then transfer to one that does. (namecheap, namesilo, google domains, amazon aws route53, even godaddy, the absolutely worst web company, has good security options)
A lot of this will apply to your game servers as well - really any kind of server you expect to setup.
That's it, for now
I ran out of steam while typing this all up after a couple hours, but I may revisit it later to add more info. Feel free to ask any questions about any of these topics and I'll do my best to answer them all.
TL;DR (y u words so much??)
Use a password manager so you can have different, random, secure passwords on every account on every website/service/game
Use MFA/2FA on every account, if possible
Lock your computer when idle/away
Use full disk encryption on laptops
Update your operating system (we all hate Windows Update, but it really is for our own good)
Use anti-virus (Windows Defender is fine)
Update your browser
Use good adblockeprivacy blocker browsers extensions
Don't use browser extensions that you don't really need (they could be a trojan horse of bitcoin mining later)
Don't trust anything sent by anyone, unless you were expecting it and know it's safe
E-mail is the least secure form of communications in use these days; don't trust it for sensitive things
Use source control for your game code (git, mercurial, etc)
Lock down access to your source code
Don't put secrets (passwords, API keys/tokens, social security numbers, credit card numbers) in your code repository
Don't do dumb things like store your AWS keys in your game for players to just find with simple tools
Check your code dependencies for security bugs, update them when needed
Use HTTPS on your website
Update your web server OS and software
Use secure password storage (don't reinvent this wheel, it's been solved by way smarter people)
Use SSH keys instead of passwords for Linux servers
Use a firewall to block the world from getting in with SSH/Remote desktop/database direct connections
Only allow your own IP address (which can change!) into the server for admin tasks
Don't run your own email server, let someone who knows what they are doing handle that for you
Secure your domain registrar account, keep email address up to date
... in general... in general... in general... I sure wrote those 2 words a lot.
Why Should I Trust This Post?
Hopefully I have provided enough information and good links in this post that you can trust the contents to be accurate (or mostly accurate). There is certainly enough information to do some searches on your own to find out how right or wrong I might be about these things. If you want my appeal to authority answer: I've been working at a major (network/computer) security company for almost 7 years as a software developer, and I've had to put up with pretty much every inconvenience brought on by security. I've also witnessed the aftermath of nearly every type of security failure covered in this post, via customers and the industry at large. None of the links I used are related to my employer or its products. Edit: Fixed some typos and added some more links More edit: added a few more points and links
“This person does not exist, huh?” Another empty Saturday of my recently unemployed schedule slides by without a thought as to appointments to keep. My finger slides endlessly through Reddit’s constantly generating front page, all concern to the content long gone. I tap the link and find a website that purports presenting randomly generated faces. I’ve not exactly the sharpest attention to detail so at first the randomly generated faces seem normal to me. Eventually, even the dimmest eye can begin to discern uncanny features on the randomly generated faces. Ridges over eyes are too pronounced and the skin appears wrinkled in some places and smooth in others. Irises differ in shape and size and sometimes even color. That’s just the little stuff. Refresh the page over again long enough and you start to come across aberrations such as glasses that don’t connect to their lenses or hats that do not cast a shadow. Scroll long enough and you are lucky to come across the blatant abominations of a soulless AI that only such a program could create. Facial features appear deformed and broken, melding into their surroundings in a discolored and melting mess. Companions of the photograph’s focus are inhuman monsters with mouths sutured shut and eyes that stare emptily into your soul. You know- basic computer fun. That being said, it grows old real fast to a mind that has been nurtured into a desire for instant gratification and a desire for entertainment. I click out of the new tab and go back to scrolling Reddit. The message hits my iPhone with a sharp ring and a notification box slips out of the top of the screen. Jay: Hey, can I borrow a phone-charger adapter? All mine are in use right now. I roll my eyes though its not exactly a great burden on my back. Me: Sure, but you need to come down here. I hear the ceiling above creak and squeak as my upstairs neighbor hoists himself off of his couch and walks across his living room floor. My apartment is an old building, full of the wear and tear of a building from a fading age, built in a rural area in expectation of local development that never came. I hear the upstairs door open and shut, and the stairs outside rattle with Jay stomping down the stairs. He knocks on the door twice and then comes inside without invitation. In the two years that I’ve lived in this apartment, Jay’s the only one that I’ve become on a first-name basis with. I’ve always had a hard time making friends due to general social awkwardness, but Jay seemed invulnerable to any sense of shame or ability to sense offense. Eventually, he wormed his way into my affections, despite being nearly ten years older, through sheer persistence and ignorance. “Hey man,” Jay says with a friendly smile that changes a bad case of resting bitch face to a welcoming warm glow. “Is it in your spare drawer?” Jay was an imposing man that was somewhere between muscular and chubby and had a pair of horn-rimmed glasses dangling from the collar of a dusty blue button-up. His hair was beginning to migrate from the middle of the top of his head to an ever thickening beard that would rival that of any philosopher. “Yup.” I nod, returning his gesture. “In the kitchen.” “Cool.” Jay nods and slips his flip flops off and walks into the kitchen at a near jog. “Hey, I’m going to Family Fare later, do you wanna go along?” I shrug, “Sure. I need to get some rice.” I go back to my phone and then glance back at him. “Ooh, some steak also.” Jay comes out of my kitchen with a outlet-USB adapter cradled in his left hand. “Cool, I’ll text you.” He begins going for the door before I interrupt him. “What are you working on today? You seem too excited to be designing a website for a church.” Jay’s smile returns with an intensity to rival the sun. “Oh yeah, I don’t think I’ve told you about it yet.” He holds out his hands, both flat, though his left one cradled the USB adapter under his thumb. “Alright, picture this. Only you are the one who knows your schedule, right? Or how hot you like your room at night, right?” He pauses enough for a half nod on my part, but quickly continues. “Alright, now imagine that you can clone a little copy of all your little likes and dislikes and install it onto a server that runs your smart home, after bundling it with an AI. Then, this little copy of you could do everything that you want to do on a digital basis, making your life way easier!” He stops and stared at my face. “Isn’t that the plot of a Black Mirror episode? Maybe a bunch of them?” I ask, blurting out the first thing on my mind. Jay seemed confused for a moment, then shrugged, “Is that the technology Twilight-Zone thing you keep trying to get me to watch?” I nod in reply and Jay gives me a sidelong glance. “They haven’t done it though, right? Like in real life?” “I don’t think so.” I say with a shrug. “I don’t even think they have the capability to design commercial AI yet though.” “I’m not concerned about what they can do.” Jay says with a dismissing wave. “The idea is still potentially profitable, right?” “I guess.” I reply and Jay’s smile returns. “But what about the ethical and moral problems of creating a being capable of understanding reality, adding a person to it, then trapping them into a role. Isn’t that similar to creating life just to subject it to slavery?” Jay holds both his hands up in mock defense without dropping his smile, “Woooah, Mister Philosopher over here. I don’t care about that stuff, come on. Plus I’m gonna create safeguards against that stuff.” “Whatever, man.” Shaking my head, I scroll back up to the link to the web page in my history. I open up the randomly generated face of an elderly Asian woman and then turn the phone around to show Jay. “Hey dude, what do you think of this?” Jay steps forward and takes the phone into his hand. “Looks like a face. Looks like its been messed with a bit on Photo-shop or something.” He turns it back around. “Like the nose is too elongated here.” He points to the left nostril. “What about it?” “Hit refresh.” I say and he taps the button. The page reloads and another face shows up. This time, its a young black woman with a companion whose face is distorted beyond any recognizable parameter as a human. “Wow.” Jay says and taps the button again. He tosses the phone back to me and it drops onto my lap, showing a picture of a redheaded man, smiling with a flesh-colored hat. “That’s crazy stuff right there dude, I wouldn’t mess around with it too much.” I smile, “What do you mean?” “Looks like a viral site or something. Trust me, just don’t mess around with it.” “Viral?” I begin as Jay slides on his flip flops. In place of his usual smile is now a gruff expression, him appearing lost in thought. I continue on, sitting up. “Isn’t iOS sand-boxed to hell? How would I get a virus from a site on Reddit’s front page without someone commenting about it?” “Trust me, Peter.” Jay’s rough tone takes me by surprise. “I don’t know very much, but I know what I’m saying when I say that you should stay off that page.” He opens the door and then walks out without another word. I snort and press the sleep button, letting the generated man’s face sink into darkness and drop the phone onto the floor next to the couch. Getting up, I head to the kitchen and begin sorting through my cupboards and refrigerator, searching for food items I’m going to need. Milk, beans, apples, etc. Knowing I’m going to need to make a list, I head back into the living room and snag my phone from the living room floor. After typing in my pass code, the man’s face reappears. I snort again while walking into the kitchen. I grew up with this stuff. It’s not like I don’t recognize a viral download when I see one. Where’s the Trojan download request, or pop-ups? I think to myself. I refresh the page again just for laughs. A smiling Caucasian smiles at the camera, fairly normal in appearance. There is, of course, a blue mucoid blob next to her in frame, but all in all there is nothing sinister or dark about this. No real Nosleep material, as it were. I close out of the tab and tap out a list of things to buy with my dwindling savings. Hopefully my unemployment would get sorted out soon. I’ve never gone on unemployment before and my father, who had some knowledge of the law, said my case seemed ideal for it. The thought of what Jay had said begins to irk me slightly. Does he think that I’m a dumbass or something? I need paper towels too. I tap that into my list. I know that I’m not great at detecting tone or hidden meanings behind words, but it seems weird that Jay would say that to me. Toilet paper? No, I’m good at that. Same as toothpaste and floss. I do need mouthwash, though. There’s no way that’s a virus. I think. Sighing, I finish up my list and open up Safari again. I navigate to the list of comments below the link. Scrolling down, I see no comments about malicious software or hackers or anything like that. Just Imgur links to disconcerting results and threads mocking the realism of the pictures. Setting down the phone on my coffee table, I grab the remote to my TV and flipped it on. Grabbing the GameCube controller hooked up to my Switch and turned the console on and try to idly explore Hyrule in Breath of the Wild, but my mind is occupied too much to be distracted. Minutes pass by and my mind begins to delve into all the bad possibilities, like that I had offended Jay, or perhaps