Chủ Nhật, 7 tháng 10, 2018

Waching daily Oct 8 2018

I'm Hamoody Bamby

We have for you a legendary adventure

I'm coming to you baby

For the 100th anniversary of the Chevy trucks

I brought this legend to this legend

So we're gonna make a beast out of this truck

Come along

"100 years & the legend lives on"

Assalamu alaykum, how are you?

I know that you're excited as I am

and you await eagerly as I do too

You're more eager than I am

But I'm more excited than you are

Going to the garage now to show you the work

How we'll assemble the pieces Going to the garage now to show you the work

How we'll assemble the pieces

Stay tuned brothers, stay tuned!

Hello everybody!

You guys ready?

Let's do this

Whoa! look at this

- Please don't tell me it started - What's up man? No

- How are you? - Can't start the party without you

You told me to get ready & I'm ready now

Before we get started

we need to take a picture of the truck

That's a really good idea, let's do it

The truck is in such a good condition

that I can use lots of the parts in future projects

So we're gonna assess what we need & gonna use

That's a really good idea because it's 51 years old

What we'll do now is remove the hood

and replace the pieces

I'm thrilled about the legendary work I'm about to do now

We need the energy to take it apart!

Ready? Come with me

The 1st piece removed will be the last mounted

Luck!

- We got it ready? - Yeah

- How are you feeling? - I'm feeling hungry

- No lunch for you - No lunch for me?

- No - No, not allowed?

That way... Caught it baby

I need some help, need some muscles

- Right here - Got it?

- Yeah got it - This is a...

The bad boy's gonna do it

Close it a bit

Now we can see the engine

which is the main heart of the car

Let's go there

This is a Chevy's workhorse right here

They used it for farming, driving across America

Carrying stuff across with just this right here

So this truck is 51 years old still running strong

We're gonna give it a bit more muscle

- Why is it Orange? - That's called GM Orange

- Okay - Hook me up

We're cool

We're almost there!

Now pull the machine back

Watch your toes, up... Jack it up

Alright, alright, that's good

Set it down

- We're good - We're good

I got it!

You're tiny

Now focus with me & listen

We made him something legendary & astonishing today

Made him "majbous" chicken, rice & spices

which is a new dish for him

Also Emirati food & setting for him

All of this where? The Chevy no doubt

- Welcome to my field - Thank you

- That was your field, this is mine - Okay

- This chicken's bit spicy - It's okay, I'm Mexican

- How do you say Majbous? - "Mashbush"

So I hear you have a Chevy pickup

- I love Chevy - Yeah?

I love, I swear

Had 3 cars, sold them all & kept this

It's comfortable, sport, fashionable, fast

- Because we have desert here - Yeah

We use these cars in the desert

They never break down there

Mine is beautiful and I love it

- It's all black - Yeah?

It's a beast, we call it "wahesh"

So we're gonna make a beast out of this truck

Have you done the sketches for this car now?

I've some sketches that I started working on

I really can't wait to see them then

Let's finish lunch & we'll have a look at them

Alright then, let's just do it

I've been going over the designs in my head

Thinking of putting Chevy truck's 100th year

& I think I got the perfect truck for this

So we'll do a rough sketch

to know what the truck's gonna look like

& then we put it all together

He's designing something legendary

You cannot see so just wait for it

I see the Chevy's almost ready

Yeah it started to take shape

Have you decided which color to put?

I wanna do a really pearly white roof

- & sand color gold bottom - wow bro, it's beautiful

I think it represents us

Our culture, our traditional colors

- Pear diving as you said pearls - Yes

- And? - Sand color bottom half

- Have you been to Shindagha? - I've been to Shindagha

- Have you seen the old houses? - Yeah

Those 2 colors represent our culture right there

Surely whoever sees this will know it was built with heart

& was built here in the UAE

Honestly the colors he chose

represent the old Emirati heritage

The pearly and the brownish gold

Of course everyone knows why pearl & brown

The brown as the old houses

& pearl because our ancestors used to dig them

So he chose those 2 specific colors

So imagine the old Chevy with those 2 colors?

As you can see we don't work in a garage

This garage resembles a 5 stars hotel

For example...

You push & it opens by itself

I like that!

Everything is easy

For example if a piece fell

I will use this to pick it up

I like that!

For more infomation >> Chevrolet Silverado: The Old - Renovated! - Duration: 7:51.

-------------------------------------------

MOTIVARSI ED ANDARE AVANTI (Sub. ENG-ES 🇬🇧🇪🇸) - Duration: 2:35.

Motivate yourself and go on

Goodmorning, happy Monday, welcome back

if this jar opens.. ahaha

(birds)

When you do something you must know that you will have against those who wanted to do the same thing,

who wanted to do the opposite and who did not want to do anything

How you do it, you do it ... it will not be good

so it is worth so much to do what we really want, no?!

There will always be envious people

there will always be people who do not want to support you, without a reason

there will always be people who do not like anything

In conclusion: if we have to worry about the thought of others we will not do anything

I think that doing something

that we really want, as I always say,

emits a different vibration,

the energy is more powerful,

and we arrive to people.

