THIS POST IS CONTINUED FROM PART 14, BELOW--
YEH BACKDOOR CHEEZ KYA HAI BHAIYYA ?
YEH “ILU ILU” JAISA MAAL HAI KYA ?
India must take Putin's help and build our own CHIPS . Our nuclear submarines must have our own chips. A submarine which can be POLLED and cannot hide is as good as dead in a war.
IN MODERN WARS ONLY AN IDIOT WILL TRY TO KNOCK PUNCH OUT AN INCOMING MISSILE IN THE AIR
WE SAW SAUDIS USING AMERICAN PATRIOT MISSILES TO BLOCK YEMENI MISSILES AND FALLING PHUTT ON THEIR FACES
On November 5, Yemeni forces launched a Borkan-2 (Volcano-2) missile against King Khalid International Airport, located 35 kilometers north of the Saudi capital Riyadh— and it could NOT be intercepted .
On 7th April 2017, we saw Russia knock out more 36 of the 59 Tomahawk cruise missile—IN THE AIR-- sent from 2 US warships to knock out Shayrat airbase in Syria
MODERN MISSILES MUST BE WITH WW3 IN MIND.
INDIA WILL BE PULLED DOWN BY THE JEALOUS ZIONIST LED WESTERN NATIONS AS THE WHITE JEW / CHRISTIAN WILL NEVER SUBMIT TO BLACK HINDU RULE.
ALL IT REQUIRES IS A KILL CHIP --
THE MISSILE WILL WORK IN TESTS AND FIELD TRIALS .
IN A REAL WAR THE MISSILE WILL NEVER EVER HIT ITS TARGET - FOR THE KILL CHIP WILL BE ACTIVATED..
THIS KILL CHIP IS NO BIG TECHNOLOGY --
IT IS BASIC TECHNOLOGY WHICH EVERY UNDER GRADUATE ELECTRONIC STUDENTS CAN ACHIEVE.
WHY DID THE INDIAN MAIN STREAM MEDIA PRAISE MODI WHEN HE SIGNED THE DEAL FOR 36 RAFALE FIGHTER JETS FROM JEW RUN DSSAULT — WHEN THEY HAVE NEVER EVER PRAISED HIM BEFORE?
Zionists will use Pakistan to pull down India.
As soon as Modi came to power he QUIETLY cleared the Israeli Barak Missile deal-using two in one Arun Jaitley ( defence / finance minister ) . We all knew this would happen .
When India has a FULL BLOWN WAR with Pakistan which will be triggered by a Zionist FALSE FLAG ATTACK on Pakistan’s nuclear facilities – the ENTIRE Arab oil/gas rich desert kingdoms will give their military hardware QUIETLY with Zionist support to Pakistan -like fighter jets/ missiles/ submarines etc.
In this scenario India can never hope to have MORE fighter jets or missiles than Pakistan .
Note: Pakistanis guard the Wahabi Ibn Saud bloodline palace in Saudi Arabia -Pakistani / Egyptian pilots operate the fighter jets of the place guard.
All oil rich desert crypto kings do NOT trust their own people's army and they have Rothschild protecting them with private merceneries. As soon as oil runs out these CRYPTO JEW kings will no longer get Rothschild's protection and people will grab power . .
MISSILES / FIGHTER JETS / DRONES ARE KNOCKED OUT BY FRYING ITS ELECTRONIC CHIPS FROM A SATELLITE -- OR HIJACKING ITS CHIPS .
WHEN YOU HIJACK A CHIP, THE ENEMY DRONE IS YOURS- TO BE REPROGRAMMED AND USED AGAINST THE ENEMY .
Every Zionist fighter jet manufacturer has a system to hijack the microprocessors by a KILL SWITCH that is activated by remote control .
every fighter jet has more than a 1000 chips - it is impossible to destect which is the TROJAN HORSE CHIP.
USA is worried bout Chinese chip invsions and US Defense Advanced Research Projects Agency (DARPA), the Pentagon's R&D wing, has a secrey program named " Trust in Integrated Circuits "
This US Trust program has already started its prequalifying rounds by sending to three contractors four identical versions of a chip that contained unspecified malicious circuitry.
It is practically IMPOSSIBLE to exhaustively test chips with BILLIONS of logic gates.-
A mobile phone can be tested to check out if the phone's various functions work. Any extraneous circuitry that doesn't interfere with the chip's normal functions won't show up in these tests. And it is IMPOSSIBLE to detect this.
Testing of chips is done –say one in a thousand . It is IMPOSSIBLE to test every single chip.
It involves hundreds of man hours of grinding away a thin layer of the chip, put the chip into a scanning electron microscope, and then take a picture of it, repeating the process until every layer of the chip has been imaged.
Spotting a tiny discrepancy amid a chip's many layers and billions of transistors is IMPOSSIBLE and the chip is destroyed in the process.
For ICs destined for mission-critical systems, it is IMPERATIVE to test every chip without destroying it.
A kill switch is any manipulation of the chip's software or hardware that would cause the chip to die outright--to shut off a TEJAS 2 missile-launching electronics
Users will NEVER be aware of the malicious intrusion--the enemy could use it to bypass battlefield radio encryption.
THE ONLY WAY OUT IS TO TAKE PUTINs HELP IN DEVELOPING OUR OWN CHIPS PROGRAM. RUSSIANS / CHINESE ARE AHEAD OF THE ZIONISTS.
Chip security to a barricaded home against thieves . The front door and windows might offer vault like protection, but there is a an unknown rear window deep in the basement for malicious use by the enemy who designed and built your home .
Chips can be down graded or made to have a lesser shelf life ( expiry date ). All it needs is a small nick of the chip’s copper wiring. The fault, is IMPOSSIBLE to detect. The chip fails due to electromigration: as current flowed through the wire, eventually the metal atoms would migrate and form voids, and the wire would break.
If the chip goes into a defense satellite, where it's supposed to work for 20 years but fails after 2 years -- you have a very expensive, inoperative satellite.
To create a controlled kill switch, they add an extra logic to a microprocessor, which can be done either during manufacturing or during the chip's design phase. A saboteur could substitute one of the masks used to imprint the pattern of wires and transistors onto the semiconductor wafer—so that the pattern for just one microchip is different from the rest.
Modern fighter jets use field-programmable gate arrays (FPGAs)--a generic chip that can be customized through ENEMY software. If you put the FPGA in a military system, someone else can reprogram it. Libya and Syria has faced these problems. Building a kill switch into an FPGA could mean embedding say 500 transistors within its billions.
Malicious chips have BACK DOORS.
A kill switch is any manipulation of the chip's software or hardware from a satellite that would cause the CHIP to die outright
An enemy who embeds a kill switch in every commercial router could devastate the whole national security without ever targeting the Defense Department directly.
The timer could be programmed with a single command- The whole defence mechanism fails.
Chip alteration can even be done after the device has been manufactured and packaged, provided the design data is available.
Focused-ion-beam etching machine ( FIB ) shoots a stream of ions at precise areas on the chip, mechanically milling away tiny amounts of material like Microsurgery with the beam acting like a tiny scalpel to remove material, cut a metal line, and make new connections.
They can dig several layers to get to the intended target. It is IMPOSSIBLE to detect.
They can reroute signals to the transistors that are already in place because chips commonly contain large blocks of unused circuitry, leftovers from previous versions of the design.
Soft X-ray tomography can be used to penetrate the chip for inspection but not strong enough to do irreversible damage.
There is a technique called Boolean equivalence checking to analyze what types of inputs will generate certain outputs. This process can be reversed- to detect monkey play.
Unlike India Pakistan has refused to allow KILL CHIPS in their defence mechanism both offensive and defensive. . At a recent hearing, a U.S. House Committee on Foreign Affairs addressed Pakistan's ongoing refusal to let the United States help it secure its nuclear arsenal with American technology.
A hacker who's able to reverse engineer the drone's flight software can impersonate that controller to send navigation commands, meanwhile blocking all commands from the drone’s legitimate operator. You can inject packets and alter waypoints, change data on the flight computer, set a different coming home position
The Wi-Fi connection between its telemetry module and a user’s tablet uses weak "WEP" or "wired-equivalent privacy" encryption, a protocol long known to be crackable in seconds. That would allow any attacker in Wi-Fi range to break into that connection and send a so-called “death” command that kicks the drone’s owner off the network.
The connection between that telemetry module and the drone itself uses an even less-secured radio protocol. CHIPS used in mesh networking, do have built-in encryption capabilities. But in order to avoid latency between the user’s commands and the drone, the drone doesn’t implement that encryption function, leaving the drone open to a man-in-the-middle attack in which another malicious machine could join the same network
A hacker can inject a command to turn on the drone's motors without touching the tablet or telemetry box meant to control it. But in a more malicious attack an unseen hijacker could just as easily control the drone to make it unresponsive, or worse, to crash it to where it took off from , or to simply fly it away and steal it.
In 2011, Iranian engineers jammed the GPS signal for an U.S. RQ-170 Sentinel drone, then spoofed its coordinates to make it land in Iran instead of its base in Afghanistan
You can send a command to the camera, to turn it to the wrong side so they don't receive the desired information...or you can steal the drone, all the equipment attached to it, and its information.
MISSILES / FIGHTER JETS / DRONES ARE KNOCKED OUT BY FRYING ITS ELECTRONIC CHIPS FROM A SATELLITE -- OR HIJACKING ITS CHIPS
These kill chips are NOT high tech stuff. Even a student of any undergraduate college can make this. There was a time when the yanks boasted that nobody could take their drones down. Then a couple of students made them eat crow -- not only can the drones be destroyed from mid air-- it will go back and kill the man who launched it.
All military fighter jets have a KILL CHIP and nuclear submarines have SIGNATURE revealing chips embedded – and India must buy military hardware only from TRUSTED nations.
IF INDIA HAS TO BE A SUPERPOWER IN 16 YEARS , WE NEED TO INVEST 6 BILLION IN A FABLAB
INDIAN NEEDS 18 NUCLEAR SUBMARINES ASAP-- AND ALSO A 6 BILLION USD FAB LAB TO MAKE CHIPS
WE CAN GIVE 10 BILLION USD AS CHARITY TO AFRICA AND BANGLADESH , RIGHT?
THE ITALIAN WAITRESS GAVE 10 BILLION EUROS TO “ ITALY ZONE” SO THAT THEY CAN DRINK PREMIUM WINE
The integrity of Bitcoin depends on a hash function called SHA-256, which was designed by the NSA and published by the National Institute for Standards and Technology (NIST).
The NSA, detailed key elements of Bitcoin long before Bitcoin ever came into existence. Much of the Bitcoin protocol is detailed in this document, including signature authentication techniques, eliminating cryptocoin counterfeits through transaction authentication and several features that support anonymity and untraceability of transactions.
The document even outlines the heightened risk of money laundering that’s easily accomplished with cryptocurrencies. It also describes “secure hashing” to be “both one-way and collision-free.”
