English rugby union footballer
POPULARITY
In der heutigen Folge geht es wieder um Privatsphäre. Chris spricht mit Max Hillebrand darüber, dass Mobiltelefone Metadaten mögen. Zusätzlich gibt es eine deutschsprachige Lesung des “A Cypherpunk's Manifesto” von Eric Hughes, Hughes, Hughes … Von und mit: [[Chris]]Produziert und geschnitten: ChrisHier könnt ihr uns eine Spende über Lightning da lassen: ⚡️nodesignal@getalby.comWenn euch unsere Arbeit gefällt, könnt ihr unsere Folgen auch auf Podcasting 2.0 Plattformen, wie Fountain, PodcastGuru, Castamatic, Breez oder Podverse hören und uns so eine kleine Aufmerksamkeit da lassen. Danke an alle, die die Bitcoin Community mit ihren Spenden unterstützen! Mit diesen Spenden wird unter anderem unser Bounty Programm verwirklicht, in dem ihr euch für die Mitarbeit an einem Projekt eine Belohnung sichern könnt.Für Feedback und weitergehenden Diskussionen kommt gerne in die Telegramgruppe von Nodesignal und bewertet uns bei Spotify und Apple Podcasts. Folgt uns auch gerne bei Nostr:npub1n0devk3h2l3rx6vmt24a3lz4hsxp7j8rn3x44jkx6daj7j8jzc0q2u02cy und Twitter.Blockzeit: 876493 A Cypherpunk's Manifesto (Eric Hughes, 1993) https://www.activism.net/cypherpunk/manifesto.html übersetzt von Chris_SHA256 Kontakt Max: nostr: npub1klkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qulx3vtmail: max@towardsliberty.comgithub: @maxhillebrandMusik (used with permission/open license): The long ascent - Cooper CannellEast West - John PatitucciTimestamps:(00:00:00) Intro(00:00:22) Das Cypherpunk Manifest Lesung(00:09:00) Intro Folge Chris(00:13:55) V4V(00:14:46) Begrüßung Max(00:15:25) Warum Beschäftigung mit Privacy?(00:16:52) Privacy macht Spaß(00:18:20) Warum sind Mobiltelefone bezüglich Privacy relevant?(00:20:50) Wer trackt einen auf dem Smartphone?(00:24:25) Was sind Meta-Daten?(00:27:30) Wo werden auf dem Mobiltelefon Meta-Daten erhoben?(00:31:48) Wie erfolgt das Tracking über das Telefonnetz?(00:36:49) Wie erfolgt das Tracking über das mobile Betriebssystem?(00:43:13) Wie erfolgt das Tracking in Apps?(00:50:10) Was rät Max, wenn man mit mehr Privacy starten möchte?(00:54:07) Max Einschätzung zu einem Zitat...(00:59:14) Max Schlussworte(01:00:26) Focus on the signal, signal, signal
The Cypherpunk movement is a socio-political movement advocating for the widespread use of strong cryptography and privacy-enhancing technologies as a means to effect social and political change. Rooted in libertarian philosophy, cypherpunks believe in decentralization, individual autonomy, and freedom from centralized authority. Their impact on society is undeniable, from influencing the development of cryptocurrencies like Bitcoin to mainstreaming encryption in everyday technologies like secure messaging apps.History:While cryptography was largely confined to military and intelligence agencies until the 1970s, the publication of the Data Encryption Standard (DES) and the first publicly available work on public-key cryptography brought it into the public sphere. David Chaum's 1985 paper, "Security without Identification: Transaction Systems to Make Big Brother Obsolete," further laid the groundwork for Cypherpunk ideas.The term "cypherpunk" emerged in the late 1980s, and the movement gained momentum with the establishment of the "Cypherpunks" electronic mailing list in 1992. The list, described as "a very active forum," hosted discussions on a range of topics, including mathematics, cryptography, computer science, political and philosophical discussions, personal arguments, and even spam.Key Principles:The Cypherpunk ethos is captured in Eric Hughes' 1993 "A Cypherpunk's Manifesto":"Privacy is necessary for an open society in the electronic age...We cannot expect governments, corporations, or other large, faceless organizations to grant us privacy… We must defend our own privacy if we expect to have any. … Cypherpunks write code. We know that someone has to write software to defend privacy, and … we're going to write it."LEARN MORE ABOUT MVMT/Web3 Unpackedhttps://linktr.ee/mvmt.mediahttps://mvmt.media#cypherpunks #cypherpunk #richpasqua #richardpasqua #Web3 #data #privacy #learnweb3 #analytics #dataanalytics #gaming #NFT #Helicka, #userengagement #blockchain #marketingstrategy #datamarketing #web3gaming #ai #community #investment #userexperience #monetization #gamedevelopment #gaming #onchainanalytics #onchain #web3unpacked
"We the Cypherpunks are dedicated to building anonymous systems. We are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money. Cypherpunks write code. We know that someone has to write software to defend privacy, and since we can't get privacy unless we all do, we're going to write it. We publish our code so that our fellow Cypherpunks may practice and play with it. Our code is free for all to use, worldwide. We don't much care if you don't approve of the software we write. We know that software can't be destroyed and that a widely dispersed system can't be shut down. Cypherpunks deplore regulations on cryptography, for encryption is fundamentally a private act."A Cypherpunk's Manifesto, by Eric Hughes. Read out loud by Walker. Read it for yourself: https://www.activism.net/cypherpunk/manifesto.htmlIf you enjoy THE Bitcoin Podcast you can help support the show by doing the following:Subscribe to THE Bitcoin Podcast (and leave a review) on Fountain | Apple Podcasts | YouTube | Spotify | HIGHLIGHTER | EVERYWHERE ELSEFollow me (Walker) on Twitter Personal (@WalkerAmerica) | Twitter Podcast (@TitcoinPodcast) | Nostr Personal (walker) | Nostr Podcast (Titcoin)*****THE Bitcoin Podcast Partners -- use promo code WALKER for...> bitbox.swiss/walker -- 5% off the Bitcoin-only Bitbox02 hardware wallet.> EFANI: Protect yourself from SIM swap attacks – go to https://www.efani.com/walker and it'll automatically apply the promo code WALKER getting you $99 OFF.> Cloaked Wireless: 25% OFF eSIM or physical SIM cards and protect yourself from SIM swap attacks.
Our very good friend, Eric Hughes is back at it again in this episode featuring Beavis graffiti, Kevin Bacon undercover, and batty weather in Arizona! Check out Eric's record label HERE! Music in this episode is provided by Aaron Kraft. Find Aaron's music HERE. Like the show? Consider joining our PATREON to receive access to new, old, and bonus content for just $3 a month.
The sixth man of One Two Three Jokes, Eric Hughes jumps into the game in this episode featuring a dinosaur poop museum, A.I. stress relievers, and disappearing ghosts. Also featuring an appearance by a very special birthday boy! Check out Eric's record label HERE! Music in this episode is provided by Aaron Kraft. Find Aaron's music HERE. Like the show? Consider joining our PATREON to receive access to new, old, and bonus content for just $3 a month.
Listen to a message from Eric Hughes from our Summer in the Psalms series on July 21, 2024.
Comedian and music mogul, Eric Hughes remains in the guest chair for this episode featuring a fun shooting range, a concerned citizen, and a fire-breathing robot dog! Check out Eric's record label HERE! Music in this episode is provided by Aaron Kraft. Find Aaron's music HERE. Like the show? Consider joining our PATREON to receive access to new, old, and bonus content for just $3 a month.
