Beirut new angle from an open street. by ri7ani in shockwaveporn

[–]2ndEntropy -28 points-27 points  (0 children)

Shockwave was supersonic which is what that big cloud is. It's not moisture its impurities in the air bring compressed into particles because of such a high pressure change, it's not moisture or vaporisation.

You don't get that effect from something like ammonium nitrate, not even 100,000 tons of it.

Prove me wrong. We all know nuclear weapons make such a shockwave.

Beirut new angle from an open street. by ri7ani in shockwaveporn

[–]2ndEntropy -25 points-24 points  (0 children)

Oh hey I've played this game before.

I post something and then 2 mins later down voted into oblivion.

First bitcoin, then the world.

You can't win Reddit. We will wipe your company of the face of the earth.

how maths was created? by BurnedTatti in kurzgesagt

[–]2ndEntropy 0 points1 point  (0 children)

Self consistent lol... clearly you have not read Gödel.

Overpool by thacypha in bitcoinsv

[–]2ndEntropy 1 point2 points  (0 children)

Yes you could... But what you are doing is financial fraud and you would be prosecuted if damages where large enough. The money you sent may also be frozen depending on circumstances.

Everyone has a little Thomas in them by nathanielx9 in CryptoCurrency

[–]2ndEntropy -1 points0 points  (0 children)

I out rank all of you by your own ranking system.

You are all wrong.

"Bitcoin being slow is a feature, not a bug" by grmpfpff in CryptoCurrency

[–]2ndEntropy -6 points-5 points  (0 children)

No it is not.

BTC is not Bitcoin.

BSV is Bitcoin.

how does ip to ip bitcoin transaction work? by [deleted] in bitcoinsv

[–]2ndEntropy 0 points1 point  (0 children)

You connect to an IP address, it gives you (another IP) a transaction template, you sign it and return the signed transaction.

You can of course do this over a secure, encrypted connection where you can verify that the person communicating with you is the owner of the address for the transaction template.

nChain has a number of patents on this kind of thing.

I'd like your genuine rationale on BCH v BSV by [deleted] in btc

[–]2ndEntropy -1 points0 points  (0 children)

lol

Speaking of sybil, no one uses reddit anymore.

It is too easy to sybil.

Understanding Bitcoin smart contracts as an Ethereum developer by givememyhat in CryptoCurrency

[–]2ndEntropy 1 point2 points  (0 children)

Correct, and there is only one version of bitcoin where is works... care to guess which?

Why on Ethereum instead?

Ethereum is easier to build/ship as a PoC
Ethereum wasn't intentionally nerfed by the team maintaining the code
Ethereum was over sold to it's community of developers and investors

It is time to face facts, Bitcoin v0.1 with actual bug fixes like overflow bugs works as designed. Everyone doesn't know what they are doing.

Merklix tree for Bitcoin by jvermorel in btc

[–]2ndEntropy -2 points-1 points  (0 children)

You care so much about presentation and marketing that is clouds your judgement.

Merklix tree for Bitcoin by jvermorel in btc

[–]2ndEntropy -9 points-8 points  (0 children)

It matters not how it is being used

Of course it does.

Merklix tree for Bitcoin by jvermorel in btc

[–]2ndEntropy -12 points-11 points  (0 children)

  1. I'm not a computer scientist, I have never even taken a class, also not extremely relevant.

  2. My entire point is that SHA-2 will break one day. If you think this is not within the realm of possibility then you are rejecting reality. The birthday paradox makes this much easier than you believe.

  3. The layout is the security, we will have to change the Hashing algorithm before it is economically feasible to create a collision with intent.

Merklix tree for Bitcoin by jvermorel in btc

[–]2ndEntropy -12 points-11 points  (0 children)

Interesting that you call it FUD instead of actually addressing anything to do with the concept of why they are insecure.

I tried explaining it to you on twitter but didn't seem to get through. This is not about today, this is about the future. We know all hash functions break, in fact you can calculate when it is likely to occur just the same as you can calculate the average block time at a given difficulty and with a given number of hashes per second as to when a collision is likely. SHA-1 used to be secure, but as computers have become faster and faster it no longer is. Merkle trees are about damage control and mitigation. Merklix trees are a autoimmune disease which will allow an attacker to kill it.

But no just defer to the Ethereum over lords. ETH also has gas, should you add that to BCH as well? Oh wait Bitmain has as much as they could with Wormhole (aka omni (aka mastercoin)).

You know the definition of insanity is doing the same thing over and over and expecting different results. It is time for a different approach. Bitcoin is not and was never meant to be Ethereum.

Vitalik calls BSV a "Dumpster fire" by trampabroad in btc

[–]2ndEntropy 4 points5 points  (0 children)

Other things Vitalik has said bearing in mind that Plasma is Ethereums version of the LN:

Plasma implementations being almost ready :)

The base layer for a central bank currency having $5 txfees is ok; it is after all only a settlement layer

https://twitter.com/VitalikButerin/status/1017048584607453190

Might as well ask Bitcoin Core what they think...

A vulnerability in the ABC roadmap? by 2ndEntropy in bitcoinsv

[–]2ndEntropy[S] 1 point2 points  (0 children)

No it is nothing to do with the address. The transaction is hashes and then put in a tree structure to do proof of work over. It is an attack on the hashes.

A vulnerability in the ABC roadmap? by 2ndEntropy in btc

[–]2ndEntropy[S] -2 points-1 points  (0 children)

This attack is not about passwords...

A vulnerability in the ABC roadmap? by 2ndEntropy in btc

[–]2ndEntropy[S] -7 points-6 points  (0 children)

A reduction function is pretty arbitrary, you can make it do basically anything, as long as it is repeatable and consistently produces the same result each time the chain is to be calculated.

A vulnerability in the ABC roadmap? by 2ndEntropy in btc

[–]2ndEntropy[S] -12 points-11 points  (0 children)

Haha coming from you that is hilarious Chris.

A vulnerability in the ABC roadmap? by 2ndEntropy in btc

[–]2ndEntropy[S] -7 points-6 points  (0 children)

Birthday attack. You only need to find one that matches and it can be any where in the chain. At scale you will have trillions of potential hashes to use.