Monday, December 11, 2017

BLOCKCHAIN, BITCOIN, BIG BROTHER WILL WATCH AND CONTROL , PART 15 - CAPT AJIT VADAKAYIL




THIS POST IS CONTINUED FROM PART 14, BELOW--



http://ajitvadakayil.blogspot.in/2017/11/blockchain-proof-of-elapsed-time-intel.html



http://ajitvadakayil.blogspot.in/2017/11/blockchain-proof-of-elapsed-time-intel.html

SOMEONE ASKED ME

WHO IS THE MAFIA PUMPING UP THE VALUE OF BITCOIN--AND WHY?

WELL IT IS FOR SURVIVAL ( in this peabrained system ) AND IT IS AN INSIDE JOB !

SMALL TIME PRIVATE MINERS HAVE ALL MELTED AWAY , AS IT IS NO LONGER PROFITABLE --OR JOINED MAFIA MINING POOLS .

The current fiat price of Bitcoin is; critical for calculating profitability –read this line a hundred times .

Mining is NOT profitable at a small scale unless you have access to really cheap electricity ( or you are stealing electricity ).

PoW hashing ensures the proper function of the Bitcoin blockchain. Miners compete to solve a cryptographic “puzzle,” known as a hash.

There are no shortcuts in this process, which can only be solved with raw computational power.

By correctly hashing the current block, miners prove their investment of work and are rewarded with a certain number of newly-created bitcoins.

The number of newly-created bitcoins, awarded to whichever miner creates a block.

This number was initially set to 50, halved to 25 in late-2012, and halved again to 12.5 in mid-2016. The next halving event expected is around mid-2020.

This halving process will continue in this fashion, halving the block reward approximately every four years / 210,000 blocks, until all 21 million bitcoins are created.

Achieving the block reward is the only valid way in which new bitcoins can be created; by miners according to the code’s rate and limit.

Hashrate is the measure of a miner’s computational power.

The higher their relative power, the more solutions (and hence, block rewards) a miner is likely to find.

In early 2017, Bitcoin’s collective hashrate reached nearly 4 Exahash. This represents a tremendous investment into mining hardware, the R&D of such hardware, and electrical expenditure.

With hashrate shooting up over the years, it would seem blocks would be found by miners ever more rapidly.

Bitcoin’s Difficulty measure is what prevents this from happening. It adjusts to hashrate to ensure that blocks are found roughly every 10 minutes.

When total hashrate rises, the Difficulty of POW hashing adjusts upwards – and the inverse also applies.

Difficulty auto-adjusts every two weeks (or 2016 blocks).

Unless you command a tremendous hashrate, your odds of solving a block by yourself (i.e. “solo-mining”) are extremely low.

By banding together with other miners in a so-called pool, your combined odds of solving a block rise proportional to the pool’s total hashrate.

Whenever they solve blocks, pools reward individual miners according to their contributed hashrate (minus commissions and the like).

PRIVATE MINING WILL DIE UNLESS THE BITCOIN VALUE IS KEPT ARTIFICIALLY HIGH--AND THEN MAFIA POOLS WILL TAKE OVER.

There is this ever-changing nature of the Difficulty modifier and danger of low Bitcoin value—which reduces miners’ incentive.

The AntMiner S9 is a modern mining rig which offers a good hashrate for its power consumption.

Bitcoin’s total hashrate – and thus its difficulty, has been consistently rising since the early years

Some big, corporate KOSHER miners found their profit margins under threat from the resulting steep spike in competition. Indeed, in mid-2016, Swedish Bitcoin mining firm KnCMiner declared bankruptcy.

The primary reason for the closing was the upcoming reduction to just 12.5 bitcoins per block mined. Without a significant increase in Bitcoin price, and a high Swedish energy tax, the board of directors and the company’s investors decided to get the HELL out while it was still possible.

Imagine now--why HOME mining is literally dead-- with some APUN BHI MONER CUNTS in India still chugging along on SNAIL equipment --not knowing if they are coming or going

The rate of obsolescence in Bitcoin mining hardware is quite fast! New, more efficient mining hardware ( SUPER EXPENSIVE ) may be released at any time, although we are reaching the technological limits of improved efficiencies.

CONTINUED TO 2



  1. CONTINUED FROM 1-

    The average home miner has found it IMPOSSIBLE to rake in moolah to even recoup the cost of mining hardware and electricity.

    The situation may improve in future once ASIC mining hardware innovation reaches the point of diminishing returns.

    What, or who, adjusts the difficulty target of solving the cryptographic puzzle (every 2 weeks) to add the new block to the Bitcoin blockchain?

    The network does.

    Every two weeks (or 2016 blocks), the Bitcoin software does a calculation across all created blocks to see how long it took to create them. If the average block creation time is <10 difficulty="" if="" increased.="" is="" it="" minutes="" s="" the="">10 minutes, the difficulty is lowered.

    The reason this needs to be done is because the hashing power on the network is dynamic. New miners can come online and drop off as they please. In order to adjust for this variation, the network has to keep recalculating the optimal network difficulty through this process

    With the value of bitcoin soaring to new heights — more than US$ 17,000 ( two days ago ) — you may be tempted to invest in the latest equipment necessary AGAIN to begin “mining” for it. But while bitcoin mining echoes the Gold Rush of the 1850s, it may take a bit more than simply showing up, pan in hand.

    Mining bitcoin is how this cryptocurrency is released to the world. For you to mine bitcoin, you must attempt to complete a “block” containing recent bitcoin transactions. These transactions are recorded in a digital ledger called blockchain. Once a block is complete, a specified amount of bitcoin is given as a reward.

    Bitcoin miners across the globe race to solve a computational puzzle — called a “hash” — that will add the next block to the blockchain. Once the block is validated, a miner is issued a “block reward.”

    A block reward is an amount of bitcoin given to the person who adds a new block to the blockchain. This amount is cut in half every time 210,000 blocks are solved. In 2009, the block reward began at 50 bitcoin per block. That value was halved to 25 in 2013 and was further reduced to 12.5 in 2017.

    Once miners receive bitcoin, they are given a digital key to the bitcoin addresses. You can use this digital key to access and validate or approve transactions.

    You can keep these digital keys safe with a number of wallet options:

    Desktop wallets. Software like Bitcoin Core allows you to send and store bitcoin addresses and also connects to the network to track transactions.

    Online wallets. Bitcoin keys are stored online by exchange platforms like Coinbase or BTC Market and can be accessed from anywhere.
    Mobile wallets. Apps like Blockchain store and encrypt your bitcoin keys so that you can make payments using your mobile device.

    Paper wallets. Some websites offer paper wallet services, generating a piece of paper with two QR codes on it. One code is the public address at which you receive bitcoin and the other is your private address you can use for spending.

    Hardware wallets. You can use a USB devices created specifically to store bitcoin electronically and your private address keys.

    Yes, people will be willing to make money mining bitcoin ( only if the vaue is pumped high artificially ) . The wildly fluctuating BUBBLE has made large nations wary--and this does not augur well for Bitcoin driven Blockchain.

    With the value of 1 bitcoin rising to over US$ 17000, a block reward of 12.5 bitcoin is a lot of money. When mining first began, there was less competition, and to complete a block required a lot less power. Mining could be done using CPUs found on standard desktop computers.

    Making money mining bitcoin is much more difficult today. Some of the issues contributing to this difficulty include:


    CONTINUED TO 3-

  2. CONTINUED FROM 2--

    Hardware prices. The days of mining using a standard CPU or graphic card are gone. As more people have begun mining, the difficulty of solving the puzzles has too increased. ASIC microchips were developed to process the computations faster and have become necessary to succeed at mining today. These chips can cost US$3,000 or more and are guaranteed to further increase in cost with each improvement and update.

    Rise in corporate miners. Hobby miners must now compete with for-profits — and their bigger, better machines — when mining to make a buck.

    Power costs. Running mining equipment all day long can consume a lot of electricity, which you’ll need to weigh up against any mining profits generated.

    Puzzle difficulty. Bitcoin’s protocol adjusts the computational difficulty of the puzzles to finish a block every 2,016 blocks. The more computational power put toward mining, the more difficult the puzzle.

    It came to a stage where only HUGE KOSHER POOLS were making money.These collectives pool the resources of its members and then divide the block reward according to shares. The pool gives these shares to members who can prove how their mining equipment contributed to completing the block-- a mafia controls this

    The mining pool is an arena that will help the Bitcoin miners to share cost the price of a platform. They unite as a team, and once they make money, they have a predetermined KOSHER way of sharing it.

    Pooled mining is a mining approach where multiple generating clients contribute to the generation of a block, and then split the block reward according the contributed processing power. Pooled mining effectively reduces the granularity of the block generation reward, spreading it out more smoothly over time.

    With increasing generation difficulty, mining with lower-performance devices can take a very long time before block generation, on average. For example, with a mining speed of 1000 Khps, at a difficulty of 14484 (which was in effect at the end of December, 2010), the average time to generate a block is almost 2 years.

    To provide a more smooth incentive to lower-performance miners, several pooled miners, using different approaches, have been created. With a mining pool, a lot of different people contribute to generating a block, and the reward is then split among them according to their processing contribution. This way, instead of waiting for years to generate some measly coins ( like Oliver Twist waiting for his gruel ) , a smaller miner may get a fraction of a Bitcoin on a more regular basis.

