A static webpage is a blob of HTML,CSS, and JS that doesn’t change whenever a user loads a page. This is different than traditional websites, because there is no database, no dynamic rendering on a server, and the page is easily cacheable in a content delivery network. This architecture is known as a JAM — Stack, and the most popular host is Github Pages.
Here are some examples of static webpages:
index.htmlthat has paths to JS and CSS is a static webpage.
Compromise is not about losing. It is about deciding that the other person has just as much right to be happy with the end result as you do.
A number of notable things happened last week on the ETC community call. First of all the community chose to reject ProgPoW. This is important because it is clear that this horrendous algorithm is a direct attack on the network by forcing it on substandard cryptography built by the CSW goon-squad. Good riddance!
However, we were not able to achieve clear community support for ECIP-1049. Why was this? …
This is a Chinese translation of my talk given at the 2019 ETC Summit in Vancouver. Thank you ETCC! Video of talk is at bottom, source: https://github.com/etcconsortium/ETCSummit/blob/master/ETC%20Summit%202019%20the%20second%20day%20agenda%20(October%204).pdf
Here is a question: Imagine you have three Ethereum miners, and a group of users broadcasting transactions.
Miner A can do 400 megahashs a second (MH/S) and has a latency of .1 seconds to the the users, Miner B can do 700 MH/S and has a latency of 3 seconds, and Miner C that can produce 1,100 MH/S and has a latency of 9 seconds.
Which farm will most likely mine the transactions first? (answer at bottom)
The most important part to understanding cryptocurrency mining is that every hash operation is just as likely to be the correct answer to a block as any other. Don’t think of mining as building a complex structure, but rather trying so many possible solutions that one is bound to be the right one to claim the block reward. Law of large numbers states, the more hashes you can do in a given time, the more likely one will get the reward. Today, you can purchase a bitcoin miner that can do 17 SHA256 terrahashes a second (17 trillion hashes a second) for $500 USD. …
Since publishing ECIP-1049 (here) as a response to the 51% attack I have received quite a bit of input and questions. I have also opened up a pull request to multi-geth to create Astor (here), an Ethereum testnet that will use Keccak256 as its proof of work method. If you agree with this article, or just want to learn more about how consensus works in Ethereum, I would appreciate any help. My goal is to have the testnet running by January 2020. Read first article in series (here)
Question (courtesy of Phyro): “Why does the amount of hashes matter to secure the network, shouldn’t it be energy expended?” …
On 2019–01–05, Ethereum Classic (ETC) was 51% attacked. What this means is that attackers sent over 40,000 ETC to an exchange, traded it for Bitcoin, withdrew that Bitcoin, and then released a chain with more accumulated hashpower that gave them back the 40k ETC. This double-spend will forever live on in the Ethereum Classic blockchain as a battlescar and will not be forked out or reversed.
Ethereum Classic Improvement Proposal 1049 is a response to this security breach. It argues for changing ETC’s proof of work algorithm from Ethash, to Keccak256. …
DISCLAIMER: Perform this at your own risk. This article is solely for academic purposes and the purpose is to help you better understand how Bitcoin/forks work.
This tutorial will show you how to split BCH from BSV, so that you can send one to an exchange without worrying about losing them both. When I say WAIT FOR THIS TO CONFIRM it is absolutely necessary to wait for a block to be mined, this can take up to an hour per transaction. DO NOT GO FAST, YOU CAN LOSE YOUR COINS.
THIS ARTICLE IS SOLELY AN ANALYSIS OF THE MARKET. THIS IS NOT TRADING ADVICE OR INVESTMENT ADVICE. I OWN A SMALL PORTION OF P3D AND P3C THAT I PURCHASED WHILE WRITING THIS ARTICLE
It’s been a little over five months since I last wrote about Proof of Weak Hands (P3D) and a picture of the contract balance is worth a 1000 words:
If you are unfamiliar with the rules of the P3D game, I suggest you check out my first article which explains them. As you can see, the price has exploded since then, validating the fact that more and more people are starting to think that P3D is a very good store of value. With the launch of the Fomo3D short and long games, P3D has effectively fought off the first wave of clones, and has a consistent revenue stream to feed dividends back to investors. This is a key evolution since Fomo3D Short and Long are really just variations of the same original P3D contract idea. …
One of the many criticisms of the usefulness of smart contracts is known as the Oracle Problem. Plainly put, because a smart contract has no knowledge of reality it has to rely on a truth source, aka “an oracle” for it to receive external data. The “problem” is that while the execution of the contract may be trustless, as Jimmy Song puts it “A smart contract that trusts a third party removes the killer feature of trustlessness.” I believe this is wrong for a number of reasons:
Most importantly- the framing of the “oracle problem” as a problem for smart contracts is similar to saying that the speed of light is a problem for space travel, i.e. it’s a fact of reality that makes certain things impossible, but doesn’t disqualify the endeavor entirely. Any computer system cannot have knowledge of the outside world without some sort of I/O (input/output). As those of you with functional programming experience know, whenever you take input, or produce output, you leave the realm of mathematical certainty and enter the non-deterministic world of reality. But here’s the thing: a program isn’t very useful if it can’t produce input or output. If you’re not a logician or work on an assembly line, chances are you don’t use any programs that are completely deterministic. The oracle problem is just a statement that, at some point, you need to trust some outside source to accurately give input as to what the state of reality is. With different forms of I/O, from keyboard, to monitor, to network, to hard drive we’re always engaged in a fractal of trust relationships with varying levels of risk. …