If you assume that the NSA did something to SHA-256, which no outside researcher has detected, what you get is the ability, with credible and detectable action, they would be able to forge transactions. The really scary thing is somebody finds a way to find collisions in SHA-256 really fast without brute-forcing it or using lots of hardware and then they take control of the network
In other words, if the SHA-256 hash, which was created by the NSA, actually has a BACKDOOR ENTRY METHOD for cracking the encryption, it would mean the NSA could steal everybody’s Bitcoins whenever it wants. (Call it “Zero Day.”)
BIG BROTHER CAN SEIZE CONTROL OF MONEY ANYTIME AND CRASH FOREIGN GOVERNMENTS ( LIKE ZIMBABWE ) WHO DO NOT PLAY KOSHER BALL
An attacker an extract the secret crypto key from a system by analyzing the pattern of memory utilization or the electromagnetic outputs of the device that are emitted during the decryption process.
Every cryptocurrency becomes obsolete with the invention of large-scale quantum computing.
Once China manages to build a working 256-bit quantum computer, it can effectively steal all the Bitcoins in the world (plus steal most national secrets and commit other global mayhem at will).
SHA-256 is a member of the SHA-2 cryptographic hash functions designed by the NSA. SHA stands for Secure Hash Algorithm.
Cryptographic hash functions are mathematical operations run on digital data; by comparing the computed "hash" (the output from execution of the algorithm) to a known and expected hash value, a person can determine the data's integrity.
A one-way hash can be generated from any piece of data, but the data cannot be generated from the hash.
A one-way hash can be generated from any piece of data, but the data cannot be generated from the hash.
SHA-256 is used in several different parts of the Bitcoin network:---
Mining uses SHA-256 as the Proof of work algorithm.
SHA-256 is used in the creation of bitcoin addresses to improve security and privacy.
SHA, are a family of cryptographic functions designed to keep data secured. It works by transforming the data using a hash function: an algorithm that consists of bitwise operations, modular additions, and compression functions.
The hash function then produces a fixed size string that looks nothing like the original. These algorithms are designed to be one-way functions, meaning that once they’re transformed into their respective hash values, it’s virtually impossible ( oh yeah ? ) to transform them back into the original data.
A few algorithms of interest are SHA-1, SHA-2, and SHA-5, each of which was successively designed with increasingly stronger encryption in response to hacker attacks. SHA-0, for instance, is now obsolete due to the widely exposed vulnerabilities.
A common application of SHA is to encrypting passwords, as the server side only needs to keep track of specific user’s hash value, rather than the actual password.
This is helpful in case an attacker hacks the database, as they will only find the hashed functions and not the actual passwords, so if they were to input the hashed value as a password, the hash function will convert it into another string and subsequently deny access.
Additionally, SHA exhibit the avalanche effect, where the modification of very few letters being encrypted cause a big change in output; or conversely, drastically different strings produce similar hash values. This effect causes hash values to not give any information regarding the input string, such as its original length.
In addition, SHAs are also used to detect the tampering of data by attackers, where if a text file is slightly changed and barely noticeable, the modified file’s hash value will be different than the original file’s hash value, and the tampering will be rather noticeable.
Due to the exposed vulnerabilities of SHA-1, cryptographers modified the algorithm to produce SHA-2, which consists of not one, but two hash functions known as SHA-256 and SHA-512, using 32 and 64-bit words respectively
The CONSENSUS protocol will fail its purpose if the majority of the individuals in the network decide to turn dishonest and cheat the rest of the network. This is known as “51% Attack”.
Because it is built on the assumption that the majority of a crowd is always honest.
SO WE HAVE THE COWBOY POSSE LED BY TRUMP ( INTERNATIONAL WHITE SKINNED COMMUNITY ) RIDING AFTER THE BAD MANGY OUTLAW KOREAN KIM, RIGHT ?
They say—“The sharing economy is already a proven success with companies like Uber and AirBnB flourishing”. We are being brainwashed like JUSTICE IS BLIND false narrative nonsense !
"JUSTICE IS BLIND" JUDICIAL SYSTEM STARTED WITH PROPAGANDA THAT ALMIGHTY JEW ROTHSCHILD AND AN OLD DYING LEPER LYING ON THE STREET IN CHENNAI WILL GET SAME IMPARTIAL JUSTICE, FROM THE COLLEGIUM MELORD.
THIS SYSTEM WAS PERMANENTLY HIJACKED TO PUNISH A FATHER WHO KILLED A RICH JEW WHO ANALLY RAPED AND KILLED HIS 6 YEAR OLD SON.
THE NEW FALSE NARRATIVE IS ---SEE “JUSTICE IS BLIND”— IT IS BLIND TO THE REASON WHY THE JEW WAS KILLED –IT JUST CONSIDERS THE "MAGNITUDE OF THE CRIME".
CONTEXT AND PRINCIPLES OF NATURAL JUSTICE ( DHARMA ) WAS FLUSHED DOWN THE SHITPOT .
THIS IS WHY JEW ROMAN POLANSKI WHO ANALLY RAPED SEVERAL YOUNG GIRLS IS STILL GETTING FILM AWARDS –
-- WHILE ANAND JON WHO GOT A BLOWJOB FROM SOME GOLD DIGGING MODEL WHORE, IS SENTENCED TO 59 YEARS IN JAIL
This 12 part series on HIJACKED JUSTICE is only 40% complete.
I am sick and tired of it !!
GANDHIs AHIMSA WAS A FALSE NARRATIVE.
GANDHIs SELECTIVE AHIMSA WAS ALSO LIKE “JUSTICE IS BLIND “ BULLSHIT.
KILL THEM BAD GERMANS ( WHO NEVER HARMED BHARTAMATA ) —BUT KISS THE WHITE BRITISH INVADER WHO SHAT ON BHARATMATAs FACE, INFICTED A THOUSAND CUTS ON HER, ROBBED HER BLIND , AND MADE US SLAVES
GANDHI IS THIS PLANETs GREATEST RECRUITER OF SOLDIERS EVER-- FOR WAR AND KILLING –SO THAT HIS MASTER JEW ROTHSCHILD CAN CARVE OUT ISRAEL.
Gandhi recruited 13 lakh ( 1.3 million ) Indian soldiers in the first world war – out of which 111000 ( 1.11 lakh ) Indian soldiers were killed .
Gandhi recruited 25 lakh ( 2.5 million ) Indian soldiers in the second World war. Out of this 243000 ( 2.43 lakh) soldiers were killed.
ROTHSCHILDs MEDIA MADE GANDHI A HERO AND IMPORTED THIS KATHIAWARI CRYPTO JEW JAIN FROM SOUTH AFRICA FOR THIS REASON.
TODAY IF YOU GO TO ANTWERP, THE RICHEST INDIANS IN THE ROTHSCHILD CONTROLLED DIAMOND MARKET ARE KATHIAWARI / PALANPURI CRYPTO JEW JAINS
Below: The MK Ultra mind control programme has the initials of these two Rothschild agent BRAINWASHERS
This CRYPTO JEW Gujju Jain community who monopolized diamond trade gets a BULLET TRAIN to Mumbai so that they can avoid airport customs
Bitfinex of creating Tether coins out of thin air— they threaten to sue anybody who tells the truth..
Tethers are being funneled to other exchanges through Bitfinex. Third party deposit addresses are used to obfuscate the paper trail.
Tether is 'pegged' to the United States Dollar, however operates as a currency board, holding United States Dollar in reserve and issuing a cryptocurrency token for each reserve dollar. The exchange rate is 1 Tether (USD₮) to 1 United States Dollar (USD$).
Tether attempts to derive its value directly from United States Dollars held in reserve at Tether Limited. Tether can be stored as value, spent as a medium of exchange and has a fixed unit of account like a traditional fiat currency
Tether is not a legal tender currency or a financial instrument. The ownership of Tether has no contractual rights, other legal claims, or guarantees against losses.
Tether Limited is not a bank and does not hold required reserves at the Federal Reserve. Tether tokens are not legal tender currency and are not covered by deposit insurance.
Tether does not operate in countries and locales which do not regulate cryptocurrencies. Tether is not a legal tender currency, and thereby attempts to circumvent traditional government and regulatory controls.
Tether transactions allegedly violate regulatory compliance banking standards such as Know Your Customer and anti-money laundering standards required of financial institutions.
The Tether model is to hold all United States Dollars in reserve so that it can meet customer withdrawals upon demand.
Bitfinex imposed a withdrawal minimum of $250, which likely prevents over 74% of its customers form withdrawing.
Tether purports to make reserve account holdings publicly available; however, these holdings have not been audited. In the event of a liquidity crisis, insolvency and/or government ban, exchanges and counterparties can exchange Tether in lieu of United States Dollars.
Tether allows customers to conduct financial transactions in United States dollars without using the actual fiat currency; without intermediaries; and without banks.
Tether is closely connected with Bitfinex, which is ranked around the third largest cryptocurrency exchange (by volume) in the world. Tether was initially based on the Bitcoin blockchain ecosystem but in June 2017 it transitioned to the Litecoin blockchain ecosystem.
WARNING : Bitcoin is mixing itself with the real world economy. Day before yesterday ( Sunday ) the Chicago Board Options Exchange began offering bitcoin futures, allowing investors to speculate on whether the digital currency's price will go up or down.
Yesterday marked the first full day of trading, and it's a historic move. Unlike traditional commodities, bitcoins aren't physical assets and unlike currencies, there isn't a central bank that backs bitcoins. Bitcoins live on computer servers.
Chicago Board of Exchange tweeted on Sunday that its website was receiving heavy traffic after trading began. Bitcoin whose price has soared roughly 1,500 percent since the start of the year, got a lift from the new activity on the Chicago exchange. It jumped eight percent in less than 10 minutes.
Futures are a type of contract in which a buyer and a seller agree on a price for a particular item to be delivered on a certain date in the future, hence the name. Futures are available for nearly every type of security but are most famously used in commodities..
The futures signal greater mainstream acceptance of bitcoin but also open up bitcoin to additional market forces. The futures will allow investors to bet that bitcoin's price will go down - a practice known as shorting - which currently is very difficult to do.
Bitcoin is the world's most popular virtual currency. Such currencies are not tied to a bank or government and allow users to spend money anonymously.
They are basically lines of computer code that are digitally signed each time they are traded.
They serve merely to facilitate money laundering and illicit, anonymous payments.
Others say they can be helpful methods of payment, such as in crisis situations where national currencies have collapsed.
It is the other way around as we saw with Zimbabwe
Bitcoin and Litecoin are RIDING HIGH IN TANDEM –why ?
The digital currency, which is a fork of digital sibling Bitcoin, rose to as much as $ 300 after starting out 2017 at $4.33.
Litecoin was the first to alter Bitcoin and the most significant difference is that it takes 2.5 minutes for Litecoin to generate a block, or transaction, in comparison to Bitcoin’s 10 minutes.
There is a limited supply of 84 million litecoins, compared to 21 million bitcoin. Currently, 54,268,358 litecoin and 16,736,137 bitcoin are in circulation. Litecoin transactions take just over two minutes to go through, compared to an average of around nearly 300 minutes for bitcoin.
Litecoin is a peer-to-peer cryptocurrency and open source software project released under the MIT/X11 license. Creation and transfer of coins is based on an open source cryptographic protocol and is not managed by any central authority.