    A share is awarded by the mining pool to the clients who present a valid proof of work of the same type as the proof of work that is used for creating blocks, but of lesser difficulty, so that it requires less time on average to generate.

    The problem with pooled mining is that steps must be taken to prevent cheating by the clients and the server.

    Many people read about mining pools and think it is just a group that pays out free bitcoins. This is not true! Mining pools are for people who have mining hardware to split profits.

    Many people get mining pools confused with cloud mining. Cloud mining is where you pay a service provider to miner for you and you get the rewards.

    Bitcoin mining tends to gravitate towards countries with cheap electricity.

    As Bitcoin mining is somewhat centralized, a dozen mining companies have claimed the vast majority of network hash power.

    With many of these companies in the same country, only a number of countries mine and export a significant amount of bitcoins.

    China mines the most bitcoins and therefore ends up “exporting” the most bitcoins.

    CONTINUED TO 4--

  3. CONTINUED FROM 3--

    One of the big selling points of Bitcoin is that it's meant to be decentralised but it doesn't look like this plays out. Proof of work seems to inevitably lead to all the power going to MAFIA parties that can afford specialised hardware who are in countries with low electricity costs.

    In order to successfully 51% attack Bitcoin network, all that's needed is a combined hashrate higher than the genuine hashrate.

    When Bitcoin driven Blockchain was born--nobody had the BRAINS to figure out its inherent weakness --that the system is susceptibileto fraud if a group of nefarious KOSHER miners control a significant portion of compute power on chain, because verification is based on consensus. Jews getting rich without working has been the story of this planet , right ?

    Bitcoin uses SHA-256 for encryption. If this algorthim is cracked ( by an INSIDE JOB ) then bitcoin is doomed.

    SHA-256 and ECDSA are considered very strong currently, but they WILL be broken in the near future. If that happens, Bitcoin MUST shift to a stronger algorithm.

    An attacker that controls 51% of the network's computing power can, for the time that he is in control, exclude and modify the ordering of transactions. This allows him to:-----
    Reverse transactions that he sends while he's in control. This has the potential to double-spend transactions that previously had already been seen in the block chain.
    Prevent some or all transactions from gaining any confirmations
    Prevent some or all other miners from mining any valid blocks

    The attacker can't:-----
    Reverse other people's transactions without their cooperation
    Prevent transactions from being sent at all (they'll show as 0/unconfirmed)
    Change the number of coins generated per block
    Create coins out of thin air
    Send coins that never belonged to him

    Note that the above limitations only apply to the perspective of Bitcoin as seen by full nodes. Some lightweight nodes work by trusting miners absolutely; from the perspective of Bitcoin as seen by lightweight nodes, miners can steal BTC, etc. This is one of the reasons why lightweight nodes are less secure than full nodes.

    With less than 50%, the same kind of attacks are possible, but with less than 100% rate of success. For example, someone with only 40% of the network computing power can overcome a 6-deep confirmed transaction with a 50% success rate

    It's much more difficult to change historical blocks, and it becomes exponentially more difficult the further back you go. As above, changing historical blocks only allows you to exclude and change the ordering of transactions. If miners rewrite historical blocks too far back, then full nodes with pruning enabled will be unable to continue, and will shut down; the network situation would then probably need to be untangled manually (eg. by updating the software to reject this chain even though it is longer).

    Since this attack doesn't permit all that much power over the network, it is expected that rational miners will not attempt it( OH YEAH ? ).

    A profit-seeking miner should always gain more by just following the rules, and even someone trying to destroy the system might find other attacks more attractive. Probably the most likely scenario where this attack would be employed would be for a government to try to get control over Bitcoin by acquiring a majority of hashing power (either directly or by enforcing rules on private miners within its borders). Then this government could use the transaction-censorship power listed above to do things like:---

    CONTINUED TO 5-

  4. CONTINUED FROM 4--

    Prevent any transactions spending "stolen" coins, effectively destroying those coins. If the coins clearly are stolen, then there is a risk that this action will be accepted by the Bitcoin community, but this would set a very damaging precedent. If it becomes possible for coins to be blacklisted in this way, then it is a slippery slope toward blacklisting of other "suspicious" coins.

    Prevent all transactions from unknown people, so everyone has to register with the government in order to transact.

    The appropriate response to any long-term attack by miners is a hardfork to change the proof-of-work function. This fires all existing miners, and allows totally new ones to replace them.

    It is illegal in some countries to possess/distribute certain kinds of data. Since arbitrary data can be included in Bitcoin transactions, and full Bitcoin nodes must normally have a copy of all unspent transactions, this could cause legal problems. However, Local node policy generally doesn't permit arbitrary data (transactions attempting to embed data re non-standard), but steganographic embedding can still be used though this generally limits storage to small amounts.

    Bitcoin was officially released by an unknown person who used a Japanese pseduonym, 5 days before Obama was elected. This person does not exist.

    Secondly, bitcoin mining is designed to solve hashes in the SHA-256 algorithm. SHA-256 is a 256-bit version of an algorithm that is used to encrypt messages sent over the internet.


    The NSA invented SHA-256.

    SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA). Cryptographic hash functions are mathematical operations run on digital data; by comparing the computed "hash" (the output from execution of the algorithm) to a known and expected hash value, a person can determine the data's integrity.

    For example, computing the hash of a downloaded file and comparing the result to a previously published hash result can show whether the download has been modified or tampered with. A key aspect of cryptographic hash functions is their collision resistance: nobody should be able to find two different input values that result in the same hash output.

    As people's computers mine bitcoins, they are discovering solutions to SHA-256 hashes, which then get stored in to the blockchain, which is a digital record and repository of all activity within bitcoin to date.

    Each block is like one SHA-256 puzzle, that the computers try to solve. The only way to solve it is to guess the right answer randomly out of billions or trillions of choices. There is no algorithm or method to find the right solution other than guessing and then doing the computation to see if you were correct or not, due to how the algorithm is constructed (which is exactly what makes it good for security). So when computers mine for bitcoins, they are guessing solutions to that particular block's SHA-256 puzzle. When a solution is found, 12.5 bitcoins are rewarded to the miner who found the solution.

    So it's a lottery of sorts. This is why people pool together to form mining pools, where the winnings are shared proportionally among everyone, weighted by their total number of attempted solutions. That helps take the luck out of it so everyone can get more reliable income.

    Anyway, these solutions are so hard to find that even with all the computers across the world mining for bitcoins, it still takes 10 minutes to solve just one single puzzle.

    This is why it's CONSIDERED secure.

    CONTINUED TO 6--



    1. CONTINUED FROM 5--


      If you want to hack a system that uses SHA-256 (which is a very encryption common system to use, alongside SHA-128 which is even weaker) then hacking it CONSIDERED difficult because you have to guess over and over to solve this large prime number problem.

      However, if you have a list of all the prime numbers and their solutions (including many really huge numbers that haven't been computed except for this list) then that is a speedup to cracking a particular system using SHA-256, because you don't have to run all those calculations, you can simply look them up. In the blockchain.

      So there is a potential the blockchain is an open distributed-computing SHA-256 solution repository, which enables hackers who know how to use it (like the NSA).

      IN INDIA WE DO NOT RELY OF IMPORTED CHIPS ANYMORE BECAUSE THEY HAVE BACKDOORS IMPLANTED --MISSILES WILL NOT REACH THEIR TARGETS IN WAR.

      NSA can spy on us - and hack or bypass SSL, SSH, PGP, etc-- we can expect NSA to PLANT weaknesses into systems.

      The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence. The NSA is responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems.

      The NSA relies on a variety of measures to accomplish its mission, the majority of which are CLANDESTINE.

      BILDERBERG CLUB LOVES BITCOIN DRIVEN BLOCKCHAIN!

      THEY LOVE MODI AND JAITLEY TOO.

      HUMARA KOSHER BANANA KITHE ?

      SCRATCH SCRATCH !

      SO SO SO

      THE PRESIDENT CAN BE IMPEACHED IF 51% OF THE MEDIA SAYS HE DESERVED TO BE IMPEACHED 

      WE THE STUPID PEOPLE THINK THAT THERE MUST BE ONE LAKH INDEPENDENT AND FREE MEDIA OUTFITS

      WHAT IS THE NAKED TRUTH ?

      JEW ROTHSCHILD OWNS 90% OF THE WORLD MEDIA

      51%
       IS BAAYE HAATH KA KHEL FOR HIM!


      BRAAAAYYYYYYYYYYYY !

      LET US ALL DANCE TO THE SONG BELOW--

      https://www.youtube.com/watch?v=wnZXyJujNU4

      Capt ajit vadakayil
      ..

















  • So there is a potential the blockchain is an open distributed-computing SHA-256 solution repository, which enables hackers who know how to use it (like the NSA).

    This, in block chain, is the last thing a rutta maar mind would think, first doubt that comes to the intuitive.

  • hi tc,

    CAPT AJIT VADAKAYIL DECLARES-- NSA IS SATOSHI NAKAMOTO

    Satoshi Nakamoto means “Central Intelligence” in Japanese --Satoshi is "quick witted " --Nakamoro is "Central " --people with this surname are found mostly in the Ryukyu islands

    Bitcoin IS the ‘one world currency’ of KOSHER BIG BROTHER .