Intro Song – Eric Hughes, “Did You Have To Take The Dog, Too?”, Live On Beale Street First Set - James Harman, “Bonetime”, Bonetime The Scottyboy Daniel Blues Band, “Educated Fool”, Mercy The Mannish Boys, “Raunchy”, Shake For Me Second Set – John Nemeth, “The Last Time”, May Be The Last Time Mississippi Heat, “Ridin' On A Hit”, Madeleine Blues Flash, “Lollipop Mama” Third Set – William Clarke, “Daddy Pinocchio”, Groove Time Rod Piazza & The Mighty Flyers, “Tough & Tender”, Tough & Tender Mojo Buford, “Harp Breaker”, Home Is Where My Harp Is Fourth Set - Sugar Ray and the Bluetones , “I Don't Know”, My Life, My Friends, My Music Jason Ricci and the Bad Kind, “Ain't She Fine”, Behind The Veil JD Taylor, “Hanging On”, The Coldwater Sessions Watermelon Slim & Dennis Gruenling, “Who's Been Cheatin' Who”, Don't Pass Me By - A Tribute To Sean Costello
Our good friend, Eric Hughes is back for another go in this episode featuring a boat painting, a pub for the older crowd, and women beating the ground with sticks. Comedy so good, you'll need a new pair of shorts! Check out Eric's record label HERE! Music in this episode is provided by Aaron Kraft. Find Aaron's music HERE. Like the show? Consider joining our PATREON to receive access to new, old, and bonus content for just $3 a month.
Cypherpunk Manifest - Blockzeit 834798 - gelesen von Lassmiranda Veröffentlicht von Eric Hughes am 9. März 1993 — Originalfassung und deutsche Übersetzung.
We're once again joined by our good friend, Eric Hughes (he's practically family at this point) in this episode featuring Kevin Bacon and his cousin, a text-happy judge, and some delicious toothpicks! Be sure to check out Eric's record label, SlyVinyl Records! Music in this episode is provided by Aaron Kraft. Find Aaron's music HERE. Like the show? Consider joining our PATREON to receive access to new, old, and bonus content for just $3 a month.
Maybe it's because our good friend, Eric Hughes has returned or maybe it's because we've had too much candy, but whatever the case, we're in a world of pure imagination in this episode featuring a mom on OnlyFans, teachers winning the lottery, and a principal taking his unfair share of coffee. Be sure to check out Eric's record label, SlyVinyl Records! Music in this episode is provided by Aaron Kraft. Find Aaron's music HERE. Like the show? Consider joining our PATREON to receive access to new, old, and bonus content for just $3 a month.
Eric Hughes (1930-2020) was born and raised in Liverpool, England. Coming from a home where the Lord was not known, he first heard the gospel in Sunday School. Saved in a gospel meeting at the age of 15, Eric would go on to be baptised and received into fellowship in an assembly of Christians, gathering in David Street, Liverpool. There he remained for the rest of his life, faithfully serving the Lord. He was a highly respected overseer and was The post Eric Hughes – A Bundle of Myrrh (43 min) first appeared on Gospel Hall Audio.
What should you expect when starting a custom residential project with architects? In this episode, host Curtis Lawson explores that question with award-winning architects Eric Hughes and Heather Rowell, Founders of HR Design Dept (Architecture Studio). Their track record of consistently delivering high-end custom residential homes to their clients is one of the many reasons we asked them to join the show. They share some truly wonderful advice that's invaluable to anyone that's planning on working with an architectural designer or an architect. They share in their collaborative design process, how to understand and communicate with your designer, setting expectations around timelines and details, how to approach the interview process when selecting an architect, the tricky nature of builder bids and budgets, and making the most of the process and skills your chosen designer has to offer. A key takeaway - custom residential architecture requires significant time and collaboration - it's not a quick in-and-out process and we want to help you to understand and navigate the process and set the stage for a successful project! Tune in now to learn how to get started on the right foot and turn your vision into a reality!
Welcome to the first Current Events miniseries! Over the next four weeks, we tackle four of the most important influences on crypto culture, crypto art culture, and all the values we hold dear. Up first, Eric Hughes' 1993 "A Cypherpunk's Manifesto," a document that directly influenced the Bitcoin mission, that tackles privacy in the online age, and feels prescient today some 30 years after its writing.
It's been a week, but our good friend, Eric Hughes is still with us here in the apartment to joke about the Toy Hall of Fame, a missing fighter jet, and a blank canvas. Be sure to follow Eric on Instagram and check out his record label, which will be taking part in Flamingofest in Los Angeles, CA on November 4th and 5th! Music in this episode is provided by Aaron Kraft. Find Aaron's music HERE. Like the show? Consider joining our PATREON to receive access to new, old, and bonus content for just $3 a month.
Our good friend, Eric Hughes finally returns in this episode featuring prison cuisine, granny pods, and a misunderstood yoga class. Man, I would kill for some jack snails right now... Go see Eric performing live on October 10th in Phoenix at The House of Comedy! Tickets HERE. And be sure to follow Eric on Instagram and check out his record label! Music in this episode is provided by Aaron Kraft. Find Aaron's music HERE. Like the show? Consider joining our PATREON to receive access to new, old, and bonus content for just $3 a month.
Here are my 100 interesting things to learn about cryptography: For a 128-bit encryption key, there are 340 billion billion billion billion possible keys. [Calc: 2**128/(1e9**4)] For a 256-bit encryption key, there are 115,792 billion billion billion billion billion billion billion billion possible keys. [Calc: 2**256/(1e9**8)] To crack a 128-bit encryption with brute force using a cracker running at 1 Teracracks/second, will take — on average — 5 million million million years to crack. Tera is 1,000 billion. [Calc: 2**128/100e9/2/60/60/24/365/(1e6**3)] For a 256-bit key this is 1,835 million million million million million million million million million years. For the brute force cracking of a 35-bit key symmetric key (such as AES), you only need to pay for the boiling of a teaspoon of energy. For a 50-bit key, you just need to have enough money to pay to boil the water for a shower. For a 90-bit symmetric key, you would need the energy to boil a sea, and for a 105-bit symmetric key, you need the energy to boil and ocean. For a 128-bit key, there just isn't enough water on the planet to boil for that. Ref: here. With symmetric key encryption, anything below 72 bits is relatively inexpensive to crack with brute force. One of the first symmetric key encryption methods was the LUCIFER cipher and was created by Horst Feistel at IBM. It was further developed into the DES encryption method. Many, at the time of the adoption of DES, felt that its 56-bit key was too small to be secure and that the NSA had a role in limiting them. With a block cipher, we only have to deal with a fixed size of blocks. DES and 3DES use a 64-bit (eight-byte) block size, and AES uses a 128-bit block size (16 bytes). With symmetric key methods, we either have block ciphers, such as DES, AES CBC and AES ECB, or stream ciphers, such as ChaCha20 and RC4. In order to enhance security, AES has a number of rounds where parts of the key are applied. With 128-bit AES we have 10 rounds, and 14 rounds for 256-bit AES. In AES, we use an S-box to scramble the bytes, and which is applied for each round. When decrypting, we have the inverse of the S-box used in the encrypting process. A salt/nonce or Initialisation Vector (IV) is used with an encryption key in order to change the ciphertext for the same given input. Stream ciphers are generally much faster than block cipers, and can generally be processed in parallel. With the Diffie-Hellman method. Bob creates x and shares g^x (mod p), and Alice creates y, and shares g^y (mod p). The shared key is g^{xy} (mod p). Ralph Merkle — the boy genius — submitted a patent on 5 Sept 1979 and which outlined the Merkle hash. This is used to create a block hash. Ralph Merkle's PhD supervisor was Martin Hellman (famous as the co-creator of the Diffie-Hellman method). Adi Shamir defines a secret share method, and which defines a mathematical equation with the sharing of (x,y), and where a constant value in the equation is the secret. With Shamir Secret Shares (SSS), for a quadratic equation of y=x²+5x+6, the secret is 6. We can share three points at x=1, x=2 and y=3, and which gives y=12, y=20, and y=20, respectively. With the points of (1,12), (2,20), and (3,20), we can recover the value of 