Litecoin was released via an open-source client on GitHub on October 7, 2011.
The Litecoin network went live on October 13, 2011. It was a fork of the Bitcoin Core client, differing primarily by having a decreased block generation time (2.5 minutes), increased maximum number of coins, different hashing algorithm (scrypt, instead of SHA-256), and a slightly modified GUI.
Litecoin uses scrypt in its proof-of-work algorithm, a sequential memory-hard function requiring asymptotically more memory than an algorithm which is not memory-hard
Shared public ledger needs a functional, efficient and secure consensus algorithm to function on a global scale.
The data-adding entities are called miners. They compete for this task by proofing something – something that can be verified by every other entity of the network solely with information completely availably on the blockchain. In a cryptocurrency blockchain, for this work miners are awarded with units of the cryptocurrency.
PROOF OF WORK :
A consensus algorithm, like bitcoin’s Proof of Work , does two things: it keeps powerful adversaries from derailing the system ( unless they want to do this as an INSIDE JOB ) and successfully forking the chain, and it ensures that the next block in a blockchain is the one and only version of the truth.
In PoW, miners compete to add the next block in the chain by racing to solve an extremely difficult cryptographic puzzle and the first to solve the puzzle, wins the lottery.
The difficulty of the riddles is set by the network and every other participant can verify the solution. The miner receives 12.5 newly minted bitcoins – and a small transaction fee as a reward for his or her efforts.
Difficulty is a measure of how difficult it is to find a hash below a given target. The Bitcoin network has a global block difficulty. Valid blocks must have a hash below this target. Mining pools also have a pool-specific share difficulty setting a lower limit for shares.
Every 2016 blocks the network difficulty change. The difficulty is adjusted every 2016 blocks based on the time it took to find the previous 2016 blocks. At the desired rate of one block each 10 minutes, 2016 blocks would take exactly two weeks to find.
If the previous 2016 blocks took more than two weeks to find, the difficulty is reduced. If they took less than two weeks, the difficulty is increased. The change in difficulty is in proportion to the amount of time over or under two weeks the previous 2016 blocks took to find.
A miner verifies all transactions and includes in a block. If the miner can add this block to existing blocks, known as the blockchain, it is rewarded for the computation it did.
Collect all pending transactions
Bundles into a block
Guess a random number (aka nonce) such that sha256 (sha256 (data+nonce)) less than difficulty where nonce is a random integer. Miners try to "guess" the nonce; only way a miner can find the number is by brute-forcing, i.e. trying millions of random numbers.
SHA256 is the cryptographic hash function. The SHA-256 algorithm is intended to take an arbitrary amount of input data and produce 256 bits of output, whilst also maintaining certain properties that make for an effective cryptographic hash.
Data is a hash over the contents of the block (transactions) and the previous block's hash difficulty is a measure of how difficult it is to find a hash below a given target.
Bitcoin mining has grown from a handful of early enthusiasts into a cottage industry, into a specialized industrial-level venture. The easy money was scooped out a long time ago and what remains is buried under the cryptographic equivalent of tons of hard rock..
The PATHETIC truth is:---
Only those with specialised, high-powered machinery are able to profitably extract bitcoins nowadays. While mining is still technically possible for anyone, those with underpowered setups will find more money is spent on electricity than is generated through mining.
Electricity in China is very cheap and has allowed Chinese Bitcoin miners to gain a very large percentage of Bitcoin’s hash power. All those who think this is fortuitous , raise your fuckin’ hands—good !
All know that KOSHER funded Chinese power companies point their excess (sic ) energy towards Bitcoin mining facilities.
China is home to many of the top Bitcoin mining companies:- F2Pool, AntPool, BTCC, and BW.
It’s estimated that these mining pools own somewhere around 65% of Bitcoins hash power, meaning they mine about 63% of all new bitcoins.
Bitcoin miners can switch mining pools easily by routing their hash power to a different pool, so the market share of pools is constantly changing.
Bitcoin miners are crucial to Bitcoin and its security. Without miners, Bitcoin would be vulnerable and easy to attack.
Ponder over this:--
Most Bitcoin users don’t mine.
However, miners are responsible for the creation of all new bitcoins and are a part of the Bitcoin ecosystem.
Mining, once done on the average home computer, is now mostly done in large, specialized warehouses with massive amounts of mining hardware.
These warehouses usually direct their hashing power towards mining pools
Slush Pool, the bitcoin mining pool operated by Trezor founder and CEO Marek “Slush” Palatinus, has officially become the largest mining pool in the global bitcoin mining industry.
Recently, most of the mining pools and hash rate which had previously supported the SegWit2x hard fork migrated to Bitcoin Cash.
Consequently, many of the leading mining pools such as Bitmain’s Antpool reallocated their hashrate from bitcoin to Bitcoin Cash, leaving the bitcoin mining space open for competition.
As some hashrate left the bitcoin network, Slush Pool solidified its position as the largest bitcoin mining pool in the industry, accounting for 21 percent of the bitcoin network’s hashing power.
For many months, Slush Pool was praised for the freedom it has provided to miners within the pool. For instance, in regards to the SegWit2x hard fork, it allowed miners to choose whether to signal for SegWit2x or not, instead of forcing miners in its pool to adhere to its vision.
As Slush Pool overtook Antpool in hash rate, the bitcoin community celebrated the company’s milestone.
The rising costs of mining effectively and competing against large mining pools have made it harder for the APUN BHI MINER gullible hobbyist to profit on mining bitcoin.
Whenever a new block is mined, that miner gets rewarded with some currency (block reward, transaction fees) and thus are incentivized to keep mining.
In Proof of Work, other nodes verify the validity of the block by checking that the hash of the data of the block is less than a preset number.
Due to the limited supply of computational power, miners are also incentivized not to cheat. Attacking the network would cost a lot because of the high cost of hardware, energy, and potential mining profits missed.
QUANTUM COMPUERS can break bitcoin's security. It is a matter of ONE decade when cracking private keys will be a piece of cake.
China is leading in this field
Quantum computing could outperform the world’s fastest supercomputer—and then all computers ever made, combined. We aren’t there yet, but at 50 qubits, universal quantum computing would reach that inflection point and be able to solve problems existing computers can’t handle
Bitcoin encryption today is ensured by the difficulty of cracking its code using existing computers, but quantum computers will theoretically be able to work much faster because they are not constrained to working with bits (values that are either 0 or 1).
Quantum computers use qubits, which take advantage of the very strange ways subatomic particles behave to contain more values (or even two values at once).
An attacker with a quantum computer is likely to be able to change the transaction before the legitimate one goes through..
Quantum computing will destroy Bitcoin’s underlying protocol. Bitcoin’s encryption will be totally vulnerable to quantum computing
If private keys are compromised, that's not just bad news for cryptocurrency. It would expose anything else that uses public-private key encryption, such as messaging apps, SSL certificates and data storage.
USA is not far behind China
Quantum computers are built on processors containing units called qubits, also called quantum bits. These units take advantage of quantum mechanics by functioning outside the realm of the Newtonian space.
In other words, they do not conform to the rules governing the macroscopic, visually perceptible world. They behave according to the mystical order of the subatomic.
Instead of engaging in the binary behavior of 0’s and 1’s in the usual “on” and “off” fashion, quantum computers fuse “0’s” and “1’s,” making them indistinguishable and interconnected.
This paradoxical feature allows quantum computers to make tremendously enormous calculations.
For example, to comprehend the difference between a laptop and a quantum computer’s calculation abilities, think of the differences between a horse-drawn chariot and Space-X’s Dragon spacecraft.
This analogy expresses how much of an advantage quantum machines have over dinosaur-age computers.
The idea that 0’s and 1’s can be fused is called superposition Quantum Computing May Not Crack Bitcoin's Encryptionin quantum physics. This is the idea that on a subatomic scale, particles take on properties of other particles.
For instance, it is well known that light can be both a particle and a wave. This phenomenon is called particle-wave duality.
Furthermore, particles can also merge. In accordance with quantum mechanics, they become enjoined in a delicate dance of vibratory ecstasy.
This peculiar behavior is called entanglement, and this occurs within the confines of a computer chip the same as it does across the universe-at-large.
When dealing with quantum computers, controlling these states on an microcosmic scale with ultracold processors is difficult. This is the reason why quantum computers have not readily materialized and become commercially available.
Bitcoin protocol will upgrade from SHA-256 to SHA-384, which is a sufficiently more advanced form of cryptography. It wont be able to take on Quantum computers
ALL INITIAL WHITE QUANTUM PHYSICISTS DISCARDED THEIR BIBLES / KOSHER TEXTS , PICKED UP BHAGAWAD GITA AND GOT THEMSEVES CREAMATED –WHY ?
WHY DID THEY LEARN SANSKRIT , IF IT IS A SAVAGE SUPERSTITIOUS HINDU LANGUAGE ?
The double slit experiment tells clearly that as per quantum physics you cant have a universe without mind entering into it, and the mind is actually shaping the very things that is perceived.
This is written in our Vedas 7000 years ago.
Vedas went on oral route for 330 centuries before they were penned down 70 centuries ago, as it was not possible to convey Vedas by oral route anymore—man’s DNA was degrading
The law of attraction returns that reality exactly as you saw it in your mind. Matter, energy and consciousness are interchangeable .
There are connections between quantum mechanics and consciousness . Consciousness is the intelligence, the organising principle behind the arising of form. The quantum field or pure consciousness is influenced by intention and desire.
We see incredible order and harmony and pattern which no accident can produce. The image of the human being is contained within the microscopic DNA strands of the fertilised egg in the womb. Consciousness is the intelligent force that started the blueprint which ultimately manifested itself as a particular form.
CAN AN ATHEIST COMMIE EVER UNDERSTAND QUNTUM PHYSICS?
Most people never raise their consciousness much above that of the beast and the spark of divinity within them remains dormant the whole of their lives .
Perception occurs in the gap of alert attention. This is the inner space.
Sabarimala pilgrimage is all about a brief gap ( around 9 seconds ) between 2nd and third flashes— where PURE AWARENESS heals and formats .
This is about quantum entrainment.
Prana is amplified and focused like a laser beam.
This is about quantum entrainment.
Prana is amplified and focused like a laser beam.
Biology is a quantum process All the processes in the body including cell communications were triggered by quantum fluctuations, and all higher brain functions and consciousness also appears at the quantum level.
On the subatomic level—mind is over matter. The brain and DNA is governed by the laws of quantum physics rather than the laws of biology or neurophysiology.
An act of simple observation as shown in the double slit experiment is an action of consciousness—as exponded in the Vedas.. A “particle” observation would momentarily “freeze” the molecules’ positions, resulting in the appearance of thought.
Another complementary “wave” observation where the proteins remained unobserved would produce changes in the energy of these waves, resulting in the arousal of feelings. Thus feelings and thoughts would show the same type of duality as waves and particles.
Can you ever get a dumb computer to intuitively assess the truth in a subtle argument or see the humor in a joke, to feel the emotional impact of music, philosophize about the meaning of life, or come up with counter intuitive solutions to unfamiliar problems?