    BIG BROTHER CAN MONITOR AND MANIPULATE EVERYTHING ON THIS PLANET.. HE HAS EVERYTHING ENGRAVED ON STONE EXCEPT WHEN HE WANTS STONE TO BECOME SOFT LIKE BUTTER--AT HIS CONVENIENCE

    In the bitcoin website they say in BIG letters - “Bitcoin is not anonymous”

    THE WHITE MAN WILL NEVER ALLOW THE BROWN MAN TO LORD OVER HIM.. INDIA WILL BE THIS PLANETs NO 1 SUPERPOER IN 16 YEARS.

    WE KNOW THE DESH DROHI BASTARDS WHO WANT LAND / DEFENCE/ FINANCE TO BE INTEGRATED INTO BLOCKCHAIN

    WE KNOW THE WHITE JEWS WHO WERE PUSHING CORRUPT / NAIVE INDIAN POLITICIANS TO EARLY ADOPTION OF BLOCKCHAIN FOR FINANCE AFTER MERGING ALL SMALL EFFICIENT INDIAN BANKS INTO A INEFFICIENT BEHEMOTH TO BE BLOCKCHAINED

    ALMOST ALL OUR PAST RBI GOVERNORS WERE HANDPICKED BY JEW ROTHSCHILD AND BILDERBERG INNER CLUB

    http://ajitvadakayil.blogspot.in/2011/09/shrewd-club-within-naive-bilderberg.html


    THE WHITE MAN CAN DO HONI OUT OF ANHONI AND ANHONI OUT OF HONI -IF WE DO THIS

    Bitcoin was officially released by an unknown person who used a Japanese pseduonym, Satoshi Nakamoto, 5 days before Obama was elected.

    This person does not exist. The person alluded to, said several times that he did not found Bitcoin.

    Meanwhile several white con-men have claimed to be Satoshi Nakamoto.

    Craig Steven Wright an Australian computer scientist and businessman claimed be the real person behind the pseudonym Satoshi Nakamoto, which is bullshit.

    Bitcoin mining is designed to solve hashes in the SHA-256 algorithm. SHA-256 is a 256-bit version of an algorithm that is used to encrypt messages sent over the internet. The NSA invented SHA-256.

    SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA).

    Cryptographic hash functions are mathematical operations run on digital data; by comparing the computed "hash" (the output from execution of the algorithm) to a known and expected hash value, a person can determine the data's integrity. ( but with the BACKSIDE OPEN to make ANHONI OUT OF HONI and viceversa )

    As people's computers mine bitcoins, they are discovering solutions to SHA-256 hashes, which then get stored in to the blockchain, which is a digital record and repository of all activity within bitcoin to date.

    Each block is like one SHA-256 puzzle, that the computers try to solve.

    When computers mine for bitcoins, they are guessing solutions to that particular block's SHA-256 puzzle. When a solution is found, 12.50 bitcoins are rewarded to the miner who found the solution. So it's a lottery of sorts

    BUT LOTTERIES ARE RIGGED BY INSIDERS WHO KNOW HOW THIS WORKS --this is why everything is kept deliberately complicated.

    Miners pool together to form mining pools, where the winnings are shared proportionally among everyone, weighted by their total number of attempted solutions. That helps take the luck out of it so everyone can get more reliable income.

    If you have a list of all the prime numbers and their solutions then that is a speedup to cracking a particular system using SHA-256, because you don't have to run all those calculations, you can simply look them up. In the blockchain.

    The blockchain is an open distributed-computing SHA-256 solution repository, which enables hackers who know how to use it (like the NSA).

    NSA has a backdoor to the SHA-256 algorithm

    NSA HAS A BAD TRACK RECORD

    CONTINUED TO 2-

  • CONTINUED FROM 1-

    All Bitcoin transactions are stored publicly and permanently on the network, which means anyone can see the balance and transactions of any Bitcoin address. However, the identity of the user behind an address remains unknown until information is revealed during a purchase or in other circumstances. This is one reason why Bitcoin addresses should only be used once.

    The Fiat money system is doomed, all what you can read online is true (just sensationalized) – it’s a debt based system based on nothing. That system was created, originally in the early 1900’s and refined during Breton Woods

    JEW Adam Smith is the hero of Amartya Sen's Rothschild JEWESS wife.

    Adam Smith was the "one man think tank" to the owner of British East India Company Rothschild who ruled India . Adam Smith advises Rothschild on how to set up his banking cartel and set up a blue print on how to control the world.

    PM Chandrasekhar was reduced to selling our Gold in 1991, and World Bank and IMF would NOT give a loan unless Manmohan Paaji was made Finance Minister. And later Italian Queen Bee Sonia would NOT have anyone else except "unelected" Manmohan Paaji as PM-- going against the Indian Constitution for a democracy.

    Rothschild had done the same with SIR Chintaman Dwarakanath Deshmukh ( won Magsaysay award twice ) who was knighted in 1944 just because he had a Jew British wife.

    Rothschild would NOT give India a loan to procure wheat from USA unless our JEW SIR Chintamani baby was made Finance Minister of India.

    Rothschild used Edwina to arm twist Nehru and install him as the Finance Minister in the Union Cabinet (1950–1956).

    SIR Chintaman Dwarakanath Deshmukh attended the Breton Woods Conference to create IMF on invitation of Rothschild in July 1944 . ) Rothschild liked this Chitpavan JEW and he was a member of the Board of Governors of both of IMF for the next ten years


    Rothschilds controls the US Federal reserve, all the Central banks of all the countries of the world --except Libya, Syria, Iran, North Korea and Cuba. Libya has been taken out. The next in the pecking order is Syria ( failed thanks to IRON MAN Putin ) --then Iran.

    Opium traders Rothschild took over India officially vide the Battle of Plassey in 1757 , and stopped all pretense of being traders, by amazing deceit which sprung from the warped brains of GAY ANAL SEX RECEIVING JEW Adam Smith..

    Adam Smith was MAD --he has extreme OCD - his house used to look like a garbage dump as he hoarded everything.

    When such people with OCD write the gospel of economics, " The Wealth Of Nations" you know what you will get.

    Much later Milton Friedman effectively took many of the basic principles set forth by Adam Smith and the classical economists and modernized them.

    http://ajitvadakayil.blogspot.in/2016/06/gpi-dog-shall-wag-gdp-tail-not-vice.html


    INDIA HAS TO SACK 90% OF OUR PREMIUM BUSINESS SCHOOL ECONOMICS PROFESSORS

    RIGHT NOW DONALD TRUMP IS CROWING ABOUT RISE OF GDP AND GROWTH-- THIS INCLUDES EXPENSES FOR PUTTING OUT FOREST FIRES, RECOVERING AFTER TWO MAJOR HURRICANES, MONEY SPENT IN PURSUING CRIMINALS AND CONTAINING THEM IN JAILS, BUILDING THE MEXICO WALL ETC

    This is the reason why economists fall into the same hole again and again and again.

    http://ajitvadakayil.blogspot.in/2011/02/are-you-mentally-sick-capt-ajit.html

    The Battle of Plassey itself is a huge lie. It never took place. History was fudged. It is so easy when you control the peer reviewed media and publishing houses.

    http://ajitvadakayil.blogspot.in/2011/07/back-swing-of-john-galt-capt-ajit.html

    Bitcoin is not the ‘one world currency’ per se, but laying the framework for larger cryptocurrency projects. In the case of central banks, who control the global monetary system, that would manifest in ‘Settlement Coin’

    CONTINUED TO 3-

  • CONTINUED FROM 2--

    NSA/CIA works for KOSHER BIG BROTHER .. it was kept under wraps till Trump told he will DRAIN THE SWAMP and take on ROTHSCHILDs SHADOW GOVT RUNNING USA AND CONTROLLING EVERYTHING --like Mannargudi Mafia in Tamil Nadu

    BITCOIN IS THE BRAINCHILD OF BILDERBERG INNER KOSHER CLUB

    EURO WAS CREATED BY THE SAME KOSHER CLUB

    The FX markets currently represent the exchange between ‘major’ and ‘minor’ currencies. In the future, why not too they will include ‘cryptocurrencies’ – we’re already seeing the BTC/EUR pair popup on obscure brokers.

    When BTC/USD and BTC/EUR are available at major FX banks and brokers, we can say – from a global FX ( forex ) perspective, that Bitcoin has ‘arrived.’

    Unlike the Euro, Bitcoin is being adopted at a near exponential rate by demand

    WE KNOW WHY ROTHSCHILDs APCO BRANDED MODI IS QUIET ABOUT BITCOIN --E SPOKE ABOUT IT A COUPE OF TIMES --PRAISING IT--IT IS ON YOUTUBE

    So why Elite E Services is not actively involved in Bitcoin the answer is that previously, you can’t trade Bitcoin. They have been trying hard to declare it as a COMMODITY --like Pakistanis

    When we can trade BTC/USD just like EUR/USD you can bet your cotton pickin' ass , that EES ( Engineering Equation Solvers ) and a host of other algorithmic FX traders will be all over it!

    The NSA ( controlled by KOSHER FED ) has the capability, the motive, and the operational capacity – they have teams of cryptographers, the biggest fastest supercomputers in the world

    NSA employs the best mathematicians and cryptographers in the world-on a NEED TO KNOW basis -making whistle blowing by NON-KOSHER and non-white difficult.

    NSA was one of the first organizations to describe a Bitcoin-like system--12 years before Satoshii Nakamoto did.

