Bitcoin Unlimited

[Discord Conv] Dynamic IOTA


Disclaimer: This is my editing, so there could be some misunderstandings.
For the general view of 'what's going on?' of this dynamic ride...

2/16
dom어제 오전 5:44
Just FYI: the team is now working on a plan on how to recover from this and get the network back into operations while also allowing anyone who might have been affected to safely transition. there are no guarantees just yet, but we will do our best to get this through ASAP. Hopefully we will have a concrete action plan tomorrow and will then communicate it.
On the vulnerability side, all parties are notified and they are working with law enforcement and external auditors to fully understand how this happened. We will keep you guys posted.

dom어제 오전 5:47
needless to say, that the vulnerability itself was rather sophisticated and required access on multiple levels to be able to execute it on this scale. Hopefully we will be able to share more soon.
[Did the vulnerability existed after or before the audit on trinity?]
after the audit

dom어제 오전 5:51
Currently it looks like this will only be for recent Trinity Desktop users

dom어제 오전 5:56
the entire Trinity team did an amazing job and there is not a single person to blame. The attack itself was very sophisticated and targeted at IOTA and Trinity itself. We are already working on v2 where none of this would be possible. We will share our learnings from this publicly and also share what kind of precautionary measures we are taking.

dom어제 오전 5:58
The community also did an amazing job in helping to guide us through and give assistance to other community members.

dom어제 오전 5:58
we actually were having discussions a few weeks ago to rename Trinity (because of the religious connotation)

Jelle Millenaar [IF]어제 오전 6:37
We didn't really have panic and chaos. We actually worked really well together.

Jelle Millenaar [IF]어제 오전 6:38
[IF members, do you get paid Over Time for all the awesome work or PURE DEDICATION?]
nobody considers this overtime or anything. We just contribute because we know it is needed.

dom어제 오전 7:45
[If dependencies carry this risk, maybe they should've done an official CORE wallet and saved all the fluffy stuff for a third party app.]
that's how the new Trinity will work. Sucks that it happened now especially after we wanted to put it into maintenance mode anyways

dom어제 오전 7:49
[How do we know if the hacker has our seeds?]
this is related to a third party, unrelated to IF or IOTA

dom어제 오전 7:50
we know that this could have only been done through intrusion / collusion of an external source.
[Dom are you fully confident to solve all those problems especially regarding the possibility of even more people getting scammed instantly after coo is back again?]
yes, relatively sure. That is why we are taking the necessary time to plan accordingly.

dom어제 오전 7:55
We will provide more information on how this exploit was done soon. All the involved parties are aware of the situation

dom어제 오전 7:58
[Please give us some time before you start the coo information that we can move to new seed instantly]
don't worry, we will get it all sorted out.

dom어제 오전 8:22
once life is a bit less "tumultuos" I still want to work on that Autonomous Bar concept powered by IOTA (access control, id verification, payment and a bunch of robots)

Eric Hop [IF]어제 오후 2:44
Pretty good. I'd be surprised if we find more theft bundles. Only found one more today, while building a timeline of the theft.

Eric Hop [IF]어제 오후 2:50
We have several separate teams. One is looking at how to resume. One is looking at how to be able to rescue the funds. Others are interacting with law enforcement and third parties. I'm part of DAFT. The Data Analysis Forensics Team. Haha

Eric Hop [IF]어제 오후 3:01
Some if the people in Coordicide team like Hans have been helping out. It was an all hands on deck situation. I actually loved it. We haven't had this much of a team spirit in quite a while. Usually everyone plays in their own sand box. But this time we all played together on the beach.
It's such a joy working with so many extremely smart people. With so many eyes on the ball we did not miss much opportunities to figure things out.

Eric Hop [IF]어제 오후 3:07
And for me personally this was a great time. I am all about puzzle solving. And this was the greatest puzzle of all. With a built-in time limit. Haha

Eric Hop [IF]어제 오후 3:12
I'm not doing official statements. But we have a good overview of what happened and the extent of it. Right now we want to hammer down how to resume without risks and how to safeguard the stuck funds if possible. What is especially funny to me is that the coordinator that everyone was bitching about for years did exactly the thing it was meant to do. It allowed us to halt an exploit that otherwise would have cost everyone dearly.

Eric Hop [IF]어제 오후 3:15
It was meant as safeguard, training wheels, while we mature. And while we need to remove it due to it being a single point of failure and a bottle neck to scaling, I will be kind of sad to see it go.
Yes, IF would have done the same to safeguard funds, if a third party wallet would have been the cause. Just because we can.

Eric Hop [IF]어제 오후 3:37
Yes it was a manual attack. The sophistication was in the exploit. But he seemed to be not too sophisticated iota-wise. Everyone has their specialties I guess.

Eric Hop [IF]어제 오후 3:41
And as an aside I wish people would fuck off about the whole iota not being decentralized because of coordinator, when every block chain token is centralized around a few mining pools that seriously disrupt any possibility for positive software development. They fucking hold back everything that influences their bottom line. Which is why Bitcoin and the rest have pretty much been stagnant for years while we move forward constantly.

dom오늘 오전 7:08
We will release a new Trinity version tomorrow with the fixes implemented. It's not yet the full transition tool, but it's the first step towards fully going back to operations.

dom오늘 오전 7:09
Just wait for the rest. It is important that we get this 100% right and we are still further investigating, so there is a lot of behind the scenes work happening right now.

David Sønstebø오늘 오전 8:52
So... Tangle EE
Quite cool eh?
It's so unfortunate that this asshole managed to distract everything away from one of the biggest steps towards global adoption
Let's not give this fuckface further attention. The cause has been identified, law enforcement is involved and mitigation strategy is being worked on. There will be further official updates, but let's not halt the whole IOTA project due to one idiot.

David Sønstebø오늘 오전 8:56
[Is he identified?]
Let's just say that there's a lot of traces. The attacker does not seem to have been too sophisticated. Official update on Monday will provide details.

David Sønstebø오늘 오전 9:03
[How will this situation affect iotas partners?]
My best guess: further increasing our reputation as an organization that solves hard problems efficiently and doesn't shy away from difficulties. Every company in the world has had issues similar to this. Keep in mind that this does not at all affect the protocol/Tangle/IOTA.

David Sønstebø오늘 오전 9:08
We do have a bounty program. This/these individual/s were not interested in the greater good, pure greed and incompetence

David Sønstebø오늘 오전 9:10
[Any examples of use cases for DID on the tangle?]
Virtually all use cases on Tangle requires a secure identifier and verifiable credentials. What I think will happen is that once Tangle EE ships the first version, all other companies using IOTA will start to implement it
[One more question: How transparent will tangle EE be for the community?]
100%. This is why I/we consider Tangle EE to be such a significant milestone, it's not "just" IF, this is a coalition of major companies, start-ups and leading academic institutions building the solutions

David Sønstebø오늘 오전 9:11
[any ETA for the 1st Version?]
That's another good thing, IF won't issue the ETAs, Tangle EE will :

David Sønstebø오늘 오전 9:12
[What does T(angle)EE do exactly?]
It's a partnership and collaboration between several entities to develop and ship code and blueprints that are relevant for product developers and service providers
That blog post is a good read to get better comprehension

David Sønstebø오늘 오전 9:13
It's incredibly important that IF's role slowly but surely decreases in importance. IOTA has to succeed independent of IF post-Coordicide and multiversial-slicing (advanced sharding equivalent)

David Sønstebø오늘 오전 9:14
I would say that it's an incredible important piece of the puzzle. Naturally Object Management Group (OMG) in Tangle EE will be key here as well, but IOTA is not married to "just" Eclipse. We also work closely with Linux Foundation. However, Tangle EE is very focused

David Sønstebø오늘 오전 9:22
I don't think IF will disappear, however, it will hopefully be purely R&D-driven in 10 years, whereas the other efforts are taken over by the ecosystem (companies, academia, start-ups and enthusiasts). Even post-Coordicide, we already now have theories on how to go way beyond even that. If we achieve our goal of IOTA being equivalent to TCP/IP, there will naturally be continuous development and research in the foreseeable future. I doubt we will reach complete satisfaction, especially now that smart contracts and oracles enter the equation: there's certainly more work to be done for IF, but my goal is for IF to "simply" be R&D

David Sønstebø오늘 오전 9:27
Definitely. This is why I coined the requirement for a "grandma on crack"; this is truly how simply using IOTA should be in 2-5 years. Just like very few even know wtf TCP/IP is

David Sønstebø오늘 오전 9:57
I agree 100% with your assessment, though as would Netflix do with Blockbuster's assessment when they declined to acquire Netflix. At the end of the day it's all about basic economic and human behavioural principles.
Human nature does not change, but our environment does. Disruption will continue forever. Darwinian principles will forever remain true.
A better option = adoption. It doesn't matter how hard the incumbents fight against it, they either adapt or go Kodak/Nokia/AOL
submitted by btlkhs to Iota [link] [comments]

Can you proofread this before I explain to my Dad what cryptocurrency is?