It is possible to make conscious computers using the divine language Sanskrit , water for memory and DNA strand wiring. Conscious computers will laugh at a subtle joke or tell the moral of a story
Your Soul controls your mind . Our separation from each other is an optical illusion of consciousness. . Quantum coherent properties have been observed in biological systems . Quantum coherence in the microtubules of every cell is the key to consciousness..
Scalar waves is the point of fundamental intersection where matter and consciousness influence each other. Kundalini is the cellular expression of energy generated from the ZPF and this is why Kundalini exhibits psychic and trans-temporal effects. Scalar waves can be used in “precursor engineering” and can be coupled with intention and consciousness, and be used for healing and also to bring back the immune system in a previous blue print state.
Most modern people are stressed and harassed by their racing minds, which chase them around in the daytime like chattering monkeys and keeps them awake at night. Negative thoughts therefore create negative feelings and hence stress and illness.
Our inner voice evaluates, judges, compares and worries. Most people live with such a tormentor in their head draining them of energy. It is an awful burden not to be able to stop thinking . Up to 90 % of most people’s thoughts are meaningless playbacks of old “records” .
India there is the ancient tradition of the enlightened sage, the one who breaks free of ordinary human conditioning and attains a state called "awakening By various means such as deep meditation or by pure devotion, or by the control and understanding of the mind these historical figures broke through into universal consciousness itself, and beyond that even, into the pure awareness of the absolute.
They experienced a quantum leap and a arrived a state that cannot be defined and described. People simply called them the enlightened ones
OM opens up quantum tunneling, where the wormholes do NOT have a speed of light restriction.
Cosmic consciousness is the concept that the universe is a living superorganism with which animals, including humans, interconnect, and form a collective consciousness which spans the cosmos. Cosmic Consciousness lies in a mystic state above and beyond Self-consciousness, which is an acute sense of self-awareness.
Consciousness is not limited to the brain. The other chakras in our body are also conscious.
They express it through intelligent communication with other chakras, exchanging information energies .
Our billions of cells and DNA have memories that influence our behaviour and traits. Consciousness is a universal attribute of creation. DNA can never die. It merely changing its structure and appearance into a cavalcade of living beings.
If we stare back down this ‘great chain of being’, we see a continuous process of spiritual evolution. This is something Darwin will never understand , as he did not have the intelligence .
The classical physics of Newton takes a material perspective in which the Universe is composed of discrete building blocks, solid and unchangeable. Quantum physics takes a spiritual perspective in which there are no separate parts, in which everything is fluid and always changing.
After stupid Newton and party divorced spirit and classical science this planet is faced now with the question of how to promote the ascension of consciousness to higher levels of existence amongst the entire world population. With quantum physics, science is leaving behind the notion that human beings are powerless victims and moving toward an understanding that we are fully empowered creators of our lives and of our world.
With Newton, we were insignificant cogs in the Universal Machinery. With quantum physics, we are Creators of the Universe. Yin is formlessness; yang is form. Each contains the seed of the other. Yin and yang are conscious of each other, they are consciousness. Consciousness and existence each have a dual yin-yang structure in which form and formlessness alternate. .
The brain does not create consciousness, but consciousness created the brain.
RIPPLE is the fourth largest cryptocurrency in the world.. XRP, Ripple’s native currency, has taken the banking world by storm, soaring from under $0.01 to $0.30 a coin in less than a year—4300 %.
On Dec. 10, the company had a market capitalization of just over $9 billion. In just 3 days that market cap had more than doubled to $18.1 billion.
Year to date, Ripple’s XRP has seen its value jump more than 7,000% and its market cap increase by nearly 7,700%.
This surge has pushed Litecoin down to the fifth most valuable cryptocurrency. Both Ripple and Litecoin are still far below Bitcoin and Ethereum, however.
Ripple is a real-time gross settlement system (RTGS), currency exchange and remittance network by Ripple. Also called the Ripple Transaction Protocol (RTXP) or Ripple protocol, it is built upon a distributed open source Internet protocol, consensus ledger and native cryptocurrency called XRP (ripples).
Released in 2012, Ripple purports to enable "secure, instant and nearly free global financial transactions of any size with no chargebacks." It supports tokens representing fiat currency, cryptocurrency, commodity or any other unit of value such as frequent flier miles or mobile minutes.
At its core, Ripple is based around a shared, public database or ledger, which uses a consensus process that allows for payments, exchanges and remittance in a distributed process.
The network is decentralized and can operate without Ripple (enterprise); it cannot be shut down.
In Ripple, users make payments between each other by using cryptographically signed transactions denominated in either fiat currencies or Ripple's internal currency (XRP). For XRP-denominated transactions Ripple can make use of its internal ledger, while for payments denominated in other assets, the Ripple ledger only records the amounts owed, with assets represented as debt obligations
Ripple relies on a common shared ledger, which is a distributed database storing information about all Ripple accounts. The network is "managed by a network of independent validating servers that constantly compare their transaction records." Servers could belong to anyone, including banks or market makers.
Though the Ripple protocol is freeware, Ripple Labs continues to develop and promote the Ripple protocol, which confirms financial transactions via a network of distributed servers. Ripple Labs is currently assisting banks in integrating with the Ripple network.
A new ledger is created every few seconds, and the last closed ledger is a perfect record of all Ripple accounts as determined by the network of servers. A transaction is any proposed change to the ledger and can be introduced by any server to the network. The servers attempt to come to consensus about a set of transactions to apply to the ledger, creating a new ‘last closed ledger
XRP is the native currency of the Ripple network that only exists within the Ripple system. XRP are currently divisible to 6 decimal places, and the smallest unit is called a drop with 1 million drops equaling 1 XRP. There were 100 billion XRP created at Ripple's inception, with no more allowed to be created according to the protocol's rules
Proponents of bitcoin have criticized XRP for being "pre-mined," as XRP is built directly into the Ripple protocol and requires no mining. Also, Ripple Labs' distribution of the original limited amount of XRP currency has met with a fair amount of controversy, and in particular the founders' retainment of 20% is seen as a high percentage
Ripple acts as a payment network, RippleNet, and a cryptocurrency, Ripple XRP.
The platform makes it easy to transfer almost any currency to almost any other currency in the world in no longer than four seconds.
Alongside its cryptocurrency, Ripple operates as a payment network called RippleNet.
Currently, Ripple is focused on working with banks and other institutions in a bid to offer an efficient and cost-effective way of sending real-time payments around the world.
The real appeal of Ripple’s XRP for banks is its liquidity.
Using Ripple, if one wanted to transfer currency directly from China to the USA, they can trade CNY to XRP, (Ripples currency), and then send XRP to the recipient who will have an online Ripple wallet or a bank in the USA. From there, they can trade the XRP back into USD.
In comparison, transactions on Ethereum can take more than two minutes, and on Bitcoin payments can take more than an hour to be processed.
Ripple can be easily purchased using other cryptocurriencies like Bitcoin.
It is available on Bitstamp, where users can purchase them with their local currency.
Using an online wallet like GateHub, XRP can be stored in an online wallet. This will allow them to make purchases and even send XRP to other Ripple users.
Since XRP only works directly with banks ( read as Rothschild’s ) , the budding cryptocurrency is set to focus on developing networks to benefit finance corporations.
Although critics have questioned why the platform now focuses exclusively on banks, because it was launched to help everyday people make global transactions much easier.
But Ripple’s open nature means nodes are vulnerable to attack, which could leave users unable to access their accounts.
The Ripple network receives transactions from different nodes. The goal of consensus is to write the valid transactions to the ledger. These transactions are pushed forward in a batch to all other nodes. After 50% of the nodes approve the transactions, the batch with approved transactions is pushed further for higher approval ratings.
The network works in the iterative manner. They need to be approved first be at least 50% of the nodes and then for higher approvals. Once it reaches a super majority of approvals, i.e. 80% of the nodes approve the transaction, the transaction is then written on the ledger.
Again, Ripple is a non-minable cryptocurrency. It is a crypto currency designed as a payment network. The Ripple network accommodates other virtual currencies and also supports automated currency trades. XRP is the native currency of the Ripple Network. It only exists within the Ripple system.
Ripple or (XRP) is currently divisible to 6 decimal places, and the smallest unit is called a drop with 1 million drops equaling 1 XRP. There exists 100 billion XRP created at Ripple’s inception, and no more is allowed to be created according to the protocol’s rules.
Therefore, the system was designed so XRP will be a scarce resource with decreasing available supply, not dependent on any third party for redemption, XRP is the only currency in the Ripple network that does not entail counterparty risk, and it is the only native digital asset.
Ripple is a real-time gross settlement system (RTGS), currency exchange and remittance network by Ripple. Also called the Ripple Transaction Protocol (RTXP) or Ripple protocol, it is built upon a distributed open source Internet protocol, consensus ledger and native currency called XRP (ripples).
Currently, Ripple requires two parties for a transaction to occur: first, a regulated financial institution “holds funds and issues balances on behalf of customers.” Second, “market makers” such as hedge funds or currency trading desks provide liquidity in the currency they want to trade in.
At its core, Ripple is based around a shared, public database or ledger that has its contents decided on by consensus. In addition to balances, the ledger holds information about offers to buy or sell currencies and assets, creating the first distributed exchange. The consensus process allows for payments, exchanges and remittance in a distributed process.
ABOVE: THIS STUPID FELLOW RAGHURAM RAJAN DOES NOT UNDERSTAND REAL ECONOMICS--
HE IS FARTING THROUGH HIS MOUTH ABOUT BITCOIN.....
FUCK OFF YOU CUNT !
May 2010 $0.01
July 2010 $0.08
April 2011 $1.00
Dec 2011 $2.00
Dec 2012 $13.00
June 2013 $100
Nov 2013 $350
Mar 2014 $450
Sept 2016 $600
January 2017 $800
April 2017 $1,210
May 2017 $2,000
August 2017 $4,400
September 2017 $5,000
13 October 2017 $5,600
21 October 2017 $6,180
6 November 2017 $7,300
25 November 2017 $9,000 .
28 November 2017 $10,000
7th December 2017 $17,000
17th December 2017 $20,000
Below: 50 kilos is being supported by the spinal column away from body -- with swaying motion--dangerous for a 61 year old man
Below: 15 kilos is being held upside down behind the shoulder -- dangerous for a 61 year old man
"WE THE PEOPLE" WARN THE ELECTED EXECUTIVE AND JUDICIARY..
YOU HAVE SWORN SOLEMN OATHS BEFORE YOU SAT ON CHAIRS OF POWER -- THAT YOU WILL "UPHOLD THE INDIAN CONSTITUTION" ..
THIS SOLEMN OATH WAS TO GOD ( UPHOLDER OF DHARMA ) , THE WATAN AND THE PEOPLE--– NOT TO YOURSELF OR THE PERSON ADMINISTERING THE OATH TO YOU..
YOU HAVE NOT FOLLOWED YOUR OATHS -- AND NOW "WE THE PEOPLE" WHO ARE ABOVE THE CONSTITUTION DEMAND ANSWERS …
"COLLEGIUM JUDICIARY" IS NOT ALLOWED BY THE CONSTITUTION . THE ELECTED EXECUTIVE MUST ENSURE THIS DEFECT IF ADDRESSED IMMEDIATELY ..