    The NSA white paper alternatively refers to the currency outlined as “coins” and “tokens.”-- a precursor to beloved Bitcoin, which utilized SHA-256

    ONLY NSA HAS THE MOTIVATION TO DELARE THAT BLOCKCHAIN DATA IS ENGRAVES ON ROCK WHEN IT IS ONLY ENGRAVED ON BETTER TO BE MELTED AND ENGRAVED WITH FAKE DATA

    WE ASK MODI , JAITEY, RBI GOVERNOR-- ARE YOU REALLY BABES IN THE WOODS AS YOU PRETEND ? DO YOU NEED A BLOGGER TO SPELL THIS OUT ?

    IS OUR BANAMI MEDIA A POOL OF TRAITORS --OR ARE THEY REALLY NAIVE TO DEAL ONLY IN POTHOLES, NON-EXISTENT MOLESTATIONS ( LIKE GOD DIGGIN' ZAIRA WAHID / VARNIKA KUNDU ), CRICKET , BOLLYWOOD ETC ?

    BOTTOM LINE: NSA IS TIED TO SHA -256 HASH FUNCTION -- ARE WE TO ASSUME THAT NSA IS "ALICE IN WONDERLAND"-AND THEY DONT KNOW HOW TO CREATE A BACKDOOR TO DO EXTREME HERA PHERI AND FORGE TRANSACTION AND ITS TIME ?

    SREESHANT WAS FIXED BY "TIME" HIJACKING --TO PROTECT BIG FISH IPL OWNERS

    http://ajitvadakayil.blogspot.in/2013/06/travesty-of-justice-sreesanth-and.html

    ALL INTERNATIONAL ARBITRATION COURTS ARE KANGAROO COURTS CONTROLLED BY KOSHER BIG BROTHER


    HULLO MODI / RBI GOVERNOR/ JAITEY LISTEN UP -- Certainly, anonymity is one of the biggest myths about Bitcoin. In fact, there has never been a more easily traceable method of payment. Every single transaction is recorded and retained permanently in the public “blockchain”.

    The idea that the NSA would create an anarchic, peer-to-peer crypto-currency in the hope that it would be adopted for nefarious industries and become easy to track would have been a lot more difficult to believe before the recent leaks by Edward Snowden and the revelation that billions of phone calls had been intercepted by the US security services.

    We are now in a world where we now know that the NSA was tracking the pornography habits of Islamic “radicalisers” in order to discredit them and making deals with some of the world’s largest internet firms to insert backdoors into their systems.

    ASK PUTIN --THE KGB MAN--HE KNOWS WHAT NSA IS UPTO WITH BITCOIN AND BLOCKCHAIN


    CONTINUED TO 5--

  • CONTINUED FROM 3--

    MP Andrei Svintsov, demanded that bitcoin and digital currencies should be banned as part of a broader effort to stop capital flight. President XI knows flight of capital from China--and he is controlling it.

    ONY MODI IS LOST LIKE "LITTLE BO PEEP "--HIS MANN KE BAATH IS ALL ABOUT PRAYING TO GANDHI AND BR AMBEDKAR --NOTHING USEFUL EVER COMES OUT OF THIS RIDICULOUS TALK--OR MODIs TWITTER TALK--IT IS ALL ON RECORD

    Svintsov told Russian broadcast news agency REGNUM:-"All these cryptocurrencies [were] created by US intelligence agencies just to finance terrorism and revolutions.”

    WHY IS THE VALUE OF BITCOIN DIFFERENT IN ZIMBABWE? TODAY BITCOIN VALUE IN ZIMBABWE IS 27900 USD WHILE THE REST OF THE PLANET IS 15800 USD.

    I HAD PREDICTED TO MY WIFE THAT ZIMBABWE WILL HAVE A COUP SOON, KNOWING HOW BITCOIN VALE WAS SPIKING THERE

    Because of pesky ‘domestic’ laws, the NSA doesn’t control the internet in foreign countries. But by providing a ‘cool’ currency as a tool, they can collect information from around the globe and like Facebook, users provide this information voluntarily.

    It’s the same strategy they use like putting the listening device in the chips at the manufacturing level, which saves them the trouble of wiretapping, electronic eavesdropping, and other risky methods that can fail or be blocked.

    It’s impossible to stop a cellphone from listening to you, for example (well not 100%, but you have to physically rewire the device). Bitcoin is the same strategy on a financial level – by using Bitcoin you’re giving up your private transactional information.

    By itself, it would not identify you per se (as the blockchain is ‘anonymous’ but the transactions are there in the public register, so combined with other information, which the NSA has a LOT OF – they can triangulate their information more precisely.

    Bitcoin allowed NSA to collect a host of criminals on a network called “Silk Road” and who knows what other operations that happened behind the scenes.

    Silk Road was an online black market and the first modern darknet market, best known as a platform for selling illegal drugs. As part of the dark web, it was operated as a Tor hidden service, such that online users were able to browse it anonymously and securely without potential traffic monitoring. The website was launched in February 2011

    WHEN YOU DONT WANT MOHAMMAD TO GO TO THE MOUNTAIN --HAVE THE MOUNTAIN COME TO MOHAMMAD

    I HAVE USED THIS METHOD --AT SEA-LIKE IN THE MOVIE BELOW--SET MYSELF AS THE BAIT

    http://ajitvadakayil.blogspot.in/2014/10/the-quick-and-dead-hollywood-movie.html

    capt ajit vadakayil
    ..




  • http://ajitvadakayil.blogspot.in/2017/12/blockchain-bitcoin-big-brother-will.html

    WHEN ARE WE JUMPING OFF THE DEEP END INTO BLOCKCHAIN ULU ( OR IS IT UDU ?)

    ANYBODY HEARD OF SHA-256 AND NSA ?

    KAUN SA KHET KA BEET ROOT HAI YEH ?

    WHAT ARE INDIAs THINK TANKS WORTH?

    I HAVE STOPPED BLOGGING--YET I HAVE TO RESUME BLOGGING TO SAVE THE WATAN?

    ARE OUR THINK TANKS MANNED BY DESH DROHIS -- OR ARE THEY GULLIBLE AND NAIVE ?

    ##################

    SEND THIS COMMENT TO --
    AJIT DOVAL
    DEFENCE MINISTER
    ALL 3 ARMED FORCE CHIEFS
    TELUGULAND CMs ( BOTH OF THEM )
    ARUN JAITLEY
    RBI GOVERNOR
    SBI CHAIRMAN
    CJI
    LAW MINISTER
    PMO
    PM MODI
    SWAMY
    GURUMURTHY
    SMRITI IRANI ( LET HER THINK IT IS A NEW SONG TO DANCE TO -LEST SHE SAY, IT IS NOT MY JOB AS USUAL )
    SUSHMA SWARAJ
    EDUCATION MINISTER
    SUSHMA SWARAJ
    I&B MINISTRY
    HOME MINISTER
    YOGI ADITYANATH
    FAYE SORPOTEL BABY --THERE IS MORE TO JOURNALISM THAN POTHOLES AND VVIP RACISM

    I ASK --WHAT IS OUR BENAMI MEDIA WORTH?

    I ASK MY READERS TO SEND THIS TO DESH BHAKTS WHO HAVE BRAINS

    capt ajit vadakayil
    ..




    I ASK MY READERS TO SEND THIS MESSAGE TO SMRITI IRANI AND I&B MINISTRY SEARATELY---

    #################

    MADAMA SMRITI,

    EVERY TIME "WE THE PEOPLE" SENT YOU OR YOUR MINISTRY A PETITION-- WE GET THE SAME STOCK ANSWER

    "THIS IS NOT OUR JOB"

    WE ARE APPALLED THAT THE I&B MINISTRY DOES NOT KNOW THEIR JOB PORTFOLIO

    WHAT IS YOUR JOB -- CAPT AJIT VADAKYIL WHO WAS A SHIP CAPTAIN FOR 30 YEARS , KNOWS THE MEANING OF "PIC OF COMMS "


    MADAME SMRITI   " WE WERE APPALLED WHEN YOU CHOSE TO CALL UP DESH BHAKT GEN BAKSHI "LIVE" ON A TV DEBATE -TO PATRONISE HIM .. THIS CAUSED THE BRAVE GENERAL TO CRY..
    WHY DID YOU DO THIS SMRITI IRANI ? -- WHY DID YOU PREFER THE BOLLYWOOD MELODRAMA ROUTE WHEN IT CAME TO AN OLD GENERAL ? ONLY AN IMMATURE WOMAN CAN DO THIS-   ANYWHERE ON THIS PLANET

    THIS WILL GO AGAINST YOU--NO MATTER WHAT REPARATIONS YOU MAKE IN FUTURE . 

    I AM ENCLOSING A LINK FROM MY LATEST BLOGPOST BELOW

    http://ajitvadakayil.blogspot.in/2017/12/blockchain-bitcoin-big-brother-will.html

    IF YOU CAN UNDERSTAND IT—READ IT ( OR GET EXPERT ADVISE ) AND REACT ON IT ..

    WE ASK YOU “ARE YOU AWARE THAT VINEET JAINs TIMES OF INDIA HAS BECOME A PORN NEWSPAPER UNFIT FOR SCHOOL GIRLS TO READ ?”

    IS ABOVE PART OF YOUR JOB ? DOES YALE ENDORSED “LEADERSHIP CAPABILITY” ALLOW YOU TO INCLUDE THIS IN YOUR JOB PORTFOLIO ”

    CAPT AJIT VADAKAYIL RETIRED 6 YEARS EARLY FROM A HIGH PAYING JOB — SO THAT HE CAN BE PART OF NATION BUILDING.. 