He asked me what calculations my racks of video cards were doing, and what cryptocurrency was, so I typed this up - can you let me know all the stupid mistakes I made before I send it?
Note - he specifically asked me to explain everything as he wants to understand the entirety of it, including what my racks of GPU's are actually calculating and why
bitcoin was the first, it used the SHA256 hash algorithm
it was made so that everyone could run it and "mine" for coins with their CPU by running the SHA256 hash over and over with slightly different inputs, to try to get an output that was lower than the current target. The current target is called the "difficulty" ( https://en.bitcoin.it/wiki/Target )
If your bitcoin program found inputs that resulted in an output lower than the current difficulty, you win a "block" which contains varying amount of coins (with bitcoin, the reward halved every few years)
Your bitcoin program submits this to the network (multiple other bitcoin nodes that you're connected to), and then importantly - they all independently check your work. Once they verify that your hash is correct and is below the difficulty target, everyone agrees that a block was found and everyone moves onto looking for the next one. Note that the chain of blocks that keeps being found is called the "blockchain" , and it's completely public. Every transaction that happens between blocks sits in the "mempool", waiting to be written into the next block. ( https://99bitcoins.com/what-is-bitcoin-mempool/ )
Since SHA256 is a one-way hashing algorithm, you can't just make up a fake hash and hope it works. You actually have to do the work to find a correct one, this is called "Proof of Work"
Once it's written into the blockchain, it cannot be changed. Usually when you send bitcoins to someone, they wait for several "confirmations" before they consider your payment accepted. For example - when five new blocks have been mined after the one containing your transaction, that's five "confirmations". The deeper your transaction is into the blockchain, the more computing power it would take to invalidate that transaction. This is called the 51% attack - ( https://learncryptography.com/cryptocurrency/51-attack )
then someone figured out that it would be faster if your video card did the SHA256 hashes instead of your CPU, since there are hundreds of weaker 'cores' in a GPU than a CPU (which has 2-4). After a short while of everyone moving to using GPU's instead of CPU's, the difficulty target became harder (the network re-adjusts the difficulty target every x blocks, to keep the time between blocks constant. If more people are mining, the difficulty must go up to keep the time between blocks the same)
After a few years, various people custom designed ASICS to do the SHA256 hashes , which are much faster than GPU's, so now to mine bitcoin you have to buy custom hardware to do it. (you don't technically have to, but using GPU's would be worthless now with such an insane difficulty)
Also along the way, people realized the difficulty was getting too hard to mine by themselves, they would go weeks without finding a block; so someone invented "pooled" mining. One person runs a custom bitcoin wallet on a server, and thousands of people connect to that and mine to that wallet. However, instead of that wallet telling all the miners what the real current difficutly target is, it instead gives them a much easier target, so they find "shares" every few minutes. These "fake" easy shares are how the pools keep track of how much hardware you actually have mining for them. When the pool finds a block (because one of these shares will eventually qualify against the real current difficulty), it distributes the block reward evenly among the miners, based on how many shares they submitted during that round. (There's some tricky math called "pool hopping" you can look up if you're interested, where mathematically a miner will come out ahead if they switch to a pool at the beginning of a round, then switch to another pool at a pre-determined point. Pools came up with different payment schemes to get around this, one is called PPLNS)
Bitcoin was the first, however since it's open-source, someone took the Bitcoin code, changed some variables (name, block time, block rewards, max number of coins, etc), called it Litecoin, and launched their own version. Notably, they also changed the hashing algorithm used from SHA256 to scrypt. This was the first "Altcoin".
Since all the bitcoin mining software was written to calculate SHA256, the miner programmers had to start over on a scrypt miner. When new coins come out with new algorithms that haven't been used in previous coins, miner programmers rush to create GPU miners for that algorithm. Once they're running, they then work on optimizing them. The ones who have the fastest programs can usually charge a "devfee", which means for every x minutes of mining for you, it connects to a mining pool of the developer's choosing and mines for him for y minutes (usually devfees are 1-4%). If his/her miner is much faster than others, then it's still worth it for you to run his over the free miners.
Today there are hundreds (thousands?) of altcoins, with new ones coming out every week since it's so incredibly easy to launch your own. Very few have actually added something new to the mix, but the ones that have are the ones that are currently worth the most. A notable example is Ethereum. Instead of the blockchain just being a public ledger of transactions, it can also contain code that all the ethereum nodes can run. It can be simple code, such as "all ether directed to this wallet address will get split evenly in half, with half going to this address, and the other half going to that address" , or it can be more complex code. Once this code (called a "Contract" in Ethereum terms) is submitted into the blockchain, it's there forever (or as long as Ethereum is running on people's computers)
Another thing you can do is called a "hardfork" - if a group of people don't like the way one coin is being run, they can take the source code for that coin, change what they want changed, and launch it. At a certain block, your new code takes over, and you've essentially split the blockchain off on your own. The two blockchains can never be merged, because the nodes that run the coins are running two different versions - they each see the others' transactions and chains as invalid. If you can get enough people behind your idea, and they direct enough hashing power at your fork, then it will survive. Ethereum forked a few years ago because a large group of people disagreed with something the developer did, that fork is now called "Ethereum Classic"
Other noteable things that some coins have now are anonymous transactions, using math that might as well be magic (RingCT, ZKSnarks), several coins have the ability to do transactions that you can assume are completely anonymous. Even if you view their public blockchains, you can't figure out what transactions actually happened ( https://monero.stackexchange.com/questions/880/eli5-how-does-ringct-work )
So to answer your question, my racks of video cards used to be mining Ethereum (ethash algorithm) on an ethereum pool. Now half of them are mining Monero (cryptonight algorithm) and the other half is mining ZCash (equihash algorithm)
submitted by PcChip to CryptoCurrency [link] [comments]

Staying Anonymous in a High Risk Activity (xpost from /r/ShadowWar)

👀
To preface this topic, I must state that I am not advocating any immoral activity. Also please note, that just because something is illegal, does not necessary mean that it must be immoral. Remember that the Civil Rights Act was not passed until 1964 - just over 50 years ago. Just because something is enshrined into law, does not mean that it is moral and just.
That said, there may come a time in your life where you decide that you must do something that is going to piss off someone with the means to hurt you. For the purposes of this Topic, let us pretend you have compromising files that detail illegal activity, and you want to release it onto the internet. The pressing question is, how do you release your content without revealing who you are and putting yourself and/or your loved ones in danger?
Let's do our best to come up with as many countermeasures as we can.
Why Become an Anonymous Whistleblower?
The government and/or your workplace will tell you that there is a Whistleblower program in place, and that you should make use of it if you witness any wrongdoing. You will need to use your own judgement, on whether to use this program, or if you should instead become an internet whistleblower. Every situation is different.
What I CAN say, however, is that it is in the nature of government to seek unlimited power. EVERY government in the world would eventually strip their citizens of all rights and control their every move and thought, IF they thought they could get away with it. Similarly, individuals and corporations (and yes, governments) will risk fines and jail time by doing something illegal, if they think that it is worth the risk of getting caught.
You see examples of this everywhere. One of the easiest-to-find examples is when a car manufacturer doesn't bother to fix a fatal defect because the cost of fixing it is greater than the cost of the lawsuits from the inevitable deaths (link). Even when they DO get caught, the penalty isn't even that bad because the fines are for some odd reason TAX DEDUCTIBLE.
When the government does something illegal, they KNOW they're doing something illegal. They just do it anyway because they can get away with it, and because they hide it well enough. When someone steps forward and says "hey, this isn't right!", the government's reaction is NOT to say "oh, that person is right, we should correct things and be sure to follow the law!" Instead, what they think is "oh no, this guy is going to tell on us, and if word gets out, then it will be a setback in our quest for power! we need to make sure our secret stays hidden! how do we go about doing that...?"
The answer is typically to threaten to ruin the potential whistleblower's life in some way. Maybe they get transferred to another department. Maybe they get fired for being 1 minute late. Maybe the whistleblower made the complaint official so they go for a gag order. Or maybe the problem is big enough that they hack their emails and start a smear and discrediation campaign. Sprinkle a little crack on them. Plant child pornography on their hard drive. Use their SSN and credit cards to ruin them financially. Or maybe they just put a couple bullets in them.
The government doesn't want you to right wrongs. The government just wants power. If you uncover illegal activity, you must determine if reporting the violation through official channels will actually fix the problem, or if you must do your best to raise a public stink about it. This also applies to corporations. Be wary of dealing with HR - they exist to protect the company, not you.
"It's Just Metadata"
When solid evidence of mass survillence was revealed, one of the arguments that the government used to try to downplay it is that they were not actually collecting message contents, but instead only collecting the metadata (sender, reciever, date and time, etc). First off, this is bullshit - they are obviously collecting the message contents too. Second off, METADATA IS FUCKING IMPORTANT. You can put together a pretty clear picture of exactly what is happening, just from metadata. Metadata is basically a smoking gun to the message or file contents.
The scary thing is, most tech-savy people - myself included - are not able to guarantee that they can clean ALL of the metadata from a file. And not only is metadata stored on the operating system level (on the "outside" of files), but the program that created the file in the first place probably has its own metadata INSIDE the file. And there's no way you can trust "metadata-cleaner-v0.6.exe" (now with the Ask toolbar!) to keep you out of jail.
You must assume that the original files that you copy and intend to leak, are littered with metadata that very very clearly identifies you as the leaker.
To combat this, there are several steps you can take.
  1. DO NOT leak the original untouched files. Certainly keep a copy of them, but original files might have your digital fingerprints all over it, and will put you at risk. Instead, copy or transcribe the contents, and place it into a new file, and be sure to do it on a computer that cannot be traced back to you or any of your accounts.
  2. Modify the contents of the file. When pasting text, you should strongly consider pasting the contents format-free (control-shift-v) (or use Notepad as an intermediary). Depending on how paranoid you are about this, also consider converting everything to upper-case or lower-case. If images are involved, resize them slightly. Also, especially if the image is a .jpg, save with a slightly reduced quality to introduce noise or to destroy "invisible" markers that the human eye cannot detect. Also be aware that documents might have deliberate variations, depending on the person who accessed them. This could be hidden in typos, punctuation, capitalization, even full words or sentences. The document you plan on leaking might actually be trapped.
  3. You must also consider who had access to the file? Are you the only one? Because if you are, then taking every precaution possible will not help you. Is it a limited group of people? You are going to be placed under a microscope. The more people that "could have" done it, the better. You need to be able to hide in a crowd of suspects - the larger the pool of suspicion, the better.
This is in no way a comprehensive list. The reality is, the offending organization has as many tools at their disposal as they can imagine. You must try to determine the level of risk yourself, and what the most likely countermeasures would be, and adjust your strategy to circumvent them. Be smart, and careful, and paranoid. And honestly, you should seriously consider using a journalist instead of doing this yourself.
There is also one more matter to be careful of... the actual file contents itself. You have to read it, and you have to determine if any innocent person would be put in danger if you leak the information. And then you must determine if leaking the document is still worth it.
Doing the Deed
There are a number of precautions that you can take when you need to remain anonymous for an online activity. Some of these are pretty basic. Others of these are more extreme. It is up to you to determine which measures are appropriate, to protect yourself from the risks you are about to take.
  1. Do not use any computer that is associated with you or anyone else you know. You should buy a laptop off of Craigslist. Do not use your real phone number, or real email address, or your real name, etc. When arranging to buy this laptop, you should ideally not be using your own computer or internet connection to communicate with the seller. Using your laptop with a Tails linux live CD in a coffee shop is typically secure enough though, for this particular activity. Buy the laptop using cash. Try to not give the seller any reason to remember you.
  2. Remove the hard drive from your newly acquired laptop. Only boot up on a Tails live cd. Read up on spoofing your MAC address. Never switch on the laptop at home, or use your home internet connection. Never connect to any of your personal online accounts using this laptop. Never use this laptop to browse the internet - your browsing behaviors could get the laptop/connection "fingerprinted" back to you. This is a "dark" laptop, and you should take every measure to keep it that way.
  3. I do not know if it is even possible to aonymously buy a burner phone in the United States. But if you absolutely need one, try to do it as anonymously as possible, using all of the other tips listed here, and then some. Use cash, avoid cameras, avoid local shops,
  4. Do all of your preparations offline. Only connect to the internet for the amount of time you need to perform your activity, and no longer. Every second you spend online increases your exposure and threat. This is very similar to the concept of military radios that transmit in encrypted bursts, to help prevent enemy interception and triangulation.
  5. Only use public hotspots, when you connect to the internet. And assume that every time you hop online, someone puts a pin in a map where you are. This means, do not use hotspots near your home. Do not use the same hotspot twice.
  6. Use TOR. It's not perfect, and I have my suspicious about government infiltration of the network. But it's FAR better than nothing. In addition, you should also use a VPN if you can. This is far more difficult though, since VPNs are generally not free. Check /VPN, for assistance in researching this topic though, I think there might be a few, albiet with limited bandwidth. If you need to buy a VPN, use bitcoin (/bitcoin), instead of your credit card. Reasons should be obvious enough.
  7. Avoid cameras, CCTV, and traffic cameras. This is especially difficult this day in age, but try to make an effort to anyway, without appearing suspicious. Maybe call off your upload / activity, if there were too many cameras. If your adversary is strong enough, you must assume that they will pinpoint the location you used, and long after you're gone, they might arrive on the scene to confiscate security footage from the surrounding area.
  8. Consider anti-facial-recognition makeup and clothing. Note, this only fools facial recognition software, and should only be used if circumstances warrant (aka, they already know who you are, and are looking for you). This type of behavior will INSTANTLY cause everyone around you to pay attention to you. A realistic silicon mask and makeup is probably a superior alternative, if you have access to that sort of thing, to make an old-fashioned disguise, but takes a bit more effort.
  9. In extreme cases, consider performing a surreptitious upload. For example, maybe you can leave your laptop in a bag, and have it automatically connect to a coffee shop's WiFi and perform a task and then disconnect, while you pretend to work on a paper, or chat up the cute girl with the glasses. If you are this worried though, you might be better off not even entering the building with the hotspot in the first place. If you need to put even more distance between you and your internet access, consider using a directional WiFi antenna. Naturally, you might want to build it yourself, as opposed to buying one on Amazon.
As you can see, possible methods for avoiding detection start to become increasingly ridiculous. Every measure has a countermeasure. You must determine the likely measures that will be used to find you, and focus on countering those. If you have the spare time, then take it a few steps further. But at some point, a budget for time, alabi windows, and resources avaialble to perform countermeasures start to become stretched thin.
Hitting The Fan
Despite being more careful than you thought humanly possible, there is always the possibility that will get caught. Maybe you leave your fingerprint on a spoon. Maybe a random camera catches your face. Maybe you brag about it on Facebook. Maybe your moment of doing the right thing was witnessed by a 192 megapixel camera with a wide angle lense, mounted on the bottom of a Cessna and flown in lazy circles around the city at an altitude of 8000 feet while recording everything within 30 miles, allowing law enforcement to rewind the footage to locate you at the scene, and then fast forward while tracking your movements to find out where you live.
I guess that last one was oddly specific... (link)
The point is, you need a plan for when things go south. Edward Snowden's plan was to fly to a country that doesn't have an extradition treaty with the United States. Most of us aren't going to need that extreme of a getaway plan, but picking a country you would flee to in such a hypothetical sitaution is amusing by itself. (Relavant Wikipedia Article)
Depending on the severity of your actions, it might be wise to leave the country BEFORE you publish your dirt. Make sure your passport is up-to-date, withdraw as much cash as you can comfortably / legally travel with, and transfer your remaining assets to a safe international bank. I'm not an expert on international finance, if you have enough assets you would likely want to speak to a lawyer to make sure your funds don't get frozen or confiscated.
For the rest of us who are not on the top of the international most wanted list, you may want to pre-plan a legal defense.
Or you could just take up a hobby. I hear handcuffing yourself in a duffel bag in your bath tub and padlocking it from the outside so you can practice escaping is a pretty fun and safe solo activity. (link)
submitted by primo_pastafarian to conspiracy [link] [comments]