he did really think I was that stupid- as my mind is apt to wander. “Ugh.” Groaning, I finally set the controller down and go to the door for my beat up hi-tops. Jay’s pretty hard to offend and he knows me pretty well, so he wouldn’t think it is too weird if I asked for clarification about his statement. I walk out into the hallway and close the door behind me. Sure is cold out today. I think, even though a quick glance to the double glass doors at the front of the complex confirms they are both shut. The trip upstairs is quick and I knock on Jay’s door. “If it’s Peter, then come in!” A voice calls from within. Opening the door, I step into an apartment far more cluttered than my somewhat minimalist interior design. Stacks of manuals and technical magazines clutter the floor, intermixed with CDs in jewel cases and USB sticks. Old laptops are stacked on top of computer towers along the back wall on either side of a couch that is clear enough for a blanket and pillow, both of which are oddly neat and folded. In the center of the living room are three plastic totes spilling over with green computer components, neatly bundled cords and wires, and random adapters and such. As long as I’ve been friends with Jay, I’ve never actually set foot in his apartment. I’ve seen the inside, but we always hang out at my place. “Jay, where are you?” I call out over the quiet hum of box fans spraying cool air all over the room. The window is open, despite it being winter. “In the bedroom!” Jay replies and I head for the door before Jay steps out and shuts it behind him. In the glimpse that I have of his bedroom, I see boxes on shelves with blinking lights and neatly arranged cords that I can only conclude is some kind of server setup or something. “Jeez man, are you mining bitcoin or something?” I ask half-jokingly, but Jay shakes his head. “Naw. That become unprofitable a few years back. What’s up?” “Listen Jay, I was just wondering about what you said. I don’t want you to think I meant offense if I offended you about-” Jay interrupts me with an upheld hand. “I figured you were coming in about that. I shoulda phrased it better. I’m sorry.” He says with an apologetic frown. “It’s nothing.” I reply and pause, “But what is so wrong about that site? I couldn’t find anything about it. I mean, it just seems like...” I trail off, waiting for a response. Jay sighs and shakes his head, “Listen, you don’t like math or stuff like that, right?” I shake my head but continue before he says anything, “No, but I’m pretty curious about this.” Jay looks away reluctantly and then speaks. “Okay, listen. The site that you showed me has a program that generates a randomly-featured face, right?” “Okay?” I say. Jay moves to the couch and grabs his pillow and blankets in a nice stack. He removes them to the top of the plastic totes and takes a seat. After waiting for me to sit, he continues, lacking any of the excitement that he usually gets about technology. “When the program blends faces together, it gets what appears to be on the surface, a new face. Depending on the sample size of the data fed into the database the program pulls from, any type of face could be generated. The number of possibilities goes up with each entry into the system.” “So what?” “So, if a large enough sample size exists, and a large enough amount of randomized features exist, then the output has, for our purpose, an infinite number of possibilities.” “But it’s not infinite. For it to be infinite-” Jay interrupts me with a nod, “Yeah, yeah, but for OUR purpose, its infinite.” “Okay?” “So eventually, given enough time, the system will generate a face that is identical to a face that is in reality, right? Even with all the distortions and whatever, eventually one will get created, right?” “Given enough time.” I quote him back his own condition. “Yup. The more people messing with it, the more that it has the chance to output a real value.” “So why does any of this matter? Are you gonna tell me the person stops existing?” I begin to chuckle but stopped when I see him shaking his head sadly. “What, Jay?” I tease, less joyfully than I had. “You superstitious?” Jay reaches into the pocket of his sweats and pulls out an iPhone. Typing on the screen, he quickly pulls up the website and points to the URL. “You see the name of the website?” “Yeah. What about it?” Speaking with a shrug, I watch his face grow deadly serious. With a few taps, Jay opens a window to the side of the website filled with what I surmise is the code for the operation. “Do you see all this?” Jay taps a few places on the text-filled window and then flips it to show me a bunch of meaningless brackets, colons and equal signs intermixed with words. “Yeah, its just code.” “Okay.” Jay says. He taps something on the screen a few times, sets the phone down and mumbles something that sounds like “I guess I trust him.” He reaches forward and taps me on the nose. “Boop!” A small shock that feels like a static discharge burns my nose and I recoil.” Ow. “What was that for?” I calmly ask, beginning to grow pissed off. Without a word, Jay lifts his phone and shows me the text window. Strange symbols and letters formed from slashes and grammar symbols appear to be intermixed with the code now. They seem almost to project themselves from the screen in an odd mimicry of a 3-D movie. It’s hard to see the text behind it, or even anything as my focus is locked onto the floating runes. They seem to float out of the screen, growing brighter and brighter as reality grows dim. Then Jay shuts the screen off. I have to blink a few times to clear my vision of the etched symbols. “Wow. Wow. WOW.” I begin to stutter out, but Jay snaps his fingers in front of my face to reclaim my attention. “I might as well go all the way.” Jay says with a shrug. “The name of the website is something called a ‘True Statement’ in that it is unconditionally true. It’s always true that the output of the website does not exist. So if the output is a real person, than that person ceases to exist, with all effects and differences they’ve made in reality changing with them. Reality has already changed six times since this thing was created. When you showed it to me, it seemed off so I came up and checked the source code.” “What? What do you-” I interrupted, but Jay kept speaking. “These symbols are, at a basic level, magical spells in the code that do stuff. This was created by someone bad.” “How do you even know all of this?” I asked and he shrugged. “I’m good with magic. I mean, technology makes it way easier than it used to be. I stare at him stunned. I regret the first thing that rolls out of my mouth. “So I guess you could say you are a tech wizard, huh?” Jay stares at me, mouth hanging open. “Are you serious?” He stands up, gesturing with his hands frantically. “That’s your response to this? A pun?” He puts his hand on his forehead. “I was freaking out about someone finding this out, but...” he trails off. “So now what?” I ask. Part two here: https://www.reddit.com/nosleep/comments/arnhwt/tech_wizard_part_2/
Because cold wallets, such as those stored offline in a text file as I keep recommending in my standard advice below: All you need is a text file to put your wallets in, like this example from https://walletgenerator.net/?currency=Dogecoin 1,"D7WBUpdgLRtG6WyPsqjhaKiJR65X8ZGnkZ","6KieLMW1poAzNVnmLuQZqA262gxEQ51eLGdDK8e2GL2B4LHCKKb"2,"DM8LT16d49zHr8ByXbUwZb9UBXDGMaZRdc","6Ktgxdv6vN9v2bDHwcJBBb3oMRAgXJumESzBnxaXUSGFZoq6pWQ"3,"D5UCa51AfxjtVHQ46oYXe2YfkctTeLXPhx","6L2WSPWadRYCwt2L1CxH6zC7PoTYY3KyjxdiUoCqi5eyq6hQKvj" Use https://coinb.in/#settings to move coins. Download both sites and run them offline. Use https://bitinfocharts.com/dogecoin/ to check balances and transactions. See http://www.mocacinno.com/blog/create-sign-broadcast-transactions-using-coinb/ for coinb.in tutorial. And read the ELI5s (and my history) for more info. Are without doubt THE SAFEST way to store your coins. Plus, they consume no resources. No bandwidth, no network stress for every node we have, no storage of 20Gb+ blockchains, no weeks of waiting for things to sync, no tearing your hair out and posting desperate pleas for help, and most importantly, no coins irretrievably lost because you or your client screwed up.
Wallets, ALL WALLETS are nothing but numbers. Very large numbers, but fundamentally no different from “7”, “42”, “911” or a phone number. They cannot be created nor destroyed, and you either know them or you don’t. Anyone who knows a key can use it to spend any coins it controls. Anyone who doesn’t know it, can’t. Don’t be the guy who doesn’t know his own keys. Keep them safe. Make copies. Keep those safe. Don’t let your friends, kid brother or random burglar find them, but don’t lose them either. The only other thing you need for a fully functional wallet is a way to spend coins. Coinb.in is such a way. There are others, such as DogeCoinMultiSig.org which tomcarbon built. Oh, and you can and should download it and run it locally.
The default entry point for coinb.in is https://coinb.in/#settings because this settings page is very well hidden. Its in the tiny gear wheel on the Broadcast page. Looking across the top of the page, you can see
We’re only going to use three of these. New, Sign, Broadcast. Now, keep in mind that coinb.in is an old Bitcoin tool which tomcarbon added Dogecoin to. Sometimes it thinks its dealing with Bitcoin still, so if you see anything odd, go and make sure you’ve selected Dogecoin in the Settings page.
This tool should be the only place you spend coins. Sure, some clients may look more convenient, but they all suffer from a very big coin-losing flaw. Whenever you split a UTXO, they create a new wallet to send the change to. And they DON’T TELL YOU! This means unless you back up after every transaction, you run a high risk of finding all your coins have ‘disappeared’ from your wallet, and you don’t recognise where they went. So if you use a client for the convenience as well as a text list of your wallets, you won’t know to add a new wallet to your masterfile. Its best to ditch the clients entirely.
Now we come to the nitty-gritty. Lets use those three wallets above and assume that #1 is the source, #2 the destination and #3 the change wallet. Note that these won’t actually work, as none of them have ever been used, but they will do as examples. New Transaction Located at the bottom of the New menu, this will give you a page to enter your wallets and amounts. In the top field, you enter your source address or Key. If you use the key, it will calculate the address when you click the Load button, which should match what you expected. Note that Load only brings in the first 100 UTXOs. This is so that you can retrieve coins from high-volume wallets which would kill any client. Coinb.in is in fact the ONLY WAY to do this, as even QT falls over around 600 UTXOs. You will see the total balance that was loaded in the Transaction Fee field. And also in the Inputs tab, where you can go to adjust which UTXOs to spend. Now you need to add the wallet(s) and amounts to send to them. Lets suppose the source contained a single UTXO for 1,000 Doge. You want to send 500 of them. So you would enter the #2 address in the Address field, and 500 in the Amount field. The Fee now changes to 500, which is not what you want. So you click the + button to bring up a new line, enter the change address and the other 500, making the fee zero. And you’re done. Check that the Fee is indeed zero. Check that the amounts shown in the Outputs and Inputs tabs match exactly.
THIS IS CRITICAL!
There is a bug which will send all the coins to the miners if the Outputs exceed the Inputs. I would have expected the Fee to show as negative in such a situation, but it doesn’t. BE WARNED! Once everything looks right, hit the Submit button. This will give you a block of hex code. Copy it. Sign Go to the Sign tab and paste it. Add your private key for the source wallet and click Submit. Note this can be done offline for safety. This will give you another block of hex, the SIGNED transaction. Broadcast Copy this and paste it in the Broadcast tab and click Submit. That’s it. Your coins are on their way. Make a cuppa and settle in while they arrive in a minute or three. Note: All fields retain their values unless you refresh the page! This can be a boon when doing multiple transactions, such as when emptying a huge wallet. But it can also be a trap for the unsuspecting. Refresh or close the window when you’re done.