    WE WATCH!

    PUT THIS COMMENT IN WEBSITES OF GEN BAKSHI, ARMED FORCE CHIEFS ( ALL 3 ), DEFENCE MINISTER, PMO, PM MODI, SWAMI, GURUMURTHY, AJIT DOVAL, LAW MINISTER, CJI, HOME MINISTER , YOGI ADITYANATH, EDUCATION MINISTER, FINANCE MINISTER, SUSHMA SWARAJ AND WEBSITES OF ALL DESH BHAKTS.. 

    SPREAD ON SOCIAL MEDIA..

    Capt ajit vadakayil
    ..



    YEH BACKDOOR CHEEZ  KYA HAI  BHAIYYA ?


    YEH  “ILU ILU”  JAISA MAAL HAI KYA ?



    India must take Putin's help and build our own CHIPS .  Our nuclear submarines must have our own chips.   A submarine which can be POLLED and cannot hide is as good as dead in a war.

    IN MODERN WARS ONLY AN IDIOT WILL TRY TO KNOCK PUNCH OUT AN INCOMING MISSILE IN THE AIR

    WE SAW SAUDIS USING AMERICAN PATRIOT MISSILES TO BLOCK YEMENI MISSILES AND FALLING PHUTT ON THEIR FACES

    On November 5, Yemeni forces launched a Borkan-2 (Volcano-2) missile against King Khalid International Airport, located 35 kilometers north of the Saudi capital Riyadh— and it could NOT be intercepted .

    On 7th April 2017, we saw Russia knock out more 36 of the 59 Tomahawk cruise missile—IN THE AIR--  sent from 2 US warships to knock out Shayrat airbase in Syria

    MODERN MISSILES MUST BE WITH WW3 IN MIND.

    INDIA WILL BE PULLED DOWN BY THE JEALOUS ZIONIST LED WESTERN NATIONS AS THE WHITE JEW / CHRISTIAN WILL NEVER SUBMIT TO BLACK HINDU RULE.

    ALL IT REQUIRES IS A KILL CHIP --

    THE MISSILE WILL WORK IN TESTS AND FIELD TRIALS .

    IN A REAL WAR THE MISSILE WILL NEVER EVER HIT ITS TARGET - FOR THE KILL CHIP WILL BE ACTIVATED..

    THIS KILL CHIP IS NO BIG TECHNOLOGY --

    IT IS BASIC TECHNOLOGY WHICH EVERY UNDER GRADUATE ELECTRONIC STUDENTS CAN ACHIEVE.

    WHY DID THE INDIAN MAIN STREAM MEDIA PRAISE MODI WHEN HE SIGNED THE DEAL FOR 36 RAFALE FIGHTER JETS FROM JEW RUN DSSAULT — WHEN THEY HAVE NEVER EVER PRAISED HIM BEFORE?

    Zionists will use Pakistan to pull down India.

    As soon as Modi came to power he QUIETLY cleared the Israeli Barak Missile deal-using two in one Arun Jaitley ( defence / finance minister ) . We all knew this would happen .

    When India has a FULL BLOWN WAR with Pakistan which will be triggered by a Zionist FALSE FLAG ATTACK on Pakistan’s nuclear facilities – the ENTIRE Arab oil/gas rich desert kingdoms will give their military hardware QUIETLY with Zionist support to Pakistan -like fighter jets/ missiles/ submarines etc.

    In this scenario India can never hope to have MORE fighter jets or missiles than Pakistan .

    Note: Pakistanis guard the Wahabi Ibn Saud bloodline palace in Saudi Arabia -Pakistani / Egyptian pilots operate the fighter jets of the place guard.

    All oil rich desert crypto kings do NOT trust their own people's army and they have Rothschild protecting them with private merceneries.   As soon as oil runs out these CRYPTO JEW kings will no longer get Rothschild's protection and people will grab power . .

    MISSILES / FIGHTER JETS / DRONES ARE KNOCKED OUT BY FRYING ITS ELECTRONIC CHIPS FROM A SATELLITE -- OR HIJACKING ITS CHIPS .

    WHEN YOU HIJACK A CHIP, THE ENEMY DRONE IS YOURS- TO BE REPROGRAMMED AND USED AGAINST THE ENEMY .

    Every Zionist fighter jet manufacturer has a system to hijack the microprocessors by a KILL SWITCH that is activated by remote control .

    every fighter jet has more than a 1000 chips - it is impossible to destect which is the TROJAN HORSE CHIP.

    USA is worried bout Chinese chip invsions and US Defense Advanced Research Projects Agency (DARPA), the Pentagon's R&D wing, has a secrey program named " Trust in Integrated Circuits "

    This US Trust program has already started its prequalifying rounds by sending to three contractors four identical versions of a chip that contained unspecified malicious circuitry.

    It is practically IMPOSSIBLE to exhaustively test chips with BILLIONS of logic gates.-

    A mobile phone can be tested to check out if the phone's various functions work. Any extraneous circuitry that doesn't interfere with the chip's normal functions won't show up in these tests. And it is IMPOSSIBLE to detect this.

    Testing of chips is done –say one in a thousand . It is IMPOSSIBLE to test every single chip.

    It involves hundreds of man hours of grinding away a thin layer of the chip, put the chip into a scanning electron microscope, and then take a picture of it, repeating the process until every layer of the chip has been imaged.

    Spotting a tiny discrepancy amid a chip's many layers and billions of transistors is IMPOSSIBLE and the chip is destroyed in the process.

    For ICs destined for mission-critical systems, it is IMPERATIVE to test every chip without destroying it.

    A kill switch is any manipulation of the chip's software or hardware that would cause the chip to die outright--to shut off a TEJAS 2 missile-launching electronics

    Users will NEVER be aware of the malicious intrusion--the enemy could use it to bypass battlefield radio encryption.

    THE ONLY WAY OUT IS TO TAKE PUTINs HELP IN DEVELOPING OUR OWN CHIPS PROGRAM. RUSSIANS / CHINESE ARE AHEAD OF THE ZIONISTS.

    Chip security to a barricaded home against thieves . The front door and windows might offer vault like protection, but there is a an unknown rear window deep in the basement for malicious use by the enemy who designed and built your home .

    Chips can be down graded or made to have a lesser shelf life ( expiry date ). All it needs is a small nick of the chip’s copper wiring. The fault, is IMPOSSIBLE to detect. The chip fails due to electromigration: as current flowed through the wire, eventually the metal atoms would migrate and form voids, and the wire would break.

    If the chip goes into a defense satellite, where it's supposed to work for 20 years but fails after 2 years -- you have a very expensive, inoperative satellite.

    To create a controlled kill switch, they add an extra logic to a microprocessor, which can be done either during manufacturing or during the chip's design phase. A saboteur could substitute one of the masks used to imprint the pattern of wires and transistors onto the semiconductor wafer—so that the pattern for just one microchip is different from the rest.

    Modern fighter jets use field-programmable gate arrays (FPGAs)--a generic chip that can be customized through ENEMY software. If you put the FPGA in a military system, someone else can reprogram it. Libya and Syria has faced these problems. Building a kill switch into an FPGA could mean embedding say 500 transistors within its billions.

    Malicious chips have BACK DOORS.

    A kill switch is any manipulation of the chip's software or hardware from a satellite that would cause the CHIP to die outright

    An enemy who embeds a kill switch in every commercial router could devastate the whole national security without ever targeting the Defense Department directly.

    The timer could be programmed with a single command- The whole defence mechanism fails.

    Chip alteration can even be done after the device has been manufactured and packaged, provided the design data is available. 

    Focused-ion-beam etching machine ( FIB ) shoots a stream of ions at precise areas on the chip, mechanically milling away tiny amounts of material like Microsurgery with the beam acting like a tiny scalpel to remove material, cut a metal line, and make new connections. 

    They can dig several layers to get to the intended target. It is IMPOSSIBLE to detect.

    They can reroute signals to the transistors that are already in place because chips commonly contain large blocks of unused circuitry, leftovers from previous versions of the design.

    Soft X-ray tomography can be used to penetrate the chip for inspection but not strong enough to do irreversible damage.

    There is a technique called Boolean equivalence checking to analyze what types of inputs will generate certain outputs. This process can be reversed- to detect monkey play.

    Unlike India Pakistan has refused to allow KILL CHIPS in their defence mechanism both offensive and defensive. . At a recent hearing, a U.S. House Committee on Foreign Affairs addressed Pakistan's ongoing refusal to let the United States help it secure its nuclear arsenal with American technology.

    A hacker who's able to reverse engineer the drone's flight software can impersonate that controller to send navigation commands, meanwhile blocking all commands from the drone’s legitimate operator. You can inject packets and alter waypoints, change data on the flight computer, set a different coming home position

    The Wi-Fi connection between its telemetry module and a user’s tablet uses weak "WEP" or "wired-equivalent privacy" encryption, a protocol long known to be crackable in seconds. That would allow any attacker in Wi-Fi range to break into that connection and send a so-called “death” command that kicks the drone’s owner off the network.

    The connection between that telemetry module and the drone itself uses an even less-secured radio protocol.   CHIPS used in mesh networking, do have built-in encryption capabilities. But in order to avoid latency between the user’s commands and the drone, the drone doesn’t implement that encryption function, leaving the drone open to a man-in-the-middle attack in which another malicious machine could join the same network

    A hacker  can inject a command to turn on the drone's motors without touching the tablet or telemetry box meant to control it. But in a more malicious attack an unseen hijacker could just as easily control the drone to make it unresponsive, or worse, to crash it to where it took off  from  , or to simply fly it away and steal it.