6. Adi Shamir broke the Merkle-Hellman knapsack method at a live event at a rump session of a conference. With secret shares, with the highest polynomial power of n, we need n+1 points to come together to regenerate the secret. For example, y=2x+5 needs two points to come together, while y=x²+15x+4 needs three points. The first usable public key method was RSA — and created by Rivest, Shamir and Adleman. It was first published in 1979 and defined in the RSA patent entitled “Cryptographic Communications System and Method”. In public key encryption, we use the public key to encrypt data and the private key to decrypt it. In digital signing, we use the private key to sign a hash and create a digital signature, and then the associated public key to verify the signature. Len Adleman — the “A” in the RSA method — thought that the RSA paper would be one of the least significant papers he would ever publish. The RSA method came to Ron Rivest while he slept on a couch. Martin Gardner published information on the RSA method in his Scientific American article. Initially, there were 4,000 requests for the paper (which rose to 7,000), and it took until December 1977 for them to be posted. The security of RSA is based on the multiplication of two random prime numbers (p and q) to give a public modulus (N). The difficulty of RSA is the difficulty in factorizing this modulus. Once factorized, it is easy to decrypt a ciphertext that has been encrypted using the related modulus. In RSA, we have a public key of (e,N) and a private key of (d,N). e is the public exponent and d is the private exponent. The public exponent is normally set at 65,537. The binary value of 65,537 is 10000000000000001 — this number is efficient in producing ciphertext in RSA. In RSA, the ciphertext is computed from a message of M as C=M^e (mod N), and is decrypted with M=C^d (mod N). We compute the the private exponent (d) from the inverse of the public exponent (e) modulus PHI, and where PHI is (p-1)*(q-1). If we can determine p and q, we can compute PHI. Anything below a 738-bit public modulus is relatively inexpensive to crack for RSA. To crack 2K RSA at the current time, we would need the energy to boil ever ocean on the planet to break it. RSA requires padding is required for security. A popular method has been PCKS#1v1.5 — but this is not provably secure and is susceptible to Bleichenbacher's attack. An improved method is Optimal Asymmetric Encryption Padding (OAEP) and was defined by Bellare and Rogaway and standardized in PKCS#1 v2. The main entity contained in a digital certificate is the public key of a named entity. This is either an RSA or an Elliptic Curve key. A digital certificate is signed with the private key of a trusted entity — Trent. The public key of Trent is then used to prove the integrity and trust of the associated public key. For an elliptic curve of y²=x³+ax+b (mod p), not every (x,y) point is possible. The total number of points is defined as the order (n). ECC (Elliptic Curve Cryptography) was invented by Neal Koblitz and Victor S. Miller in 1985. Elliptic curve cryptography algorithms did not take off until 2004. In ECC, the public key is a point on the elliptic curve. For secp256k1, we have a 256-bit private key and a 512-bit (x,y) point for the public key. A “04” in the public key is an uncompressed public key, and “02” and “03” are compressed versions with only the x-co-ordinate and whether the y coordinate is odd or even. Satoshi selected the secp256k1 curve for Bitcoin, and which gives the equivalent of 128-bit security. The secp256k1 curve uses the mapping of y²=x³ + 7 (mod p), and is known as a Short Weierstrass (“Vier-strass”) curve. The prime number used with secp256k1 is 2²⁵⁶-2³²-2⁹-2⁸-2⁷-2⁶-2⁴-1. An uncompressed secp256k1 public key has 512 bits and is an (x,y) point on the curve. The point starts with a “04”. A compressed secp256k1 public key only stores the x-co-ordinate value and whether the y coordinate is odd or even. It starts with a “02” if the y-co-ordinate is even; otherwise, it starts with a “03”. In computing the public key in ECC of a.G, we use the Montgomery multiplication method and which was created by Peter Montgomery in 1985, in a paper entitled, “Modular Multiplication without Trial Division.” Elliptic Curve methods use two basic operations: point address (P+Q) and point doubling (2.P). These can be combined to provide the scalar operation of a.G. In 1999, Don Johnson Alfred Menezes published a classic paper on “The Elliptic Curve Digital Signature Algorithm (ECDSA)”. It was based on the DSA (Digital Signature Algorithm) — created by David W. Kravitz in a patent which was assigned to the US. ECDSA is a digital signature method and requires a random nonce value (k), and which should never be reused or repeated. ECDSA is an elliptic curve conversion of the DSA signature method. Digital signatures are defined in FIPS (Federal Information Processing Standard) 186–5. NIST approved the Rijndael method (led by Joan Daemen and Vincent Rijmen) for Advanced Encryption Standard (AES). Other contenders included Serpent (led by Ross Anderson), TwoFish (led by Bruce Schneier), MARS (led by IBM), and RC6 (led by Ron Rivest). ChaCha20 is a stream cipher that is based on Salsa20 and developed by Daniel J. Bernstein. MD5 has a 128-bit hash, SHA-1 has 160 bits and SHA-256 has 256-bits. It is relatively easy to create a hash collision with MD5. Google showed that it was possible to create a signature collision for a document with SHA-1. It is highly unlikely to get a hash collision for SHA-256. In 2015, NIST defined SHA-3 as a standard, and which was built on the Keccak hashing family — and which used a different method to SHA-2. The Keccak hash family uses a sponge function and was created by Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche and standardized by NIST in August 2015 as SHA-3. Hash functions such as MD5, SHA-1 and SHA-256 have a fixed hash length, whereas an eXtendable-Output Function (XOF) produces a bit string that can be of any length. Examples are SHAKE128, SHAKE256, BLAKE2XB and BLAKE2XS. BLAKE 3 is the fastest cryptographically secure hashing method and was created by Jack O'Connor, Jean-Philippe Aumasson, Samuel Neves, and Zooko Wilcox-O'Hearn. Hashing methods can be slowed down with a number of rounds. These slower hashing methods include Bcrypt, PBKDF2 and scrypt. Argon 2 uses methods to try and break GPU cracking, such as using a given amount of memory and defining the CPU utlization. To speed up the operation of the SHA-3 hash, the team reduced the security of the method and reduce the number of rounds. The result is the 12 Kangaroo's hashing method. The number of rounds was reduced from 24 to 12 (with a security level of around 128 bits). Integrated Encryption Scheme (IES) is a hybrid encryption scheme which allows Alice to get Bob's public key and then generate an encryption key based on this public key, and she will use her private key to recover the symmetric. With ECIES, we use elliptic curve methods for the public key part. A MAC (Message Authentication Code) uses a symmetric key to sign a hash, and where Bob and Alice share the same secret key. The most popular method is HMAC (hash-based message authentication code). The AES block cipher can be converted into a stream cipher using modes such as GCM (Galois Counter Mode) and CCM (counter with cipher block chaining message authentication code; counter with CBC-MAC). A MAC is added to a symmetric key method in order to stop the ciphertext from being attacked by flipping bits. GCM does not have a MAC, and is thus susceptible to this attack. CCM is more secure, as it contains a MAC. With symmetric key encryption, we must remove the encryption keys in the reverse order they were applied. Commutative encryption overcomes this by allowing the keys to be removed in any order. It is estimated that Bitcoin miners consume 17.05 GW of electrical power per day and 149.46 TWh per year. A KDF (Key Derivation Function) is used to convert a passphrase or secret into an encryption key. The most popular methods are HKDF, PBKDF2 and Bcrypt. RSA, ECC and Discrete Log methods will all be cracked by quantum computers using Shor's algorithm Lattice methods represent bit values as polynomial values, such as 1001 is x³+1 as a polynomial. Taher Elgamal — the sole inventor of the ElGamal encryption method — and Paul Koche were the creators of SSL, and developed it for the Netscape browser. David Chaum is considered as a founder of electronic payments and, in 1983, created ECASH, along with publishing a paper on “Blind signatures for untraceable payments”. Satoshi Nakamoto worked with Hal Finney on the first versions of Bitcoin, and which were created for a Microsoft Windows environment. Blockchains can either be permissioned (requiring rights to access the blockchain) or permissionless (open to anyone