"ELECTED EXECUTIVE " MUST KNOW THIS -- "WE THE PEOPLE" HAVE ELECTED AND EMPOWERED YOU . FOLLOW YOUR OATHS . ..
WE SEE AN INCREASING NEXUS BETWEEN BENAMI MEDIA ( CONTROLLED FROM ABROAD ) AND THE INDIAN JUDICIARY. ALMOST ALL MAJOR INDIAN MEDIA BARONS ARE MERE PUPPETS OF THEIR FOREIGN WHITE JEW MASTERS ..WE SAW THIS DURING THE JNU EPISODE ..
THE PROVISIONS OF THE CONSTITUTION ARE FLOUTED AGAIN AND AGAIN AND AGAIN.
EXAMPLE: THE CONSTITUTION TREATS ALL CHILDREN OF BHARATMATA THE SAME.
FOREIGN FORCES ( BILDERBERG CLUB ) ARE INTERFERING -- USING AND TREATING SOME SECTIONS AS "SPECIAL PENGUINS " . NCW AND NCM HAVE BEEN CREATED IN INDIA BY BILDERBERG CLUB
IN INDIA WE HAVE FEMALE GENDER GETTING MORE WEIGHT ( ZAIRA WAHID / ASARAM BAPU etc CASE )
IN INDIA WE HAVE "RESERVATIONS FOR DALITS "7 DECADES AFTER INDEPENDENCE. THERE IS ENORMOUS BRAIN DRAIN TO WESTERN NATIONS DUE TO THIS.
HAVE WE DENIED OPPORTUNITIES TO DALITS ??.
WHAT SYSTEM IS THIS WHERE RUNNERS WHO COME LAST IN A FAIR RACE ARE GIVEN ALL THE MEDALS?
CAN MY INCOMPETENT STEWARD ON MY SHIP WHICH I COMMAND DEMAND THAT HE BE ALLOWED TO NAVIGATE QUOTING SOME “ WHITE INVADER POISON INJECTED MANU SMRITI “ FOR PSYCHOLOGICAL RANSOM?
OR SOME PEABRAINED NURSE IN A BRAIN SURGERY THEATRE FOR THE MATTER ?
CHECK OUT THE VIDEO BELOW.
MANI SHANKAR AIYAR HAS GONE TO AN ENEMY NATION PAKISTAN ( ON BEHALF OF ITALIAN WOMAN SONIA GANDHI ) AND ASKED THEM OPENLY TO "ELIMINATE " ELECTED PM MODI .
CHECK OUT 1.13
IN ANY OTHER NATION MANI SHANKAR AIYAR WOULD BE ARRESTED AS SOON AS HE ARRIVES BACK IN INDIA AT THE AIRPORT --BY AGENCIES SWORN TO PROTECT BHARATMATA FROM EXTERNAL ENEMIES .
AFTER THE INQUIRY THE ITALIAN WOMAN AND HER HALF BREED SON WOULD ALSO BE IN JAIL … REMEMBER, THE COLLEGIUM JUDICIARY CANNOT INTERFERE WITH EXTERNAL THREATS AS PER THE CONSTITUTION.
YET NOTHING HAPPENED , WHY ? WHY ? WHY ?
"WE THE PEOPLE", THE "WATAN" AND "DHARMA" ( NATURAL JUSTICE ) RIDE ABOVE THE CONSTITUTION.
INDIA HAS BECOME A BANANA REPUBLIC ??
JAYALALITHAA HAD Z+ SECURITY.
SHE WAS ABANDONED IN APOLLO HOSPITAL..WHY? ALL COULD SEE THAT HER LEGS ARE CUT. SOME MANNARGUDI MELORD DECIDES AN INQUIRY IS NOT REQUIRED ?
MGR HAD Z+ SECURITY ..
HE WAS RULING WHILE HE WAS A "VEGETABLE" ON A WHEELCHAIR , SAME APOLLO HOSPITAL SHENANIGANS . AND THEY BRING IN WHITE DOCTORS TO BUTTRESS THEIR CASE ?
ARE WE NOT COMPETENT ENOUGH ? ARE WE A SLAVE NATION STILL?
DURING THIS TIME, WHEN MGR WAS A VEGETABLE, LTTE CONVERTED TO CHRISTIANITY. THE ENTIRE THORIUM RICH COASTAL BELT FISHERMEN OF TAMIL NADU GOT CONVERTED TO CHRISTIANITY--WITH FOREIGN CHRISTIAN NGOs DOING WHAT THEY WANTED IN TAMIL NADU.
THE MOTHER OF ALL SCAMS ( THORIUM SCAM ) WHICH HAPPENED WHEN MGR WAS A MERE PUPPET ON A WHEELCHAIR HAS BEEN KICKED UNDER THE CARPET .
THE ENTIRE RED CORRIDOR TRIBALS HAVE BEEN CONVERTED TO CHRISTIANITY AND TOLD TO RETAIN HINDU NAMES ..
CONTINUED TO 2-
CONTINUED FROM 1-
INDIAs CHRISTIAN POPULATION IS NOT 2.8% AS TOUTED BY INDIAN BENAMI MEDIA ..
THE RED CORRIDOR WAS CREATED RUING THE RULE OF THE ITALIAN WOMAN.
BE WARNED , WE ALLOWED 100% HINDU NE STATES TO BE CONVERTED TOTALLY TO CHRISTIANITY ... THE CHRISTIANS DECLARE THAT THEY ARE HINDUS IN CENSUS .
YSR WAS AN INSTRUMENT FOR CONVERSION IN TELUGU LAND..
WE HOLD OUR AGENCIES RESPONSIBLE FOR PROTECTING INDIA "EXTERNALLY AND INTERNALLY " RESPONSIBLE.
JUDICIARY IS NOT EMPOWERED BY OUR CONSTITUTION TO SAVE BHARATMATA .. MELORD JUDGES CAN ONLY SAVE PEOPLE WHO DO NOT HOLD A FOREIGN GUN AGAINST BHARATMATA . . MELORDS CAN ONLY INTERPRET LAWS , THEY CANNOT CREATE LAWS.
TODAY EVEN NGT IS CREATING LAWS MERRILY— JUST BECAUSE THEY HAVE COLLEGIUM MELORDS IN THE SALARY PAYROLL ...
LIKE "COLLEGIUM FORCES" NCW AND NCM -- NGT TOO WAS CREATED BY "BILDERGEBRG CLUB" TO RETARD INDIAs PROGRESS
WE HAVE "COLLEGIUM COMMIE PROFESSORS " IN JNU ( AN ISLAND OF COMMUNSIM IN THE WHOLE OF NORTH INDIA ) -- ARE WE BLIND ?
"WE THE PEOPLE" ARE GETTING INCREASINGLY DISILLUSIONED -- WE ARE APPALLED THAT FOREIGN CONTROLLED TRAITORS WHO INFLICT CUTS ON THE BODY OF BHARATMATA ARE BEING PROTECTED , RATHER THAN BEING DECIMATED WITH BENAMI EDIA SUPPORT .
REMEMBER, WE ABANDONED PM SHASTRI.
AFTER HIS MURDER NO INQUIRY WAS DONE. IT WAS ACCEPTED THAT INDIRA GANDHI WOULD RULE.. THE DAY SHASTRI WAS MURDERED , NETAJI SUBHASH CHANDRA BOSE WAS IN THE SAME TASHKENT HOTEL .
NETAJI SUBHASH CHANDRA BOSE ATTENDED NEHRUs FUNERAL HOPING TO BE MADE PM BY POPULAR PEOPLEs CALL-- HE WAS SHOVED OFF UNCEREMONIOUSLY BY SHASTRI FROM THE FUNERAL SITE.
WE ASK AJIT DOVAL, NIRMALA SITARAMAN AND RAJNATH SINGH-- FOLLOW YOUR OATHS YOU MADE BEFORE YOU SAT ON YOUR CHAIR OF POWER. YOU DONT NEED ANYBODYs PERMISSION . WHEN THE PMs LIFE IS IN DANGER--IT IS YOUR JOB TO PROTECT HIM..
PM MODI DOES NOT HAVE TO BEG YOU TO ARREST MANI SHANKAR AIYAR OR HIS FOREIGN DNA MASTER.
I WAS SPEAKING TO A 7 STAR HOTEL EXECUTIVE --WHEN PUTIN VISITED AN INDIAN CITY
ONE FULL MONTH BEFORE HE ARRIVED -- ENTIRE 4 FLOORS OF THE HOTEL WAS BOOKED BY KGB. THEY BROUGHT IN A CONTAINER OF ELECTRONIC DEVICES.
THEY WERE VERY POLITE TILL THE FINAL DAY-- WHEN THEY SUDDENLY BECAME LIKE ATATCK BULLDOGS AND TREATED ALL INDIANS LIKE SHIT ( TO PROTECT THEIR LEADER ). INDIAN ELITE COPS WERE SHOVED OFF .
PUTIN COULD NOT SLEEP AND WANTED A MASSAGE. WHEN TWO INDIAN MASSEURS WERE LABORING OVER HIM-- GUN TOTING KGB KEPT WATCH.. IT WAS NOT UPTO PUTIN TO SAY TO HIS KGB "GO AWAY" AND GIVE HIM PRIVACY.
WE ASK AJIT DOVAL AND INDIAs INTERNAL / EXTERNAL SECURITY AGENCIES --HULLO - DO YOU KNOW YOUR JOB. IF NOT SEND OUR AGENTS TO PUTINs KGB FOR TRAINING ..
WHY DID ROBERT VADRA AND PRIYANKA GANDHI MET THE CHINESE AMBASSADOR ? JUST WHO THE HELL ARE THEY ? HAVE THEY TAKEN WRITTEN PERMISSION ? DONT WE HAVE A SYSTEM ? CHINA IS AN ENEMY NATION LIKE PAKISTAN..
WILL PUTINs INTERNAL RUSSIAN ENEMIES BE ALLOWED TO MEET USA AMBASSADOR IN MOSCOW?
KYA HO RAHA HAI ?
WE WATCH !
PUT THIS COMMENT IN THE WEBSITES OF
ALL THREE ARMED FORCE CHIEFS
LOK SABHA SPEAKER
RAJYA SABHA SEAKER
VP VENKAIAH NAIDU
ALL DESH BHAKT LEADERS
capt ajit vadakayil
Almost every major cryptocurrency, from the flagship bitcoin to lesser known digital tokens like litecoin and dash, took a hit TODAY ( 22ND Dec 2017 ) , with some down as much as 33%.
Here’s the scoreboard :---
Bitcoin: $12,109 (-22.26%)
Ethereum: $592 (-20.34%)
Bitcoin cash: $2,032 (-33.667)
Ripple: $0.871 (-22.66%)
Litecoin: $210 (-30.56%)
Dash: $921 (-30.17%)
Proof of Concept (PoC), in explicit terms, refers to providing a proof that your concept will work. However, its inference differs across the industries.