    In 2011, Iranian engineers jammed the GPS signal for an U.S. RQ-170 Sentinel drone, then spoofed its coordinates to make it land in Iran instead of its base in Afghanistan

    You can send a command to the camera, to turn it to the wrong side so they don't receive the desired information...or you can steal the drone, all the equipment attached to it, and its information.

    MISSILES / FIGHTER JETS / DRONES ARE KNOCKED OUT BY FRYING ITS ELECTRONIC CHIPS FROM A SATELLITE -- OR HIJACKING ITS CHIPS

    These kill chips are NOT high tech stuff.   Even a student of any undergraduate college can make this. There was a time when the yanks boasted that nobody could take their drones down.   Then a couple of students made them eat crow -- not only can the drones be destroyed from mid air-- it will go back and kill the man who launched it.

    All military fighter jets have a KILL CHIP and nuclear submarines have SIGNATURE revealing chips embedded – and India must buy military hardware only from TRUSTED nations.

    IF INDIA HAS TO BE A SUPERPOWER IN 16 YEARS , WE NEED TO INVEST 6 BILLION IN A FABLAB

    INDIAN NEEDS 18 NUCLEAR SUBMARINES ASAP-- AND ALSO A 6 BILLION USD FAB LAB TO MAKE CHIPS

    WE CAN GIVE 10 BILLION USD AS CHARITY TO AFRICA AND BANGLADESH , RIGHT? 

    THE ITALIAN WAITRESS GAVE 10 BILLION EUROS TO “ ITALY  ZONE”  SO THAT THEY CAN DRINK PREMIUM WINE 





    The integrity of Bitcoin depends on a hash function called SHA-256, which was designed by the NSA and published by the National Institute for Standards and Technology (NIST).

    The NSA, detailed key elements of Bitcoin long before Bitcoin ever came into existence. Much of the Bitcoin protocol is detailed in this document, including signature authentication techniques, eliminating cryptocoin counterfeits through transaction authentication and several features that support anonymity and untraceability of transactions.

    The document even outlines the heightened risk of money laundering that’s easily accomplished with cryptocurrencies. It also describes “secure hashing” to be “both one-way and collision-free.”

    If you assume that the NSA did something to SHA-256, which no outside researcher has detected, what you get is the ability, with credible and detectable action, they would be able to forge transactions. The really scary thing is somebody finds a way to find collisions in SHA-256 really fast without brute-forcing it or using lots of hardware and then they take control of the network

    In other words, if the SHA-256 hash, which was created by the NSA, actually has a BACKDOOR ENTRY METHOD for cracking the encryption, it would mean the NSA could steal everybody’s Bitcoins whenever it wants. (Call it “Zero Day.”)

    BIG BROTHER CAN SEIZE CONTROL OF MONEY ANYTIME AND CRASH FOREIGN GOVERNMENTS ( LIKE  ZIMBABWE ) WHO DO NOT PLAY KOSHER BALL

    An attacker an extract the secret crypto key from a system by analyzing the pattern of memory utilization or the electromagnetic outputs of the device that are emitted during the decryption process.

    Every cryptocurrency becomes obsolete with the invention of large-scale quantum computing.

    Once China manages to build a working 256-bit quantum computer, it can effectively steal all the Bitcoins in the world (plus steal most national secrets and commit other global mayhem at will).

    SHA-256 is a member of the SHA-2 cryptographic hash functions designed by the NSA. SHA stands for Secure Hash Algorithm. 

    Cryptographic hash functions are mathematical operations run on digital data; by comparing the computed "hash" (the output from execution of the algorithm) to a known and expected hash value, a person can determine the data's integrity. 

    A one-way hash can be generated from any piece of data, but the data cannot be generated from the hash.

    SHA-256 is used in several different parts of the Bitcoin network:---
    Mining uses SHA-256 as the Proof of work algorithm.
    SHA-256 is used in the creation of bitcoin addresses to improve security and privacy.

    SHA, are a family of cryptographic functions designed to keep data secured. It works by transforming the data using a hash function: an algorithm that consists of bitwise operations, modular additions, and compression functions.

    The hash function then produces a fixed size string that looks nothing like the original. These algorithms are designed to be one-way functions, meaning that once they’re transformed into their respective hash values, it’s virtually impossible ( oh yeah ? ) to transform them back into the original data.

    A few algorithms of interest are SHA-1, SHA-2, and SHA-5, each of which was successively designed with increasingly stronger encryption in response to hacker attacks. SHA-0, for instance, is now obsolete due to the widely exposed vulnerabilities.

    A common application of SHA is to encrypting passwords, as the server side only needs to keep track of specific user’s hash value, rather than the actual password. 

    This is helpful in case an attacker hacks the database, as they will only find the hashed functions and not the actual passwords, so if they were to input the hashed value as a password, the hash function will convert it into another string and subsequently deny access.

    Additionally, SHA exhibit the avalanche effect, where the modification of very few letters being encrypted cause a big change in output; or conversely, drastically different strings produce similar hash values. This effect causes hash values to not give any information regarding the input string, such as its original length.

     In addition, SHAs are also used to detect the tampering of data by attackers, where if a text file is slightly changed and barely noticeable, the modified file’s hash value will be different than the original file’s hash value, and the tampering will be rather noticeable.


    Due to the exposed vulnerabilities of SHA-1, cryptographers modified the algorithm to produce SHA-2, which consists of not one, but two hash functions known as SHA-256 and SHA-512, using 32 and 64-bit words respectively



    The CONSENSUS  protocol will fail its purpose if the majority of the individuals in the network decide to turn dishonest and cheat the rest of the network.   This is known as “51% Attack”.

    Because it is built on the assumption that the majority of a crowd is always honest.

    SO WE HAVE THE COWBOY POSSE LED BY TRUMP ( INTERNATIONAL WHITE SKINNED COMMUNITY )  RIDING AFTER THE BAD MANGY OUTLAW KOREAN KIM, RIGHT ?

    They say—“The sharing economy is already a proven success with companies like Uber and AirBnB flourishing”.  We are being brainwashed like JUSTICE IS BLIND false narrative nonsense !


    "JUSTICE IS BLIND"  JUDICIAL SYSTEM STARTED WITH PROPAGANDA THAT ALMIGHTY JEW ROTHSCHILD AND AN OLD DYING LEPER LYING ON THE STREET IN CHENNAI WILL GET SAME IMPARTIAL JUSTICE,  FROM THE COLLEGIUM MELORD.    

    THIS SYSTEM WAS PERMANENTLY HIJACKED TO PUNISH A FATHER WHO KILLED A RICH JEW WHO ANALLY RAPED AND KILLED HIS 6 YEAR OLD SON.   

    THE NEW FALSE NARRATIVE IS ---SEE “JUSTICE IS BLIND”— IT IS BLIND TO THE REASON WHY THE JEW WAS KILLED –IT JUST CONSIDERS THE "MAGNITUDE OF THE CRIME".  

    CONTEXT AND PRINCIPLES OF NATURAL JUSTICE ( DHARMA ) WAS FLUSHED DOWN THE SHITPOT . 


    THIS IS WHY JEW  ROMAN POLANSKI  WHO ANALLY RAPED SEVERAL YOUNG GIRLS IS STILL GETTING FILM AWARDS – 

    --  WHILE  ANAND JON WHO GOT A BLOWJOB FROM SOME GOLD DIGGING MODEL WHORE,  IS SENTENCED TO 59 YEARS IN JAIL


    This 12 part series on HIJACKED JUSTICE is only 40% complete. 

    I am sick and tired of it !!







    GANDHIs AHIMSA WAS A FALSE NARRATIVE.

    GANDHIs  SELECTIVE AHIMSA WAS ALSO LIKE “JUSTICE IS BLIND “ BULLSHIT.

    KILL THEM BAD GERMANS   ( WHO NEVER HARMED BHARTAMATA )  —BUT KISS THE WHITE  BRITISH INVADER WHO SHAT ON BHARATMATAs FACE,  INFICTED A THOUSAND CUTS ON HER,  ROBBED HER BLIND , AND  MADE US SLAVES

    GANDHI IS THIS PLANETs GREATEST RECRUITER OF SOLDIERS EVER-- FOR WAR AND KILLING –SO THAT HIS MASTER JEW ROTHSCHILD CAN CARVE OUT ISRAEL. 

    Gandhi recruited 13 lakh ( 1.3 million ) Indian soldiers in the first world war – out of which 111000 ( 1.11 lakh ) Indian soldiers were killed . 


    Gandhi recruited  25 lakh ( 2.5 million ) Indian soldiers in the second World war.   Out of this 243000 ( 2.43 lakh)  soldiers were killed.


    ROTHSCHILDs MEDIA MADE GANDHI A HERO AND  IMPORTED THIS KATHIAWARI CRYPTO JEW JAIN  FROM SOUTH AFRICA FOR THIS REASON.  

    TODAY IF YOU GO TO ANTWERP, THE RICHEST INDIANS IN THE ROTHSCHILD CONTROLLED DIAMOND MARKET ARE KATHIAWARI / PALANPURI CRYPTO JEW JAINS 



    Below:  The MK Ultra mind control programme has the initials of these two Rothschild agent BRAINWASHERS




    This CRYPTO JEW Gujju Jain community who monopolized diamond trade gets a BULLET TRAIN to Mumbai so that they can avoid airport customs





    Bitfinex of creating Tether coins out of thin air— they threaten to sue anybody who tells the truth.. 