Who should use this? Absolutely EVERYONE! Even if you’re wedded to your client in some satanic blood-contract, you should still know how this works, because sooner or later you’re going to have a problem you can’t fix without it. Definitely download the site and store it on every device you have. On every USB backup of your wallets. On your phone (well, except iOS which doesn’t do local HTML), etc, etc, etc. Oh, and if you’re a programmer SmartyShibe, do consider improving the code over on GitHub. EDIT:https://github.com/OutCast3k/coinbin added courtesy of AtomHearth
It’s my bad, guys. I got too busy to sit down and format the post right after it went up. It’s been up for a few hours and people are blowing up over it. A few have private messaged me and asked for a link to the forum post. Let me clarify where this is being posted. This site is very, very privacy oriented. Links are automatically changed every few minutes, and they are updated across the site automatically. Even the domain name changes every couple of hours. In short, nothing on the site is static. You have to be invited and run software on your computer to keep the links updated. So, no, I can’t link anyone to the post. I can’t invite anyone to the site either, because every account gets ONE invite, and I’ve already given mine to a friend a while ago. Sorry. That’s also why, even though Michael/Neale provides links in this post, I can’t link them here. Without further comment, here’s the last post from Michael/Neale!
Jack's face told me that there would be no lying my way out. Not a chance in hell. He wasn't going to believe anything besides the truth. I eyed the gun on his bedside table briefly. If he didn't like the way I'd been living, he could shoot me. Or just plain attack me. Jack seemed to be a very upright and honest guy. I'd probably lose his help by the end of telling the truth. So, I did. I told him about leaving the military and being unable to find a job. I told him everything I've told you now. I told him that I did in fact talk with Neale's Employees, and that I didn't want the police involved because I was an identity thief. Jack sat on the bed across from me and just stared during my story. He barely even moved. No reaction. "I still don't know if these guys are after me as Michael, or me as Neale," I finished with a shrug. Then I sighed deeply and looked at the floor. "You're kidding me," Jack said after a few seconds of silence. "Nope, it's all true," I said. He stood up and grabbed one of the motel keys. "I'm taking a walk to think about this," he said. I didn't even look up. He left, and I stayed where I was, my eyes boring into the floor. "Fuck." I whispered after he slammed the door. My emotions were drained, but the adrenaline of being caught by Jack kept me alert. No way was I sleeping anytime soon. I pulled out my laptop and took a seat at the desk provided by the motel. It would be past midnight soon, so the DeathNote guys' latest wager would be wasted. They'd have to put in another if they wanted their money on their next attempt. If the DeathNote guys were going to try and make some money by killing me, I was going to use their greed against them. I wrote a quick bot that would poll the DeathNote site every few seconds. If a bounty was added under my name, I'd get a text from my email address. Hello crude alarm system. Writing that bot took about half an hour, and by the time I had finished, I was ready to sleep again. As I laid down, I turned up the ringer on my phone to its maximum. I hoped it would wake me up. Sleep hit me like a metric ton of bricks.
I didn't hear Jack come back in last night, but he was sleeping in his bed when I squinted in the morning light and rolled over. The curtains were parted just barely and let a single stream of sunlight right into my eyes. Grumbling, I got up to pull them closed. The alarm clock on my nightstand said it was 10am. I panicked, realizing that I was very late for work. I pushed that trivial panic down and laughed quietly at myself. I was so wrapped up in maintaining Chris's identity that I apparently didn't give a shit about Neale or Michael. Not getting fired took priority over staying alive, apparently. I called my store and told the employees I was sick and wouldn't be in after all. Giving instructions from memory. I glanced over at Jack, who was completely passed out. His Beretta, phone, and keys were lying on his bedside table. I watched him intently for a few minutes, thinking. He could very well wake up and call the cops on me. He was a liability now. But there was nothing I could do to get rid of him. Not now, at least. Time to get to work. I still had some fishing to do. Ha, get it?
I logged into the backend of the fake phishing site I'd made, and was pleased to find ten entries in the database. Ten people had used my "forgot password" scam, and eight of them were Neale's. The other two were from my Employees. Marco and Alejandro Chavez. Brothers? Or were they cover names? They had followed my instructions, providing the same email address for both of them, but separate phone numbers. Pulling out my phone, I entered both numbers and saved them. I had yet to decide what I was going to do with them. Now, onto Neale. All of these Neale's were at least a little smart. None of them gave addresses, only zip codes. But at least I had something. Two zip codes were far out of state, two were one state away, and three of them were from nearby counties. One Neale didn't even have the last name of Keaton. How many Neale Keaton's were there? I decided to investigate the three Neale's in nearby counties. Google provided Facebook pages, LinkedIn profiles, and even a Twitter account. They were semi-active there, and even though they looked like grade-A citizens online, there was no way to know if any of them were not my Neale. For each one, I created a Facebook profile with some stock photos online. Their profiles were locked down, but their friends lists were viewable. I correlated the number of friends and guessed that the friends with the most of the same high school meant that was the school Neale had gone to. I used that high school to finish the profile, and sent off a friend request. I followed the same procedure for the other two zip codes in the neighboring states, but ignored the other two that were far away. If they accepted my friend request, I could do some more digging on their profile and hopefully narrow down my list. It took me a couple of hours to set everything up. Jack woke up just as I was wrapping things up. "Guess you're more into computers than you let on," he said as he sat up. I didn't say anything, but I turned around slowly to make eye contact. "You gonna call the cops on me?" I ventured. "Do you see the cops here?" "No..." "There's your answer." "Are you planning to help me get out of this?" "I don't want to help you." "Then why are you still here?" I coarsely asked. "After last night, whoever was shooting at us knows I'm helping you. So, before I knew what kind of an asshole you are, I locked myself into this." "You really think I'm that big of an asshole that I don't deserve to live?" I said angrily. "Identity theft is pretty fucking serious, Michael. Or should I say "Chris", because that's what your name tag says." I cringed and shut my eyes. "Jack," I started. "I'm not a bad person, or at least I try not to be. I boost people's credit scores and only take what they can afford to lose and not get suspicious about. I do that so I have a chance at retiring and not being a store manager beyond the age of 65." "So you go to school, you learn how to be valuable instead of stealing value from someone else!" Jack's voice rose. I gestured wildly at my laptop. "I didn't know shit about this or business before I started! But look at me now, I'm learning and getting better! Hell, if I get good enough, I might be able to repay everything I took! Plus interest!" Jack turned away and ran his hands through his hair. "So if you're stuck with me, like you said, then what's the endgame here?" I asked, giving him a minute to collect himself. "To get my name disassociated with yours, or Neale's or whoever the fuck these guys are after." "Good, then we have the same goal: to ditch Neale's identity. I have a part of a plan. Maybe sixty-five percent." "How comforting," Jack sneered. I spread my arms out and widened my eyes. "I've gotten this far on some pretty complicated crimes, Jack. We can get out of this." Jack sighed. "What's your sixty-five percent of a plan?" "Well, obviously we leave this area and never come back. Find a way to fire those Employees after I pay them what I owe." "You owe them money?!" Jack cried incredulously. "Not me! Neale!" Jack shook his head at me. I continued anyway. "I pay them what I owe so they don't come looking for me. We leave town, I burn everything to do with Neale. I find a new job somewhere else, you do the same, and we're free and clear." "How is that only sixty-five percent of a plan? Sounds more like common sense." "I haven't run through all the variables yet to make sure nothing is left undone," I said, folding my arms. "If you want my help, I have some conditions," Jack said. "Honestly, I could take it or leave it at this point, so I'm not to inclined to ask for your help," I snipped. "Then you can walk home from the motel." I shut my mouth. "First, you give me your real info. First name, last name, military unit, parent's info, the works." I waited for him to continue, even though I was shouting "No!" internally. "Second, you burn every identity you have currently. All except for Chris, since you need a job somewhere. But if you take out anymore credit cards, they sure as hell better be in your name." I clenched my jaw. Those were my backups. My emergency identities in case I needed to run. "Then I've decided. I don't want your help." "Then I'll call the cops." "Not if I get out of town first." "Then I'll find Chris directly and tell him all about what you've been using his info for. I'm sure your store keeps records on first and last names and social security numbers. I'll call as a bill collector and find the real Chris. Your best identity will be gone." He snapped his fingers. "I can't believe this. You're threatening me to accept your help. Are you listening to yourself?" "Actually, I'm protecting the public against you. If I find out you're swindling people out of identities again after this, I'll turn you in myself. The alternative is that I turn you in right now." Shit. He had me in a tight corner. I could squeeze out, but it'd take time to plan and some research to-- "Deal?" Jack interrupted my thoughts, thrusting out a hand. "If we have a deal, I help you get out of Neale's identity and get the target off your head. No deal, and you go to jail tonight." I sighed, then took his hand. "First thing's first," Jack said after we let go. "Burn those identities."
I shuffled around my office, peeling credit cards and IDs from underneath tables and underneath carpet flooring. Jack explored the room, looking for any that I might be intentionally leaving behind. "We might need these to get out of town," I complained while stacking the cards on my desk. "You mean you might need them. I don't have any fake identities to fall back on if things go south, so you don't get them either." "I'm telling you, these could be useful," I grumbled. "And I told you that was part of the deal. Every identity except Chris." I kept Neale's and Chris's documents off to one side. Neale's I would need in case I needed to prove myself to my Employees, and Jack was letting me keep Chris's identity. I tried to keep at least one identity hidden, but Jack swept the room and found him. Bert Drew, a tax accountant. "Whoops, missed one," I laughed nervously. Jack just dropped the credit card on the table and continued searching. Once Jack was satisfied by his search, we gathered all the documents and cards and went to Jack's house. We took out his barbeque, lit a fire, and toasted each one. Every name that was dumped into the fire evoked memories for me. "And you'll pay off every last one of these and close the account?" Jack demanded. "Most are already paid off," I sighed. "I'll finish the rest today." He nodded his satisfaction.