But first of all it makes us feeling better.

So, when you decide to do something,

don't worry about what others may think, just do it

because otherwise you enter a mechanism of thought,

often negative,

that makes you suffer, that makes you sick,

and it creates more pressures and more thoughts ..

...but...

If everyone put into practice the "live and let live" will be better

And.. support the nice ideas,

the brilliant ideas that someone can have

it's nothing wrong

"Marika, change the topic of your videos"

These are part of a type of videos

that serve to those who need them,

they cannot be understood by everyone

my VLOG are liked from another kind of people;

"Mom's diary" was purely dedicated to a niche of people

above all parents,

even if I have discovered that a lot of young girls watched "Mom's diary".

But this is just an example.

Whatever choice you make you will always find someone who does not agree

So.. keep calm,

do it 'cause you wanna

make choices because you decide

1000 kisses! See you next time

Fast fast fast!

We'll see you on Thursday, ...well yes

from today there will be only 2 episodes a week

For more infomation >> MOTIVARSI ED ANDARE AVANTI (Sub. ENG-ES 🇬🇧🇪🇸) - Duration: 2:35.

-------------------------------------------

[CS198.2x Week 2] Proof-of-Stake - Duration: 5:02.

Up until now, the main consensus algorithm we've focused on is Proof-of-Work.

Proof-of-Work, although the system behind the most popular cryptocurrency, Bitcoin,

still has many drawbacks.

For example, we have already mentioned the massive amount of energy consumption required

for Proof-of-Work, the potential for 51% attacks, as well as the shift from decentralized individual

miners, to more centralized mining pools.

To solve some of these issues, Proof-of-Stake was introduced.

As mentioned earlier, Proof-of-Stake is a consensus mechanism where voting power is

directly proportional to economic stake locked up in the network, instead of computational

power and resources.

Each participant stakes a certain amount of native currency, and each node is given a

probability of being chosen as the next validator, weighted by how much was at stake.

Once a validator is chosen, they can propose a valid block and receive a reward.

With this scheme, how much power a participant has in the network is limited by the amount

they are willing to stake.

Rather than relying on rewards for security, Proof-of-Stake relies on penalties.

If a participant places stake on a dishonest block, they are penalized and lose however

much they put at stake.

In this, acting maliciously is penalized much more heavily than the gain from acting honestly.

This is one example of defender's advantage.

Nodes are now more disincentivized to act maliciously due to the explicit consequences

of doing so.

This security comes from locking up capital for long periods of time.

Proof-of-Work, on the other hand, has no such defender's advantage: the cost of attacking

and the cost of defending are 1:1, meaning the amount of resources I spend on acting

honestly versus acting dishonestly are equal.

There is no explicit disincentive against acting maliciously in Proof-of-Work: it just

simply allows it.

Another advantage Proof-of-Stake has over Proof-of-Work is the drawback in attempting

a 51% attack.

In Proof-of-Work, a dishonest actor needs 51% of the network's hash power, and if

achieved, can censor transactions, rewrite transaction history, and perform double spend

attacks.

Nodes are not explicitly discouraged from attempting a 51% attack, and, if unsuccessful,

only lose the resources used to attempt the attack.

This cannot be said for Proof-of-Stake, which requires 51% of the network's coins.

This is incredibly expensive, and then the attacker must stake all of their wealth in

order to attempt executing the attack.

Also, since this miner owns 51% of the cryptocurrency, it is not in their best interest to attack

a network that they hold a majority share in if the value of the currency were to drop

due to the attack.

As seen, there are major drawbacks in attempting this, another example of Proof-of-Stake's

disincentive focused system.

Although Proof-of-Stake fixes many issues with Proof-of-Work, it is not without its

own drawbacks.

For example, there is the problem of the "rich get richer."

Those with more wealth can stake more and increase their chances of creating the next

block, and therefore receiving the reward, and increasing their wealth further.

One implementation of Proof-of-Stake is Ethereum's Casper Protocol, which takes this to another

step, which enforces a minimum stake value required to validate blocks.

Some argue that this takes the issue to an extreme and makes the system even much more

centralized.

However, only time will tell.

Another issue of Proof-of-Stake stems from the fact that amount of voting power is tied

directly to how much stake one has.

In Proof-of-Work, anyone can buy ASICs and begin participating in the network, but in

Proof-of-Stake, all the voting power is internal to the system so one can only obtain stake

if a current stakeholder sells theirs.

This means that if a single actor is able to obtain 51% of the cryptocurrency, there

is no way for this power to be taken back by the rest of the network.

In Proof-of-Work, dislodging 51% power would only require more computation through more

honest mining, reducing the relative power of the malicious actor.

However, in Proof-of-Stake, the only way to reduce this power is to decrease relative

amount of cryptocurrency the dishonest validator has.

However, there is no way to do this without the 51% stakeholder willingly selling their

stake.