to use). Bitcoin and Ethereum are the two most popular permissionless blockchains, and Hyperledger is the most popular permissioned ledger. In 1992, Eric Hughes, Timothy May, and John Gilmore set up the cypherpunk movement and defined, “We the Cypherpunks are dedicated to building anonymous systems. We are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money.” In Bitcoin and Ethereum, a private key (x) is converted to a public key with x.G, and where G is the base point on the secp256k1 curve. Ethereum was first conceived in 2013 by Vitalik Buterin, Gavin Wood, Charles Hoskinson, Anthony Di Iorio and Joseph Lubin. It introduced smaller blocks, improved proof of work, and smart contracts. NI-ZKPs involves a prover (Peggy), a verifier (Victor) and a witness (Wendy) and were first defined by Manuel Blum, Paul Feldman, and Silvio Micali in their paper entitled “Non-interactive zero-knowledge and its applications”. Popular ZKP methods include ZK-SNARKs (Zero-Knowledge Succinct Non-Interactive Argument of Knowledge) and ZK-STARKs (Zero-Knowledge Scalable Transparent Argument of Knowledge). Bitcoin and Ethereum are pseudo-anonymised, and where the sender and recipient of a transaction, and its value, can be traced. Privacy coins enable anonymous transactions. These include Zcash and Monero. In 1992, David Chaum and Torben Pryds Pedersen published “Wallet databases with observers,” and outlined a method of shielding the details of a monetary transaction. In 1992, Adi Shamir (the “S” in RSA) published a paper on “How to share a secret” in the Communications of the ACM. This supported the splitting of a secret into a number of shares (n) and where a threshold value (t) could be defined for the minimum number of shares that need to be brought back together to reveal the secret. These are known as Shamir Secret Shares (SSS). In 1991, Torbin P Pedersen published a paper entitled “Non-interactive and information-theoretic secure verifiable secret sharing” — and which is now known as Pedersen Commitment. This is where we produce our commitment and then show the message that matches the commitment. Distributed Key Generation (DKG) methods allow a private key to be shared by a number of trusted nodes. These nodes can then sign for a part of the ECDSA signature by producing a partial signature with these shares of the key. Not all blockchains use ECDSA. The IOTA blockchain uses the EdDSA signature, and which uses Curve 25519. This is a more lightweight signature version and has better support for signature aggregation. It uses Twisted Edwards Curves. The core signing method used in EdDSA is based on the Schnorr signature scheme and which was created by Claus Schnorr in 1989. This was patented as a “Method for identifying subscribers and for generating and verifying electronic signatures in a data exchange system”. The patent ran out in 2008. Curve 25519 uses the prime number of 2²⁵⁵-19 and was created by Daniel J. Bernstein. Peter Shor defined that elliptic curve methods can be broken with quantum computers. To overcome the cracking of the ECDSA signature from quantum computers, NIST are standardising a number of methods. At present, this focuses on CRYSTALS-Dilithium, and which is a lattice cryptography method. Bulletproofs were created in 2017 by Stanford's Applied Cryptography Group (ACG). They define a zero-knowledge proof as where a value can be checked to see it lies within a given range. The name “bulletproofs” is defined as they are short, like a bullet, and with bulletproof security assumptions. Homomorphic encryption methods allow for the processing of encrypted values using arithmetic operations. A public key is used to encrypt the data, and which can then be processed using an arithmetic circuit on the encrypted data. The owner of the associated private key can then decrypt the result. Some traditional public key methods enable partial homomorphic encryption. RSA and ElGamal allow for multiplication and division, whilst Pailier allows for homomorphic addition and subtraction. Full homomorphic encryption (FHE) supports all of the arithmetic operations and includes Fan-Vercauteren (FV) and BFV (Brakerski/Fan-Vercauteren) for integer operations and HEAAN (Homomorphic Encryption for Arithmetic of Approximate Numbers) for floating point operations. Most of the Full Homomorphic encryption methods use lattice cryptography. Some blockchain applications use Barreto-Lynn-Scott (BLS) curves which are pairing-friendly. They can be used to implement Bilinear groups and which are a triplet of groups (G1, G2 and GT), so that we can implement a function e() such that e(g1^x,g2^y)=gT^{xy}. Pairing-based cryptography is used in ZKPs. The main BLS curves used are BLS12–381, BLS12–446, BLS12–455, BLS12–638 and BLS24–477. An accumulator can be used for zero-knowledge proof of knowledge, such as using a BLS curve to create to add and remove proof of knowledge. Metamask is one of the most widely used blockchain wallets and can integrate into many blockchains. Most wallets generate the seed from the operating system and where the browser can use the Crypto.getRandomValues function, and compatible with most browsers. With a Verifiable Delay Function (VDF), we can prove that a given amount of work has been done by a prover (Peggy). A verifier (Victor) can then send the prover a proof value and compute a result which verifies the work has been done, with the verifier not needing to do the work but can still prove the work has been done. A Physical Unclonable Functions (PUFs) is a one-way function which creates a unique signature pattern based on the inherent delays within the wires and transistors. This can be used to link a device to an NFT.
"The Necessity, Clarity, and Authority of God's Word" was preached from 2 Timothy 3:14–17 at Redeemer Church on August 13, 2023, by Eric Hughes. This sermon is part of the series "Rooted & Grounded: Cultivating Life in God's Word. For more information about Redeemer Church, visit https://redeemer.live.
So, here's my Top 100 snippets of knowledge for blockchain: Blockchains use public key methods to integrate digital trust. Bob signs for a transaction with his private key, and Alice proves this with Bob's public key. The first usable public key method was RSA — and created by Rivest, Shamir and Adleman. It was first published in 1979 and defined in the RSA patent entitled “Cryptographic Communications System and Method”. Blockchains can either be permissioned (requiring rights to access the blockchain) or permissionless (open to anyone to use). Bitcoin and Ethereum are the two most popular permissionless blockchains, and Hyperledger is the most popular permissioned ledger. Ralph Merkle — the boy genius — submitted a patent on 5 Sept 1979 and which outlined the Merkle hash. This is used to create a block hash. Ralph Merkle's PhD supervisor was Martin Hellman (famous as the co-creator of the Diffie-Hellman method). David Chaum is considered as founders of electronic payments, and, in 1983, created ECASH, along with publishing a paper on “Blind signatures for untraceable payments”. Miners gather transactions on a regular basis, and these are added to a block and where each block has a Merkle hash. The first block on a blockchain does not have any previous blocks — and is named the genesis block. Blocks are bound in a chain, and where the previous, current and next block hashes are bound into the block. This makes the transactions in the block immutable. Satoshi Nakamoto worked with Hal Finney on the first versions of Bitcoin, and which were created for a Microsoft Windows environment. Craig Steven Wright has claimed that he is Satoshi Nakamoto, but this claim has never been verified. Most blockchains use elliptic curve cryptography — a method which was created independently by Neal Koblitz and Victor S. Miller in 1985. Elliptic curve cryptography algorithms did not take off until 2004. Satoshi selected the secp256k1 curve for Bitcoin, and which gives the equivalent of 128-bit security. The secp256k1 curve uses the mapping of y²=x³ + 7 (mod p), and is known as a Short Weierstrass (“Vier-strass”) curve. The prime number used with secp256k1 is ²²⁵⁶−²³²−²⁹−²⁸−²⁷−²⁶−²⁴−1. Satoshi published a 9-page paper entitled “Bitcoin: A Peer-to-Peer Electronic Cash System” White Paper on 31 Oct 31, 2008. In 1997, Adam Black introduce the concept of Proof of Work of Hashcash in a paper entitled, “Hashcash — a denial of service countermeasure.” This work was used by Satoshi in his whitepaper. Satoshi focused on: a decentralized system, and a consensus model and addressed areas of double-spend, Sybil attacks and Eve-in-the-middle. The Sybil attack is where an adversary can take over the general consensus of a network — and leads to a 51% attack, and where the adversary manages to control 51% or more of the consensus infrastructure. Satoshi used UK spelling in his