After burning all that plastic to a crisp, we had gone inside to do some research. I wanted to check my phishing site for more details and talk to my Employees to find out how much I actually owed them. Jack stood behind me as if he didn't trust what I was doing. Out of recent habit, I went to DeathNote first. I couldn't believe what I was staring at. Neither could Jack. His jaw hung slack before he took his fingers through his hair again. "Oh my god..." I whispered. And so, my little darkweb dweebs--hey, that's kinda catchy--this is where you started to come in. I'm sure you've seen the lovely "Wanted Poster" style post at the top of DeathNote. "WANTED -- NEALE KEATON. REWARD: $150,000. DEAD OR ALIVE." The rest of the post was some big long monologue about how shitty Neale Keaton was and how he double crossed on his business deals and shot up both friends and enemies. It included lines about how Neale stole identities too, which I thought was interesting. Did they get that from the real Neale, or from stalking me? The post wasn't signed, not even with a username. It was stuck to the top of the page. I read it in horror, a horror that was amplified after what we’d just done. "YOU DICK!" I screamed, jumping at Jack and shoving him into the wall. Even as he backpedaled, he grabbed his Beretta and stabbed it into my chest. I was so furious that I didn't care. "WE BURNED ALL OF MY IDENTITIES EXCEPT NEALE AND CHRIS. WELL, GUESS WHAT?! THEY KNOW ABOUT CHRIS NOW TOO! I'M WORTHLESS NOW, JACK!" He kept the gun painfully dug into my chest and glared at me. "There were kids at the store, when Neale's "employees" showed up. They were taking photos together in front of the store. Posing and stuff. They weren't even suspicious." He was thinking now. "Do you see how far up shit creek we are now?!" I yelled. Eventually, I calmed down and we got back onto DeathNote. It got worse. There was an honest-to-God campaign against Neale. You assholes were commenting everything you could dig up on Neale from across the darkweb. The stuff came from hidden sites that I didn't have an invite to and couldn't have searched. Our Neale had been a very busy man. Killed three drug runners in an ambush and stole their goods. Burned down a few competing meth labs. Harassed people who planned to testify against his friends and killed the ones who did. I'd call him a bad guy, but that doesn't do it justice. Not only was he enemies with good people, but he was enemies with practically every other bad guy out there! Not a single positive comment about him showed up. And everyone that commented thought that his name belonged to my face. I sat back in disbelief. “I can't outrun this,” I sighed. “This is all over the place, who knows where he has and hasn't been. No matter where I move, this bounty, plus the DeathNote gamble, is attached to my face. Doesn't matter who I really am. No one is going to believe me when I say I'm not him.” Jack was staring grimly at the screen. My phone suddenly rang, which scared the hell out of both of us. I exhaled sharply then took it off the table. Another $1,000 had been added to DeathNote. I refreshed to see that, sure enough, there was more. The bet was for today. “We should get moving,” Jack said after seeing the new bet. “I need to take care of a couple of things on my own first,” I said. “Can I borrow your car and a scarf?”
Jack let me leave without a fight. I don't think he cared if I lived or died at that point. “I'll call a couple of friends and see what I can set up while you're gone,” was his response. I wrapped the scarf around my face in a way that didn't arouse suspicion, and left in Jack’s car. My plans were twofold: collect my cash from my hiding places, and pay Neale’s Employees. There were three hiding places in town with cash that would total around $5,000. Enough, I hoped, to pay the two and get us out of town. I called Marco, who I hoped was the tall one. “Hello?” “It’s me,” I ventured. “Hey, boss.” “You hear the news?” I asked. “Which part?” “I’ve been ousted.” “Heard that,” he said. “Anything else?” “Shawn Lockhard is looking for you.” Marco sounded nervous. “I'm not concerned about him right now,” I said, unsure how else to respond. “He’s offering you help.” Well then. I guess Neale has some friends after all. “What kind of help?” “The usual. Money, guns, passports.” A way out. Neale was offering me a way out. “I'm coming by to pay what I owe you,” I stated. “Remind me how much.” “Nah, boss, it’s only a couple thousand. Keep it, you're going to need it. We planned for this.” Well what do you know. Loyal employees, and good friends. Even though the world hated Neale, I was starting to like him. Guess he wasn't such a bad manager after all. “We still should meet,” I said, against my better judgement. I glanced in my rearview mirror in paranoia. “We need to talk.”
I left the meeting with Marco and Alejandro feeling a little better. I had a meeting with Shawn Lockhard, whoever the hell that was. We had spoken on the phone. Two passports, ten grand, and a private plane trip to the northwest. From there, I could slip into Canada and hide away while I disassociated Neale from myself. Jack could do whatever he wanted after that. As I drove back to the motel, I thought about just taking off. I thought about staying with Marco and Alejandro until the meeting that night, grabbing the money, and running. Jack would demand half of it, if not more. But I wasn't Neale. Michael and Chris were more loyal than that. So, I parked around back, and made my way to the room. As I approached the motel room, my phone started buzzing. I opened it to see texts flooding in, one after the other. Gambles on DeathNote were being placed left and right. What the hell? There were five already and growing. When I stepped around the corner, I looked up from my phone, and my whole body tensed. There, huddled near the door to our motel, were the two DeathNote goons. Looked like I had just managed to turn the corner right as they were going to break the door down. The one facing me looked up in surprise and pointed. The other one swung his head around to look at me. They were both wearing something on their heads… flashlights on headbands? “You’ve got to be kidding”, I growled as they stood up and pursued me. I was already back around the corner by the time they’d stood. My phone’s buzzing picked up intensity as I stuck it back into my pocket. I bolted for the car, thankful that I was leading them away from Jack and keeping him safe. A silenced shot whizzed past my arm, and I moved to the side, my throat clenching up. I couldn’t even swear, I just moved back and forth, praying they were bad shots. I heard three more silenced shots, but didn’t see where they went. I was coming up on the corner of a building, so I threw myself around it to put something between us. The car was still far enough away that they could catch up and fire more shots. Suddenly, I heard gunshots from behind. I ducked behind a car and wondered what the hell I was going to do. My phone continued to buzz, and I got very, very irritated. Then, I realized that some of the gunshots weren’t silenced. There was an exchange of fire happening around the corner between muted, silenced shots and the raw power of a Beretta. Jack was here. I made for the car, pulling the keys out of my pocket while I ran. Gunfire was still filling the air when I jumped into the car. A few people were peering out of the gas station next door, wondering what was going on. I saw two of them on the phone, probably calling the police. Great. My phone was distracting me, so I pulled it out and tossed it onto the floor of the car. It kept buzzing, but at least now it wasn’t against my thigh. I slammed the car into reverse and sped out of the parking space. For half a second, I wondered what the hell I was doing. But before I could question it, I put the car in drive and stomped on the gas. I lowered my seat so I could just barely see over the steering wheel. I flew around the corner, yanking the wheel hard to the left. I saw my chance and took it. The DeathNote goons were no match for the Honda Civic. The first guy bounced off my front bumper, flying forward into the air. The other guy, alerted by his buddy being bounced off, managed to roll onto the hood. Momentum had other plans, and he tumbled up the windshield, over the roof, and slipped off the trunk. As he rolled over the windshield, I caught sight of what was on his head. A fucking camera. He was filming this! I glanced at my still buzzing phone on the floor of the car. It must’ve been a live feed, and people were submitting gambles, each trying to be the one who got the closest to my time of death. Fuck. I came to a stop just in time to see the first guy land on another parked car, setting off the car alarm. The brakes had brought me too far from Jack, so I switched into reverse and hit the gas. I heard the guy behind me scream, and the car jolted when it hit him. Jack threw open the passenger door and slammed it shut. “Go!” He yelled. I peeled out of the parking lot and into the street.
“Those fuckers!” I yelled, punching the steering wheel. I needed some release: a way to get the adrenaline out. Jack looked down at my still buzzing phone. “They had live feed cameras on their heads,” I explained. “They were showing video to DeathNote, and people were placing bets on the exact second that I would die.” “Jesus…” Jack said in a tone I couldn’t quite understand. “I arranged a deal,” I said. “I can get us out of here. Private plane, money, and a way out of the country.” Jack did a double take. “How?” “My Employees set it up for me. I guess being Neale Keaton still has some perks.” “How do you know it isn’t a trap? A way to kill you and collect the reward?” “Because, according to my Employees, Shawn makes enough money to make that reward money seem like pocket change to him. Apparently I told them at one point that I’d seen his golden private jet.” Jack still looked skeptical. “I told him I was coming alone,” I continued. “But that doesn’t mean you can’t come along for backup.” Jack nodded while I told him my plan.
I rolled up to the private airport and slowly pulled into hangar 3, as Shawn had instructed. Jack, who was hiding in the back seat, jumped out of the car on my command. I was moving slow enough for him to slip out and get behind some crates, gun at the ready. He was my backup if things went south. If things went badly here, we’d be out of options. I was met with a guy in a suit who held out a hand for me to stop the car. I obeyed. He came to my door and pulled it open for me. “Welcome, Mr. Keaton,” he greeted cordially. Not what I was expecting. I stepped out of the car, and he held out a hand for the keys. That made me nervous. I wanted a getaway vehicle. “That’s okay,” I said, putting the keys in my pocket. To my surprise, he didn’t protest. We were inside a massive hangar that housed not one, but two private planes. One was a small, single prop airplane. The other was a private jet. It was black, not gold, but was still sleek and beautiful. The floors of the hangar were polished concrete that actually shone under the large, dome lights overhead. The walls were made from polished steel and segmented into storage containers. The hangar looked nice, but there were large crates scattered everywhere, as if a cargo plane had just been unloaded. The mess took away from the appeal if you asked m-- “Neale!” Someone called from across the concrete. I looked over to see a much older man walking my way. He was a walking contradiction. He looked like he was almost 90, but his walk was young and full of spring. I hoped I’d be that upbeat when I was that old. If I ever made it to that age. Instead of replying with a name, like an amateur, I smiled widely. “Thanks for seeing me,” I said happily. “Happy to see you in the flesh!” He called back as we neared each other. We met right in between the two planes. The man reached out a hand, and we shook vigorously. The man in the suit was still beside me, and the old man turned to him. “Tell everyone that the hangar is closed for the night, please Harold. And go home yourself. Take the night off.” The man smiled and actually bowed. The old man bowed back, and the man excused himself. “I’m guessing you’re Shawn,” I ventured when the man had left. I hoped that Jack could find a way to stay hidden while they closed down the hangar. “Indeed,” he laughed, giving me a wry smile. “It’s so good to see you, Neale. I’ve been looking forward to meeting you for a long time.” “Long overdue, I guess,” I smiled back, playing my part. “I wish it was under better circumstances. You’re aware of my situation?” “Oh yes,” he murmured. “Your identity has been revealed. You’re a marked man, Neale.” Something about that last sentence made me uneasy. Shawn must’ve sensed it, because he laughed to put me at ease. “You and I are a lot alike,” he said in typical old man rhetoric. Life story, here we come. “Bold, but cautious. Visionaries. Makers of our own fortune. When you were down after leaving the Army, you didn’t just accept your fate. You got up and took control of your future.” I nodded, my heart skipping a beat. Stay calm, Neale might have been in the Army too, that’s not uncommon. “You and I both use people to get what we want. We both started out by mistreating them, but, over time, we learned that the best way to get what you want from people is to give them something in return. We learned to treat our human relationships as symbiotic.” “I used people face to face. But you, my friend, you used people without them even knowing about it. I’m in awe of your methods. What a world of technology we live in,” Shawn sighed. My smile was fading. “Hello, Michael,” he smirked. “I’m Neale Keaton.”