Log of AMA with Skycoin

boldninja Let's all give a warm welcome to @synth from SkyCoin.net and for taking the time to do this AMA
synth *hello
mike Hi Synth
jakethepanda Hey @synth
thrice.pi Hey synth
dr10 Hi
boldninja I think we can start - you guys know the drill. Give him some time to respond (no more than 2-3 questions on backlog so he can catch up)
dr10 How would you - shortly & in easy words - sum-up the advantages of SkyCoin to magazines and non-crypto people?
mgaruccio Can you explain a bit about the mesh net? Is it just an mpls network between nodes or is there something deeper going on?
michaelthecryptoguy Whassup @synth
tranzer hi synth. I have a question - are those coins that are not in circulation in any cold wallets since only a portion is currently available according to CMC? What would you say is the 1 unique feature that Skycoin has?
synth It is very difficult, because Skycoin is a very large project and already has +6 years of development. Different parts of the project have different objectives.
The cryto, coin part is about solving the problems with the existing consensus algorithms. Being able to do +300 transactions a second, transactions in seconds instead of minutes (faster than credit cards), eliminating miners, eliminating block rewards (eliminating inflation) and eliminating 51% attack and the other problems with mining.
then there are other repos and experimental projects under github.com/skycoin such as a meshnet and distributed VPN prototype, where people will be paid coins for forwarding traffic. Also prototypes of distributed social media application, with peer to peer data replication and different experimental projects. Research into immutable data structures for next generation internet. Some of them are very radical.
dr10 How does the Network consensus algorithm Obelisk work and differ from widely known algorithms like Proof of Work and Proof of Stake?
mgaruccio So how much exists today? Could I build an app on the platform if I wanted to?
mike In terms of the rate of progress, what is currently your greatest limiting factor - like funding, manpower, currently available technology?
synth
Can you explain a bit about the mesh net? Is it just an mpls network between nodes or is there something deeper going on?
It is not actually a meshnet. It is software defined networking, it is much more powerful than just meshnet. Its a new type of networking and new completely new protocol and networking namespace, independent of the existing internet.
It supports source routing, while the existing internet does hot potato routing, so never achieves optimal latencies.
It supports multi-homing, which IPv6 does not (Which is critical for when we have gigabit or terabit networking and multi-redundant bandwidth paths)
It has default oppurunistic crypto, both link layer and end to end; so everything is encrypted by default, unlike the current internet.
It has store and forward networking and will operate in Africa or even under conditions where latencies are in the minutes or hours and packet loss is excessive. Where existing protocols cannot operate reliability. It is much more robust than IPv4/IPv6 or TCP/ip
It has improved privacy. If a packet takes a route that is 10 hops, each hop only knows the previous node in the route and the next node in the route. It is not like IPv4 where each packet gives the source and destination. The privacy level is something that does not exist on the current internet.
IP addresses are replaced by public key and no one can read traffic to a destination, without knowing the private key of the public key that identifies the destination. The system does not need 3rd parties or certificate authorities. The design is a revolution.
are those coins that are not in circulation in any cold wallets since only a portion is currently available according to CMC?
The coins are locked into 100 addresses, each with 1 million coins each. And they are released sequentially.
There is a complicated locking procedure and releasing new coins requires unamious consent and a shared secret among a group of developers. Anyone in the shared secret group can block distribution of more coins (to stop the problem that killed NXT). So by design the coins were supposed to be difficult to distribut, there had to be a good reason or justification before a distribution would be approved.
mike What are the hardware requirements to operate a wireless Skywire (the name for the protocol described above) Node?
arc-over-water nxt i think is doing ok..
synth
How does the Network consensus algorithm Obelisk work and differ from widely known algorithms like Proof of Work and Proof of Stake?
PoS and PoW use miners. Miners receive new coins every block as a block reward. So miners are making money and will fight to control the network. An everyone will suffer because the newly created coins represent inflation.
Skycoin was designed to eliminate mining and eliminate the inflation. No block rewards, no new coins. And we needed to develop a new consensus algorithm to do that and there are only a few methods that work, for these constraints. The consensus algorithm is based upon Ben-Or's randomization procedure for achieving consensus in a distributed system, with some improvements for detecting adversarial or malicious nodes who are trying to prevent the consensus process.
There are white papers on skycoin.net about the specifics. I would call it "network consensus" and it uses a sort of Web of Trust (WoT), where if the people creating blocks are doing a bad job or attacking the network, then the community can get rid of them. At the same time, the people who control the network, do not have any real power to attack the network except by slowing down transactions and being annoying, so even if they become malicious the only issue is how to get rid of them and select new people.
mike Any idea when Skywire will be released and ready to test on hardware nodes (testnet or mainnet)?
mgaruccio So if there is no block reward what is the incentive to run a node?
vega What will be the actual function of Skycoin (the coin itself)? Will the coin be used as currency, as transfer of value in and between all these various developing functionalities, semi-separate projects to tie them all together or it's function will be more limited?
michaelthecryptoguy Do you have an idea on the specs of a node that would be required? In the beginning? What about with 10,000 users? (edited)
synth
nxt i think is doing ok..
There were three people that each owned 30% of the coin. One decided he wanted out and began dumping. NXT was over 150 million I think. When he started dumping, it basicly killed NXT.
Skycoin's distribution was designed to stop dumping by the founders and early people.
After Skycoin gets to 30% of the total coins distributed, there will probably a hard time lock on the remaining coins, so that a maximum of 5% of the remaining coins can be released per year. So the distribution for the other 70% of the coins will take a minimum of 14 years (and could be longer).
We cannot even sell the rest of the coins, because if we sold 10% of the total now at $5 per coin, it would be 50 million or something and we cannot spend or even use that amount of money. Not at this stage.
Ethereum spent 30 million or 70 million in their first year or two after the ICO and then nearly went bankrupt. Silicon Valley wages and offices etc. We have been very conservative and have kept costs down and kept them responsible. Now we have coins like EOS and they want to raise a billion dollars and have not produced anything yet, do not hav a blockchain and I have no idea what they would spend that money on, but they are throwing $350,000 parties in time square for marketing/PR etc...
arc-over-water what prevents you from selling? anybody can spend that amount of money?
nxt is a newer platform than sky, market value is $220 million plus $166 million, I get what you are saying but the evidence is wrong. Community is huge and active in Nxt. But you say it is killed, i dont get it?
synth
What will be the actual function of Skycoin (the coin itself)? Will the coin be used as currency, as transfer of value in and between all these various developing functionalities, semi-separate projects to tie them all together or it's function will be more limited?
Yes. Bitcoin has no purpose. An altcoin does two things - check your balance - send money to other people
Two features - check balance - send
For a coin to have value, people need to be forced to buy it to consume specific services. There has to be stuff for people to spend the coin on, that there is demand for.
So Bitcoin is really just a purely speculative asset. It generates no cashflow and its value is determined by perception or social convention.
Ideally, Skycoin would start off as a "better Bitcoin" (faster, more secure, new algorithm, simplier, etc), then over time we would build up an ecosystem and have some type of backing and tie the coin's value into the network and usebase.
The mesh netork (skywire) is good, because it gives something for people to do to get coins and it allows people to consume the coins. You can run your internet traffic through a VPN that tunnels over Skywire and maybe it will be a nominal amount (actually absurdly small amount of money), but there would be real economic activity and a real userbase and community using the coin. Not just speculation.
Later on the scope is much wider.
arc-over-water So the skycoin wallet will be a VPN for our internet usage?
synth
nxt is a newer platform than sky, market value is $220 million plus $166 million, I get what you are saying but the evidence is wrong. Community is huge and active in Nxt. But you say it is killed, i dont get it?
What I am saying, is that NXT would be a lot further along than it is now and probably around where Ethereum is, except for that mistake in the distribution and keeping it too concentrated. It set them back by years. They did not consider what the impact on the price would be, over the long term, when one of the early whales started selling off or decided he wanted out.
arc-over-water But they did the same again with IOTA, same lead dev.. Its over a $Billion
they released and let the market price distribute
synth
So the skycoin wallet will be a VPN for our internet usage?
The VPN is just one application, that uses bandwidth over Skywire. There are several things in development.
This is a BBS like 4chan, that is completely distributed, with CXO. https://github.com/skycoin/bbs
It will run over Skywire also, This is like building a whole new internet from scratch. The apps that run on it are going to specialized and privacy focused, etc GitHub skycoin/bbs Contribute to bbs development by creating an account on GitHub.
mike So Skycoin is a Proof of Resource coin where its value is actually backed by provision of a useful service, in this case private and secure networking? Are there plans to add decentralized storage and even distributed processing to it?
arc-over-water so these 100 separate million coin accounts will be 100 ICOs or how is the distribution patterned? is it written into the code or up to the devs?
rockyj !calculate
slackbot Custom Response https://docs.google.com/spreadsheets/d/1FGo3FkC3uSWXGHatPQyny2brMWjAIJsHFCR-Lhkl_m0/edit#gid=0
synth
So if there is no block reward what is the incentive to run a node?
running a consensus node does not cost anything. You can run it on a raspberry pi.
The important thing is that if the people doing consensus are doing a bad job, that the community can get rid of them and replace them. The other important thing, is that they can be audited and determined automatically if they are obeying the protocol.
the miners in skycoin are not very powerful and cannot do anything except slow down transactions. They are unable to spend other people's money without their private keys, so the consensus/mining nodes are almost irrelevent. It is not like Bitcoin where the miners can hold the network hostage or act selfishly (driving up the transactions fees for their own personal benefit and delaying any innovations that would improve bitcoin for everyone, etc).
So Skycoin is a Proof of Resource coin where its value is actually backed by provision of a useful service, in this case private and secure networking? Are there plans to add decentralized storage and even distributed processing to it?
We have decentralized storage, which is called CXO. But only the bandwidth is monetized by Skywire. We do not nickle and dime and try to attach a coin cost to every API call. Everything that should be free is free. So its a different philosphy.
On top of CXO we also have distributed social media applications (simmilar to Steemit)
CXO is very similar to IFPS, but simplier and designed for our internal infrastructure and with our crypto standards, instead of being a mismash.
mike Is it possible for Skycoin to choose the best paths and route around bad or slow nodes as damage to the network, in effect reducing their impact on consensus?
looks like you answered the question above while I was typing...
tranzer How many tx/s can skycoin handle? What are block times?
thrice.pi 300 right? ^
arc-over-water on your website it says you will have a NON- Turing complete lisp language?
synth
so these 100 separate million coin accounts will be 100 ICOs or how is the distribution patterned? is it written into the code or up to the devs?
We will have a distribution page, up on the website soon. Its complicated.
Skywire, is designed to pull coins out of circuation, through a sort of tithe on network activity and it does automatic buy backs effectively. So the distribution will actually peak and then decline. But one distribution is from the locked coins, and the locked coins are freed, then circulate, then end up at the foundation (from the skywire tithe are pulled out of circulation), but still count towards the free float.
The coin holders also receive a coinhour dividend and there will be a market rate conversion between coin hours and Skycoins and coinhours are the actual currency for the Skywire network. If you do not have enough coin hours, then you sell Skycoin for CoinHour at the market rate, to purchase bandwidth; but if you have a lot of coins then you have enough coin hours for downloading movies or VPN or whatever you are doing and it is essentially free.
So there is a dual level economic structure. Both with coin buybacks to pull coins out of circulation and with a dividend or incentive to encourage users to hold the coin if they are using the network.
arc-over-water so there will be two currencies, holding one reserves the other
synth
Is it possible for Skycoin to choose the best paths and route around bad or slow nodes as damage to the network
Yes. This is very important.
The person dialing a connection, chooses the path of the connection!
You can choose the lowest latency path for video games or Skype, and choose highest throughput paths for video downloads etc. Or can choose paths through specific nodes or facilities or countries, for security concerns and to minimize the number of points that the traffic could be intercepted at.
mike Will Skycoin still have the node subsidy plan for setting up and registering the mesh nodes like originally planned?
dr10 When do you plan to be able to present your planned technology and services to the masses? When can they use what you try do accomplish?
synth
on your website it says you will have a NON- Turing complete lisp language?
That is probably an error. LOL. We will have a new website soon.
There is no scripting language on the skycoin blockchain. Each transaction is constant time (for efficiency and security and to achieve the highest transaction rate and to keep the coin simple).