For instance, in software development industry, it means verifying the technical viability of a product. In engineering, it is about developing a prototype to demonstrate the functionality of an idea.
In filmmaking or digital art, it refers to designing documents or prototypes to determine whether a new technique, technology or tool is a viable option. When applied to start-ups, PoC is a way to demonstrate that your idea has good market potential – it is workable, scalable and profitable.
A proof of concept (POC) is a demonstration, the purpose of which is to verify that certain concepts or theories have the potential for real-world application. POC is therefore a prototype that is designed to determine feasibility, but does not represent deliverables.
Proof of Concept (PoC) is a realization of a certain method or idea in order to demonstrate its feasibility, or a demonstration in principle with the aim of verifying that some concept or theory has practical potential. A proof of concept is usually small and may or may not be complete.
The overall objective of POC is to find solutions to technical problems, such as how systems can be integrated or throughput can be achieved through a given configuration.
In the business world, POC is how startups demonstrate that a product is financially viable. POC involves extensive research and review, and is submitted as a single package to concerned parties.
It includes examination of the revenue model, in which companies show projected revenue from products and services, and indicate development cost, long-term finance projections and how much the service costs to maintain and market. It is an excellent way for a business to evaluate itself internally and at proposed acquisitions and projects.
Proof of concept (POC) is documented evidence that a potential product or service can be successful.
Developing a proof of concept can help a product owner to identify potential technical and logistical issues that might interfere with success. It also provides the opportunity for an organization to solicit internal feedback about a promising product or service, while reducing unnecessary risk and exposure and providing the opportunity for stakeholders to assess design choices early on in the development cycle.
A proof of concept plan should address how the proposed product or service will support business goals. It should include clearly defined criteria for success, documentation for how the proof of concept will be carried out, an evaluation component and a proposal for how to move forward should the POC prove to be successful.
Developing such a plan is an important step in determining how an envisioned product or service will ultimately be delivered to users with the fewest number of flaws.
PoC should precede product development. Because, it will answer the following questions about your product:
Is there really a latent or an existing demand for your product? Perhaps your idea is good, but doesn’t appeal to the end-users.
If yes, then what features and uses customers expect from this kind of product? It is not about what you think they want. It is about offering what they want.
Can your product be mass-produced or grow as your business grows? If it can’t be scaled, then it’s of no use.
Can your product be monetised? If people are not willing to pay a price for it, it is not a profitable business model.
Can your product adapt to changing market needs? If not, either competition will eat you away or customers will stop buying from you.
PoC not only establishes the technical viability of your product, it also gives you an insight into what will work & what wouldn’t, what improvements it needs, what is the potential of its scalability and what is it the commercial feasibility.
When investors see a tangible proof of the potential success of your idea, they might get interested in backing your project.
So, it makes more sense for you to put aside time and budget for PoC before taking a headlong plunge into a full-fledged product development or starting the business.
For a start-up entrepreneur, PoC is the best bet to minimize the risk of losing money on an idea that is not worthwhile. And, if it proves that your idea is super, then there should be no stopping you!
Hashgraph is an advanced type of distributed ledger technology developed by Swirlds, a US-based company. The key features of hashgraph algorithm includes fast, secure and fairness of access.
Hashgraph is a data structure and distributed algorithm that reduces the requirement of major computation power and massive energy consumption. Moreover, hashgraph is expected to eliminate Ripple in banking and finance application.
It can carry out functions faster than blockchain, and takes only a second for hundreds of thousands of transactions. These factors are expected to provide major growth opportunity to decentralized applications including games, stock market, and auctions.
Most applications that require thousands of transactions per second require community agreement on the order of transactions in near real time. For example, Google Apps for Work includes docs, sheets, and slides that can be offered without requiring users to trust Google, or a distributed eBay that does not require a server to enforce the auction rules, to improve system security. This feature is attributed to fuel the growth opportunity of global hashgraph market.
The main objective of hashgraph is to generate trust among user by providing advanced security solutions for online transactions. The hashgraph algorithm achieves this by virtue of its features such as being fast, fair, providing Asynchronous Byzantine Fault Tolerance (aBFT), efficient, ACID compliant, inexpensive, DoS resistant, time stamped, and optionally non-permissioned.
These features are attributed to broader range of applications of hashgraph, which includes distributed capital markets, distributed auctions, cryptocurrency with native micropayments, improved collaboration apps, and distributed gaming.
In both blockchain and hashgraph algorithm, one thing is common that is transaction can be generated by any user and the data will eventually be stored into a block or register and then spread through the users. In blockchain technology, these blocks are used to form a long single chain.
Therefore, if two blocks are created at the same time then one will be selected, while the other is rejected. In hashgraph, each and every block is used, which makes it more just. Hence, all data or information stored in all branches will exist forever and all branches will back together to make a single chain.
Also, when various blocks come in rapidly together, the blockchain may fail to work due to faster development of branches. For this reason some mechanism is required to slow down the operating speed of blockchain. Where hashgraph is not affected by rapid growth.
There is no restriction on transaction, as anyone can make block of transaction at any time they want. Hence, its function is very simple and has faster processing rate. Hashgraph consists of Byzantine agreement and fairness, which makes it simple. Byzantine is not present in blockchain and the technology rejecting blocks is considered to be unfair.
In the hashgraph technology, no data of order of transactions can be manipulated by any individual. Moreover, no individual can stop a transaction from entering the system, also the process cannot be delayed. Conversely, in blockchain technology, there is a chance of delay by one or two mining periods, when many branches are refused to be included in blockchain.
Furthermore, no hacker is able to stop a member to record a transaction hashgraph, attackers cannot stop a member from recording a transaction other than for resorting to blocking their internet access.
The hashgraph is Byzantine. It provides advanced security for the prevention of cyber-attacks, due to this no individual can change the data stored in block once they reached to the register.
The hashgraph market is expected to be segmented on the basis of geography in North America, Europe, Asia Pacific, Latin America, and Middle East and Africa regions. The market in North America is expected to be dominant in the global market. Hashgraph technology is soon be accepted by a major part of local US finance industry as a security solution.
Hashgraph platform enables the connection of the power of peer-to-peer decision-making and record keeping in cryptocurrency and finance by public applications such as Bitcoin and Ethereum, and in private banking networks such as IBM Hyperledger.
Proof of Stake (PoS)
The proof-of-work (POW) system used by Bitcoin and other cryptocurrencies fails to create an incentive for miners to hold onto their coins, which means that several thousands of BTC had to be sold per day to pay for electricity and rent, alone. This has changed with artificial PUMPING of Bitcoin value
While Bitcoin uses PoW mining, Ethereum uses a Proof of Stake model (PoS) for reaching consensus. Proof of stake mining asks users to prove ownership of a certain amount of currency (their “stake” in the currency). Instead of buying computers and electricity for mining in a PoW system, a PoS systems uses the capital to acquire the coins/tokens that allow you to validate transactions.
In proof-of-work, miners compute puzzle answers at dizzying speeds, a process that requires money for equipment and electricity. In proof-of-stake, participants similarly commit money to the system, but not with electricity and equipment. With Casper, virtual miners, known as validators, commit money to the system with the understanding that they will lose their deposits if they don't follow the rules.
Proof of Stake does not rely on hashing power (and therefore electricity) to gain consensus. Instead, nodes opt to be ‘forgers’ in the ecosystem by putting up a stake (or non-trivial amount of cryptocurrency). If these forgers play by the rules, they get a % of interest on their cryptocurrency annually. If they are caught cheating, they lose their stake to the network.
There is no unnecessary electricity usage for this algorithm, as the only compute being used is for handling transactions and building the blockchain. This is tiny compared to the amount of hashing power required by networks like Bitcoin today.
As more cryptocurrencies get released, more are relying on Proof of Stake to handle consensus, making them more environmentally friendly.
Proof of Stake is the most common alternative to Proof of Work. In Proof of Stake a ‘validator’ invests in the coins of the system, instead of investing in expensive computer equipment in a race to mine blocks . Mining is somehow like a lottery, and in Proof of Stake you get the tickets for lockings your cryptocurrency token, while in Proof of Work you have to let your hardware create tickets.
Note the term validator, because no coin creation exists in PoS. Instead, all the coins exist from day one, and validators are paid strictly in transaction fees.
In PoS, your chance of being picked to create the next block depends on the fraction of coins in the system you own. A validator who has 300 coins will have a three times bigger chance to be chosen than someone who has 100 coins.
Once a validator creates a block, that block still needs to be committed to the blockchain and different PoS systems vary in how they handle this. For instance, in Tendermint every node in the system has to sign off on a block until a majority vote is reached. On the other hand, in other systems, a random group of signers is chosen.
Now we have a problem. What is to discourage a validator from creating two blocks and claiming two sets of transaction fees, and what is to discourage a signer from signing both of those blocks? This has been called the ‘nothing-at-stake’ problem, since a participant with nothing to lose has no reason not to behave badly.
Blockchain engineers are trying to find ways to tackle this and other issues in the burgeoning field of ‘crypto-economics’ and one answer is to require a validator to lock their currency in a type of virtual vault.
Those coins are slashed if the validator tries to double sign or fork the system.
Proof of Stake has several advantages against Proof of Work:
It decreases the amount of electricity that the network needs.
It decreases the initial investment in mining, and in this way keeps mining more decentralized.
It produces less volatile time intervals between new blocks and in this way has better scaling properties.
It is secure against a number of attacks based on the distribution of the hardware.
The first coin to implement PoS was Peercoin, and blackcoin and NXT followed it. Ethereum currently relies on PoW. However, it is planning a move to PoS in early 2018.
All currently available PoS coins have in common that they need an initial and trusted setup to keep a consensus. This is problematic for Blockchain purists but seems to work in practice.
The economic context of PoS is maybe even more problematic. It sets incentives to hoard coins by giving a direct interest that doesn’t require any economic action.
Proof of Stake takes away the energy and computational power requirement of PoW and replaces it with stake. Stake is referred to as an amount of currency that an actor is willing to lock up for a certain amount of time.
In return, they get a chance proportional to their stake to be the next leader and select the next block. There are various existing coins which use pure PoS, such as Nxt and Blackcoin.
In chain-based proof of stake, the algorithm pseudo-randomly selects a validator during each time slot (eg. every period of 10 seconds might be a time slot), and assigns that validator the right to create a single block, and this block must point to some previous block (normally the block at the end of the previously longest chain), and so over time most blocks converge into a single constantly growing chain.
In BFT-style proof of stake, validators are randomly assigned the right to propose blocks, but agreeing on which block is canonical is done through a multi-round process where every validator sends a "vote" for some specific block during each round, and at the end of the process all (honest and online) validators permanently agree on whether or not any given block is part of the chain.
Note that blocks may still be chained together; the key difference is that consensus on a block can come within one block, and does not depend on the length or size of the chain after it.
Proof of stake opens the door to a wider array of techniques that use game-theoretic mechanism design in order to better discourage centralized cartels from forming and, if they do form, from acting in ways that are harmful to the network (eg. like selfish mining in proof of work).