correspondence, such as using the spelling of “honour”. The first Bitcoin block was minted on 3 Jan 2009 and contained a message of “Chancellor on brink of second bailout for banks” (the headline from The Times, as published in London on that day). On 12 Jan 2009, Satoshi sent the first Bitcoin transaction of 50 BTC to Hal Finney [here]. A new block is created every 7–10 minutes on Bitcoin. In Aug 2023, the total Bitcoin blockchain size is 502 GB. As of Aug 2023, the top three cryptocurrencies are Bitcoin, Ether, and Tether. Bitcoin has a capitalization of $512 billion, Ether with $222 billion, and Tether at $83 billion. The total cryptocurrency capitalisation is $1.17 trillion. The original block size was 1MB for Bitcoin, but recently upgraded to support a 1.5MB block — and has around 3,000 transactions. Currently the block sizes are more than 1.7MB. Bitcoin uses a gossip protocol — named the Lightning Protocol — to propagate transactions. A Bitcoin wallet is created from a random seed value. This seed value is then used to create the 256-bit secp256k1 private key. A wallet seed can be converted into a mnemonic format using BIP39, and which uses 12 common words. This is a deterministic key, and which allows the regeneration of the original key in the correct form. BIP39 allows for the conversion of the key to a number of languages, including English, French and Italian. A private key in a wallet is stored in a Wif format, and which is a Base58 version of the 256-bit private key. The main source code for the Bitcoin blockchain is held at https://github.com/bitcoin, and is known as Bitcoin core. This is used to create nodes, store coins, and transactions with other nodes on the Bitcoin network. A 256-bit private key has 115,792 billion billion billion billion billion billion billion billion different keys. A public Bitcoin ID uses Base58 and has a limited character set of ‘123456789ABCDEFGHJKLMN PQRSTUVWXYZabcdefghijkmno pqrstuvwxyz', where we delete ‘0' (zero), ‘l' (lowercase ‘l'), and ‘I' (capital I) — as this can be interpreted as another character. In Bitcoin and Ethereum, a private key (x) is converted to a public key with x.G, and where G is the base point on the secp256k1 curve. An uncompressed secp256k1 public key has 512 bits and is an (x,y) point on the curve. The point starts with a “04”. A compressed secp256k1 public key only stores the x-co-ordinate value and whether the y coordinate is odd or even. It starts with a “02” if the y-co-ordinate is even, otherwise it starts with a “03”. In 1992, Eric Hughes, Timothy May, and John Gilmore set up the cypherpunk movement and defined, “We the Cypherpunks are dedicated to building anonymous systems. We are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money.” In Ethereum, the public key is used as the identity of a user (a.G), and is defined as a hexademical value. In Bitcoin, the public ID is created from a SHA256 hash of the public key, and then a RIPEMD160 of this, and then covered to Base58. In computing the public key in ECC of a.G, we use the Montgomery multiplication method and which was created by Peter Montgomery in 1985, in a paper entitled, “Modular Multiplication without Trial Division.” Elliptic Curve methods use two basic operations: point address (P+G) and point doubling (2.P). These can be combined to provide the scalar operation of a.G. In 1999, Don Johnson Alfred Menezes published a classic paper on “The Elliptic Curve Digital Signature Algorithm (ECDSA)”. It was based on the DSA (Digital Signature Algorithm) — created by David W. Kravitz in a patent which was assigned to the US. The core signature used in Bitcoin and Ethereum is ECDSA (Elliptic Curve Digital Signature Algorithm), and which uses a random nonce for each signature. The nonce value should never repeat or be revealed. Ethereum was first conceived in 2013 by Vitalik Buterin, Gavin Wood, Charles Hoskinson, Anthony Di Iorio and Joseph Lubin. It introduced smaller blocks, an improved proof of work, and smart contracts. Bitcoin is seen as a first-generation blockchain, and Ethereum as a second-generation. These have been followed by third-generation blockchains, such as IOTA, Cardano and Polkadot — and which have improved consensus mechanisms. Bitcoin uses a consensus mechanism which is based on Proof-of-Work, and where miners focus on finding a block hash that has a number of leading “0”s. The difficulty of the mining is defined by the hashing rate. At the current time, this is around 424 million TH/s. There are around 733,000 unique Bitcoin addresses being used. Satoshi defined a reward to miners for finding the required hash. This was initially set at 50 BTC, but was set to half at regular intervals. On 11 January 2021, it dropped from 12.5 BTC to 6.2 BTC. Bitcoin currently consumes around 16.27 GWatts of power each year to produce a consensus — equivalent to the power consumed by a small country. In creating bitcoins, Satoshi created a P2PKH (Pay to Public Key Hash) address. These addresses are used to identify the wallet to be paid and links to the public key of the owner. These addresses start with a ‘1'. In order to support the sending of bitcoins to and from multiple addresses, Bitcoin was upgraded with SegWit (defined in BIP141). The wallet address then integrates the pay-to-witness public key hash (Pay to script hash — P2SH). These addresses start with a ‘3'. Ethereum uses miners to undertake work for changing a state and running a smart contract. They are paid in “gas” or Ether and which relates to the amount of computation conducted. This limits denial of service attacks on the network and focuses developers on creating efficient code. Ethereum supports the creation of cryptocurrency assets with ERC20 tokens — and which are FT (Fungible Tokens). For normal crypto tokens (ERC-20) we use, there is a finite number of these, and each of these is the same. Ethereum creates NFTs (Non-Fungible Tokens) with ERC721 tokens. We mint these each time and each is unique. Solidity is the programming language used in Ethereum, while Hyperledger can use Golang, Node.js and Java. For Ethereum, we compile Solidity code into EVM (Ethereum Virtual Machine) code. This is executed on the blockchain. Blockchain uses the SHA-256 hash for transaction integrity. Ethereum uses the Keccak hash is used to define the integrity of a transaction. This is based on SHA-3, and differs slightly from Keccak. The Keccak hash family uses a sponge function and was created by Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche, and standardized by NIST in August 2015 as SHA-3. The DAO is a decentralized autonomous organization (DAO) for the Ethereum blockchain and was launched in 2016. In 2016, DAO raised $150 million through a token sale but was hacked and funds were stolen. This resulted in a forking of the blockchain: Ethereum and Ethereum Classic. Non-interactive Zero Knowledge Proofs (NI-ZKP) allow an entity to prove that they have knowledge of something — without revealing it. A typical secret is the ownership of a private key. NI-ZKPs involve a prover (Peggy), a verifier (Victor) and a witness (Wendy) and were first defined by Manuel Blum, Paul Feldman, and Silvio Micali in their paper entitled, “Non-interactive zero-knowledge and its applications”. Popular ZKP methods include ZK-SNARKs (Zero-Knowledge Succinct Non-Interactive Argument of Knowledge) and ZK-STARKs (Zero-Knowledge Scalable Transparent Argument of Knowledge). Bitcoin and Ethereum are pseudo-anonymised, and where the sender and recipient of a transaction, and its value, can be traced. Privacy coins enable anonymous transactions. These include Zcash and Monero. In 1992, David Chaum and Torben Pryds Pedersen published “Wallet databases with observers,” and outlined a method of shielding the details of a monetary transaction. In 1992, Adi Shamir (the “S” in RSA) published a paper on “How to share a secret” in the Communications of the ACM. This supported the splitting of a secret into a number of shares (n) and where a threshold value (t) could be defined for the minimum number of shares that need to be brought back together to reveal the secret. These are known as Shamir Secret Shares (SSS). In 1991, Torbin P Pedersen published a paper entitled “Non-interactive and information-theoretic secure verifiable secret sharing” — and which is now known as Pedersen Commitment. This is where we produce our commitment and then show the message that matches the commitment. Distributed Key Generation (DKG) methods allow a private key to be shared by a number of trusted nodes. These nodes can then sign for a part of the ECDSA signature by producing a partial signature with these shares of the key. Not all blockchains use ECDSA. The IOTA blockchain uses the EdDSA signature, and which uses Curve 25519. This is a more lightweight signature version, and has better support for signature