Bitcoin: A Peer-to-Peer Electronic Cash System
Satoshi Nakamoto
[email protected]
https://t.co/G8BUvnF9nT
Abstract. A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial
Commerce on the Internet has come to rely almost exclusively on financial
2. Transactions
We define an electronic coin as a chain of digital signatures.

We need a way for the payee to know that the previous owners did not sign any earlier transactions. For our purposes, the earliest transaction is the one that counts, so we don't care about later attempts to double-spend. The only way to confirm the absence of a
3. Timestamp Server
The solution we propose begins with a timestamp server. A timestamp server

4. Proof-of-Work
To implement a distributed timestamp server on a peer-to-peer basis, we will need to use a proof- of-work system similar to Adam Back's Hashcash [6],
For our timestamp network, we implement the proof-of-work by incrementing a nonce in the block until a value is found that gives the block's hash the required zero bits. Once the CPU effort has been expended to make it satisfy the proof-of-work, the block cannot be
The proof-of-work also solves the problem of determining representation in majority decision making. If the majority were based on

To compensate for increasing hardware speed and varying interest in running nodes over time, the proof-of-work
5. Network
The steps to run the network are as follows:
2) Each node collects new transactions into a block.
3) Each node works on finding a difficult proof-of-work for its block.
4) When a node finds a proof-of-work, it broadcasts the block to all nodes.
6) Nodes express their acceptance of the block by working on creating the next block in the
chain, using the hash of the accepted block as the previous hash.
New transaction broadcasts do not necessarily
By convention, the first transaction in a block is a special transaction that starts a new coin owned by the creator of the block. This adds an incentive for nodes to support the network, and provides a way to initially distribute coins into circulation, since there
The incentive may help encourage nodes to stay honest. If a greedy attacker is able to assemble more CPU power than all the honest nodes, he would have to choose
7. Reclaiming Disk Space
Once the latest transaction in a coin is buried under enough blocks, the spent transactions before it can be discarded to save disk space. To facilitate this without breaking the block's hash, transactions are hashed in a Merkle Tree

8. Simplified Payment Verification
It is possible to verify payments without running a full network node. A user only needs to keep a copy of the block headers of the longest proof-of-work

9. Combining and Splitting Value
Although it would be possible to handle coins individually, it would

The traditional banking model achieves a level of privacy by limiting access to information to the parties involved and the trusted third party. The necessity to announce all transactions publicly precludes this method, but privacy can still be maintained by breaking

We consider the scenario of an attacker trying to generate an alternate chain faster than the honest chain. Even if this is accomplished, it does not throw the system open to arbitrary changes, such as creating value out of thin air or taking money that never
The probability of an attacker catching up from a given deficit is analogous to a Gambler's Ruin problem. Suppose a gambler with unlimited credit starts at a deficit and plays potentially an infinite number of trials to try to reach breakeven.
p = probability an honest node finds the next block
q = probability the attacker finds the next block
The receiver generates a new key pair and gives the public key to the sender shortly before signing. This prevents the sender from preparing a chain of
The recipient waits until the transaction has been added to a block and z blocks have been linked after it. He doesn't know the exact amount of progress the attacker has made, but assuming the honest blocks took the average expected time per block, the
each amount of progress he could have made by the probability he could catch up from that point:

#include
double AttackerSuccessProbability(double q, int z) {
double p = 1.0 - q;
double lambda = z * (q / p); double sum = 1.0;
int i, k;
for (k = 0; k <= z; k++)
{
double poisson = exp(-lambda); for (i = 1; i <= k; i++)
poisson *= lambda / i;
}
return sum; }
Running some results, we can see the probability drop off exponentially with z.
q=0.1
z=0 P=1.0000000
z=1 P=0.2045873
z=2 P=0.0509779
z=3 P=0.0131722
z=4 P=0.0034552
z=5 P=0.0009137
z=6 P=0.0002428
z=7 P=0.0000647
z=9 P=0.0000046
z=10 P=0.0000012
q=0.3
z=0 P=1.0000000
z=5 P=0.1773523
z=10 P=0.0416605
z=15 P=0.0101008
z=20 P=0.0024804
z=25 P=0.0006132
z=30 P=0.0001522
z=35 P=0.0000379
z=40 P=0.0000095
z=45 P=0.0000024
z=50 P=0.0000006
P < 0.001 q=0.10 z=5
q=0.15 z=8
q=0.20 z=11
q=0.25 z=15
q=0.30 z=24
q=0.35 z=41
q=0.40 z=89
q=0.45 z=340
We have proposed a system for electronic transactions without relying on trust. We started with the usual framework of coins made from digital signatures, which provides strong control of ownership, but is incomplete without a way to prevent double-spending.
References
[1] W. Dai, "b-money," https://t.co/kahMDkp7TM, 1998.
[2] H. Massias, X.S. Avila, and J.-J. Quisquater, "Design of a secure timestamping service with minimal
trust requirements," In 20th Symposium on Information Theory in the Benelux, May 1999.
2, pages 99-111, 1991.
[4] D. Bayer, S. Haber, W.S. Stornetta, "Improving the efficiency and reliability of digital time-stamping,"
In Sequences II: Methods in Communication,
[5] S. Haber, W.S. Stornetta, "Secure names for bit-strings," In Proceedings of the 4th ACM Conference
on Computer and Communications Security, pages 28-35, April 1997.
[6] A. Back, "Hashcash - a denial of service
https://t.co/ElYZGUzPRd, 2002.
[7] R.C. Merkle, "Protocols for public key cryptosystems," In Proc. 1980 Symposium on Security and
Privacy, IEEE Computer Society, pages 122-133, April 1980.
[8] W. Feller, "An introduction to probability theory and its
More from Bitcoin
claim: bitcoin ownership is heavily concentrated.
@business published an article claiming "2% of accounts control 95% of all Bitcoin" 🤣
truth: the facts, my friends, simple don't line up. let's dive in!
2/ interrogating on-chain addresses is tricky.
address =/ account.
one person can control multiple addresses.
one address can hold bitcoin belonging to multiple ppl.
exchanges and trading firms will have addresses with large balances that represent client funds.
3/ the fine folks @glassnode published an excellent analysis of on-chain address balances in January
the ownership distribution of bitcoin among wallets is actually much more diverse than one might expect.
full piece here:
https://t.co/n5IdIQdNoA

4/ 31% of BTC is held in addresses not identified as exchange wallets.
these are likely institutions, funds, custodians, and OTC desks.
our analysis at @CoinSharesCo indicates >15% of all bitcoin is held in third party custody, including @coinbase and our own @KomainuCustody
5/ in fact, between asset managers @Grayscale ($36B in BTC) and our @xbtprovider ($4B in BTC), 4% of bitcoin is locked up by fund providers and asset managers!
our @CoinSharesCo research team publishes an EXCELLENT weekly report on fund flows and AUMs -
Can also speak with authority on nation state violence
"Nothing makes you feel more free than taking another person's freedom"
After much investigation and conversations with people on here, I\u2019ve formed a relatively robust theory of what may be happening with Tether.
— Travis Kimmel (@coloradotravis) January 18, 2021
This thread will attempt to lay it out with neutral language for the purpose of discussion.
1/
and @profplum99 concerns with tether, bitcoin, and decentralization make sense yet I remain long BTC
They are correct on force, I worked in decentralized societies, they are dangerous because the state does not have a monopoly on violence
For those in the first world who have never seen a milita ride out of the desert, kill and enslave farmers, and the government cannot stop it because the 21st century slave trade pays better than the UN, the reality of decentralization is might equals right
I know, that isn't the decentralized future Buterin talks about while wearing a t-shirt with a cat fighting space invaders on it (love those shirts)
But we need to be real, disrupting the global centralized economy won't be like Uber putting taxis out of work
It will be war and faminine level disruption as old empires come alive again
For decentralization to rise the centralized global power of the last 70 years (US Hegemony) has to weaken
Yes we will be rich, but as the Big Short says,
"you can be happy, just don't fucking dance"
in this thread, i'll quickly outline key data points on #bitcoin sentiment, demand, market structure, and macro conditions
disclosure: i own BTC, obvi. this is not investment advice. DYOR. further disclosures at
2/ let's start w sentiment ☺️
first, investor sentiment:
✅ @blackrock filed to add BTC to 2 funds, CIO has 400k price target
✅ @RayDalio's Bridgewater reportedly issuing BTC research report
✅JPM, Goldman, and other bulge brackets initiated research coverage
3/ next, trader sentiment:
🚨 most important indicator is the forward curve
normally BTC futures trade in backwardation after a price drop.
this time, the curve stayed in contango following drop, meaning market makers are bullish 🐂📈 despite funding rate increase!
4/ sentiment drives demand. so DEMAND next.
💸 let's talk fund flows
🤑 our research shows $359M of inflows into crypto products last week alone (https://t.co/6Kky96m3ob)
🤑 our @CoinSharesCo @xbtprovider ETPs saw $200M trading volume on jan
4/ let's talk bitcoin fundamentals
post-halving, 900 BTC mined per day, 312,000 this year.
👀 47M millionaires. 21M bitcoin.
🏆 collectibles selling at all time highs. bitcoin is the ultimate collector's item. (see
You May Also Like
Further Examination of the Motif near PRRA Reveals Close Structural Similarity to the SEB Superantigen as well as Sequence Similarities to Neurotoxins and a Viral SAg.
The insertion PRRA together with 7 sequentially preceding residues & succeeding R685 (conserved in β-CoVs) form a motif, Y674QTQTNSPRRAR685, homologous to those of neurotoxins from Ophiophagus (cobra) and Bungarus genera, as well as neurotoxin-like regions from three RABV strains
(20) (Fig. 2D). We further noticed that the same segment bears close similarity to the HIV-1 glycoprotein gp120 SAg motif F164 to V174.
https://t.co/EwwJOSa8RK