However, we have a language called CX in development, which is a next generation language that is beyond "smart contracts" and the toy things on ethereum. It uses immutable datastructures and is something completely new. Most of the skycoin "smart contracts" will probably be off blockchain or in personal blockchains and we do not want to shove all the data onto the main chain, because forcing everyone to download everyone one elses contracts it the world is just spamming the blockchain to death. There are better ways to do it.
Will Skycoin still have the node subsidy plan for setting up and registering the mesh nodes like originally planned?
Yes. We are going to get from 20% to 30% distributno of the coins, through network incentives for people running Skywire nodes, consensus nodes and services.
I think this is going to be massive for marketing. And it is the best way to get the coins out to the users, instead of all the coins being held by whales
samuelvihollandia I read how you suggest Skycoin could be used for VPN connections, is this the largest use case you see?
arc-over-water Maidsafe has been working on the redesign of the net for about ten years, what are you doing the same and what different?
synth
I read how you suggest Skycoin could be used for VPN connections, is this the largest use case you see?
No. This is just something easy, that we have working. Its not the largest applicatoin at all.
80% of internet traffic right now is bitorrent and the bitorrent sites are being systematically shutdown and driven off the internet. They wont go away, but will jut go underground. What.cd (largest music tracker, with 800k people) was just shut down, bakabt (largest anime tracker) has gone closed registration, Nyantorrent etc...
User communities of millions of people will be migrating from the clearnet (the existing corporate shit-net) to the "new internet". We are going to see people migrating by the millions, whole user communities of millions of people.
arc-over-water Are you a corporation or foundation or charity? Registered? I am not sure i have seen anything about who you are? What is the dev team size? Background? - Maidsafe is open and clear so is IOTA and Stellar etc. Can you let us know who you and your team are? Especially you are talking about 15 year and up obligations..
techbytes Do we need to hold skycoin to run Skywire nodes or consensus nodes like masternodes from other coins?
synth
Maidsafe has been working on the redesign of the net for about ten years, what are you doing the same and what different?
Maidsafe is in version 2 or 3. Maidsafe will not have a real coin until version 9. Each version takes them about two or three years. Maidsafe will not be "done" or ready for atleast 18 years at this rate.
Skycoin has been in development for ~6 years and the meshnet for 4 years and it will be finished in a few months. To the poin that people can start using it.
Skycoin is similar to maidsafe in the objective, but has a different approach and architecture and primitives. We did not try to do everything, but focused on a smaller, tractable core and got that done.
There will be multiple projects in this space, but few teams are able to plan on the time horizon necisary for building a new internet or able to design each of the components of a system this large, or figure out how to do it so that it is useful at each stage of construction of a project that may take a decade. (edited)
mike Can you see a way for Ark and Skycoin to build on each other in a synergistic manner? I'm all for not reinventing the wheel, especially when it looks like it will be replaced with antigravity like Skycoin.
I see Skycoin as essentially replacing TCP/IP and providing mesh network type functionality at the hardware level, Ark would run on top of it as a top level application layer.
arc-over-water are you up to date on Maidsafe, they are nearly out of Alpha and its more like release early next year? But that being said, Maidsafe says once it is released it is like a virus or AI type, so does Tau Chain, and also Autonomic by HunterMinerCrafter, are we heading towards AI with Maid, Sky Tau and Autonomic?
dr10 smartbridge now! :kappa:
mike So Skycoin would act as a sort of global decentralized cloud server to build on top of.
To communicate, it is more like sharing encrypted files to selected recipients than it is sending messages or hosting sites on a specific server.
synth
Are you a corporation or foundation or charity? Registered? I am not sure i have seen anything about who you are? What is the dev team size? Background?
I think there are over ~60 people who have worked on Skycoin or have made major contributions. Its really a project from the darknet.
Many of the contributors are anonymous. Some of them have security clearances and were in the military industrial complex and one of them worked at the San Diego Naval Defence Research Lab and a lot of the idea for the networking protocols came out of public sector academic researched, funded from there.
We also have a lot of very very early Bitcoin people, hardcore crypto people that predate Bitcoin and an Ethereum core developer, etc..
On the Chinese side we have an early investor in Alibaba and telecom investor. And are doing pilot with china aviation group (owns four publicly traded airline companies) and apparently now Sinopec (which is 2nd largest publicly traded corporation in world).
Then we have people who are part of israeli and US intelligence and are probably doing some sort of money laundering or phychological operations background, who just showed up for some reason. This group seems very interested in the "applications" of these coins and how to improve tranaction privacy and the specifics of the CoinJoin protocol implementation. We got a lot of advice from people experienced in forensic accounting and what they wanted to see and where they felt Bitcoin was deficient and where it leaked metadata.
Then a bunch of PHD level people doing research into distributed database consensus algorithms and another group doing programming language research.
Then a lot of people from the deep darknet, anon, frog twitter and cipher punks and bitorrent communities. (really should be listed as two seperate groups). And people from the Russian darknet community. We have like eight Ivans. (edited)
I see Skycoin as essentially replacing TCP/IP and providing mesh network type functionality at the hardware level, Ark would run on top of it as a top level application layer.
Yes. The key functionality is two things - connecting to people by public key (networking) - distributing self validating, immutble data peer to peer (transactions, blocks etc... content addressible storage)
And you can build almost anything on those two building blocks. The whole internet will eventually be rewritten on top of those primitives and it will replace many of the existing protocols.
arc-over-water Who is the entity that is funding this? I think you have done 2 ICOs? How much did you receive? The first was 10c and the second was @ 50c per coin, released 6 million, is that correct?
samuelvihollandia Are you planning to enter a different exchange market soon?
arc-over-water Have you personally been in Sky from the start? What members have? Who allocates the ICO money etc... I hope you understand that decentralization with investment is a two edged sword, we invest in people but we cannot know these people.... So... we question.. (edited)
thrice.pi with all these outside parties that helped to build skycoin and bring it where it is today who are the main core team who will help to keep all these cool features running. Will these outside parties be recruited for the long haul?
synth
Who is the entity that is funding this? I think you have done 2 ICOs? How much did you receive? The first was 10c and the second was @ 50c per coin, released 6 million, is that correct?
The people who funded the project for the first four years, were early bitcoin and deep crypto people; who were unhappy with the fact that Bitcoin and the other alts did not seem concerned about the core issues at all. They gave us over 1200 bitcoin I think, over several years and did not ask for anything in return.
The early Skycoin devs were doing academic research, architecture and new algorithms. Prototyping and simulation. The later stage people were more project managers and doing implementation.
We did four ICOs for small amounts, to fund development and to allow developers working on the project to buy in. The first ICO I remember was at $0.10 per coin and the price now is about $4.00 per coin, so its up ~35x or 40x, but when you consider the Bitcoin price going from $100 to $3000, the increase has not been so much. lol (edited)
arc-over-water With the price up 35x in about 1 year, is it not now time to cool the run up and release another ICO? At what amount of coins released and what procedure?
mike Would Intel Edison or Joule, or Samsung Artik 10 work well as a Skywire wireless node? They have 2 Gb-8 Gb RAM, 8-64 Gg eMMC storage, 802.11n wireless, bluetooth, and some with Zigbee?
synth
Have you personally been in Sky from the start? What members have? Who allocates the ICO money etc... I hope you understand that decentralization with investment is a two edged sword, we invest in people but we cannot know these people.... So... we question.
I think there wer three different groups that merged together in first three years, that had similar objectives. Because the code was in different language. There was python, C code and then eventually golang and the golang code became the basis for the current codebase.
The way the coin allocations work, is that it requires unamimious consent for releasing coins and it has to be for a specific, ear marked purpose and can be blocked by any of the devs.
Then there is a pool of coins in bitcoin for various project managers to allocate. And that is an operational fund for paying developers, contractors, marketing etc. Then different people have different responsibilities.
Then we also have corporate funding and sponsorship and some companies paying our full time devs etc, which helps a lot.
arc-over-water Silicon Valley (TV SHOW) recently had their decentralized web running on a network or refrigerators? So i would guess, smart phones, smart gadgets? Home gadgets etc could add services and receive rewards from Sky?
mike best would be a totally open source and publicly audited manufactured system on a chip for the nodes to prevent any backdoors. Even chip designers now don't really know what they're putting into the chips since they just drag and drop black boxes known as IP cores into the ASIC designs.
synth
With the price up 35x in about 1 year, is it not now time to cool the run up and release another ICO? At what amount of coins released and what procedure?
I think the Skycoin price has been doubling every 40 days, for as long as I can remember. However, it will still be years before it is in the top 20, its still a long way to climb. It took bitcoin years to go from 0 to $1, even though it was growing at 1% per day the whole time for six years.
best would be a totally open source and publicly audited manufactured system on a chip for the nodes to prevent any backdoors.
we are going to use arm
arc-over-water IOTA is also working on their own hardware for nodes etc, Trinary asset is JINN
synth all intel and AMD systems have remote management engine backdoors. So they are not safe for storing large amounts of coins.
We also have alpine linux and special version of linux, that is 6 MB and has everything that is needed for running our toolchain. It will not have any binary blobs in the kernel or anything that we cant compile from source. It does not have systemd and does not have gli, but uses musl. And does not have openssl.
mike so looks like the Samsung Artik 5 and 10 can run it no problem, they're ARM based. 25x35x4mm package for the Artik 10, Artik 5 is smaller, less powerful but has 2 separate antenna ports, nice for mesh networking with an omni and a directional antenna.
earlyarkinvestor how does Ark compare to Lisk?
synth uploaded this image: 1923810435.jpg Add Comment
earlyarkinvestor isn't Lisk trying to achieve interoperability between blockchains as well
synth uploaded this image: 1433594905.jpg Add Comment
synth uploaded this image: 1432540863.jpg Add Comment
synth uploaded this image: 2049465686.jpg Add Comment
mike nice! looks like an ARM based server rack
let me know if you need any help with it, see you're on solidworks, which I run as well.
synth this is the skycoin cluster; it has 8 CPU boards; 4 cores per CPU, 2 GB of ram per CPU and 64 bit ARM processor. Only one program will run on each individual board, so there is compartmentalization and a physical gap so that compromising one process on a system does no allow all other processes on the system to be compromised
mike looks like 2 ethernet ports per board.
synth and the hardware does not have the qualcom backdoors and is actually chinese equipment; and the backdoors are normally at the kernel level because they are not at hardware backdoors yet
lol
mike do they have SATA ports, maybe M.2 for storage?
synth and we will hav an ARM openwrt router eventually too
this model does not have SATA, but we have a model with SATA; you could hook up 16 2 TB drives, lol and download half the piratebay to your cluster (edited)
the skycoin infrastructure is cluster based and designed for running across +300 computers, with one "node" deployed per computer. Eithe a CXO storage node, or a skywire SDN/meshnet node, or a VPN end point node or a consensus network, or skycoin node, etc. We have multiple node/application types.
so this is a "personal cloud' by itself
its not like StoreJ where you have other people storing your stuff; you are going to have ~5 clusters and 300 computers and can store your own files, on your own internet, on your own hardware. You do not need to go outside of your own network.
mike Have thought it'd be nice to have a board with an array of M.2 sockets to run SSD arrays without all the cables, have the busses shielded in circuit board.
synth yes, i think there will be m.2 eventually
these actually use a microSSD for storage, and its 48MB/s
mike any idea on the pricing on your ARM boards in quantity? We are looking at Intel for Bitseed V3, but ARM would be good to stay with, especially using your boards if there is SATA.
arc-over-water Do you have a general idea of usable functions to be released next in what order? The first release was the Coin and wallet, then the ICOs and can you give a general future with dates if you can
synth the boards are $30 each and the memory for solid state, is actually more than the the cost of the CPU/RAM/board now. Which is sort of insane.
mike so you have microSSD, what's maximum size? we shipping 1with Tb hard drives right now
synth Bitseed mike is going to help with this; so we can pool the boards and do a custom PCB
mike yes, that's where we see the price jumps, is in RAM and eMMC costs.
and it's hard to find low cost boards with SATA
synth try the orange pi
the price goes up 30% for SATA
mike yes, very nice specs.
synth eventually, we will make one that has custom PCB and is a pluggable blade server, I think.
mike I like the Samsung Artiks for the tiny form factor for drone routers, cubesat/picosat possibilities.
but like the fact that you are controlling much deeper down the supply chain with your boards.
synth we only need ram, CPU, then microSD slot; and that is it. so the wifi and all this other stuff is just crap and its junk. We only have communication, storage and computation. So should be minimialist.
submitted by Jarunik to ArkEcosystem [link] [comments]