aggregation. It uses Twisted Edwards Curves. The core signing method used in EdDSA is based on the Schnorr signature scheme and which was created by Claus Schnorr in 1989. This was patented as, a “Method for identifying subscribers and for generating and verifying electronic signatures in a data exchange system”. The patent ran out in 2008. Curve 25519 uses the prime number of ²²⁵⁵-19 and was created by Daniel J. Bernstein. Peter Shor defined that elliptic curve methods can be broken with quantum computers. To overcome the cracking of the ECDSA signature from quantum computers, NIST are standardising a number of methods. At present, this focuses on CRYSTALS-Dilithium, and which is a lattice cryptography method. Bulletproofs were created in 2017 by Stanford's Applied Cryptography Group (ACG). They define a zero-knowledge proof as where a value can be checked to see it lies within a given range. The name of “bulletproofs” is defined as they are short, like a bullet, and with bulletproof security assumptions. While Bitcoin can take up to 7–10 minutes to mine a new block and create a consensus, newer blockchains, such as IOTA, can give an almost instantaneous consensus. Banks around the world are investigating CBDC (Central Bank Digital Currency) and which is not a cryptocurrency but a way to quickly define a consensus on a transaction. Homomorphic encryption methods allow for the processing of encrypted values using arithmetic operations. A public key is used to encrypt the data, and which can then be processed using an arithmetic circuit on the encrypted data. The owner of the associated private key can then decrypt the result. Some traditional public key methods enable partial homomorphic encryption. RSA and ElGamal allow for multiplication and division, whilst Pailier allows for homomorphic addition and subtraction. Full homomorphic encryption (FHE) supports all of the arithmetic operations and includes Fan-Vercauteren (FV) and BFV (Brakerski/Fan-Vercauteren) for integer operations and HEAAN (Homomorphic Encryption for Arithmetic of Approximate Numbers) for floating point operations. Most of the Full Homomorphic encryption methods use lattice cryptography. Some blockchain applications use Barreto-Lynn-Scott (BLS) curves which are pairing friendly. They can be used to implement Bilinear groups and which are a triplet of groups (G1, G2 and GT), so that we can implement a function e() such that e(g1^x,g2^y)=gT^{xy}. Pairing-based cryptography is used in ZKPs. The main BLS curves used are BLS12–381, BLS12–446, BLS12–455, BLS12–638 and BLS24–477. An accumulator can be used for zero-knowledge proof of knowledge, such as using a BLS curve to create to add and remove proof of knowledge. Open Zeppelin is an open-source Solidity library that supports a wide range of functions that integrate into smart contracts in Ethereum. This includes AES encryption, Base64 integration and Elliptic Curve operations. Metamask is one of the most widely used blockchain wallets and can integrate into many blockchains. Most wallets generate the seed from the operating system and where the browser can use the Crypto.getRandomValues function, and compatible with most browsers. Solidity programs can be compiled with Remix at remix.ethereum.org. The main Ethereum network is Ethereum Mainnet. We can test smart contracts on Ethereum test networks. Current networks include sepolia.etherscan.io and goerli.net. Ether can be mined for test applications from a faucet, such as faucet.metamask.io. This normally requires some proof of work to gain the Ether — in order to protect against a Denial of Service against the Faucet. The private key can be revealed from two ECDSA signatures which use the same random nonce value. Polkadot is a blockchain which allows blockchains to exchange messages and perform transactions. The proof of work method of creating is now not preference because of the energy that it typically uses. Many systems now focus on proof of stack (PoS). A time-lock puzzle/Proof of Work involves performing a computing task which has a given cost and which cannot be cheated again. This typically involves continual hashing or continual squaring. The Chia blockchain network uses both Proof of Space (PoS) and Proof of Time (PoT). The PoS method makes use of the under-allocation of hard-disk space. With a Verifiable Delay Function (VDF), we can prove that a given amount of work has been done by a prover (Peggy). A verifier (Victor) can then send the prover a proof value and compute a result which verifies the work has been done, with the verifier not needing to do the work but can still prove the work has been done. A Physical Unclonable Functions (PUFs) is a one-way function which creates a unique signature pattern based on the inherent delays within the wireless and transistors. This can be used to link a device to an NFT. In Blockchain applications, we can use Non-interactive zero-knowledge (NIZK) proofs for the equality (EQ) of discrete logarithms (DL) — DLEQ. With this — in discrete logarithms — we have
"Rooted & Grounded" was preached from 2 Timothy 3:14–17 at Redeemer Church on July 30, 2023, by Eric Hughes. This sermon is part of the series "Rooted & Grounded: Cultivating Life in God's Word. For more information about Redeemer Church, visit https://redeemer.live.
"The Priority of Love" was preached from 1 Corinthians 13 at Redeemer Church on July 23, 2023, by Eric Hughes. This sermon is part of the series through the Book of 1 Corinthians. For more information about Redeemer Church, visit https://redeemer.live.
"The Theology of the Cross" was preached from 1 Cor 1:18–15 at Redeemer Church on July 16, 2023, by Eric Hughes. This sermon is part of the series through the Book of 1 Corinthians. For more information about Redeemer Church, visit https://redeemer.live.
"In the End" was preached from 1 Cor 16 at Redeemer Church on July 9, 2023, by Eric Hughes. This sermon is part of the series through the Book of 1 Corinthians. For more information about Redeemer Church, visit https://redeemer.live.
"The Resurrection Body" was preached from 1 Cor 15:35–49 at Redeemer Church on June 25, 2023, by Eric Hughes. This sermon is part of the series through the Book of 1 Corinthians. For more information about Redeemer Church, visit https://redeemer.live.
"The Resurrection Changes Everything" was preached from 1 Cor 15:12–34 at Redeemer Church on June 18, 2023, by Eric Hughes. This sermon is part of the series through the Book of 1 Corinthians. For more information about Redeemer Church, visit https://redeemer.live.
"The Gospel Truth" was preached from 1 Cor 15:1–11 at Redeemer Church on June 11, 2023, by Eric Hughes. This sermon is part of the series through the Book of 1 Corinthians. For more information about Redeemer Church, visit https://redeemer.live.
"The Gathering" was preached from 1 Cor 14:26–41 at Redeemer Church on June 4, 2023, by Eric Hughes. This sermon is part of the series through the Book of 1 Corinthians. For more information about Redeemer Church, visit https://redeemer.live.
"The Body of Christ: Prophecy & Tongues" was preached from 1 Cor 14:1–25 at Redeemer Church on May 28, 2023, by Eric Hughes. This sermon is part of the series through the Book of 1 Corinthians. For more information about Redeemer Church, visit https://redeemer.live.
Sermon from Eric Hughes on May 21, 2023
"The Body of Christ: Find a Lane" was preached from 1 Cor 12:27–31 at Redeemer Church on May 14, 2023, by Eric Hughes. This sermon is part of the series through the Book of 1 Corinthians. For more information about Redeemer Church, visit redeemer.live.
"The Body of Christ: Every Member Matters" was preached from 1 Cor 12:12–27 at Redeemer Church on May 7, 2023, by Eric Hughes. This sermon is part of the series through the Book of 1 Corinthians. For more information about Redeemer Church, visit redeemer.live.
"Celebrating God's Faithfulness" was preached from Psalm 77 at Redeemer Church on April 30, 2023, by Eric Hughes. This sermon was preached to celebrate Redeemer Church paying off their building mortgage. For more information about Redeemer Church, visit redeemer.live.
Today, Mike talks with Eric Hughes, owner of The EH Group. Eric is a full-time art teacher with a large lawn care company. Eric talks about managing his career, his side hustle, and his large family! Eric shares his knowledge on starting a business, growing a business, managing his time, and staying organized. Brian Fullerton recently toured Eric's Shop in Delaware, Ohio. Link below. Take a video tour of Eric's shop: https://youtu.be/odr2YWYdmis @coastalfertilization @sidehustlesquadpodcast
"The Body of Christ: Spiritual Gifts" was preached from 1 Cor 12:1–11 at Redeemer Church on April 23, 2023, by Eric Hughes. This sermon is part of the series through the Book of 1 Corinthians. For more information about Redeemer Church, visit redeemer.live.