    Tethers are being funneled to other exchanges through Bitfinex.   Third party deposit addresses are used to obfuscate the paper trail.

    Tether is 'pegged' to the United States Dollar,  however operates as a currency board, holding United States Dollar in reserve and issuing a cryptocurrency token for each reserve dollar.   The exchange rate is 1 Tether (USD₮) to 1 United States Dollar (USD$).   

    Tether attempts to derive its value directly from United States Dollars held in reserve at Tether Limited.  Tether can be stored as value, spent as a medium of exchange and has a fixed unit of account like a traditional fiat currency

    Tether is not a legal tender currency or a financial instrument. The ownership of Tether has no contractual rights, other legal claims, or guarantees against losses. 

    Tether Limited is not a bank and does not hold required reserves at the Federal Reserve. Tether tokens are not legal tender currency and are not covered by deposit insurance. 

    Tether does not operate in countries and locales which do not regulate cryptocurrencies. Tether is not a legal tender currency, and thereby attempts to circumvent traditional government and regulatory controls. 

    Tether transactions allegedly violate regulatory compliance banking standards such as Know Your Customer and anti-money laundering standards required of financial institutions.

    The Tether model is to hold all United States Dollars in reserve so that it can meet customer withdrawals upon demand.  

    Bitfinex imposed a withdrawal minimum of $250, which likely prevents over 74% of its customers form withdrawing.

    Tether purports to make reserve account holdings publicly available; however, these holdings have not been audited. In the event of a liquidity crisis, insolvency and/or government ban, exchanges and counterparties can exchange Tether in lieu of United States Dollars.  

    Tether allows customers to conduct financial transactions in United States dollars without using the actual fiat currency; without intermediaries; and without banks.

    Tether is closely connected with Bitfinex, which is ranked around the third largest cryptocurrency exchange (by volume) in the world.  Tether was initially based on the Bitcoin blockchain ecosystem but in June 2017 it transitioned to the Litecoin blockchain ecosystem.


    WARNING :  Bitcoin is mixing itself with the real world economy.  Day before yesterday  ( Sunday ) the Chicago Board Options Exchange began offering bitcoin futures, allowing investors to speculate on whether the digital currency's price will go up or down.  

    Yesterday marked  the first full day of trading, and it's a historic move. Unlike traditional commodities, bitcoins aren't physical assets and unlike currencies, there isn't a central bank that backs bitcoins. Bitcoins live on computer servers. 

    Chicago Board of Exchange tweeted on Sunday that its website was receiving heavy traffic after trading began. Bitcoin whose price has soared roughly 1,500 percent since the start of the year, got a lift from the new activity on the Chicago exchange. It jumped eight percent in less than 10 minutes. 

    Futures are a type of contract in which a buyer and a seller agree on a price for a particular item to be delivered on a certain date in the future, hence the name. Futures are available for nearly every type of security but are most famously used in commodities.. 

    The futures signal greater mainstream acceptance of bitcoin but also open up bitcoin to additional market forces. The futures will allow investors to bet that bitcoin's price will go down - a practice known as shorting - which currently is very difficult to do. 

    Bitcoin is the world's most popular virtual currency. Such currencies are not tied to a bank or government and allow users to spend money anonymously. 

    They are basically lines of computer code that are digitally signed each time they are traded.  

    They serve merely to facilitate money laundering and illicit, anonymous payments. 

    Others say they can be helpful methods of payment, such as in crisis situations where national currencies have collapsed. 

    BALLS –

    It is the other way around as we saw with Zimbabwe




    1. QUOTE
      However, if you have a list of all the prime numbers and their solutions (including many really huge numbers that haven't been computed except for this list) then that is a speedup to cracking a particular system using SHA-256, because you don't have to run all those calculations, you can simply look them up. In the blockchain.
      UNQUOTE
      Woah Captain, technical readers will understand the importance if this single paragraph, how NSA can use the mining to break the AES encryption algo.
      Again sir only you on the entire net & the world has the perception to oppose the rising tide of bitcoin.
      You on one ganga bajoo & others on another ganga bajoo.

    2. Now with Quantum Computers gaining traction, Prime number/Composite number finding will be even easier. When that happens we can kiss the current security model goodbye. Credit cards/Debit cards etc will be cracked. They also rely on Prime and Composite numbers.



      1. MERU WAS THE MOUNTAIN USED AS A DASHER IN SAMUDRA MANTHAN. 

        EGYPTIANS CALLED THE KEY TO MERU AS AANKH ( LIBERATED , KUNDALINI RAISED AGE )

        A prime number is a natural number greater than 1 that has no positive divisors other than 1 and itself. For example, 5 is a prime number because it has no positive divisors other than 1 and 5. The first 25 prime numbers are 2, 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41, 43, 47, 53, 59, 61, 67, 71, 73, 79, 83, 89, 97.

        MERU IS PASCALS TRIANGLE

        THERE IS A WAY TO FIND OUT IF VEDIC SRUTI VERSES HAVE BEEN POISON INJECTED -VEDIC SRUTIS ARE CONGRUENT BY DIVINE MATH 

        https://www.youtube.com/watch?v=0mI03elF4Gs


        VEDIC SRUTIS HAVE GOLDEN MEAN (1.618 ) , FIBONACCI SERIES , PASCALS TRIANGLE, LUCAS NUMBERS , SRI YANTRA ( GEOMETRY OF OM ), ULAM SPIRAL, PRIME NUMBER MAGIC EMBEDDED IN IT -- 

        THIS IS WHY WE HINDUS INSIST THAT SRUTIS WERE DOWNLOADED FROM AKASHA BY SEERS --THEY ARE NOT WRITTEN BY MAN. THE METERS ARE SACRED. 


        THE SOUND OF THE VEDIC VERSES MATTERS , NOT THE MEANING OF THE VERSE , WHICH BASICALLY INDUCE A FEELING OF GRATITUDE.

        EXAMPLE: Pascal’s triangle has many unusual properties and a variety of uses:

        Horizontal rows add to powers of 2 (i.e., 1, 2, 4, 8, 16, etc.)

        The horizontal rows represent powers of 11 (1, 11, 121, 1331, 14641) for the first 5 rows, in which the numbers have only a single digit.

        Adding any two successive numbers in the diagonal 1-3-6-10-15-21-28… results in a perfect square (1, 4, 9, 16, etc.)

        It can be used to find combinations in probability problems (if, for instance, you pick any two of five items, the number of possible combinations is 10, found by looking in the second place of the fifth row. Do not count the 1’s.)

        When the first number to the right of the 1 in any row is a prime number, all numbers in that row are divisible by that prime number

        The Fibonacci Series is found in Pascal’s Triangle.

        Pascal’s Triangle, is formed by starting with an apex of 1. Every number below in the triangle is the sum of the two numbers diagonally above it to the left and the right, with positions outside the triangle counting as zero.

        The numbers on diagonals of the Pascalstriangle add to the Fibonacci series

        https://www.youtube.com/watch?v=XMriWTvPXHI&pbjreload=10


        The Fibonacci numbers are--
        0, 1, 1, 2, 3, 5, 8, 13, ... (add the last two to get the next)

        The golden section numbers are--

        0•61803 39887... = phi = φ and
        1•61803 39887... = Phi = Φ
        The golden string is

        1 0 1 1 0 1 0 1 1 0 1 1 0 1 0 1 1 0 1 ...
        a sequence of 0s and 1s that is closely related to the Fibonacci numbers and the golden section

        http://ajitvadakayil.blogspot.in/2017/04/sanatana-dharma-hinduism-exhumed-and_71.html
        CONTINUED TO 2-

      2. CONTINUED FROM 1-

        WHEN I SAID THAT KERALA MATHEMATICIANS BUILT THE PYRAMIDS AND EVERY VESTIGE OF EGYPTIAN GLORY --ALL WERE MOST SARCASTIC

        WELL WELL-- I HAVE STOPPED BLOGGING--SO YOU CAN FIGURE OUT THE ROSETTA CODE

        https://rosettacode.org/wiki/Ulam_spiral_(for_primes)


        ERATOSTHENES WAS A MATH PROFESSOR FROM KODUNGALLUR UNIVERSITY --DEPUTED AT THE UNIVERSITY OF ALEXANDRIA AND ALSO DOUBLED AS THE CHIEF LIBRARIAN OF THE GREAT LIBRARY OF ALEXANDRIA ..

        WHEN THE LIBRARY OF ALEXANDIA WAS BURNT DOWN BY THE ROMAN EMPEROR CONSTANTIN THE GREAT WHO COOKED UP JESUS CHRIST AT THE FIRST COUNCIL OF NICEA IN 325 AD-- ALL BOOKS ON MATH , CHRONOLOGY, GEOGRAPHY ETC WRITTEN BY ERATOSTHENES GOT BURNT INTO TINDER.

        Eratosthenes proposed a simple algorithm for finding prime numbers. This algorithm is known in mathematics as the Sieve of Eratosthenes--inherent in sruti verses of Vedas

        In mathematics, the sieve of Eratosthenes one of a number of prime number sieves, is a simple, ancient algorithm for finding all prime numbers up to any given limit.