Reduced centralization risks, as economies of scale are much less of an issue. $10 million of coins will get you exactly 10 times higher returns than $1 million of coins, without any additional disproportionate gains because at the higher level you can afford better mass-production equipment.
Capt. Ajit Vadakayil January 4, 2018 at 11:38 AM
JIGNESH MEVANI MUST BE JAILED IMMEDIATELY--HE IS NOT A PATRIOT ..
TIME TO BREAK THE BIGGEST BOMBSHELL OF 2018..
THE LEGEND OF CHRISTIAN NOSTRADAMUS WAS CREATED BY JEW ROTHSCHILD ( FRENCH BRANCH )..
NOSTRADAMUS WAS A JEW…
I HAVE READ HIS BOOK OF PREDICTIONS AT THE AGE OF 11.. THE BOOKS IS STILL IN MY HOME LIBRARY..
HIS QUATRAINS ARE VAGUE….
PEOPLE LIKE HITLERs NAME WAS CONVERTED TO HISTER TO ACCOMODATE THE PREDICTIONS..
JEW HITLER WAS USED BY ROTHSCHILD TO CARVE OUT ISRAEL -- HIS ORIGINAL NAME WAS NOT HILTER ( BUT HEIDLER AS PER SCHOOL RECORDS )-- IT WAS GRANTED TO HIM..
THIS IS A PERFECT CASE OF CREATING TRUTHS VIA THE BACK DOOR..
DURING WW1 AND WW2 --ROTHSCHILD DROPPED LEAFLETS ALL OVER EUROPE QUOTING NOSTRADAMUS…
The book of predictions is Les Propheties, a collection of 942 poetic quatrains allegedly predicting future events. The book was first published in 1555 and has rarely been out of print since his death. ..WHY ?..
WHO IS SO KEEN ON PROPAGATING THE FAME AND POWERS ( SIC) OF NOSTRADAMUS ..
JEW NOSTRADAMUS WAS MADE POPULAR BY HIS ALMANAC WHICH WAS LIFTED FROM KERALA ..
Capt Ajit Vadakayil declares today at 1105 AM, on 4th Jan 2018-- SATYA VACHAN that Nostradamus's predictions have been DELIBERATELY kept vague-- they could be applied to virtually anything, and are 100% useless for determining whether Nostradamus had any real prophetic powers. ..
Most of the quatrains deal with disasters, such as plagues, earthquakes, wars, floods, invasions, murders, droughts, and battles—all undated-..
ANY CHARLATAN CAN WRITE SUCH QUATRAINS …
OUR OWN VEDAS HAS SUCH COOKED UP VERSES INJECTED --BY JEW ROTHSCHILD..
THE FRENCH REVOLUTION WAS WORKED VIA BACKDOOR BY FRENCH ROTHSCHILDs FREEMASONS --THIS WAS THE FIRST REAL VICTORY OF FAKE NOSTRADAMUS..
BELOW IS THE FRENCH REVOLUTION PREDICTION..( BULLSHIT )..
THE TRUTH IS ROTHSCHILDs MEDIA LIE THAT THEY HEARD THE QUEEN SAYING "IF PEOPLE DONT HAVE BREAD LET THEM EAT CAKE "..
Century VI.--Quatrain 74.
La. dechassée 1 an regne tournera,
Ses ennemies trouvés des conjurés:
Plus que jamais son temps triomphera,
Trois et septante à mort trop asseurés.
She who was proscribed will return to the kingdom,
Her enemies will be treated as conspirators;
More than ever her time (or empire) will triumph;
Seventy-three years its deathly domination is assured.
His astrologies were disastrously wrong, containing flagrant astronomical errors—we in Kerala know astronomy..
He did not use a bowl of water as a "magic mirror" when writing his prophecies, he used a regular mirror. ..
JEW ROTHSCHILD MATCHED HIS DEATH DATE ON LATER EDITIONS…
If he predicted his own death in Presage 141, he missed it by a year — so some editions show a version of that Presage posthumously edited by his secretary to match the correct date…
Nostradamus was reputed to be a plague doctor—he knew SHIT about plague..
JEW ROTHSCHILD GAVE BULL THAT NOSTRADAMUS WAS BURIED UPRIGHT LIKE HINDU JIVAN MUKTS .. IN REALITY HE WAS BURIED IN LYING POSITION
The RIDICULOUS tale about Nostradamus is that he was buried standing up so that nobody would step on his grave; and when his body was later disinterred during the French Revolution to be relocated, he was wearing a FORGED medallion on which the exact date of the disinterment was engraved…
I have two editions of his book Les Propheties—both are different to accommodate LIES converted to truths ..
Various versions were published during his lifetime, and there is no one authoritative collection
Over 200 different translations and interpreted versions have been published since his death, so the folly of hoping to find Nostradamus' original text is IMPOSSIBLE..
CONTINUED TO 2-
CONTINUED FROM 1-
Nobody has ever used Nostradamus' writings to predict a future event in specific terms which later came true. Nobody has ever used Nostradamus' writings to predict a future event in specific terms which later came true. Nobody has ever used Nostradamus' writings to predict a future event in specific terms which later came true.
Nostradamus' writings are exploited in a number of fallacious ways. Ambiguous and wrong translations, "creative" interpretations, hoax writings, fictional accounts, and the breaking of non-existent codes within his quatrains all contribute to a vast body of BULLSHIT work, all of it wrong, and many times the size of everything Nostradamus ever actually wrote…
IT WAS ONLY USED BY JEW ROTHSCHILD FOR FAKE PROPAGANDA –WITH THE SINGLE MINDED AIM OF CARVING OUT ISRAEL..
SO HOW DOES CAPT AJIT VADAKAYIL KNOW ?..
Nostradamus wrote in 16th century French, which was significantly different from modern French…
THIS IS LIKE OUR JESUS WHEN THE LETTER J NEVER EXISTED TILL THE 17TH CENTURY !..
Rothschild’s histrorians gave bull that fear of prosecution by POPE for heresy compelled Nostradamus to write only vaguely, but there is no historical evidence for this…
Some books and websites even go so far as to allege the presence of meaningful anagrams found in modern English translations, or even more strangely, English anagrams found within French translations…
Erika Cheetham—an agent of Jew Rothschild was involed in MODERN bull..
Cheetham's books were full of historical events into which she shoehorned Nostradamus' quatrains, with word, name and number substitutions whenever convenient, and she called them "amazingly accurate predictions".
Occasionally she went out on a limb and made future predictions, and when those years came and went with none of her predictions coming true, she'd issue updated editions of her books with new names and dates and make the same tired old predictions again. First she interpreted references to Moammar Qaddafi, and later changed them to the Ayatollah Khomeini, and later changed them again to Saddam Hussein..
NEW YORK NEVER EXISTED DURING TIMES OF NOSTRADAMUS .. IT IS NOT THERE IN THE BOOK I READ IN MY CHILDHOOD—WHICH IS IN MY LIBRARY ( BROUGH FROM AN OLD CALICUT BOOK STORE –PROPERTY OF AN ENGLISHMAN IN CALICUT WHO DIED 150 YEARS AGO ) ..
In the city of York there will be a great collapse,
2 twin brothers torn apart by chaos
While the fortress falls; the great leader will succumb;
Third big war will begin when the big city is burning.
On the 11th day of the 9 month,
Two metal birds will crash into two tall statues
In the new city,
And the world will end soon after.
WITH EVERY NEW EDITION JEW ROTHSCHILD DELETED AND INSERTED MERRILY-- TO MAKE THE BOOK HOLD WATER..
IT TAKES A CAPT AJIT VADAKAYIL TO EXPOSE JEW NOSTRODAMUS ( A MERE FRONT OF ROTHSCHILD ) LIKE JEW HITLER ..
MY REVELATIONS NOW JUMP TO 52.95%..
Capt ajit vadakayil
Capt. Ajit Vadakayil
January 11, 2018 at 7:01 PM
JUDGES ELECT JUDGES LIKE JNU COMMIE PROFESSORS…
NAPUNSAKS PM MODI AND LAW MINISTER RAVISHANKAR PRASAD ARE SHIVERING IN FRIGHT --THEY CANT MOVE …
BOTH THESE TIMID FELLOWS SWORE TO UPHOLD THE CONSTITUTION…
INDIAN CONSTITUTION DOES NOT ALLOW JUDGES TO ELECT JUDGES..
INDIA IS THE ONLY NATION ON THE PLANET WHERE JUDGES ELECT JUDGES..
PEOPLE LIKE JEW NOAM CHOMSKY GIVE FIATS TO COLLEGIUM MELORDS .. .
MOST OF OUR COLLEGIUM JUDGES ARE PEA BRAINED . . THEY WERE FOOT SLOGGING UNSUCCESSFUL LAWYERS . ..
MOST OF THESE LOSER LAWYERS BECAME JUDGES TO C0CK A SNOOK AT THEIR SUCCESSFUL COLLEAGUES WHO DROVE MERCEDES CARS WHILE THEY FOOT SLOGGED WITH HAWAI CHAPPALS …
WE KNOW COLLEGIUM JUDGES HAVE FOREIGN SUPPORT WHEN THEIR LEGISTLATE , DO EXTREME JUDICIAL OVERREACH . . . . . . .
BHARATMATA IS RACING TO BE THIS PLANETS NO 1 SUPERPOWER IN 15 YEARS --BEFORE THAT THE NEW WORLD ORDER WANTS INDIA TO IMPLODE. ..
OUR COLLEGIUM JUDICIARY BURNT MIDNIGHT OIL TO OPEN CHAMIYA BARS ( WH0RE HOUSES IN MUMBAI ) AS IF TWO DOZEN GOOD LOOKING DANCING GIRLS CANT GET A DECENT JOB..
BREAD WINNERS OF ENTIRE FAMILIES HAVE BEEN ROTTING IN JAIL WITHOUT A TRIAL FOR THREE DECADES .. .
ONE OF THE REASONS FOR NAXALISM , IS BECAUSE OF THE COLLEGIUM JUDICIARY . . .. POOR UNDERTRIALS WHO ARE BREAD WINNERS ARE KEPT IN JAIL FOR DECADES WITHOUT A TRIAL . .. .
POOR PEOPLE DO NOT HAVE THE WHEREWITHAL TO PROVIDE BAIL MONEY OR PERSONAL SURETY . . .WITH ANOTHER MAN COMING AND SHOWING ALL THOSE DOCUMENTS WHICH ARE REQUIRED FOR THE GUARANTEE . ...
WHY IS THE INDIAN GOVT INSISTING ON BAIL MONEY FROM VERY POOR PEOPLE ? . ..
Article 312 of the Constitution provides for the creation of an all-India Judicial Service common to the Union and the States. ….
JUDGE CANNOT CREATE OR REPEAL LAWS..THEY CAN ONLY INTERPRET LAWS, WHEN ASKED TO DO IT—NOT BY FOREIGN FINDED NGO PIL….
IF CONTENT IS KING- CONTEXT IS GOD !!......
BURN EVERY SINGLE PAST JUDGEMENT BY COLLEGIUM SUPREME COURT JUDGES........ THESE PAST JUDGEMENTS ARE BEING USED TO HIJACK JUSTICE BY "OUT OF CONTEXT " REFERENCE .....