A small pistol had materialized in his wrinkled hand, and light glinted off the metal in my peripheral. It was aimed steadily at my chest. “Do you know how long it took to track down all of your history? I mean, once I had your real name and found your credit cards, it was a lot easier to backtrack you from identity to identity. You kept great historical data. I guess you just got sloppy after a while.” “I’m not alone,” I whispered. “You’re not?” He said in surprise. “Jack!” I called into the empty hangar, my voice echoing. The real Neale Keaton didn’t even flinch. There was no reply. “Sounds to me like you’re alone,” Keaton chuckled. “Actually,” Jack said from behind him. “He brought me.” Keaton didn’t even turn around. Jack’s gun was trained on Keaton’s back, but Keaton just smiled. “Glad you could make it,” he said. “Me too. Almost thought that Michael was going to come without me,” Jack smirked before lowering his gun. I stared at him in disbelief. “You… and… him?” I stuttered. Keaton waited while I put it together. I didn’t vocalize my understanding. “Why?” I asked. Keaton’s eyebrow raised. “Why take such a roundabout way to get money? Why didn’t you just have Jack shoot me in the back, take your money, and leave?” Keaton burst out laughing. Jack’s smile was condescending, as if I had asked why 2 plus 2 did not equal five. “It’s not about the money,” he laughed. “If you don’t get it yet, there’s no point in me explaining it to you.” He turned to Jack. “Is he armed?” “No,” Jack said, still clutching his Beretta but aiming it at the floor. Neale nodded. “You want me to take your place,” I said, the pieces suddenly clicking. Once one block fell, the rest of the puzzle clicked. And ho-ly shit, was it clever. “Oooooh my Gooood,” I laughed, unable to resist smiling. “You don’t want to be Neale Keaton anymore!” Keaton smiled reassuringly. “You’ve made too many enemies! But you were smart enough to do business without letting anyone ever see who you were. You hired other people to do your deals, even though it pissed off the people you made deals with. “Every time your hired guns double crossed someone, even if they were rogue and stealing from you, you were the one who got blamed. There’s only so many bad deals that can happen before no one will deal with you anymore.” “I guess he can think,” Keaton glanced at Jack. “But you couldn’t have just thought of this after I’d stolen your identity… you had to have…” I trailed off, thinking. “My identity was bait. You were the one unlucky fish who bit the hook. I let you be me before releasing the hounds,” Keaton prompted. “You hired the DeathNote guys? You put money on your own head and just hoped they wouldn’t shoot the real Neale Keaton?” “Of course they didn’t know who I was,” Keaton snapped. “You gave them my address,” I kept going. “And the other two guys you hired were, what, a scare tactic? Why tell them they were working for Neale?” “They were my employees long before you came along. I had to dump them just like I dumped my identity. Once you die, they’ll find a new employer.” “And once you had decided that I would be your strawman to take a bullet for you, you told them about Shawn Lockhard,” I finished. Keaton nodded, looking impressed. “I’ll make you a deal, Michael, since that’s why you’re here. I’ll let you live. Jack here won’t be the one to kill you. You’re smart. You get to keep Neale Keaton’s identity and I’ll let the world finish you off. You may last a while, but not that long.” “How very generous,” I said sarcastically. “Sarcasm won’t help me like you any more.” Keaton tutted. “But why Jack? What’s he got to do with this?” “I was your bodyguard, of sorts,” he spoke up. “My job was to keep you alive long enough for the word to spread that Neale Keaton had to die. Plus, I supplied all of your identities to Neale here.” That also explained how he knew about DeathNote. Keaton had told him about the plan. I remembered the gunfight we had just left with the DeathNote guys. Neither of them had been behind any cover, yet no one had been shot. The firefight had been staged. How many more details had I missed? “If you try to use any of the identities that you and Jack burned,” Keaton said, “I’ll add it to the Wanted poster. You are to use my identity and mine only. You will become me. I even emailed you some notes about the people you may meet.” “Once again, how generous.” “See, I can be nice,” Keaton said. “Unfortunately, I have a duty to a client who I promised a tip-off on the infamous Neale Keaton.” Keaton nodded to Jack, and Jack aimed the Beretta once more. I put my hands up instinctively. “We’re going to take a little trip, leave you tied up somewhere, and let my client know your whereabouts.” “Not much of a chance against the world,” I replied. Keaton shrugged. “I’m sure you’ll think of some way out. If you don’t, then you’re not worthy of my name after all.” Jack advanced toward me. “Turn around,” he said. I slowly complied. Suddenly, the sound of a small, metallic ting resounded throughout the hangar. Like a magnet to metal. A huge, fiery explosion suddenly went off at the head of the private jet. The heat raced across my skin, and it felt like I was next to a bonfire. Luckily, we were further back towards the tail, or else we might’ve been hit. “WHAT THE FUCK WAS THAT!” Keaton shrieked. “There!” Someone yelled from the large hangar entrance, which had been left open. Gunfire filled the hangar. Jack dropped his attention from me and moved to stand in front of Keaton. He raised his Beretta and took several calculated shots and the men who were firing blindly inside. I dropped and rolled under the single prop plane, putting something between Jack and I before he decided to take a shot at me instead. The gunfire increased as more men showed up at the entrance. “NOWHERE TO HIDE, NEALE!” Someone screamed. “FUCK YOU, OLIVER!” Keaton yelled back, returning fire with his own small pistol. “Jack, move back. The crates have ammo.” Keaton said over the gunfire. I was barely able to hear him. Perfect, I thought. I moved quietly along the airplane, keeping its body between me and the multiple shooters. When I hit the back of the plane, I peered around. Jack and Keaton were still exchanging bullets with the intruders, slowly stepping towards the crates in the back. I moved just out of their peripheral vision, following my training. I stayed low and made sure the plane kept me out of sight. When I reached the scattered crates, I lifted one quickly to find it full of nothing but straw. Taking a chance, I dug my hand down and touched metal, thank God. I pulled out an actual AK with the a clip taped to the side with packaging tape. Biting off the tape, I felt around for ammo and managed to snag a handful of loose bullets. I ducked behind the crate and slid bullets one by one into the clip. Eight bullets. Eight shots. More than enough to kill Keaton and Jack, but not enough to get out of here. They’d kill everyone here just to make sure they got the real Keaton. I heard gunfire getting closer, so I knew that Jack and Keaton were getting closer. They had to be running out of bullets by now. I glanced up and saw that they were using the plane as cover like I had and were still making their way back. Raising the AK, I aimed for Jack’s back, lining the sights up perfectly. My finger slowly squeezed the trigger until I heard a click. It jammed. “SHIT,” I hissed involuntarily. That made Jack turn around. I hit the floor as three bullets zipped overhead, denting the steel wall behind me. Desperately, I tore at the bullet feed, trying to kick out the jammed bullet. I heard Jack’s gun click loudly, and took my chances. I jumped up, still fiddling with the AK, and ran towards Jack. He ran towards me too, ready to fist-fight it out. I lowered the AK to one hand and raised the other like I was going to punch. The distraction worked, and I shoved the AK forward, barrel first. It hit him hard in the gut, and he doubled over. With two hands, I used the AK to slam the butt down on the back of his head. He collapsed instantly. I’d hit the back of his neck perfectly. Gasping for air and trying to keep the adrenaline for just a little longer, I tried one more attempt to unjam my rifle. But it was hopeless, and I could get shot at any second. Keaton turned back, probably just realizing that Jack was gone, and saw me standing over Jack’s unconscious body. I dropped the gun, intending to run back to the crates and find another. But the jammed bullet jumped out when the gun hit the ground. Both Keaton and I saw the bullet bounce off the ground. As if in slow motion, I bent to pick up the gun while he spun his pistol on me. I wasn’t fast enough. A bullet caught him in the calf from behind, and he screamed. It forced him down onto one knee in a small spray of blood. His gun went off, but wasn’t aimed anywhere specific. He crawled further under the plane to shield himself, which gave me time to act. I pulled out my phone, which was pissing me off. IIt had been vibrating non-stop ever since I arrived at the hangar. Even though it pissed me off, it was good. It meant that Marco and Alejandro had done their jobs. I raised the AK in one hand, and my phone in the other. One button started the video recording. I let out all six remaining bullets, only two of which actually hit Keaton’s chest. He screamed again, dropped his gun, and fell down face-first. Satisfied, I hit “Stop” on my phone and slipped it into my pocket again. Both were down. I was the only one left. And the gunfire from the door wasn’t slowing down. The squeal of tires made me perk up my ears, and I smiled in disbelief as two SUV’s sped into the hangar, each manned by Marco and Alejandro. Alejandro used his to defend Marco’s car, which sped between the two planes and skid to a stop in front of Keaton. I raced forward with the AK and jumped into the backseat. I dropped to the floor while Marco hit the gas and turned around. Alejandro had already gone in front and his SUV was taking all the fire. The car rocked as we tore out of the hangar and bullets ravaged the back of the car. I tore the battery out of my phone to stop it from vibrating anymore. “Their cars are parked far away, we should be safe soon,” Marco said with his usual accent. “Thanks, Marco,” I rasped, sitting up. “You’re welcome, Mr. Keaton.”
I knew there was a 50/50 chance that this meeting was setup. In the worst case, I’d be riding a private jet out with guns blazing. In the best case… well, what happened was the best case. At my request, Alejandro and Marco had gone onto DeathNote and spread rumors that I was getting alerts from DeathNote whenever a new hit was added. I changed my code to paste my phone’s location on DeathNote every time it received a text about a new hit. You darkweb dweebs caught on immediately and started spamming the hit list to get my location and track me down. The more hits that were added, the more value Neale Keaton’s death had. And with that beautiful video, I was able to prove to the DeathNote owners that I had indeed killed Neale Keaton. How did they know that old guy was the real Neale? I’d been recording on my phone ever since I got to the hangar. The audio corroborated everything. With proof in hand, the runners of DeathNote paid out my grand total of $56,000 in Bitcoin. I didn’t get the $150,000 unfortunately since it was Keaton himself who had placed that reward. See, I knew something was fishy with Jack after I looked at his phone the morning after I told him I was an identity thief. He was asleep when I went through his phone to try and find a way to ditch him somehow. I wasn’t sure what I was looking for. But his calls list showed a call to the same number multiple times over the last couple of days. All of the calls had been made while I wasn’t with him. Sure, it could have been anyone, but it made me suspicious. When I met with Marco and Alejandro, I kept up the ruse of being Neale. They only knew what I told them, and I asked them to bring two cars to my phone’s location when they heard shooting. My phone had brought you lovely darkweb fuckers right to where I was going to die. You inadvertantly saved my life. Like I said from the start, you were being manipulated. By both Neale and myself. Thanks ;) Someone made a post a few days ago out of video from the people who came to kill Keaton at the hangar. The video showed Jack and Keaton, who was a 90 year-old guy, but not my face. All the rest of you saw that Keaton’s reward had been claimed, and cried fraud. But it wasn’t fraud. I just beat you all to it. This post is here to salvage Chris’s reputation. Michael is a piece of shit. Neale is a piece of shit too. But Chris is the one identity I actually wanted. I wish I could have that identity and that life back. But it’s too late now. You have forced my hand, and until this site accepts that I got the bounty fair and square, I can’t be Chris the store manager. I’m an identity thief, my darkweb dwellers. I become who I need to be to get what I want. The sooner you accept that I am NOT Neale Keaton, the sooner Neale Keaton will die. Until then, Keaton’s email is really helping me assume his role. Once you all accept it, I’ll dump his shit, delete everything, and go back to being Chris the store manager. Until that changes, I am Neale Keaton.