        It does so by iteratively marking as composite, i.e., not prime, the multiples of each prime, starting with the multiples of 2. The multiples of a given prime are generated starting from that prime, as a sequence of numbers with the same difference, equal to that prime, between consecutive numbers.

        This is the sieve's key distinction from using trial division to sequentially test each candidate number for divisibility by each prime.

        MY REVELATIONS NOW JUMP TO 52.0 %

        capt ajit vadakayil
        ..

    Bitcoin and Litecoin are RIDING HIGH IN TANDEM –why ?

    The digital currency, which is a fork of digital sibling Bitcoin, rose to as much as $  300 after starting out 2017 at $4.33.

    Litecoin was the first to alter Bitcoin and the most significant difference is that it takes 2.5 minutes for Litecoin to generate a block, or transaction, in comparison to Bitcoin’s 10 minutes.

    There is a limited supply of 84 million litecoins, compared to 21 million bitcoin. Currently, 54,268,358 litecoin and 16,736,137 bitcoin are in circulation. Litecoin transactions take just over two minutes to go through, compared to an average of around nearly 300 minutes for bitcoin.

    Litecoin is a peer-to-peer cryptocurrency and open source software project released under the MIT/X11 license.   Creation and transfer of coins is based on an open source cryptographic protocol and is not managed by any central authority.
    Litecoin was released via an open-source client on GitHub on October 7, 2011. 

    The Litecoin network went live on October 13, 2011. It was a fork of the Bitcoin Core client, differing primarily by having a decreased block generation time (2.5 minutes), increased maximum number of coins, different hashing algorithm (scrypt, instead of SHA-256), and a slightly modified GUI.


    Litecoin uses scrypt in its proof-of-work algorithm, a sequential memory-hard function requiring asymptotically more memory than an algorithm which is not memory-hard











    I WARN WOMEN OVER THE AGE OF 60.

    DO NOT GET CARRIED AWAY --AS MOST OF YOU HAVE POOR BONE DENSITY

    YOU FORE ARM BONES WITH JUST SNAP CLEAN

    NOWADAYS I SEE OLD WOMEN TAKING "PERSONAL TRAINERS" WEARING SPANDEX PANTS AND TRYING TO JUMP LIKE FROGS HOLDING DUMB BELLS

    YOU WILL BREAK YOUR HIPBONE --AFTER THE AGE OF 60 WOMEN LOSE MORE THAN 60% BONE MASS FROM HIPS

    A man's average bone mineral density (BMD) is higher than a woman's, and men have a lower risk for osteoporosis

    From the age of around 35 onwards, however, bones become weaker and more fragile due to a loss of mineral salts. This loss intensifies in women as their oestrogen levels fall, reaching a peak at the menopause when the production of this hormone from the ovaries ceases altogether.

    DO SURYANAMSKAR !

    http://ajitvadakayil.blogspot.in/2011/10/surya-namaskar-11000-year-old-vedic-sun.html

    THE POST ABOVE IS THE BEST READ AMONG MY 1274 POSTS

    capt ajit vadakayil
    ..


    Below: 50 kilos is being supported by the spinal column away from body  -- with swaying motion--dangerous for a 61 year old man


    Below: 15 kilos is being held upside down behind the shoulder  -- dangerous for a 61 year old man






    Status as on 11 Dec 2017
    Registration Number : MOIAB/E/2017/03164
    Name Of Complainant : Debdoot Sarkar
    Date of Receipt : 09 Dec 2017
    Received by : Ministry of Information and Broadcasting
    Forwarded to : Ministry of Information and Broadcasting
    Contact Address : Room No. 543-A, A Wing
    Shastri Bhawan,
    New Delhi110001
    Contact Number : 23074326
    Grievance Description : Namaskar Please find the comment regarding "Dangers Of Canola Oil" attached. Kindly acknowledge the same. Jai Bharata Thanks and Regards Debdoot Sarkar
    Current Status : CASE CLOSED
    Date of Action : 11 Dec 2017
    Details : The subject matter of the petition does not come under the purview of this Ministry.

    **********

    Thanks and Regards
    Debdoot Sarkar




    1. SEND THIS COMMENT ALONG WITH I&B MINISTRY REPLY TO--
      PMO
      PM MODI
      AJIT DOVAL
      LAW MINISTER
      CJI
      HOME MINISTER
      DEFENCE MINISTER
      SUSHMA SWARAJ
      SMRITI IRANI
      "WE THE PEOPLE" WANT OUR MINISTRIES TO BE CLEARED OF "DEAD WOOD" , "DRIFT WOOD" , "NALAYAKS BEDDED DOWN FOR RETIREMENT " AND DESH DROHIS

      WE MUST REMIND YOU THAT THE FIRST CHIEF OF PMO --MO MATHAI WAS A CIA PAYROLL SPY

      CAPT AJIT VADAKAYIL WAS A SHIP CAPTAIN FOR 30 YEARS --HE KNOW WHOSE JOB IS WHAT . HE KNOW THE JOB PORTFOLIO OF THE "I&B MINISTRY "

      WE DONT WANT THIS NONSENSE OF "THIS IS NOT MY JOB " FROM SMRITI IRANI AND HER I&B TEAM

      WHAT IS SMRITI IRANIs JOB? -- TO TELEPHONE DESH BHAKT GEN BAKSHI ON LIVE TV AND MAKE HIM CRY TO SECURE BROWNIE POINTS ?

      OR GIVE ENDLESS EGO MASSAGE TO MODI?

      OR HAVE TETE E TETE WITH DEEPIKA PADUKONE OVER SOME PADMAVATY?

      OR BOAST ON TV--   HOW YALE CELEBRATED HER "LEADERSHIP CAPACITY"?

      TELL PM MODI AND SMRITI IRANI WE NEED A PERSONAL RESPONSE.. ALL THIS SHALL BE ON RECORD..   THIS WILL GO AGAINST THE I&B MINISTRY .. 

      ALL READERS TO CO-OPERATE AND SPREAD THIS ON SOCIAL MEDIA

      capt ajit vadakayil
      ..
    https://twitter.com/girishalva/status/939906905228447744

    SABARIMALA PILGRIMAGE ATTRACTS 100 MILLION PILGRIMS ( 10 CRORES ) EVERY YEAR AND IS DOUBLE THE SIE OF "MAHA" KUMBH MELA..

    PEOPLE COME MERELY TO SEE THE THREE FLASHES FROM A FAR DISTANCE FROM ANDHRA/ TELENGANA. KARNATAKA/ TAMIL NADU ETC --THESE ARE ALSO PILGRIMS-- AS THERE IS A HUGE CRUSH AT THE SANNIDHANAM

    THE DEITY IS VISHNUs NINTH AVATAR ---DELETED BY JEW ROTHSHILD-- AND BUDDHA ( A MERE MORTAL WHO STRUGGLED FOR SALAVATION ) INSERTED

    THE CONDITION OF PILGRIMS IS FAR WORSE --THANKS TO SUCCESSIVE CHRISTIAN/ MUSLIM AND ATHEIST COMMIE GOVERNMENTS

    THESE DESH DROHIS ARE TRYING TO MAKE "MENSTRUATING WOMEN" ENTER SABARIMALA AND USING RASCALS LIKE SADGURU JAGGI VASUDEV TO PUSH IT--HE SAID ON NDTV--THERE ARE NO TIGERS IN THE PERIYAR RESERVE NOW, HENCE MENSTRUATING WOMEN CAN GO

    MY WIFE--LIKE EVERY TRUE HINDU WOMEN-- DOES NOT ENTER THE PUJA ROOM OR DO SHRADDH WHEN SHE HAS HER MENSES

    WOMEN IN NON-MENSTRUATING AGE ARE ALLOWED TO ATTEND SABARIMALA PILGRIMAGE

    IMHOTEP OF EGYPT IS SAME A LORD AYYAPPA

    http://ajitvadakayil.blogspot.in/2013/01/sabarimala-makaravilakku-three-light.html

    http://ajitvadakayil.blogspot.in/2017/05/land-of-punt-ophir-and-sheba-is-north.html


    COMMIES OF KERALA HAVE STARTED GOING FOR SABARIMALA --THEY ARE NO LONGER ATHEISTS.. THERE IS A CHRISTIAN / WHITE JEW COMMIE CONSPIRACY TO KILL SABARIMALA

    BOTH AYYAPPA AND BHISHMA ARE AVOWED BACHELORS -- PLEDGES THEY MADE TO SACRIFICE THEIR THRONES TO SUSTAIN THE HONOUR OF THEIR KING FATHERS ...

    WE WILL NOT ALLOW COMMIE / CHRISTIAN/ MUSLIMS GOVTS TO STEAL FROM SABARIMALA COFFERS

    WHEN HAS PM MODI AND RSS LAST PROTECTED THE HINDUS---ALL THE CARE OF FOR VOTES ..

    PUT THIS COMMENT IN PMO, PM MODI, LAW MINISTER, CJI, HOME MINISTER, YOGI ADITYANATH, RSS, VHP, AVBP, I&B MINISTRY, CM PINARAYI VIJAYAN, CM OF TELUGU LANDS , CM OF TAMIL NADU ( DONT WANT CM OF KARNATAKA -- ANTIHINDU ) WEBSITES--

    SPREAD LIKE WILD FIRE ON SOCIAL MEDIA

    capt ajit vadakayil
    ..





    CAPT AJIT VADAKAYIL
    ..