EVERY SINGLE CASE MUST BE SEEN WITH FRESH EYES WITHIN THE PERIMETER OF NATURAL JUSTICE AND CONTEXT..... SOME STUPID JUDGES HAVE EVEN USED RIDICULOUS PROSE IN THEIR JUDGEMENTS , TO SHOW THAT THEY ARE POETS AND PHILOSOPHERS -- EVEN QUOTING A MAD MAN NAMED SIGMUND FREUD.....
OUR FAILED LAWYERS TURNED COLLEGIUM JUDGES DO NOT HAVE THE CEREBRAL WHEREWITHAL TO UNDERSTAND THAT SANE/ FAIR JUDGMENTS MUST BE WITHIN THE PERIMETER OF CONTEXT --AND NATURAL JUSTICE MUST BE INHERENT.......
WE THE PEOPLE OF INDIA DO NOT WANT LAWYERS TO BECOME JUDGES--RATHER THERE MUST BE A NATION WIDE EXAM ( LIKE IIT/ IAS ) TO CHOOSE JUDGES . ..
WE KNOW THE BOTTOM OF THE SCHOOL CEREBRAL BARREL BECAME LAWYERS -- UNLESS THEY WERE LAWYER SONS ( LIKE BOLLYWOOD STAR SONS ) LIKE MAHESH JETHMALANI ....
GANDHI USED TOLSTOY OUT OF CONTEXT TO MAKE INDIANS SLAVES....... MEANING IS CONTEXT BOUND..... IT WAS JEW ROTHSCHILD WHO CREATED THE LEGEND THAT LADY JUSTICE IS BLIND....... JUSTICE MUST NEVER BE BLIND.....
THE RICHEST LAWYERS IN SUPREME COURT ARE THE ONES WHO HAVE A “SETTING “ OR NEXUS WITH THE COLLEGIUM JUDGE AND THE OPPOSITE CAMP LAWYER… SAB MIL BHAANTKE KHAATE HEIN….
THESE RICH LAWYERS CANT ARGUE FOR NUTS -- IF SO HOW DO THEY WIN THEIR CASES ?... WE MUST DISMANTLE THE COLLEGIUM JUDICIARY AND REBUILD IT… .
CONTINUED TO 2-
CONTINUED FROM 1-
In USA the attorney General interprets the laws that govern executive departments, and examines alleged violations of federal laws…. In India our attorney general does NOT know his powers. ..
CONTEMPT OF COURT APPLIES WHEN THE COURT IS IN SESSION AND SOMEONE IN THE COURT RELATED TO THE CASE UNDERMINES THE JUDGE'S AUTHORITY REPEATEDLY . …
CONTEMPT OF COURT CANNOT BE APPLIED ALONG THE LENGTH AND BREATH OF INDIA ( ON LAND/ UNDER GROUND/ IN SPACE ) , AS IT IS MEANT WITHIN THE CONFINES OF A WEE BRICK AND CEMENT BUILDING COURT ROOM …
ONE STUP1D JUDGE HAD SLAPPED BOTH "SEDITION" AND "CONTEMPT OF COURT " ON ARUN JAITLEY FOR SAYING CONSTITUTION DOES NOT SUPPORT "COLLEGIUM SYSTEM" BUT ONLY NJAC …
OUR FAILED LAWYERS TURNED COLLEGIUM JUDGES DO NOT HAVE THE CEREBRAL WHEREWITHAL TO UNDERSTAND THAT SANE/ FAIR JUDGMENTS MUST BE WITHIN THE PERIMETER OF CONTEXT --AND NATURAL JUSTICE MUST BE INHERENT....
THE MELORDS CANT EVEN UNDERSTAND THE MEANING OF CIRCUMSTANTIAL EVIDENCE ... THIS IS WHY NAXALS LOOK INTO THE CAMERA AND SAY--WE TRUST OUR SUPREME COURT... -- FOR FAKE WITNESSES CAN BE PRODUCED OUT OF THIN AIR BY FOREIGN MONEY ( LIKE TEESTA SETALVAD )….
WE DO NOT WANT UNELECTED PEOPLE TO RUN THE WATAN……..
WE THE PEOPLE ARE WATCHING…. REMEMBER-- THE POWER OF THE CHAIR IS ONLY AS LONG AS YOU SIT ON IT-- ONE DAY THESE PEOPLE WHO WENT AGAINST THE WATAN AND THE CONSTITUTION WILL RETIRE…..
CANCEL THE EXTENSIVE BRITISH COLONIAL STYLE VACATIONS OF THESE MELORDS .....THERE ARE TOO MANY CASES PENDING...
THE TIME HAS COME FOR "WE THE PEOPLE" TO DECLARE --WHATEVER LAWS HAVE BEEN CREATED BY JUDGES ARE ALL NULL AND VOID -- WE KNOW THESE " JUDGE CREATED LAWS "….
THE DAY WILL COME WHEN THE SYSTEM WILL BREAK DOWN -- THE JUDGES WILL BE JAILED--THEY WILL LOSE THEIR PENSIONS…. THIS WILL HAPPEN WHEN UPSET POLICE TELLS THE JUDGE " MAKE YOUR OWN ARREST… WE ARE DONE WITH JUDGES PLAYING GOD !"….
PM MODI-- WE ELECTED YOU FOR 5 YEARS -- YOU HAVE ALLOWED COLLEGIUM JUDGES TO SHIT ON BHARATMATAs FACE -- WE THE PEOPLE ARE SHOCKED AND DISMAYED…
WHO RULES INDIA ?
PM MODI OR THE " SOLI / FALI IMMIGRANT GANG " ?... KYA HO RAHA HAI ?...
WE DONT WANT LAWYER TURNED JUDGES TO INTERFERE WITH BHARATMATAs SECURITY-- )… KASHMIRI MUSLIMS WHO HAVE DRIVEN AWAY HINDU PANDITS, USURPED THEIR LANDS AND DESTROYED THEIR TEMPLES -- ARE CALLING THEMSELVES "MINORITY" AND MILKING THE BENEFITS – ..
NCM / NHRC ( CONTROLLED FROM ABROAD ) PLAYS ALONG… WE THE PEOPLE DEMAND TO KNOW-- THE ITALIAN WAITRESS GAVE 10 BILLION EUROS TO ITALY ZONE--- MODI GAVE 10 BILLION USD TO AFRICA AND 10 BILLION USD TO BANGLADESH…. WHAT HAVE YOUR DONE FOR KASHMIRI PANDITS SO FAR ? …
TEENAGED KASHMIRI PANDIT SCHOOL GIRLS ARE STILL LIVING IN TENTS ?... JUDGES HAVE DESTROYED THIS WATAN DUE TO ENDLESS HAIRSPLITTING , MAKING DECISIONS OUT OF CONTEXT--WITHOUT DHARMA OR NATURAL JUSTUCE…ENOUGH IS ENOUGH!..
WE KNOW WHY COLLEGIUM JUDGES GIVE PREFERENCE TO PILs FROM DESH DROHI TROJAN HORSE NGOs… ..
READ ALL 7 PARTS OF POST BELOW ...- punch into Go0gle search -- - . . …. . . . . .FOREIGN FUNDED TROJAN HORSE NGOs , PIL, JUDICIAL OVERREACH VADAKAYIL .. ….
................................................... RIGHT TO PRIVACY IN INDIA IS NOT A FUNDAMENTAL RIGHT SAYS CAPT AJIT VADAKAYIL .........................
..................... TIME HAS COME TO SAVE THE WATAN THE TIME IS NOW VADAKAYIL ...................... capt ajit vadakayil ..
As of Jan. 13 2018, 16.8 million bitcoins (BTC), or 80 percent of the entire Bitcoin supply, were mined. This means only 4.2 million bitcoins, or 20 percent, are left to mine until Bitcoin’s 21 million supply cap is reached.
With such a 21 million cap in place, the more bitcoins are mined, the more scarcity is produced on the market.
Scarcity arguably creates demand, which in turns makes the coins more valuable. Once 21 million bitcoins have been mined, it will become even harder to obtain them, also potentially making each coin more valuable.
Miners currently receive a 12.5 BTC reward for every block that they mine, but Nakamoto’s protocol also requires that the mining reward is halved every 210,000 blocks, or approximately four years.
The next miner halving will take place within two years, approximately in early June 2020 depending on hashrate, bringing the rewards down to 6.25 BTC per mined block.
Not every digital currency is mineable like BTC. Some cryptocurrencies are created with the entire supply released all at once, in which case the total supply is either held or in circulation and there is no way to “mine” or mint new coins.
Some examples of non-mineable digital currencies are Ripple, IOTA, NEM, NEO, Qtum, Omisego, Lisk, Stratis, Waves, and EOS.
It is theoretically possible to increase Bitcoin’s 21 million capped supply of Bitcoin via a 51 percent or a Sybil attack, but so far neither of these manipulations has proven feasible in the case of BTC.
Altcoin Krypton, which is based on Ethereum, experienced a 51 percent attack in August 2016, but no other such attacks have taken place since then.
Sybil attack--An attacker can attempt to fill the network with clients controlled by him, you would then be very likely to connect only to attacker nodes. Although Bitcoin never uses a count of nodes for anything completely isolating a node from the honest network can be helpful in the execution of other attacks.
This state can be exploited in (at least) the following ways:---
The attacker can refuse to relay blocks and transactions from everyone, disconnecting you from the network.
The attacker can relay only blocks that he creates, putting you on a separate network. You're then open to double-spending attacks.
If you rely on transactions with 0 confirmations, the attacker can just filter out certain transactions to execute a double-spending attack.
Low-latency encryption/anonymization of Bitcoin's transmissions (With Tor, JAP, etc.) can be defeated relatively easy with a timing attack if you're connected to several of the attacker's nodes and the attacker is watching your transmissions at your ISP.
Bitcoin makes these attacks more difficult by only making an outbound connection to one IP address per /16 (x.y.0.0). Incoming connections are unlimited and unregulated, but this is generally only a problem in the anonymity case, where you're probably already unable to accept incoming connections.
Looking for suspiciously low network hash-rates may help prevent the second one.
Both Bitcoin and Ethereum mining are very centralized, with the top four miners in Bitcoin and the top three miners in Ethereum controlling more than 50% of the hash rate.
The Bitcoin cryptocurrency records its transactions in a public log called the blockchain. Its security rests critically on the distributed protocol that maintains the blockchain, run by participants called miners.
Conventional wisdom asserts that the mining protocol is incentive-compatible and secure against colluding minority groups, that is, it incentivizes miners to follow the protocol as prescribed. Bitcoin mining protocol is not incentive-compatible.
An attack with which colluding miners obtain a revenue larger than their fair share. This attack can have significant consequences for Bitcoin: Rational miners will prefer to join the selfish miners, and the colluding group will increase in size until it becomes a majority.
At this point, the Bitcoin system ceases to be a decentralized currency. Unless certain assumptions are made, selfish mining may be feasible for any group size of colluding miners
THIS POST IS NOW CONTINUED TO PART 16, BELOW—
CAPT AJIT VADAKAYIL