So my JNB's birthday came and went without any contact between myself and my JNF which is likely going to cause my JNM to blow up at me and DW. So, instead of dwelling on the blowout in our future, DW and I are taking a trip down memory lane and writing a post about all my JNM's strange religious behavior, which is probably all BEC stories but it's a good way to lighten the mood. Also, this was good for both of us and she has many other facets that are strange, offensive, confusing, and overall llama feed, and it might be time to get her a name, if anyone has any suggestions. Disclaimer: I am not religious myself, but I truly have no problem with religious people. I have a problem with people who falsely use the trappings of religion in order to be a dick and to shame others. Which is my mom. The Atheist Children: My JNB and I don’t agree on much but one of the few things we do agree on is the fact that neither of us are religious. My JNB is quite vocal about this and will even call out my JNP’s for being “idiots” for believing in “fairy tales” and for some reason my JNP’s are perfectly fine with him being disrespectful. Anyways, when I was in High School my parents took me to confirmation school to get me “confirmed in the faith” and with most things back then, I just went along with it to stay in the shadows to avoid confrontation. About three or four weeks in I told my JNM that “I didn’t want to go to those classes anymore because I didn’t believe in God.” She then blew up on me, saying that I was going to hell and “why don’t [I] just go along with it?! It doesn’t hurt you and you don’t lose anything by doing it!” She apparently chose to forget that it lost me my Sunday mornings (when we still went to church as a family) and every Wednesday evening for that stupid class. My JNM finally set up a meeting between me and the pastor so that he could “teach me the errors of my ways,” I remained unconvinced and just went along with the class and eventually got “confirmed in the faith” which is something that I still regret. A couple years go by and my JNB is on one of his atheist rants again and my JNM looks over at me and says “you don’t believe this do you?!” When I responded with “Yes” my JNM was utterly horrified and she “couldn’t BELIEVE that her son was an ATHEIST!” (apparently it doesn’t count when my JNB is one) She was terse with me for awhile and eventually it all blew over until I got to college and I mentioned that my DW (then GF) was an atheist raised by atheists. Bad decision. She scolded me for having an atheist gf and said things like “how could you date an atheist?!” which I responded with something like “easily considering I am one?” She apparently chose to forget that fact about her son and was re-horrified to find out that information. Since then she has re-discovered that DW and I are atheist a handful of times and her reaction has been about the same every time. The Exodus from Sunday Church: Growing up, JNB and I spent a lot of time with our second cousins (JND’s cousin’s family) who were EXTREMELY religious. Honestly I’m still curious why the patriarch of that family wasn’t a pastor. Anyways, we switched from our first church to the one that the cousin’s went to when I was in about fifth grade because my JNM “just loved the music there so much more than our old church!” Which was true, the music was better which made the hour long lecture a bit easier for my atheist-ass, but in retrospect I think the real reason was to get closer to the cousin’s family. The matriarch of that family was a real piece of work, she was incredibly judgemental, manipulative and above all else, a “good christian woman.” She would be extremely passive-aggressive to my JNM about how “[JNM’s] kids are following a bad path.” My JNM fell for it completely and my cousin’s mom had her wrapped around her finger and my JNM was convinced that if she would just behave like the cousin-mom, all her problems would go away. Then comes the time when my parents “kicked out” my JNB because he was selling drugs out of their house. By “kicking out” they meant that they took his car back (after giving it to him) and sold it, he was no longer allowed in the house, but he got to keep the credit card they gave him (that they paid), the cell phone that he had (that they paid for), and a handful of other things that I can’t think of right now. When all this was first happening, cousin-dad asked my JND “what, if anything, could he do to help the situation with my JNB” which my JND responded with “nothing, we are going to take care of it.” During this period my JNM started taking antidepressants because she “kicked out her son!” and “how could he be alone on CHRISTMAS?!” (She’s got one of those doctors she can pay to agree with webMD hysteria and give her pills/diagnoses aka martyr-tokens) Turns out he wasn’t alone on Christmas. The cousin-family invited him over on Christmas so that he wouldn’t be alone as well as try and indoctrinate him into their specific brand of judgemental christianity as well as show my JNP’s how much more loving and forgiving they were as a family. This, understandably, really pissed off my JNP’s to the point where they cut off all contact with cousin-family, stopped going to Sunday church and were isolated from a large portion of my JND’s (very large) extended family (who, as I’m writing this, my DW just realized that none of those individuals ever tried to contact my parents again after this, which, indoctrination runs deep but that’s a statistical anomaly when we’re talking about this sheer number of catholics having babies at catholic rates. Maybe gasp my JNP’s did something...wrong...No, it can’t be). Looking back on this from where I am now, I wonder how much of all of that is true. I know I didn’t like the matriarch, but the patriarch seemed like a good guy to me despite the fact he was so “meddling” whenever they look back on it. And it seems strange that they never found another church afterwards, almost like they learned that “church friends” wouldn’t act the way that they wanted “friends” to act. So they just...stopped with organized religion altogether despite the fact it had been important enough to my mother for her to threaten pre-teen me with going to hell. The Church: So my JNM moved around a fair amount as a kid due to her father's government job and eventually landed in the state where she went to high school and college (and got married to my JND). Despite the fact that she no longer lives in that state, and hasn't for nearly three decades, she is OBSESSED with decorating her house with decor from that area. The most prominent decoration in her house is many (5+) paintings of her "favorite church in the whole world." She has commissioned a few custom paintings of that church through the years and she hangs them proudly on the wall. After hearing this, you might expect her to still be a very religious type right? Wrong. I once asked her "hey mom, why don't you ever go to church?" To which she responded "I go to [favorite church] twice a year and that fills my spiritual tanks enough to last me until the next trip! I love that place so much! I just feel God there!" One of the church's "attractions" is that you can send them photos of your loved ones which they will then post on a huge wall so that the people who visit this church will pray for them. She has repeatedly and gleefully informed me and my DW (who again, also isn’t religious) that she put pictures up there so that people will give us their prayers, like we can spend them or something, like spiritual bitcoin. Again, I think that people praying for someone they love is actually a really important and sweet brand of kindness that exists in healthy relationships with God. This isn’t that. This is shaming us by saying “you all are so bad, you need total strangers to pray for you”. DW and I are planning on visiting that church and ripping down our pictures because it feels like a huge invasion of privacy (maybe because it is). Decor in general: Holy Crucifixes Batman. She sees a square foot of home state specific color painted wall without a fake happy posed family photo on it and thinks “hey, I could fit a crucifix here, I’ve got about forty new ones that are all encrusted with state specific semi-precious stones”. Every room, every wall. She has a Christmas decoration she pulls out every year that’s like...a Christmas tree shaped thing made of crucifixes hanging on it. In a very long story that I’ll have to extrapolate on sometime, our wedding shower was at her house, and along with all of my carefully curated childhood pictures being out on every surface (which I didn’t agree to and there was no attempt to get DW’s baby pictures), the crucifixes had multiplied since the last time I was at her house. My JYMIL and my DW were chatting and looking at my baby butt and had a conversation we still laugh about. JYMIL: You know, the conflict you guys are having might be due to misunderstanding DW: Nah, it’s because I didn’t let their GC call me a slut without saying anything. And I encourage my DH to say things. In general, we say too many things. JYMIL: I just can’t see the problem they have with you kids. There has to be a reason. Is this a religious house? DW: No JYMIL: Not any? DW: No one goes to church, says grace, reads scripture, follows scripture, speaks openly about religion aside from making road trips to see grandma half an hour longer twice a year… (to see the church) JYMIL: stares at elaborate configuration of crucifixes on the wall Oh. “Spirituality”: JNMom looooooves to say that she’s “spiritual”. It’s unclear what that means. Sometimes it means that she doesn’t like having bible verses quoted in full at her when she’s truncating them so that they mean something else that makes her look good. Sometimes it means that she forgot Easter wasn’t originally about bunnies and demanding her children show up to brunch. Sometimes it means that she can’t spell “Lutheran” and definitely not “Presbyterian” so she cannot actually say what kind of Christian she is OR choose a church to go to that fits her so unique beliefs. They’re so unique, guys, no one but her understands her unique “spirituality” and it’s ever shifting and mutable nature to align with whatever she wants to use it as an excuse for. There is literally nothing that can’t be “spirituality”-ed away. One of the ways that she has “coped” with DW, myself and JNB being atheist is that instead of saying “please pray for X” she will say “keep X in your thoughts” as a way to keep us “spiritually engaged in the situation” and that “positive vibes do wonders”. And again, that’s all well and good, but this is justnomil where we all know that “Keep X in your thoughts” actually means “X is in my thoughts because I’m so charitable and giving and kind. The Kindest. Capital K. Don’t ever forget it and if you ever think I’m not being Kind, remember when I kept X in my thoughts. Speaking about how Kind I am counts as being Kind and wow, my Kind tanks are full today.” On not knowing how to talk to children about God: My DW was the one to tell me that this story was creepy, I didn’t put it together on my own. My paternal grandpa died when I was six and it was the first big death that I coped with, before any pet deaths or anything, and understandably, I had questions and gasp feelings that weren’t entirely in line with my mother’s. Her solution? She put an angel statue in my room and told me that my grandpa was in it and he was watching me from heaven. She even made up a special prayer for me to say before bed which included the line “and let little angel [my name], sleep soundly in his bed, something something, Grandpa is watching you in your bed.” And maybe some kids would be comforted by this, but I, already analytical, was horrified that my loving grandpa was now stuck in a creepy porcelain thing that watched me while I slept. I felt that the tiny scrap of privacy I was just starting to have, you know, a room where I could close the door and play legos by myself, was being grossly violated. I cried, I had nightmares, I couldn’t sleep knowing that statue was watching me and that my grandpa wasn’t the grandpa I remembered anymore. She also got me a handful of dream-catchers to help me with my nightmares because she’s extremely culturally insensitive and it’s not like mixing christianity and mis-understood appropriation of paganism went off horribly in the past or anything. Did they take the statue back? Nah. It got donated to goodwill (She’s so Charitable, guys, giving her old shit to goodwill a couple times a year so that she can buy new stuff. The Kindest.) which again, creepy, because didn’t she imbue value on it by telling me that my grandpa lived in that thing? To a kid, didn’t she just kind of entrap my grandpa in kitsch and then give him away? No, she didn’t think about it that way so there’s no merit and she wanted new useless tchotchkes.