Topic 5: Staying Anonymous in a High Risk Activity

To preface this topic, I must state that I am not advocating any immoral activity. Also please note, that just because something is illegal, does not necessary mean that it must be immoral. Remember that the Civil Rights Act was not passed until 1964 - just over 50 years ago. Just because something is enshrined into law, does not mean that it is moral and just.
That said, there may come a time in your life where you decide that you must do something that is going to piss off someone with the means to hurt you. For the purposes of this Topic, let us pretend you have compromising files that detail illegal activity, and you want to release it onto the internet. The pressing question is, how do you release your content without revealing who you are and putting yourself and/or your loved ones in danger?
Let's do our best to come up with as many countermeasures as we can.
Why Become an Anonymous Whistleblower?
The government and/or your workplace will tell you that there is a Whistleblower program in place, and that you should make use of it if you witness any wrongdoing. You will need to use your own judgement, on whether to use this program, or if you should instead become an internet whistleblower. Every situation is different.
What I CAN say, however, is that it is in the nature of government to seek unlimited power. EVERY government in the world would eventually strip their citizens of all rights and control their every move and thought, IF they thought they could get away with it. Similarly, individuals and corporations (and yes, governments) will risk fines and jail time by doing something illegal, if they think that it is worth the risk of getting caught.
You see examples of this everywhere. One of the easiest-to-find examples is when a car manufacturer doesn't bother to fix a fatal defect because the cost of fixing it is greater than the cost of the lawsuits from the inevitable deaths (link). Even when they DO get caught, the penalty isn't even that bad because the fines are for some odd reason TAX DEDUCTIBLE.
When the government does something illegal, they KNOW they're doing something illegal. They just do it anyway because they can get away with it, and because they hide it well enough. When someone steps forward and says "hey, this isn't right!", the government's reaction is NOT to say "oh, that person is right, we should correct things and be sure to follow the law!" Instead, what they think is "oh no, this guy is going to tell on us, and if word gets out, then it will be a setback in our quest for power! we need to make sure our secret stays hidden! how do we go about doing that...?"
The answer is typically to threaten to ruin the potential whistleblower's life in some way. Maybe they get transferred to another department. Maybe they get fired for being 1 minute late. Maybe the whistleblower made the complaint official so they go for a gag order. Or maybe the problem is big enough that they hack their emails and start a smear and discrediation campaign. Sprinkle a little crack on them. Plant child pornography on their hard drive. Use their SSN and credit cards to ruin them financially. Or maybe they just put a couple bullets in them.
The government doesn't want you to right wrongs. The government just wants power. If you uncover illegal activity, you must determine if reporting the violation through official channels will actually fix the problem, or if you must do your best to raise a public stink about it. This also applies to corporations. Be wary of dealing with HR - they exist to protect the company, not you.
"It's Just Metadata"
When solid evidence of mass survillence was revealed, one of the arguments that the government used to try to downplay it is that they were not actually collecting message contents, but instead only collecting the metadata (sender, reciever, date and time, etc). First off, this is bullshit - they are obviously collecting the message contents too. Second off, METADATA IS FUCKING IMPORTANT. You can put together a pretty clear picture of exactly what is happening, just from metadata. Metadata is basically a smoking gun to the message or file contents.
The scary thing is, most tech-savy people - myself included - are not able to guarantee that they can clean ALL of the metadata from a file. And not only is metadata stored on the operating system level (on the "outside" of files), but the program that created the file in the first place probably has its own metadata INSIDE the file. And there's no way you can trust "metadata-cleaner-v0.6.exe" (now with the Ask toolbar!) to keep you out of jail.
You must assume that the original files that you copy and intend to leak, are littered with metadata that very very clearly identifies you as the leaker.
To combat this, there are several steps you can take.
  1. DO NOT leak the original untouched files. Certainly keep a copy of them, but original files might have your digital fingerprints all over it, and will put you at risk. Instead, copy or transcribe the contents, and place it into a new file, and be sure to do it on a computer that cannot be traced back to you or any of your accounts.
  2. Modify the contents of the file. When pasting text, you should strongly consider pasting the contents format-free (control-shift-v) (or use Notepad as an intermediary). Depending on how paranoid you are about this, also consider converting everything to upper-case or lower-case. If images are involved, resize them slightly. Also, especially if the image is a .jpg, save with a slightly reduced quality to introduce noise or to destroy "invisible" markers that the human eye cannot detect. Also be aware that documents might have deliberate variations, depending on the person who accessed them. This could be hidden in typos, punctuation, capitalization, even full words or sentences. The document you plan on leaking might actually be trapped.
  3. You must also consider who had access to the file? Are you the only one? Because if you are, then taking every precaution possible will not help you. Is it a limited group of people? You are going to be placed under a microscope. The more people that "could have" done it, the better. You need to be able to hide in a crowd of suspects - the larger the pool of suspicion, the better.
This is in no way a comprehensive list. The reality is, the offending organization has as many tools at their disposal as they can imagine. You must try to determine the level of risk yourself, and what the most likely countermeasures would be, and adjust your strategy to circumvent them. Be smart, and careful, and paranoid. And honestly, you should seriously consider using a journalist instead of doing this yourself.
There is also one more matter to be careful of... the actual file contents itself. You have to read it, and you have to determine if any innocent person would be put in danger if you leak the information. And then you must determine if leaking the document is still worth it.
Doing the Deed
There are a number of precautions that you can take when you need to remain anonymous for an online activity. Some of these are pretty basic. Others of these are more extreme. It is up to you to determine which measures are appropriate, to protect yourself from the risks you are about to take.
  1. Do not use any computer that is associated with you or anyone else you know. You should buy a laptop off of Craigslist. Do not use your real phone number, or real email address, or your real name, etc. When arranging to buy this laptop, you should ideally not be using your own computer or internet connection to communicate with the seller. Using your laptop with a Tails linux live CD in a coffee shop is typically secure enough though, for this particular activity. Buy the laptop using cash. Try to not give the seller any reason to remember you.
  2. Remove the hard drive from your newly acquired laptop. Only boot up on a Tails live cd. Read up on spoofing your MAC address. Never switch on the laptop at home, or use your home internet connection. Never connect to any of your personal online accounts using this laptop. Never use this laptop to browse the internet - your browsing behaviors could get the laptop/connection "fingerprinted" back to you. This is a "dark" laptop, and you should take every measure to keep it that way.
  3. I do not know if it is even possible to aonymously buy a burner phone in the United States. But if you absolutely need one, try to do it as anonymously as possible, using all of the other tips listed here, and then some. Use cash, avoid cameras, avoid local shops,
  4. Do all of your preparations offline. Only connect to the internet for the amount of time you need to perform your activity, and no longer. Every second you spend online increases your exposure and threat. This is very similar to the concept of military radios that transmit in encrypted bursts, to help prevent enemy interception and triangulation.
  5. Only use public hotspots, when you connect to the internet. And assume that every time you hop online, someone puts a pin in a map where you are. This means, do not use hotspots near your home. Do not use the same hotspot twice. Make sure the "map" of every hotspot you've used doesn't center on your home, or even the town you live in.
  6. Use TOR. It's not perfect, and I have my suspicious about government infiltration of the network. But it's FAR better than nothing. In addition, you should also use a VPN if you can. This is far more difficult though, since VPNs are generally not free. Check /VPN, for assistance in researching this topic though, I think there might be a few, albiet with limited bandwidth. If you need to buy a VPN, use bitcoin (/bitcoin), instead of your credit card. Reasons should be obvious enough.
  7. Avoid cameras, CCTV, and traffic cameras. This is especially difficult this day in age, but try to make an effort to anyway, without appearing suspicious. Maybe call off your upload / activity, if there were too many cameras. If your adversary is strong enough, you must assume that they will pinpoint the location you used, and long after you're gone, they might arrive on the scene to confiscate security footage from the surrounding area.
  8. Consider anti-facial-recognition makeup and clothing. Note, this only fools facial recognition software, and should only be used if circumstances warrant (aka, they already know who you are, and are looking for you). This type of behavior will INSTANTLY cause everyone around you to pay attention to you. A realistic silicon mask and makeup is probably a superior alternative, if you have access to that sort of thing, to make an old-fashioned disguise, but takes a bit more effort.
  9. In extreme cases, consider performing a surreptitious upload. For example, maybe you can leave your laptop in a bag, and have it automatically connect to a coffee shop's WiFi and perform a task and then disconnect, while you pretend to work on a paper, or chat up the cute girl with the glasses. If you are this worried though, you might be better off not even entering the building with the hotspot in the first place. If you need to put even more distance between you and your internet access, consider using a directional WiFi antenna. Naturally, you might want to build it yourself, as opposed to buying one on Amazon.
As you can see, possible methods for avoiding detection start to become increasingly ridiculous. Every measure has a countermeasure. You must determine the likely measures that will be used to find you, and focus on countering those. If you have the spare time, then take it a few steps further. But at some point, a budget for time, alabi windows, and resources avaialble to perform countermeasures start to become stretched thin.
Hitting The Fan
Despite being more careful than you thought humanly possible, there is always the possibility that will get caught. Maybe you leave your fingerprint on a spoon. Maybe a random camera catches your face. Maybe you brag about it on Facebook. Maybe your moment of doing the right thing was witnessed by a 192 megapixel camera with a wide angle lense, mounted on the bottom of a Cessna and flown in lazy circles around the city at an altitude of 8000 feet while recording everything within 30 miles, allowing law enforcement to rewind the footage to locate you at the scene, and then fast forward while tracking your movements to find out where you live.
I guess that last one was oddly specific... (link)
The point is, you need a plan for when things go south. Edward Snowden's plan was to fly to a country that doesn't have an extradition treaty with the United States. Most of us aren't going to need that extreme of a getaway plan, but picking a country you would flee to in such a hypothetical sitaution is amusing by itself. (Relavant Wikipedia Article)
Depending on the severity of your actions, it might be wise to leave the country BEFORE you publish your dirt. Make sure your passport is up-to-date, withdraw as much cash as you can comfortably / legally travel with, and transfer your remaining assets to a safe international bank. I'm not an expert on international finance, if you have enough assets you would likely want to speak to a lawyer to make sure your funds don't get frozen or confiscated.
For the rest of us who are not on the top of the international most wanted list, you may want to pre-plan a legal defense.
Or you could just take up a hobby. I hear handcuffing yourself in a duffel bag in your bath tub and padlocking it from the outside so you can practice escaping is a pretty fun and safe solo activity. (link)
submitted by primo_pastafarian to ShadowWar [link] [comments]

[Table] IAmA: I am Matt Mullenweg, co-founder of WordPress (18% of web!) and Automattic, ask me anything!