In (B), the segment S680PPRAR685 including the PRRA insert and highly conserved cleavage site *R685* is shown in van der Waals representation (black labels) and nearby CDR residues of the TCRVβ domain are labeled in blue/white
https://t.co/BsY8BAIzDa

Sequence Identity %
https://t.co/BsY8BAIzDa
Y674 - QTQTNSPRRA - R685
Similar to neurotoxins from Ophiophagus (cobra) & Bungarus genera & neurotoxin-like regions from three RABV strains
T678 - NSPRRA- R685
Superantigenic core, consistently aligned against bacterial or viral SAgs

It was Ved Vyas who edited the eighteen thousand shlokas of Bhagwat. This book destroys all your sins. It has twelve parts which are like kalpvraksh.
In the first skandh, the importance of Vedvyas

and characters of Pandavas are described by the dialogues between Suutji and Shaunakji. Then there is the story of Parikshit.
Next there is a Brahm Narad dialogue describing the avtaar of Bhagwan. Then the characteristics of Puraan are mentioned.
It also discusses the evolution of universe.( https://t.co/2aK1AZSC79 )
Next is the portrayal of Vidur and his dialogue with Maitreyji. Then there is a mention of Creation of universe by Brahma and the preachings of Sankhya by Kapil Muni.
HOW LIFE EVOLVED IN THIS UNIVERSE AS PER OUR SCRIPTURES.
— Anshul Pandey (@Anshulspiritual) August 29, 2020
Well maximum of Living being are the Vansaj of Rishi Kashyap. I have tried to give stories from different-different Puran. So lets start.... pic.twitter.com/MrrTS4xORk
In the next section we find the portrayal of Sati, Dhruv, Pruthu, and the story of ancient King, Bahirshi.
In the next section we find the character of King Priyavrat and his sons, different types of loks in this universe, and description of Narak. ( https://t.co/gmDTkLktKS )
Thread on NARK(HELL) / \u0928\u0930\u094d\u0915
— Anshul Pandey (@Anshulspiritual) August 11, 2020
Well today i will take you to a journey where nobody wants to go i.e Nark. Hence beware of doing Adharma/Evil things. There are various mentions in Puranas about Nark, But my Thread is only as per Bhagwat puran(SS attached in below Thread)
1/8 pic.twitter.com/raHYWtB53Q
In the sixth part we find the portrayal of Ajaamil ( https://t.co/LdVSSNspa2 ), Daksh and the birth of Marudgans( https://t.co/tecNidVckj )
In the seventh section we find the story of Prahlad and the description of Varnashram dharma. This section is based on karma vaasna.
#THREAD
— Anshul Pandey (@Anshulspiritual) August 12, 2020
WHY PARENTS CHOOSE RELIGIOUS OR PARAMATMA'S NAMES FOR THEIR CHILDREN AND WHICH ARE THE EASIEST WAY TO WASH AWAY YOUR SINS.
Yesterday I had described the types of Naraka's and the Sin or Adharma for a person to be there.
1/8 pic.twitter.com/XjPB2hfnUC