If You Believe in the Technology, There is no Reason to Worry
In times like these, it is another reminder as to why you shouldn't invest in crypto if you don't truthfully believe in the technology. If you believe in the technology, there is little to worry about at this moment- we know it will go back up and hence we are hodling. This isn't a get rich quick-scheme, if you are doing this for quick cash, you'll get burned. The best thing to do right now is simply go out. Put on the freedom app on your phone for the next 24 hours (This disables internet on your phone) and relax. Go to a bar, have some drinks, meditate, do whatever. This is a short term trend- there is examples every day of more widspread adoption of blockchain technology and the big crypto currencies. Many are panicking because of bitconnect, but in reality everyone who did their research knew there was a good chance of it being a scam and those who wanted to make a quick buck off a scam got burned. This is a simple reminder that research is king and always will be. There is never such thing as making money easy. If something seems to easy and obvious, then it's probably a trap. Edit: Yes, I am aware that technology success doesn't directly correlate with the value of the currencies. In this short piece, I am referring to the potential of individual coins that you invest in. If you believe in the tech of those coins and that it will succeed and be adopted in the future, there is nothing to worry about. More people are accepting bitcoin and using other many other coins on a daily basis. Keep calm and go outside and enjoy the fresh air.
Blockchain to fix horribly broken e-mail system like it is today?
E-mail as it is, is horribly broken. Horrendously broken. It wasn't that many years ago that you could be assured your e-mail reaches whoever you were mailing to. Today it is a mere suggestion, that perhaps this should be delivered to this person, at least for any automated e-mail. This seems to be creeping to manual, organic email as well. Hell, we are seeing even internal e-mails being flagged by spamassassin as spam, organic, human written conversations! In that instance, the spamassassin is also maintained by one of the largest hosting providers in the world... Hotmail/MS services has been for years (atleast about 4 years now!) been silently dropping email, not all, but some. There's a bit of relief lately, as they have started to favor a bit more marking as spam, rather than silently dropping. I know, most email users don't see this problem, but those who use email a lot to do their work, and those who need to send automated emails (say, welcome e-mails for a service) this is a big problem. (Disclaimer, for us, our niche of hosting probably causes flagging as well. Our site is blocked by many corporate firewalls for example) Blockchain to the rescue? This is an idea i've been toying around with a few years. What if any single e-mail would cost a faction of a cent, and who receives the e-mail, gets paid for it? Now that would solve a lot of problems. I realize there has been some half assed attempts on blockchain based e-mail, but they are about replacing email (never going to happen). Using blockchain to enhance the current experience, with least minimal friction should be the goal, not re-inventing the wheel. Imagine a say 0.01 cent (0.0001 USD) cost per e-mail. This price would not be cost prohibitive even for free e-mail service providers (Ad revenue etc. should exceed this value), never mind any legit e-mail users. Especially considering you get paid for receiving. So all legit e-mail services would work rather well regardless of the cost. (never mind free email service could profit from this) Spam however? To send 1 million emails you would need to pay 100$. How many spammers would continue doing so? At least it makes things much harder, not so easy to use a botnet to send your email when you need to include your private key(s) to the botnet, or make some kind of private key management system, makes more complicated. Small business newsletters? Say you need to send 100k e-mails to legit customers, 10$ is nothing. To human time crafting that newsletter is order (possibly orders) of magnitude greater than that. Price would also fluctuate as per the market. The most difficult thing would probably be setting the self balancing mechanisms to keep per mail cost sensible. As such, the biggest hurdle in this might not be technical at all. Technically, how could this work? Sender sends a TX for e-mail they are sending for recipient. This TX contains message with mail ID, and a segment which can be used with the email contents to unlock the private key for the payment. This way it is verified that recipient mail servers receives and reads the email. Once the recipient server has calculated the private key, they can either TX the received sum to their wallet, or this needs to be formatted so that once the sender has sent it, they cannot recover the private key and double spend (technical hurdle A. For someone who knows their stuff unlikely to be an major hurdle) Step by step repeat: * Sender checks if recipient has "MailCoin" capability * Sender sends TX to recipient * Sender sends the email to recipient * Recipient notices on mail header (say x-mailcoin-tx: TXID_HERE) that this is a "mailcoin" mail * Recipient checks TX if it has been received * Recipient puts the mail on delivery queue, antispam is instructed of heavy negative score (MTA admin configurable) * Recipient claims the value of the TX (this is the hurdle A). Recipient can only claim the TX value in case they have received the full e-mail. (Question, can this step be pushed even further down the delivery chain, but still remain MTA only level without mail client support?). Most likely solution is that the header contains the encrypted private key, and chain TX contains the key to decrypt that private key to claim the coins, or vice-versa? Once recipient has the email & payment, they simply mark on their Antispam a automatic lower score and deliver it normally. E-mail server side we have several components:
Recipient server needs component to check for TXs
Sender server needs component to send a TX, and check if the recipient has the capability
Recipient server OR dns zone has indicator the recipient can utilize "MailCoins" (DNS IN TXT field most likely, ie. mailcoin.domain.com. IN TXT publicaddress)
Most typical scenario would be the Recipient server works as outgoing as well, with single wallet. So depending on your mail volume, do you send or receive more on that wallet you might never need to worry about the coins (except for value going skyhigh and having like 10k $ worth of "MailCoins"). So perhaps additional components on per use case are needed, or more likely rudimentary scripting capability (ie. "MailCoin" daemon api) to keep the balances in check. Technical hurdle B: This needs to be super super simple to setup. Or sufficient financial incentive. One would need to develop standard components & configs for exim, postfix, and other MTAs. Infact, make it autogenerate wallet ID etc. and easy to replace or import private keys etc. to put in coins for sending if you need to. Privacy: On the blockchain you would not see the e-mail contents, only that e-mail likely took place (TX with mail UUID) to recipient. If sender can be deciphered it depends on them if it can be traced who they were. Automatic mixers? :) Recipient can also keep cycling the receive addresses to keep things private if they want to. The biggest problem i see here, is that if an attacker can deduce the sender and/or recipient, it might to lead to some issues out of the scope of technical solutions. If attacker could read the emails, they would already have accomplished MitM and could just grab all e-mails. Default implementation should be so, that from recipient address outsider cannot deduce the recipient server nor hostname. Also, if attacker gains access to your mail with full headers, they could see the TXs in blockchain. MTA might need to scrub mailcoin related headers (yuck, scrubbing headers ....) for paranoid users, but most likely solution is that recipient retransmits those mailcoins as soon as they got the private key for the balance. Blockchain: Blocks needs to be done every 10seconds or so, it needs to be fast. Preferrably even every 5 seconds, as not to cause any undue delay. Then again, if your application is reliant on receiving email within seconds, one should consider another means for communicating. Imho, email should be considered a little bit like snail mail, but on internet pace: Couple minutes delay is just OK. Block size given the e-mail volume needs to be fairly large as well, considering the time between blocks. This is technical hurdle C: Hosting the full blockchain. I can easily foresee that this would grow to be terabytes in size. However, any large email operator would have vested interest in ensuring smooth operation of the blockchain, and for them, running a full node would have neglible cost. (Technical hurdle C) Single email sent using the system could easily have TX contents of 100 bytes + TX headers + block headers etc. Say 100 bytes, and 100 million emails per day: 9.31GiB per day, 3 399GiB per year, 5 years later: 16.60 TiB just for the mail TXs. Some estimate there is 200+ billion emails per day, but we all know large portion of this is spam. But even at 50 billion emails a day, 100 bytes per mail TX would add to 4.55TiB per day! So optimizing the blockchain size is obviously going to be important. The volume will be obviously much smaller as semi-spam (those daily half opt-in spamvertising from companies you know) will be lower as well. So probs 100+ billion emails per day at 100% adoption. Blockchain should then be compressed, the whole block. Algorithm probably should favor speed over compression rate, and should be task specifically optimized (needs a simple reference release, where you can just stream the block contents into it and get output as compressed or uncompressed). The more compression there is, the more full nodes will be hosted by smaller operators :) For large e-mail server clusters there should be central store for the blockchain, but this can be accessed on the system administratoconfig level already. The MTA components will just remotely talk to single full node daemon (so not really different from many implementations in existence right now), instead of each one running locally a full node. At today's cheapest hosting rates 16.60TiB is roughly around 85-100€ a month. Purchase cost per 8TB drive is around 230€ mark right now, externals are cheaper. Not an issue for any even semi serious mail provider. Not even issue for datahoarder individuals. However at 100 billion mails per day: 9.09TiB per day added, which is prohibitively large! We should be targeting something like 20bytes per mail final storage spent, or even less. If it looks like it is going to grow really large, full node needs to have configurable multiple storages, so they can store parts of the blockchain on multiple different devices (ie. individual might choose to have it on 4 different external drives). Filesystem side optimizations are needed as well, but these are fairly simple, just split into multiple subdirectories by the 10 thousand blocks or so, ie. 1 for blocks 1-10k, 2 for blocks 10 001 to 20k etc. Filesystems get exponentially slower the more files there is per directory. 