Verified? (This bot cannot verify AMAs just yet)
Date: 2013-07-31
Link to submission (Has self-text)
Questions Answers
Hey Matt, I was at your State of the Word in SF and you talked about moving WordPress more towards being an application framework rather than a CMS or blog platform. What specifically do you have in mind for this (better settings API, developer features, etc)? And then if you could break backwards compatibility (which really isn't a option for WP), what would you really like to completely redo or add to WordPress? Thanks! First and foremost the most important things for a platform are stability, speed, and security. To do those well you need the ability to push updates and fixes as close to real-time as possible. And it needs to work in every language. User authentication, data and caching abstraction.
A lot of what people think of as platform stuff is actually at the CMS layer -- custom post types, taxonomy meta,
If backwards compatibility wasn't a concern I would rename all the inconsistent column names and variables to match our style guide, drop TinyMCE, simplify the user roles and capabilities system, replace widgets with page blocks, redo the admin menu system, denormalize the DB, flatten dependencies and deep hierarchy in function execution, and completely reorganize the code so the bare minimum of files are included with any given request.
After reading questions from all of the nice, well-meaning people writing WordPress as "Wordpress", do you wish reddit would implement capital_P_dangit(\)? ;) Yes! If anyone from Reddit sees this, would super-duper appreciate if we could get /WordPress capitalized properly. I can send copious amounts of swag, bourbon, and BBQ if bribes are needed.
Looks like that already happened. My link works, but if you click the link in the header it takes you back to the lowercase P. Probably just a field in a database somewhere.
How is it going with Bitcoin ? Haven't looked recently, will see if I can pull some numbers. I wish I had bought some Bitcoins before we introduced it, though. :)
Any stats ? 94 successful transactions so far, pretty low. I think it's more important philosophically to support it than it's been beneficial from a business point of view.
If you could wave a magic wand and instantly rewrite WordPress in any programming language, which would it be? Go. :)
Do you ever think "I could have been tumblr" ? Just the opposite, I'm very glad we're not Tumblr.
Hi Matt, I'm a long time WordPress dev (since day 1 moreorless) so thanks very much for starting it. Just wondering what your opinion of Ghost is? Link to www.tryghost.org. Link to www.fastcolabs.com
They say or imply lots of things about WordPress that aren't true. They've also done things like had a quote from me looking like I was endorsing Ghost on their Kickstarter page even after I asked them to remove it several times. (Lots of people were confused or thought it was a plugin for WP.)
What do you think of Drupal 8 ? :) Some cool stuff in there! I also keep an eye on Joomla and Concrete5. I find it really fascinating to watch other open source projects especially because we share much of the same background and philosophy, but make radically different decisions around things like backward compatibility and release schedule.
It's like watching birds that evolved from the same ancestor but on isolated islands and environments. I'm sure we do things that look completely crazy to Drupal folks, and vice versa.
Along those lines I was asked to keynote at the Joomla World Conference in November and it looks like I'm going to be able to make it.
Why is hello dolly still a default plugin? Do you have any statistics about how many people actually activate/use it? Have you personally written any other plugins? Hello Dolly is actually the 13th most active plugin, with an active userbase of about 16% of Akismet (the most-activated plugin), and about a third as popular as Jetpack. It's ahead of W3 Total Cache! Again this is not just installations, it's currently active.
Some of the other plugins I've been involved with are here on my profile: Link to profiles.wordpress.org
They're obsolete but at the time I was proud of Advanced Caching, Staticize Reloaded, and Cache Images and the early and since-rewritten work on bbPress, HyperDB, and Akismet.
How directly involved are you in ongoing development of core? Are you relatively hands on, do you ever drive decision making or do you leave it to the community? Would love a wooden WP logo, as long as it's not a fauxgo. :)
On a completely different subject. I'm as involved in WordPress development as I was 10 years ago, it just manifests itself in ways that tend to be a lot more behind the scenes and less visible, which I don't mind as I'm way more interested in things moving forward and the results than credit or recognition for any specific thing. (I get plenty of recognition regardless, don't need more.) The only downside is that folks who I don't work with on a day-to-day basis assume that my role at Automattic or WP is more as a traveling figurehead or "evangelist" which can rub me the wrong way sometimes.
I met you at WordCamp Chicago this year (I told you about a widget plugin that turns them into a post type and such). For 3.8 I'm going to take a swing at the release lead role again, which should be fun.
I created these wooden WordPress logos with my 3D Printer, I meant to give you one but I forgot about it. You still want one? The most important thing I've done since WP started, though, isn't in a line of code or a feature people use, it's getting the right people involved and creating an environment for them to thrive. It's the single most important thing any founder can do, whether of an OS project, a non-profit, or a for-profit company even though there's not a single thing you can point to as the result of it other than the overall success and movement of the project.
What are your favorite/most powerful/most surprising implementations of WordPress? My favorite are when people I admire use it, from Jay Z to Zeldman. In many ways what we do like a canvas, and it's a huge honor to see the creativity and beauty people bring to it.
Of all the WordCamp's you've been to around the globe, what was the most unusual location for the event itself and, separately, the after party? Oh by far and away the strangest location was Davao in the Philippines. I can't find any pictures at the moment, but my talk was essentially at a restaurant with a swimming pool courtyard -- the audience was on the other side of the pool from me, and the food buffet was behind me so when the Q&A got slow people would grab food. The PA system had an echo because I think it was normally used for karaoke. And then the bats came out!
Best after-party is hard to pick, but I had a great time after WordCamp Las Vegas which aligned with my 25th birthday a few years ago.
The Philippines is a wacky place. Oh, my people :-) I loved it and had a great time, including at the one mentioned above. :)
Of all the WordPress community memes, which one is your favorite? Link to twitter.com is pretty funny, and some days I miss WP Wank.
Recently I enjoyed #thingswpdailywouldpost and the response: Link to torquemag.io
Pretty much anything Mike Adams (mdawaffe) sneaks into the code, be it easter eggs or Ghostbuster references.
Mark Jaquith had some pretty hilarious ones but I can't find them at the moment, maybe other folks could post their favorites too. :)
Automattic has a lot of side projects (Gravatar, PollDaddy, etc) - What's next? There's always a struggle between doing new things or experiments under a new brand -- like VaultPress -- vs putting it under an existing brand. A lot of the things I've been thinking about we're going to put under the Jetpack brand, for example Jetpack Photon (CDN + dynamic image resizing and filtering) could be a standalone product, but decided to bundle it. So keep an eye on some big things coming to Jetpack, especially for Code Poets, people who use WordPress professionally.
What would you like to see us do next?
What individual do you think is the most under recognized contributor to the WordPress community at large? That's a tough one... I'm going to say the volunteers on the support forums. There are 2M+ posts there, and it's easy to forget that a huge number of WP users end up in the forums and get help that allows them to use the software when they wouldn't otherwise be able to.
I remember seeing a WordPress yearly theme of "WordCamps and WordPress Meetups". What should be the next year's area of focus for the Community? What areas would you like to see beefed up in the Community? Some themes that I thought might be good are "Women in WordPress", "Contribution and Documentation", "WordPress Evangelism", "Adopt an old plugin" to name a few. How do you feel about these? Those are all good, if I had to pick one it'd be getting the documentation going better on WordPress.org -- handbooks, function reference, training materials / syllabuses, and doing it all in every language and for every plugin/theme.
Hey Matt, what was the most difficult thing for you in starting your business and what do you think is the most important thing you have to know and/or to learn when you found a startup? The hardest thing for me was taking responsibility for the lives and families of others, those first few hires especially. It's why I originally raised funding even though we had revenue already, and why since then we've always focused on making the business sustainable over decades, not just the next tech hype cycle.
What's the best meal you have ever eaten (and photographed)? Hands down: Eleven Madison Park in NYC.
Recently I had a really special libation tasting menu at The Aviary in Chicago, which is from Grant Achatz the chef of Alinea, it was a cool experience at a table in the kitchen.
I'm constantly amazed by the coordination and efficiency of professional kitchens, I'm mesmerized when I watch.
PHP has matured a lot in the last few years, with new tools such as Composer and new frameworks such as Laravel. The relationship between this side of the PHP community and WordPress seems to be pretty strained. Are there plans to address this relationship, particularly with the new focus on WordPress as a web app framework? I think the PHP and WP community are coming closer together, I know it's something that Nacin has been spending time on and we've had more presence at PHP-focused conferences.
Thoughts on forking WordPress, a la jQuery? (Link to eamann.com. I don't think forking as described there is a good idea.
Multiple content areas - probably the most important CMS feature not baked into core. Will it ever happen? There's something around multiple content areas that could be really interesting we're going to start working on this year, hopefully ready by early 2014.
What do you see as the biggest challenge facing WordPress (in the context of competitive software or just un-met customer needs) for the next year? By far and away it's the high attrition rate of new users. We look at posting a lot in that context but I think it's far more important to look at customization -- theme discovery and tweaking, widgets, menus.
Hello Matt, what is your opinion about current state of PHP in general? Do you like any particular framework? Templating engine? Thanks. I think it's pretty great, would just love to see continuing development around performance. Nothing really in the language that's holding us back. Wish it was trendier with younger devs.
Hey Matt, why did you force the rest of us to suffer through images defaulting to a link in our posts (I understand that was your doing)? Youthful indiscretion!
What is your development setup (software)? Most of my time these days is spent with people instead of code. (For better or worse. :)) I love lists, and live on Link to simplenote.com .
When I code since I switched to Mac in 2011 I use Coda 2 and SFTP to a remote server rather than a local dev environment. nano on the server.
Apache or nginx? Nginx!
I find WP so much more user-friendly than the competition. Was that a conscious decision from the outset? Was it hard work to make it that way or was it just the way you guys did things? Do you have a warehouse full of useability testers or does it just come naturally to you guys? The first few users were friends of mine who weren't into technology at all, so from the start we needed to make it work for regular people. As we grow it's mostly just a matter of reminding ourselves of that, sitting down with them to see how they use the software, and anticipating their needs.
If something in the future interests you enough to make WordPress/Automattic part-time for you, so you can take on something else or contribute to another cause, what might it be? I'm really fascinated by micro-electronics, hardware, and the "internet of things" for lack of a better term. It's surreal to be approaching an age that resembles the sci-fi I loved as a child.
That said, I can't imagine not working full-time on WordPress/Automattic, I feel too strongly about our mission, impact, and potential.
What's your favorite beer? Link to imgur.com. Link to cloudup.com
