MONEY: The US dollar that is the fraud

>>>> I really wish I understood the crypto world better. It seems like such a scam.

There are numerous good videos on crypto, bitcoin, etherium, and other “distributed blockchain ledgers”.  Some sites will even give you coins to watch their tutorials.

Essentially a bitcoin is nothing more than having a number that is the product of two large prime numbers.   For example, 77 is the product of 7 and 11.  You prove that “77” is yours because you have a public key of 7 and a private key of 11.  This “ownership” is written in a “distributed ledger” in lots of places.  That’s all you really need to understand.  

The “mining” that everyone talks about is people finding these pairs and writing the public key found and their private key to the distributed ledger.  Then, transfers are done by someone combining that public key to your wallet’s public key using their private key and writing it to the ledger.  Copies of the ledger are then created by all the other ledgers who repeat that calculation and confirm it. 

Sounds complicated but it really isn’t.

What makes these “coins” of great interest is that, in the case of bitcoin and bitcoin/cash, there is a limited supply that can not be inflated by anyone.  Including the Gooferment.  As such, it becomes “maney”, similar to gold and silver.  Especially as it gets wide spread adoption, it will become that store of value that every one seeks who realizes that the fiat Federal Reserve Note is essentially being made worthless by the Gooferment inflating the number of “dollars” in circulation.   

Just like the Romans devalued the denarius (silver) coin and the French the (gold) franc, so to the USA is devaluing the dollar to give politicians the money to spend on our version of “bread and circuses”.

Like all empires, the USA will financially collapse … … sooner or later.

BITCOIN might emerge as the money of the future.  

I probably won’t be around to see it, but I believe it WILL happen.  

If you’re looking for a scam, it’s the US dollar that is the fraud.

Sadly.  Sigh!


CRYPTO: Crypto can’t be trusted

*** begin quote ***

Date: Fri, 05 Nov 2010 17:47:43 -0700

From: Gene Wirchenko <>

Subject: Getting Crypto Wrong

Neal Ungerleider, How Haystack Risked Exposing Iranian Dissidents,, 20 Sep 2010

In 2009, Iran was in turmoil, and the Islamic Republic was blocking and monitoring sites used by opposition groups — until a team led by American IT specialist Austin Heap built a program, Haystack, and touted it as a secure and anonymous Web portal for Iranians. *The Guardian* lauded it, and U.S. Secretary of State Hillary Clinton personally praised Heap. The U.S. government even gave him rare permission to export his cryptological software to Iran. Among an elite group of beta testers — and many more unauthorized users — Haystack was a godsend.

Then in Sept. 2010, security experts discovered a problem: Iranian authorities, the very ones Haystack was supposed to circumvent and shield against, were exploiting massive holes in the encryption scheme to snoop on dissidents.

[Beware of anonymity-bearing gifts. As we have noted here before, ALWAYS look a gift (trojan) horse in the mouth. PGN]

*** end quote ***

It all comes back to how do you know the stuff works?

# # # # #

TECHNOLOGY: Printers with e-mail addresses

HP introduces printers with e-mail addresses, cloud access
By Casey Johnston

*** begin quote ***

Hewlett-Packard has announced a new line of printers designed to work directly with smartphones and cloud services without the need for a computer intermediary. The printers are designed to take print jobs that are e-mailed to them or uploaded to a cloud service they can access. HP hopes the increased accessibility will encourage the use of printouts, as files can increasingly be carried on a single pocket device.

The new range of printers have Web access, either wired or wireless, removing the need for a print server or connection to a computer. They have touchscreens and e-mail addresses, and can print documents that are e-mailed to them from any source, as well as items from Web services like Google Docs. Users can schedule print jobs on the printers and set up regular print runs of their documents, like weekly menus or itineraries.

*** end quote ***

(1) SPAM! Can you think of junk mail faxes? How long do you think it will take for “Dr (Mrs.) Faith Zenwakolo, a dying woman who has decided to donate what I have to charity through any thoughtful and selfless someone” to guess what the email address is? Or whatever the complicated “security structure” that’s put in place to “protect” it. Wanna bet you’ll get HP advertisements?

(2) I want to print a sensitive document to my HP printer. Email? Unless it’s encrypted — in transit and at each place of residence — and the User controls the keys, and there’s no backdoors.

(3) And is there storage on the printer? How does it get erased?

Seems like a lot of questions!

# # # # #

TECHNOLOGY: Email is worse than a postcard!

September 26, 2009
Whoa; NBC Producer to anti-ACORN group employee: ‘Bite me, Jew boy?’
Rick Moran

*** begin quote ***

When Stone received an email urging Congress to defund ACORN from Alex Rosenwald, director of media outreach for Americans for Limited Government, the following sentence came back to Rosenwald from Stone’s account: “Bite me, Jew Boy!”

*** and ***

   But Stone’s response email-provided to POLITICO-did not have any anti-Semitic comment. In fact, it had just one line: “Take me off this list!” (There are also subtle differences, including number of dashes, between the two emails).

   “Somebody, on the other end, I’m assuming, took the return stamp from the email and then put in this hateful message,” Capus said. “I don’t know who did it. It’s outrageous to suspect that somebody from NBC News would do it.”

*** end quote ***

I always rant that email should be secured. It’s the vendors, the ISPs, and the technology community that has to do it. We can’t leave it to the users.

Like IPv6, the technology industry has been sitting on its hands for decades. FIgure it out boys and girls!

(Or should that be girls and boys. Do girls come before boys? Or is always alpha order?)

We have had the capability to do encryption for stuff for eons. PGP can encrypt messages. At the very least it can give you a hash of the message that proves if it’s been tampered with!

Then we’d completely avoid these little distractions about “who did it”.

Time has come for the technology folks to get their act together.

# # # # #