Max Hillebrand joins me for a series of conversations covering the work on crypto-anarchism. In this episode, we discuss "A Cypherpunk's Manifesto" written by Eric Hughes. Max Hillebrand is a free software entrepreneur building tools to empower individual sovereignty.// GUEST // Twitter: https://twitter.com/HillebrandMax A Cypherpunk's Manifesto: https://nakamotoinstitute.org/static/docs/cypherpunk-manifesto.txt// SPONSORS // In Wolf's Clothing: https://wolfnyc.com/iCoin Hardware Wallet (use discount code BITCOIN23): https://www.icointechnology.com/CrowdHealth: https://www.joincrowdhealth.com/breedloveWasabi Wallet: https://wasabiwallet.io/Join Me At Bitcoin 2023 in Miami (use discount code BREEDLOVE): https://b.tc/conference/Casa (use discount code BREEDLOVE): https://keys.casa/Bitcoin Apparel (use discount code BREEDLOVE): https://thebitcoinclothingcompany.com/ Feel Free Tonics (use discount code BREEDLOVE): https://botanictonics.comCarnivore Bar (use discount code BREEDLOVE): https://carnivorebar.com/// OUTLINE // 00:00:00 - Coming up 00:01:09 - Intro 00:02:42 - Helping Lightning Startups with In Wolf's Clothing 00:03:29 - Introducing Max Hilbert 00:03:51 - A Cypherpunk Manifesto 00:10:27 - A Strong Case for Privacy 00:14:39 - The Relationship Between Taxation and Privacy 00:19:06 - An Option to Reveal or Conceal One's Privacy 00:23:55 - Governments and their Privacy 00:28:06 - Can you Steal Information? 00:31:19 - Bitcoin and the Legal System 00:34:50 - The Staggering Effects of The Global Communication Engine 00:41:28 - Secure Your Bitcoin Stash with The iCoin Hardware Wallet 00:42:25 - Take Control of Your Healthcare with CrowdHealth 00:43:26 - A Bitcoin Wallet with Privacy Built-In: Wasabi Wallet 00:44:01 - A Blurry Line Between Interactions and Transactions 00:48:18 - Selectively Revealing The Information 00:54:33 - “I Must Always Reveal Myself” 00:56:13 - Privacy in an Open Society Requires Anonymous Transaction System 00:58:11 - Monero vs. Bitcoin Argument 01:03:13 - Is Monero a Shitcoin? 01:05:09 - Why It'll Take Years to Use Bitcoin Properly 01:08:12 - Transacting without Revealing One's Identity 01:10:26 - Zero-Knowledge Proof and Cryptographic Signatures 01:15:32 - How Facebook Owns Your Data 01:17:58 - “Information Understands Less than Rumor” 01:19:47 - "Information Longs to be Free" 01:22:58 - A Chance to Win Discounted Tickets to the Bitcoin 2023 Conference and 10M SATS 01:23:53 - Hold Bitcoin in the Most Secure Custody Model with Casa 01:24:41 - The Only Way Out of the No Privacy Problem 01:30:44 - The Reason Behind the Movement 01:37:45 - A Stance Against Stateism Through Cryptography 01:40:56 - "Cryptography will Ineluctably Spread over the Whole Globe" 01:42:40 - The Incentives are a Ground Stand of Human Action 01:45:41 - An Open Source Ethos with Emphasis on Humility and Human Action 01:52:26 - Breaking down the word 'Cypherpunk' 01:53:07 - Human Flourishing or Global Totalitarianism 01:55:11 - What Motivates Max to Improve the Privacy of Humanity 02:00:51 - What Work Should Max and Robert Cover Next?// PODCAST //Podcast Website: https://whatismoneypodcast.com/Apple Podcast: https://podcasts.apple.com/us/podcast...Spotify: https://open.spotify.com/show/25LPvm8...RSS Feed: https://feeds.simplecast.com/MLdpYXYI// SUPPORT THIS CHANNEL // Bitcoin: 3D1gfxKZKMtfWaD1bkwiR6JsDzu6e9bZQ7 Sats via Strike: https://strike.me/breedlove22Sats via Tippin.me: https://tippin.me/@Breedlove22Dollars via Paypal: https://www.paypal.com/paypalme/RBreedloveDollars via Venmo: https://account.venmo.com/u/Robert-Breedlove-2The "What is Money?" Show Patreon Page: https://www.patreon.com/user?u=32843101// WRITTEN WORK // Medium: https://breedlove22.medium.com/ Substack: https://breedlove22.substack.com/ // SOCIAL // Breedlove Twitter: https://twitter.com/Breedlove22WiM? Twitter: https://twitter.com/WhatisMoneyShowLinkedIn: https://www.linkedin.com/in/breedlove22/Instagram: https://www.instagram.com/breedlove_22/TikTok: https://www.tiktok.com/@breedlove22All My Current Work: https://vida.page/breedlove22
Today we're joined by Eric Hughes of The EH Group, who shares his incredible side hustle lawn and landscaping business with us. These guys are growing big time and doing amazing work, even with a large family and a full-time career. Enjoy. Lawntrepreneur Academy Whole Ball of Wax (Save $300 with code: SpringRush) Get Brian's Free Newsletter Brian's Lawn Maintenance On YouTube Brian's Lawn Maintenance On Instagram Ballard-Inc.com (Brians10) KUJO (Brians10) Equipment Defender (Brians10) https://gpstrackit.com/brianlm/ www.brandedbullinc.com Mention Brian's name and save $100 on a new website.
In this episode, Caleb interviews Eric Hughes, a local school teacher, and entrepreneur who has been running his landscaping business for 17 years while still teaching full-time. Eric shares valuable insights on how he successfully juggles his teaching duties and running a landscaping business during the school season. https://www.TheHardscapeAcademy.com Auman Landscape on YouTube Together In The Trades - July 14-15, 2023 www.companycam.com/kcpodcast 14 days FREE and 50% off the first 2 months Linktree/AumanLandscape @aumanlandscapellc www.CycleCPA.com (Use code "Auman" to save $200 when signing up. https://www.greenfoundryco.com/ SteinerTurf.com Unilock.com bartellglobal.com LMN Software Code: AUMAN25 Latux Diamond Blades: AUMAN NDS Drainage Certification FREE: www.lawntrapreneuracademy.com Mailing Address: Caleb Auman PO Box 203 Carroll, OH 43112 **********
► NEWS: Silvergate Capital implodes as contagion still has ripple sin the bitcoin eco system... ► CULTURE: ... 30th anniversary of the "Cypherpunk Manifesto" by Eric Hughes so we do our best impersonation of Bitcoin Audible/ Guy Swann read. Enjoy;). ✔Simply Bitcoin in Written Form: http://simplybitcoin.news/ ✔Check out our Sponsors, support Bitcoin ONLY Businesses: ✔ Blockstream: ► https://store.blockstream.com/product/blockstream-jade-hardware-wallet/ ► Blockstream Jade an open-source hardware wallet for the cold storage of bitcoin and bitcoin layer-2 assets on Liquid. Manage your assets from mobile or desktop with jade-compatible wallets. ✔ @TheBitcoinConf ► https://bm.b.tc/simply ► The largest Bitcoin conference in the world! In Miami Beach Florida on May 18-20th 2023. Use code SIMPLY for 10% off your tickets! ✔ Citadel21: ► https://www.citadel21.com ► A Bitcoin cultural zine. Bitcoin culture is rich and varied. It contains a multitude of voices, opinions and flavors. Only 1000 of each volume are made. ✔ BitPlates: ► https://bitplates.com ►Raising the standard of Bitcoin wallet backup devices | BitPLATES® BitPLATES® Domino® metal storage plates provide industrial-grade and marine-grade protection for your Bitcoin wallet backup words. ✔ kaboomracks : ► kaboomracks.com ► The best place to buy Bitcoin miners. Start your mining utopia today. Checkout their racks at https://t.me/kaboomracks ✔ NODL : ► https://www.nodl.eu ►Running Bitcoin, just like in Hal Finney's legendary tweet. Use all the Lightning features thanks to your always on device. Easy to Use, Everyone can run a NODL. Privacy focused. ✔ Represent Clothing: ► https://www.representltd.com ► Check out Represent LTD's full clothing line including collabs, originals & collections. Super comfortable, great fit and Style, there is something for everyone: hoodies, tees, tanks, jackets and more! It's your life...represent accordingly. ► USE PROMO CODE SIMPLY-BITCOIN FOR 10% OFF ANYTHING IN THE REPRESENT CLOTHING STORE! ✔ Swan: ► https://www.swanbitcoin.com ► Swan is the best way to build your Bitcoin stack, with automated Bitcoin savings plans and instant purchases. Serving clients of any size, from $10 to $10M+ ✔ Join our Telegram, Give us Memes to Review! ► https://t.me/TheSimplyBitcoinChannel ✔ Follow Us! ► https://twitter.com/SimplyBitcoinTV ► https://twitter.com/BITVOLT7 ► https://twitter.com/@My_Livin_Truth ► We are a proud supporter of Bitcoin only businesses. ⚡️ simplybitcoin@getalby.com DISCLAIMER: All views in this episode are our own and DO NOT reflect the views of any of our guests or sponsors.
