Hello, is anybody there?
Kim Stock
Flopper1@nostress.cc
npub1cd5l...ldur
Signum Enthusiast
Legendary zapper
So whatever happened with the writers strike!🤷🏼
I believe this to be true…. View quoted note →
Definitely unsung…. View quoted note →
I made this…. View quoted note →

3,.700,000 acres of forest in Canada burned where are we going to hide now?
So, as long as we have the app on our phone, we will still have it, but you will not be able to get it from the App Store anymore. Is that what I’m hearing?
Just thought I’d throw this out there….
lnbc101pjfp0mgpp5gefw0tx8ejaffccq9cdm7xuegcdmtra33ywkg0ukvf33cc2mv54sdqu2askcmr9wssx7e3q2dshgmmndp5scqzzsxqyz5vqsp5dxwp6kgnwjt334wrscrmzre6elwrvk4plh8t9etgze4ag94xdeas9qyyssqf4dka8yr546cxjcellxy0fdjv3exwve6dcpr7m2c3r5t58j2afc8jz5qqmqn0yqfcwpjq5vz982hjaat275nql4gpvd3r9fhxs22zlsq933n2n
I thought for privacy
Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn't want the whole world to know, but a secret matter is something one doesn't want anybody to know. Privacy is the power to selectively reveal oneself to the world.
If two parties have some sort of dealings, then each has a memory of their interaction. Each party can speak about their own memory of this; how could anyone prevent it? One could pass laws against it, but the freedom of speech, even more than privacy, is fundamental to an open society; we seek not to restrict any speech at all. If many parties speak together in the same forum, each can speak to all the others and aggregate together knowledge about individuals and other parties. The power of electronic communications has enabled such group speech, and it will not go away merely because we might want it to.
Since we desire privacy, we must ensure that each party to a transaction has knowledge only of that which is directly necessary for that transaction. Since any information can be spoken of, we must ensure that we reveal as little as possible. In most cases, personal identity is not salient. When I purchase a magazine at a store and hand cash to the clerk, there is no need to know who I am. When I ask my electronic mail provider to send and receive messages, my provider need not know to whom I am speaking or what I am saying or what others are saying to me; my provider only need know how to get the message there and how much I owe them in fees. When my identity is revealed by the underlying mechanism of the transaction, I have no privacy. I cannot selectively reveal myself; I must always reveal myself.
Therefore, privacy in an open society requires anonymous transaction systems. Until now, cash has been the primary such system. An anonymous transaction system is not a secret transaction system. An anonymous system empowers individuals to reveal their identity when desired and only when desired; this is the essence of privacy.
Privacy in an open society also requires cryptography. If I say something, I want it heard only by those for whom I intend it. If the content of my speech is available to the world, I have no privacy. To encrypt is to indicate the desire for privacy, and to encrypt with weak cryptography is to indicate not too much desire for privacy. Furthermore, to reveal one's identity with assurance when the default is anonymity requires the cryptographic signature.
We cannot expect governments, corporations, or other large, faceless organizations to grant us privacy out of their beneficence. It is to their advantage to speak of us, and we should expect that they will speak. To try to prevent their speech is to fight against the realities of information. Information does not just want to be free, it longs to be free. Information expands to fill the available storage space. Information is Rumor's younger, stronger cousin; Information is fleeter of foot, has more eyes, knows more, and understands less than Rumor.
We must defend our own privacy if we expect to have any. We must come together and create systems which allow anonymous transactions to take place. People have been defending their own privacy for centuries with whispers, darkness, envelopes, closed doors, secret handshakes, and couriers. The technologies of the past did not allow for strong privacy, but electronic technologies do.
We the Cypherpunks are dedicated to building anonymous systems. We are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money. Cypherpunks write code. We know that someone has to write software to defend privacy, and since we can't get privacy unless we all do, we're going to write it. We publish our code so that our fellow Cypherpunks may practice and play with it. Our code is free for all to use, worldwide. We don't much care if you don't approve of the software we write. We know that software can't be destroyed and that a widely dispersed system can't be shut down.
Cypherpunks deplore regulations on cryptography, for encryption is fundamentally a private act. The act ofencryption, in fact, removes information from the public realm. Even laws against cryptography reach only sofar as a nation's border and the arm of its violence. Cryptography will ineluctably spread over the whole globe,and with it the anonymous transactions systems that it makes possible.
For privacy to be widespread it must be part of a social contract. People must come and together deploy thesesystems for the common good. Privacy only extends so far as the cooperation of one's fellows in society. We theCypherpunks seek your questions and your concerns and hope we may engage you so that we do not deceiveourselves. We will not, however, be moved out of our course because some may disagree with our goals.
The Cypherpunks are actively engaged in making the networks safer for privacy. Let us proceed together apace.
Onward.
Eric Hughes [hughes@soda.berkeley.edu]
Yes, cryptocurrencies have the potential to be disruptors in the monetary system. Cryptocurrencies, such as Bitcoin and Ethereum, operate on decentralized networks and utilize blockchain technology. They offer certain advantages like security, transparency, and the potential for faster and cheaper transactions compared to traditional banking systems.
However, it's important to note that the adoption and impact of cryptocurrencies on the monetary system are still evolving. Regulatory frameworks, scalability issues, volatility, and concerns about illicit activities are some factors that can affect their widespread integration into mainstream financial systems. As the technology continues to develop and mature, cryptocurrencies may play a more significant role in shaping the future of the monetary system.
https://medium.com/signum-network/collapse-of-the-big-blockchains-on-the-horizon-no-doubt-670547480b60
The first transaction to benefit from STPS was Signum’s multi-out payment in 2018. This transaction type enabled the Signum chain to conduct a pay-out up to 128 recipients in one transaction. This pushes the STPS from 1,020 to 19,200 per block (new block every 4 minutes). This increased the regular capacity from 4.25 TPS to 80 TPS for a given block size of only 179,520 bytes.
Good Day each and every one….