I see a lot of desperate web development companies locally that try to stress that Wordpress is insecure and shouldn't be used. What would be the best thing to say to people like that to shut them up? Some of the largest and most important publishers in the world rely on WordPress. (Show them the showcase.) If WordPress was insecure we'd see it on the front page of nytimes.com, wired.com, and cnn.com. :)
Hi Matt, have you read Chris Lema's blog post. What is your response? I have. It's also funny because I think Gartner is about to come out with a "magic quadrant" that puts us in the crappy quadrant (low vision and ability to execute). Their leaders? Adobe, Sitecore, SDL, Oracle, HP, Opentext...
I completely agree with Chris on all the ways that enterprise currently works, and their concerns. (People assume because we choose to do things differently that we don't understand the other side.) But I'm not willing to compromise getting better software into the hands of users as quickly as possible, if that means Gartner thinks we're a visionless niche player so be it.
We've done long-term support branches before, it was a big development burden and almost no one used it or cared. There will be businesses that embrace keeping their technology moving at the speed the web does, and there will be those that go out of business and become irrelevant.
•Will you ever support multiple languages in the WordPress core? No plans for multiple languages in core, sorry.
•What do you think of new writing platforms like Quip and Editorially? Will the WordPress post editor ever have any of those 'team' features? I really dig the new writing platforms, I do think we'll get some of those team features if not in core than in Jetpack.
I heard a rumor Matt switched back to QWERTY. True? Not true, still typing Dvorak, though last year I was beat on speed for the first time by Helen Hou-Sandi, who types QWERTY. She's speedy, and if she switched to Dvorak she could probably win world champs. :)
Hey Matt, where do you think the future of the independent WordPress news community lies, with your recent purchase of WPTavern and the recent sale of WP Daily to WP Engine? Do you think there is a space for an impartial WordPress news website? *edited for correct spelling! I'm glad that new ones are being started as fast as old ones are shutting down. There is some really interesting stuff going on in the community and I think there's space for real journalism and strong commentary.
What one major thing would you like to see changed/fixed/updated in WordPress core? The fact it doesn't work well on mobile devices.
How do I convince my boyfriend, who wants me to keep his site in ASP.NET (he's a programmer, I'm a designecoder), to install WordPress? I'm not even allowed to use PHP! :( The best way I've found to convince people, even as the founder, is just showing examples. That's why we created the showcase: Link to wordpress.org
Find out which musicians, celebs, authors, etc he writes and see which of them are on WordPress and bring it up casually in conversation. (We have huge adoption from creative folks.)
Best BBQ of all time? I hope I haven't had it yet. :)
Are open source contributions a prerequisite to work at Automattic? No, but they get you to the top of the list when we're reviewing applications. (I know, I look at every incoming resume.)
Would you consider Automattic the "Redhat of WordPress"? Without a doubt. ;)
Do you think an app store for plugin and themes built with high quality standards and framework, could be a good solution for WordPress end users? The plugin directory is an app store where everything is free.
Would having paid stuff there make it better? I don't think so.
Why do you feel thats different for themes - premium themes are available via the themes directory. (I've never bought one of those so I don't know if the comparison is valid) Design is inherently valuable in its scarcity, functionality is valuable in ubiquity.
It's unlikely that we'll ever want to put a popular theme into core, but fairly likely it'll happen for a popular plugin.
Collaboration is more important for plugins than themes, and money from scarcity balkanizes development.
Did you ever feel like you couldn't continue with your project? Is there any advice you have for small business startups? Covered advice here -- Link to www.reddit.com
There have absolutely been times I felt like I couldn't continue, both with Automattic and WordPress. You have to take the lows with the highs and stick with what you believe in.
Hi Matt, I have been using WordPress for 10 years, make most of my living from it, and will always love it. Thank you for that! It is by far the easiest way I have found to build websites that my clients find easy to use. I see the reasons why WordPress does not use more modern coding practices and tools and appreciate the need for backward compatibility, but wonder if you ever see the code base moving forward to a time when developers can use the newest features of PHP, best coding practices (i.e. testing), and the great tools that are available these days, like Composer. Do you think there will ever be some kind of fork or offshoot of WordPress that functions as an application development framework, since so many developers are using it for that these days? Thanks :) I disagree with the premise -- WordPress does use modern coding practices. People assume that supporting say an older version of PHP or MySQL holds us back far, far more than it actually causes any trouble. Supporting older browsers is a way bigger deal.
Our biggest challenge is figuring out the user side of things, the front-end code. How things should work for a user rather than how they should work for a computer.
What does your average day look like and how do you manage so many different projects? I spend more time on Skype (text chat with colleagues) than I would care to admit. Between that and P2s ( Link to p2theme.com ) I can easily fill eight hours in a day. As the company has grown to over 180 people there is a huge amount of content and activity to keep up with.
Hey Matt, how many hours you work on an average day? It's hard to say because I don't really consider what I do work, the hours just melt away.
I find I'm most productive first thing in the morning when I wake up, usually around 7am but a bit later if it's a cloudy morning, and I generally run out of steam around 11:30pm that night.
Some days I'm traveling though I might only have 4-5 hours at a computer and can get a similar amount done.
I find I'm generally more creatively charged the following day if I'm able to unplug at night, which is one reason I like jazz festivals (I try to go to Montreal every year) because I can work during the day and check out shows at night.
Any chance of a comment-spam filter being built into core? Akismet is great but has a lot of hurdles for a new user (Activation of the plugin, Registration on Wordpress.com, Registration for API key) and most just don't do it, contributing to the problem. I agree with Viper007Bond -- anything we did in core like Cookies for Comments would become completely ineffective within a day. Those only stop dumb bots who have easier places to spam.
Link to markjaquith.wordpress.com
off, love you, your ethos, your company. If you figure it out, let me know. :)
My question: how do you plan to get "normal" people to update their blogs as often as they do their Twitter and Tumblrs? But seriously, I think it's all about removing friction (every second loading and extraneous click) and becoming part of people's habits, which is one of the reason I spent a fair amount of time on triggers and habits at the State of the Word this year.
any plans to launch a Premium paid version of Photon service with more features? Not on features, we'll make anything new there free to everybody, but might have a paid tier for top 1% of users by bandwidth/usage. But probably a few years from that, plenty of bandwidth and CPU here in the meantime, and it's just getting cheaper and faster.
Find a new boyfriend maybe? His judgement is clearly lacking. Ha!
Which features are available on other CMS that you would like to see in WordPress? I really like some of the drag and drop layout things folks like Squarespace and Weebly do. I think we have so much we can do to improve customization.
Hi Matt ! I know you've advocated for water causes in the past. Do you have plans for future charitable/philanthropic projects? Thanks for doing this. My big contribution this year has been to the Bay Lights project: Link to thebaylights.org
Haven't decided about next year yet...
What do you think about App websites/themes that seem to be using WordPress as the choice of CMS, do you think WordPress is a good platform for these types of sites? Scaling, Performance issues considering? Examples, Dating sites, Crowdfunding sites, Job board, etc. I think it's a great framework for anything content-driven. For things like messaging that don't map well to WP's data model, you can still do it just make some new tables, don't try to shoehorn it in the standard ones.
Which verticals will you be tackling next with WordPress.com? Please share your sensitive corporate information ;) Putting a hold on new verticals at the moment, going to try and go deeper on some of the existing ones first.
Hi Matt, now as most people know, you are very much a fan of open source and the GPL license. However, is there anything you do NOT like about open source? Also besides Wordpress (or its themes/plugins), are there any open source projects you like that aren't related to Wordpress or Automattic? I think the things that make open source incredibly collaborative and ultimately eat the world can also make design and big shifts difficult. WordPress has made some major shifts over its decade of life and grew as a result, but those pivots are harder to do the more successful we are because sometimes it means doing the opposite of what we did to become successful in the first place.
Automattic's been tweeting a bunch of new hires lately, and quite frankly doing a great job of making me jealous. Has the 90% of employees being remote ever caused real problems or friction? And how do Happiness Engineers work: do they help people out over the phone, or is it strictly a text over the Internet thing? Remote distributed working has been working great and we plan to continue it for the foreseeable future. HEs mostly work with email, but we're introducing a ton more live chat and phone work.
Say you retired your involvement from WordPress, what other projects stimulate your interest and challenge you? I think for many of us, all good things come to an end and considering your success of WordPress, what other projects (offline or online) would benefit from your involvement? I think I got this one here -- Link to www.reddit.com
Have any companies ever tried sueing you over silly software patents? Yes.
Hey Matt, you talked about profitability on TWiST. How do you plan on increasing revenue at Automattic? (I'm especially interested in how open source projects like Wordpress could lead to profitable companies) Edit: (changed "profit" to "revenue") I think it largely looks like the things we're doing today, just executed better and with a wider audience aware of them.
Hi Matt, besides traveling and photography, what are some of your other non-WordPress interests? Pretty tame: Music, especially jazz and hip-hop (J Cole, Childish Gambino, Kendrick Lamar, Weeknd). Wearable tech. Vinyl records. Food (trying to cut down on this). Reading.
With growing popularity Wordpress has, in the past few years, become increasingly prone to hack attempts, brute force attacks, etc. Is there anything being done to address security concerns? I think we're a lot more secure than we were a few years ago, to be honest.
Hey Matt, I watched the live stream of your State of the Word on the weekend and you talked about leading development of WordPress 3.8 and that it would be "experimental". What kind of features do you have in mind? New interface with MP6, new theme with 2014, and hopefully some work on the editor and widgets.
As someone who's making a living thanks to the WordPress, this might be the only occasion for me to say Thank you Matt. You've truly changed my life. Thank you. :) Hug a WP contributor next time you meet one, there are hundreds of people active every day that are even more crucial to WordPress than me.
This is my personal favorite. ;) Edit: Whoops, imgur mirror so we don't kill ipstenu's site. That is indeed amazing. :)
Contribute. Agreed!
Sup Matt, Hit me with some Akismet stats. We're blocking 40-50 million more spam every day than we were last year. The volume of spam has been growing unusually fast.
Hi Matt, what do you think about this 400,000 Euro Site - :D. Link to www.carlabrunisarkozy.org. Link to www.connexionfrance.com. WordPress is priceless, so 400k euros isn't a bad deal, but they could shop around for a better consultant. :)
Last updated: 2013-08-04 23:08 UTC
This post was generated by a robot! Send all complaints to epsy.
submitted by tabledresser to tabled [link] [comments]