10k might start to show slowing down, but is not significant yet. Nodes could also implement secondary compression (compress multiple blocks together), if the blockchain starts to become stupid large. If it starts to become impossible to maintain, we could possibly implement a scrubbing methodology, where very old blocks get the TX contents wiped as they are not necessary anymore. Should not be an issue Blocks with 10second target generated per annum: 3 153 600 Mails per 10second: 115 740 e-mails per 10second block. Final compressed size (say 20 bytes per mail): 2.20MiB + headers etc. per block Let's start small and allow linear growth to this, say 0.1% per day (36.5% annual) and start from 20k / 512KiB. After 3 years: 41.9k / 1072.64KiB per block, After 10 years: 93k / 2380.8KiB. (2027 we should have HDDs in the size of 30TB and daily max size for chain growth is 19.61TiB) On the positive side every problem is an opportunity in disguise. If the blockchain is large, once again botnets will have a hard hard time to spamming, they can't host the full blockchain on infected machines. They will need to develop centralized mechanisms on this regard as well. One method i can see is by having TOR client built in, and via .onion domain to anonymize, but this is two way street, security researchers could exploit this (see above about the private keys) as well. Even without botnets, spammers will need to dedicate significant resources to host the full blockchain. On the flip side, if spammer has also mining operation on the same local area network, they have both the income for mailcoins + full blockchain, and could leverage economies of scale, but this too would increase cost. And after all: This is all about increasing cost for spamming, while having the price in vicinity where real e-mail users, real businesses it is not a significant impact, or may even be an income source Client side Zero, Nada changes. No changes to outlook, thunderbird etc. Everything works under the hood at the MTA level. Very easy adoption for the end user. Everything is in the backend, server side. Economics for users Cost of operation has above been shown to increase wildly for spammers. But how about normal use cases? Joe Average: They receive e-mail a lot more than they send, all kinds of order confirmations, invoices, newsletters and other automated e-mail. They will actually earn (however tiny amounts) from using this system. So for the masses, this is a good thing, they will see the earning potentials! which brings us to .... New business opportunities! I could foresee a business setting up spam traps, the more e-mail you receive the more you earn! So it pays to get your receiver into spam lists. You don't ever need to read these, just confirm receive of them. All of sudden we could see even greater numbers of invalid e-mail addresses in spam lists, making spamming ever more expensive! Free email services might proof to be extremely profitable, to the point of potential revenue sharing with Joe Averages (and above spamtraps). Because free email is mostly joe averages, they will have greater influx than outgoing. On the caveat, free email needs to have limits, but due to the low cost and potential of earnings, they could implement "mail credits" system, base is like 20 emails a day, but each received email could increase this credit limit. As such, it makes actually sense for free email services to implement this at the very least on the receiving side. Business mass emailings. A business which has 100k valid e-mails on their database will not have a problem with paying few dozen bucks to have their mass mailing delivered. BUT they will make extra sure the content is good and targeted, something the recipient wants to receive. These will be the biggest spenders on email, apart from spammers. ISPs, hell they get paid to provide e-mail. And they are on the same spot as free email service providers, they stand to earn more than spend! Blockchain economics This is where things might get interesting, there is so much potential. However, there are several things definitively should not be done:
Initial Coin Offerings
Non-consensus chain (ie. whatever devs say, goes!), always has to be consensus
Infinite & preferential supply
1 & 2 are easy, just do not mine outside of testnet prior to launch. (If devs get paid by companies, there is conflict of interest as well, but let's not get into that right now) 3: Miners and/or full node maintainers decide what goes on. Probably miners like bitcoin is supposed to. 4: Infinite & preferential supply: No after the launch "contracts" etc. to give coins to preferential parties, it should remain as on the launch unless majority consensus says there will be a change. Proof of stake is gray area imho, but then again also proof of work is the rich gets richer. Mining: Storage requirement is a blessing in disguise, the massive storages required for this to function means that there will be no central hardware developer who sells all the shovels, without significant other markets. Ie. WD, Seagate, Toshiba the main players. This means algo needs to be based on the full blockchain being hosted. The hashing needs to be so that GPUs are the king most likely, since almost anything good for CPUs is also doable in GPUs. Eventually someone will likely come with ASIC alternative, but due to masses of data it WILL require high bandwidth, high memory. Nothing like bitcoin currently, where low bandwidth, no memory requirement for the ASIC. There needs to be some expensive commodity components in there (RAM, Storage), and as such GPUs are the most likely candidate, and the bottleneck will not likely be computation, but I/O bandwidth. Quickly thinking, previous block could include number of blocks to be included on the next for verification, in a highly compressible format. Let's say difficulty is number of blocks to be hashed, or from difficulty you can calculate number of blocks to be included. Previous blocks miner just chooses on random blocks to be included on the next one. Listing 10 series of blocks to be included, which can include series instructions. It could request block #5729375+100, or #357492+500 stepping 5 (every 5th block). Hell the random generator could use last block as seed for the next one to make it deterministic YET random as the emails and TXs change. (WTF, Did i just solve how the algo needs to work?!?) Only blocks which would differentiate is the first few, and obviously Genesis, for which an "empty" block would be what is to be hashed. Hashing algo could be SHA256 because of the high requirement of streaming data, and most ASIC miners lacking in bandwidth (infact, it could be made compatible with bitcoin, but only those ASICS with higher I/O bandwidth than storage/ram I/O bandwidth is could actually boost the perf) Different hashable list operations could be (on the block list what to be hashed on the next one): * Single block * Block # + number of blocks * Block # + (number of blocks with stepping) * Block # + number of blocks chosen by random using each hashed block as the seed for choosing next one (makes prefetch, preread, caching not work efficiently) * Number of previous blocks mined (ie. 50 last blocks) * Above but with stepping operator * Above but with choose random next X blocks, with variations based on the last hashed, sum of the hashed * All random pickers would have operation modes for the seed to be used: From hashed sum, the whole block, block contents, block header These modes would ensure the blocks are there and makes it a lot dependable on variable factors, RAM speed, I/O seek time, I/O bandwidth. This way we have proof that the miner has access to those blocks in efficient manner and the full blockchain is stored there, even if it is not practically retrievable from him / her over the internet for others to obtain a copy. HOWEVER, due to the data volumes, i think it is given they have fast access, but a miner would probably prefer not to share their blockchain contents to have bandwidth free for their mining, as the deadlines are tight. It could be built into the full node spec that they do not accept new blocks from sources which are not ready to supply any given block, and perhaps even periodic test of this. However, this would be unenforceable if people start running custom coded nodes which disables this, as it is not part of the blockchain calculation. It is not miner's benefit to "waste" precious bandwidth to serve others the vast blockchain, meanwhile it is end users benefit those running full nodes without mining to get them fast. So an equilibrium might be reached, if miners start loosing out because other miners will not share their blocks, they will start offering them, even if prioritized. At 2MiB blocks, 10 second deadline, a miner would preferentially want the new block within 500ms, which would be barely sufficient time for a round trip across the globe. 500ms for 2MiB is 4MiB/s transfer rate inbound, and when block found you want it out even faster, say 250ms you'll need 8MiB/s burst which very very few have at a home. At more usual 1MiB/s it would take 2secs to submit your new block. On the other hand, if you found the block, you'd have immediate access to begin calcing the next one. Block verification needs to be fast, and as such the above difficulty setting alone is not sufficient, there needs to be nonce. Just picking the right block is not guarantee there will be match, so traditional !???? nonce needs to be set as well most likely. As such, a lot of maths needs to be done to ensure this algorithm does not have dead ends, yet ensures certain blocks needs to be read as full and stored fully by the miners, just plain hashes of the blocks is not sufficient. Perhaps it should be block data + nonce, then all the blocks hashes (with nonce, or pre-chosen salt) and to be generated block combined hash with nonce needs to have certain number of zeroes. Needs testing and maths :) So there are many ways to accomplish proof of storage, we'd need just to figure out the which is the best. Sidenote, this same algo could potentially be used with different settings for immutable, forever storage of data. Since there is no continuing cost to store data, TX Fee for every message (data) byte should be very high in such a coin. Supply. Needs to be predictable and easy to understand. It would be preferential the standard mailing out is always 1x MailCoin, albeit coin itself should be practically infinitively divisable, and as such supply needs to be in the trillions eventually. But these things get complicated really fast, so we need to set a schedule. Current email use is very large, so we should have something in the same magnitude. 8640 blocks per day - so maybe 10 000 coins per block == 86 400 000 new coins per day == 31 536 000 000 new coins per year, halving every 2 years. First halving: 63 072 000 000, Second halving: 94 608 000 000, Third (6 years): 110 376 000 000, but only halving 4 or 5 times to keep some new supply for ever increasing adoption and lost coins. Got all the way here? :D Thanks for reading up. Let me know what you think, and let's start a discussion on the feasibility of such a system! I cannot develop this myself, but i would definitively back an effort up in the ways i can if anyone attempts to do something like this :) And i know i got probably many of the details incorrect The main point of the methods described above is ease of adoption. Without adoption any system is worthless, and with email, you just cannot replace it like that (see the attempts trying to replace IPv4 with IPv6 ...), but you can enhance it. adoption is very critical in communications systems. (No one would have a phone if no one else had a phone) Addendum 1: Forgot to add about pricing and markets, read comment here Addendun 2:Bad actors and voting
Give Bitcoin some time. Yes, I agree, as it is right now, it is not the best option to transfer value right now. But it is a new technology -- and it improves continuously. The future of bitcoin might just be as bright at the future of the internet in 1989. If you are thinking about buying Bitcoin to take advantage of the current correction in the price levels then this article meant for you. Drop all distractions like browsing through your phone or checking out what’s coming on the TV. Give me your und... In the 1990s, the internet made location irrelevant for information. Can it do the same now for money? You can make $3000 BTC with your phone or pc in a day only if you invest now with the right person. skylink technology is the best in the bitcoin industry as they have come up with a way and technology to get your bitcoin doubled in hours. am sharing this because i don't want to be the only one benefiting from this, i want you to too as well so hurry up and get in touch with them and make your ... By CCN.com: The parabolic bitcoin price explosion, which saw BTC surge 136 percent in 2019, is a trap, according to on-chain analyst and Adaptive Fund partner Willy Woo.. The price explosion is simply a short-squeeze driven by hedge funds. Organic buyers are waiting for a healthy retracement before buying in again.
bitcoin the final enslavement tool of the nwo. Rudolf the tall white alien. No. 365
Los Angeles, CA- Another reason to value BTC over real estate is that jurisdictions all over the USA will be looking to milk real estate for every dollar the... Welcome to Trap Nation, YouTube's number one channel for a unique and diverse taste of trap music! If you like what you hear, support the producers and show ... This Bitcoin Mining Software can mine with your computer or laptop CPU at least 0.5 bitcoin per day. So if you need bitcoin in your wallet,or just want to earn more money from your home,then this ... NEW UPDATE BLOCKCHAIN SCRIPT APRIL 25, 2020 Download VIP Script: https://bit.ly/3528yO0 Download FREE Script: https://bit.ly/2x3a59U Tags: New faucet bitcoin Bitcoin giveaway New free faucet New ... Digital currency, bitcoin cyptocurrency and MLM is a hot topic right now. I have nothing against cryptocurrency, in fact I own some. I have nothing against cryptocurrency, in fact I own some.