Signum Network aims to be a decentralized platform. It utilizes the Proof of Capacity (PoC) consensus algorithm, which allows participants to contribute their storage space to secure the network and validate transactions. This approach promotes decentralization by reducing barriers to entry, as participants do not need expensive mining hardware or excessive computational power.
Decentralization in Signum Network can be influenced by factors such as the distribution of storage space across participants and the level of network participation. The broader the distribution of storage and active participants, the more decentralized the network becomes.
It's important to note that achieving full decentralization is an ongoing process, and the level of decentralization in any blockchain network can evolve over time. However, Signum Network's design and consensus mechanism are intended to foster a decentralized ecosystem for storage and digital asset management.
1. Burst Network:(rebranded to Signum)
- Genesis Block: The Burst network's Genesis block was created on August 11, 2014.
- Proof of Capacity (PoC): Burst uses a unique consensus algorithm called Proof of Capacity, which leverages hard drive space for mining instead of traditional computational power.
- Decentralized File Storage: Burst incorporates a decentralized file storage system where users can store and share data using the blockchain.
- Smart Contracts: Burst has implemented smart contract capabilities, enabling the creation and execution of self-executing contracts on the network since before, Ethereum.
2. Signum Network (formerly known as Burst Dymaxion):
- Genesis Block: The Signum network emerged as a rebrand of Burst Dymaxion on March 10, 2021.
- Tangle-Based Consensus: Signum employs a tangle-based consensus algorithm inspired by the technology behind IOTA. This approach offers scalability, fast transactions, and zero fees.
- Dynamic Pegging: Signum introduces dynamic pegging, which allows users to peg their funds to various assets or currencies, providing stability and versatility.
- Atomic Cross-Chain Swaps: Signum supports atomic cross-chain swaps, enabling users to exchange assets between different blockchains securely.
Please note that this is just a brief overview, and there are many more details and features associated with both Burst and Signum networks. If you require more specific information or have any particular questions, feel free to ask! 

Discord
Discord - Group Chat That’s All Fun & Games
Discord is great for playing games and chilling with friends, or even building a worldwide community. Customize your own space to talk, play, and h...
Mining Signa involves participating in the Signum network's consensus algorithm to validate transactions and secure the blockchain. Signum utilizes a unique proof-of-capacity (PoC) algorithm, which allows miners to use their hard drive space rather than computational power to mine new blocks.
Here are the key steps and components involved in mining Signa:
1. Plotting: Plotting is the process of precomputing your hard drive space to generate proofs for mining. It involves creating nonces (unique mathematical calculations) that will be used during the mining process. The more hard drive space you allocate for plotting, the higher your chances of mining a block.
2. Mining Software: You need mining software that supports Signa mining and is compatible with the Signum network. The official Signum Wallet often includes built-in mining software, or you can explore third-party options.
3. Storage Space: Signum mining requires a significant amount of hard drive space. The more storage you allocate for mining, the better your chances of finding blocks. The hard drive must be reliable and have a high-speed connection for optimal performance.
4. Mining Process: Once you have plotted your hard drive space and set up the mining software, you can start the mining process. The mining software will continuously scan your plotted space, searching for a solution to a cryptographic puzzle. Finding a solution enables you to mine a new block.
5. Block Rewards: When you successfully mine a new block, you are rewarded with newly minted Signa coins and any transaction fees included in that block. These rewards serve as an incentive for miners to contribute their resources to the network.
6. Network Consensus: Signum utilizes a decentralized consensus mechanism, where multiple miners participate in the network. The consensus is achieved through the collective agreement on valid transactions and the ordering of blocks. The majority of miners must agree on the validity of transactions and the order in which blocks are added to the blockchain.
7. Mining Pools (Optional): Joining a mining pool is an alternative to mining individually. Mining pools allow multiple miners to combine their resources and increase their chances of mining blocks. If a block is successfully mined by a pool, the rewards are distributed among the participating miners based on their contributions.
It's worth noting that mining Signa or any cryptocurrency can be resource-intensive, requiring significant storage space, computational power, and electricity. It's important to consider the costs involved, such as hardware, energy consumption, and potential returns, to determine the feasibility and profitability of mining.
Some of them did not do securities offerings. Bitcoin, most notably,Burst(rebranded Signa),unnoticed, never raised money from investors by selling Bitcoins nor did Burst(rebranded Signa) to build its network; this whole analysis does not apply to Bitcoin or Burst(known as signer from now on….), and everyone agrees that it is not a security.
It’s a little past may I hope you haven’t walked away because what should’ve happened in this past month is happening soon…..
BTC🔻9876.66 …..
DYOR