Which Crypto Mining Software Do You Use? - YouTube Mega Bitcoin Mining Software 2019 HACK 1 BTC DAILY NO FEE 9 JANUARY 2020 Best 2018 Bitcoin Miner Free. Automatic Earning 0.25 BTC every day. Bitcoin Pool Great Bitcoin Miner Software  Instant Withdraw  No Mining Fee  Best Bitcoin Mining Software 2020 Noob's Guide To Bitcoin Mining - Super Easy & Simple - YouTube

To use the software, users need to register on the Bitcoin mining pool to make mining bitcoins on this software easier. We need your support so Novinite.com can keep delivering news and ... Announced in 2010, SlushPool was the very first Bitcoin mining pool and undoubtedly led the way for many other mining pools to come. Founded by SatoshiLabs current CEO Marek Palatinus (aka Slush), it’s based in the Czech Republic and follows a score-based system to discourage pool-hopping. This is a medium-large sized pool. SlushPool claims a 2% fee from every block solving reward. SlushPool ... Digital money that’s instant, private, and free from bank fees. Download our official wallet app and start using Bitcoin today. Read news, start mining, and buy BTC or BCH. You decide for how long or short of a time you would like to use this best bitcoin cloud mining software. They have a very low fee for their best bitcoin cloud mining service, making it easily accessible to all users. Consumers can choose from their two basic programs: SCYRPT Cloud Mining: 1 MH/s for $6.20; SHA-256 Cloud Mining: 10 GH/s for $1.20 Join a mining pool. To have a better chance of turning a profit, it’s recommended that you pool your resources with other miners in a mining pool. Compare a variety of pools before selecting one that’s well established and reputable. Download mining software. There are several programs available designed for Bitcoin mining. Some are command ...

[index] [18860] [39633] [5457] [27417] [23306] [21663] [34619] [20663] [935] [9298]

Which Crypto Mining Software Do You Use? - YouTube

Some Helpful Links: • Buy Parts for a Mining Rig: http://amzn.to/2jSSsCz • Download NiceHash Miner: https://www.nicehash.com/?p=nhmintro • Choose a Wallet: h... Bitcoin Pool Tin Tức 24h. Loading... Unsubscribe from Tin Tức 24h? ... Received 1,834.092 Bitcoins since launch 362 days ago. How do I start? Sign up providing your wallet address and Start ... SimpleMining.net OS - https://simplemining.net/ref?user=redpandamining Cudo Miner - https://www.cudominer.com/?a=_2sL6uk7q All In One Miner - https://aiomine... How To mining Bitcoin & Best Bitcoin Software For PC Fathuroziq Official. Loading... Unsubscribe from Fathuroziq Official? Cancel Unsubscribe. Working... Subscribe Subscribed Unsubscribe. Loading ... Once Bitcoin Miner Software is up and running, simply choose a mining pool (we recommend using Slush's pool, to receive the most Bitcoins), setup your login details and hit "Start Mining!" to ...

#