Welcome back! On today's episode:Mack & Steel talk with Dusten Swayne of Backyard Boyz Landscaping and Eric Hughes of The EH Group out of Central Ohio!The guys chat with Dusten and Eric about how they transitioned into the green industry, their love behind it and what inspires them about it.Come hang with us and enjoy the show as we laugh a little and learn a little. Backyard Boyz - Instagram The EH Group - Instagram We really appreciate you listening to the Lawn Care Power Moves Podcast and hope you enjoyed Today's episode. Do us the honor and leave us a 5 star review with some words of encouragement, let us know where you're listening from and share the podcast with a friend or two. It goes a long way in helping the podcast grow.Today's Show SponsorLawntrepreneur AcademyIntro/Outro MusicTrek Manifest - BL3$$3D Check us out on your favorite social media platforms!YouTube:Mack Landscaping & Lawn Care | Steel Cuts Lawn & Landscaping Show Links:Mack's Links | Ced's LinksJoin Us Wednesdays @ 9PM EST For The Lawn Care Power Moves Instagram Live Show!
On todays show special guest Eric Hughes talks about how he balances being a full time teacher while also running his successful landscaping business. Register for SYNKD LIVE The Resource Center at GreenIndustryPodcast.com Register for Lawn and Landscape Society Event Powered by Kohler - Save $25 off with coupon code" "LLS25OFF" Try Jobber for Free! Register for Jobber Summit The Landscaping Bookkeeper - Megan and Joey Coberly Price Increase Letter Template Paul Jamison's Books Try Audible CFP Sheila Chaplain's Email: screliabletax@gmail.com Paul's Audiobooks: Cut That Grass and Make That Cash 101 Proven Ways to Increase Efficiency and Make More Money in Lawn Care Best Business Practices for Landscapers
A discussion of the current events and needs of the Maury County Schools transportation Department with Garth Pinkston. Additionally, Jack re-introduces Kevin Eady as the new Mt. Pleasant Middle School Principal and Eric Hughes as the new Mt. Pleasant High School Principal.
In Episode 26, Dave talks, once again, to Mike Mitchell Jr. and Eric Hughes. This time around, they talk about what it means to have a spiritual practice after having left Christianity.
In Episode 25, Dave talks with Mike Mitchell Jr and Eric Hughes. Mike is an actor. Eric is a lawyer. They are legitimately a power couple. This conversation is so raw, honest, full of laughter, pain and beauty. For more of Mike and Eric, check out their tiktok account and be sure to listen to part 2! tiktok: @mikemitchelljr http://www.mikemitchelljr.com/
Got an opportunity to sit and visit with Eric Hughes who is executive director of Camp Liberty. Eric who is a Marine Veteran explains some of the issues he had coping with PTSD after his time in service and how he decided to get involved in the fight. Him and his wife among several other volunteers have worked extremely hard over the last few years to create Camp Liberty. Camp Liberty is a small farm located in Fulton County Illinois that offers assistance and programs to Veterans who are struggling with Post Traumatic illness with various resources and activities discussed in the episode. Please support their cause and help them assist more of our Veterans by visiting their Facebook and Website.Camp Liberty Facebook Page / https://www.facebook.com/campliberty22/Camp Liberty Website / https://www.camplibertyvets.org#dialthewild / Instagram
Can you buy a house for under $100K? Can you invest in a house long-distance? Yes and Yes!! Eric Hughes of www.rentalincomeadvisors.com joins "The House of AC" livestream to discuss investing in long-distance single-family properties all under $100k. I've done this strategy too, so I can 100% confirm for you that this is possible! Join us live on YouTube, Twitch, Discord, Twitter, or the "House of AC" Facebook page to ask your questions in real-time! The House of AC is proudly sponsored by Jasmine Mortgage Team Topics: - Long-distance rental investing in homes under $100k with Eric Hughes - Introducing Eric Hughes - Monthly Rental Reports of what Eric Makes Monthly - The 1% Rule of Thumb in Real Estate - How to Get Started in Real Estate Investing - The Importance of a Good Property Manager - Where to Get a Mortgage Loan - How to Analyze a Property from long distance - Is Real Estate Investing a Safe Decision? - Cash Flow Markets - Where to Buy Investment Properties - Strong Cash Flow Properties - How Long to Wait to Buy More Properties Follow me on Social Media! @TheHouseofAC
Dr. Oord explains an upcoming class starting in November. Only 24 students can register: https://c4ort.com/product/going-deeper-in-ort-course/
Audioblogs and Podcasts from the Blockchain Acceleration Foundation
Listen to this avant-garde Manifesto written in 1993 by Eric Hughes that already talked about "defending our privacy with cryptography". Learn more about BAF: https://www.blockchainacceleration.org/ Follow BAF on Twitter: https://twitter.com/TheBAFNetwork
The team shares embarrassing worship leading moments on this episode of the podcast. Featuring Chase Wagner, Dan Rivera, Jon Laurenzo, and Eric Hughes. For more information of Grace City Music visit www.gracecity.com/music
Location: Skype Date: Thursday, 9th January Project: Bitcoin Magazine Role: Technical Editor Welcome to the Beginner's Guide to Bitcoin. Bitcoin can be intimidating for beginners. The protocol is complicated, the community can be aggressive and unforgiving, silly mistakes can lose you money, and it is easy to succumb to altcoin marketing. Bitcoin does though, offer you the opportunity to hold a new type of monetary asset, one which can't be seized by the government and is censorship resistance and It has the potential to change the way the world. The goal of What Bitcoin Did has always been about making things simple; there are no stupid questions, and the show is here to help beginners navigate this new world. To kick off 2020, we are launching a special series to help beginners understand Bitcoin. We will be looking at the basics from breaking down the protocol to explaining the economics and discussing the potential societal shift. Beginners Guide Part 3 - Aaron van Wirdum on Bitcoin's Pre-History and the Cypherpunks Founded by Eric Hughes, Tim May and John Gilmore the cypherpunks were a group of hackers, privacy enthusiasts and crypto-anarchists. The group consisted of some of the most prominent cryptographers including Phil Zimmermann, Adam Back, Nick Szabo and Hal Finney. The cypherpunks had its factions; some focussed on privacy tools, others on encryption and some on building decentralised monetary systems. It was on the cypherpunk mailing list and during their meetups that the building blocks of Bitcoin were born. On October 31st 2008, Satoshi Nakamoto emailed the cypherpunk mailing list, telling them "I've been working on a new electronic cash system that's fully peer-to-peer, with no trusted third party." In the 11 years that followed Bitcoin has proven to be the most successful attempt at creating a censorship-resistant and trust minimised digital currency. Each previous attempt at creating a form of digital money had solved parts of the puzzle, but Satoshi was able to put these pieces together along with his innovations to create Bitcoin. The previous attempts included: In the 1990's eCash, headed by David Chaum, attempted to make online payments anonymous. In 1997 Adam Back created HashCash, a proof-of-work system to reduce email spam and prevent denial of service attacks. In 1998 Wei Dai proposed B-money to allow for an "anonymous, distributed electronic cash system". Around the same time, Nick Szabo proposed Bit Gold where unforgettable proof of work chains would share properties of gold: scarce, valuable and trust minimised but with the benefit of being easily transactable. In 2004 Hal Finney built upon the idea of Hashcash and created Reusable Proofs of Work. When Satoshi released the Bitcoin whitepaper, rather than a revolution, Bitcoin was an evolution of all that had come before it with Bitcoin being the most trust minimised, censorship-resistant and hardest currency that has ever existed. In Part 3 of The Bitcoin Beginner's Guide, I talk to Aaron van Wirdum, a journalist and Technical Editor at Bitcoin Magazine. Aaron explains the cypherpunk movement and the digital money projects which paved the way for Bitcoin.