Proof-of-Stake also introduces the liquidity problem.

Since validators must lock up their funds in order to have a stake in the network, the

actual amount of funds available for transactions is much lower.

This reduces the liquidity of the cryptocurrency itself, decreases the amount of available

funds, and increases price and demand.

But because of this, validators are more incentivized to hold onto their funds and sell it when

the prices increase, rather than participate in the network.

One more issue is the fact that someone can rewrite the history of blockchain if someone

with a huge share of stake sells their private keys.

By obtaining such a large stake in the network, they change previous transactions on a different

chain.

Outside of these drawbacks of Proof-of-Stake that were mentioned, there are also specific

attacks that can be conducted in a Proof-of-Stake system that will be covered in the next section.

For more infomation >> [CS198.2x Week 2] Proof-of-Stake - Duration: 5:02.

-------------------------------------------

Chevrolet Silverado: The Legend Of All Times - Duration: 6:59.

I'm Hamoody Bamby

We have for you a legendary adventure

I'm coming to you baby

For the 100th anniversary of the Chevy trucks

I brought this legend to this legend

So we're gonna make a beast out of this truck

Come along

"100 years & the legend continues"

Assalamu alaykum

I'm Hamoody Bamby

I'm a huge fan of Chevrolet okay?

and I'm sure many love Chevrolet

I have for you a legendary adventure, ready?

Come along

Let me give you some of the info I have

In 1967 the Boeing 737 made its 1st flight

Shall I say more? Okay...

In 1967 Muhamad Ali Clay refused to enroll in the army

and he was banned from boxing, poor man

In 1967 The Doors released their 1st album

I gave you a lot of info yeah? come with me

And the big surprise is...

In 1967 this truck, this legend, this beast was born

What do you think of the info? Like it or not?

In 2018 this truck will be 51 years old

For the 100th anniversary of the Chevy trucks

Chevrolet Arabia asked me to find the legendary person

capable of restoring this legend behind me

and he is Bear Garcia

Bear Garcia is of the most important car customizers worldwide

He was a West Coast Customs' team member

Good news is he lives in Dubai & I have his number

and I'll call him now

Hello, are you ready? We're coming to see you

I like that!

See you there then

Bear I'm coming to you yeah... We're here

Hello!

Here we go...

- Assalamu Alaykum - You too, how are you brother?

- I'm very good, are you alright? - Yeah

So here we go, finally I meet you

And I brought this legend to this legend

Thank you

So the reason I'm here

Chevrolet trucks is celebrating 100 years

you know, this legend

It's still healthy as you can see

Yeah it's a beautiful truck

I love Chevrolet

The reason I'm here is this one

Do you know now why I'm here?

This man is a genius

What, my muscles?

No, strong ones but meant your brain's

Tell me Bear, what you're gonna do with this one?

It's a beautiful truck as it is

But I have to step back, envision it

I'll put some sketches together

tie the 2 celebrations & make something happen

You're gonna change it all or renew it?

- The shape & everything - It's still healthy

It's great just the way it is

but we're gonna bring it up to times

The original since then, it's still original

This beast is still as strong

I like that

Let's touch it with our nose, you know?

It's the Arabic way

Can't wait to see what you'll do with this car

Let's have a look at the heart & soul of it

This thing is still in its original condition

It's 51 years old & everything's still here working

It comes like this since day 1

Comes from the factory just like this

What are you going to do?

My vision is we're gonna have to keep up with times

so we're gonna have to modernize everything

So we're gonna put a new engine, AC, breaks

clean all the chassis, built it from the ground up

But with still the classic look

We'll see how this beauty will become, I like that

Wanna take a look, see what you're gonna do?

- Let's go over it, have a look - Show me, show me

I have so many things going on in my head

After you, after you sir

Everything is there, wanna drive it as it is

But you know what?

All's gonna change into something immaculate, wonderful, elegant

This is so good, look at this

We're gonna take this out

Take it to your home, you can sleep on it

- We're gonna renew everything inside - Okay

Careful now

Take it easy buddy

Sorry baby, sorry baby

What else we can check?

- What do you call it? "Jumpin..."? - "Jumpinat", shock absorbers

- We need to check that - The suspensions?

- Yeah - I check them out?

- Yeah check them - Alright will do my own way

Yeah I think that's gonna be changed

I think we need to change them

Man everything is still here

Everything is clean

It still has the original dealership tag from 1967

So are we gonna start working on it today, now?

I would've loved to start today

but don't think you're ready for what I've for you tomorrow

Well this is how it goes, anyway...

So go home, get some rest, put on your battle clothes

We're gonna get greasy and dirty tomorrow

I like that, I can't wait guys

See you tomorrow

Thank you for watching

Don't forget subscribing to our Chevrolet Arabia channel on Youtube

& wait for the next steps this champ will do

I like that!

- Are you ready? - Ready

Say "Yeah"

No, pronounce it like this

I like that!

For more infomation >> Chevrolet Silverado: The Legend Of All Times - Duration: 6:59.

-------------------------------------------

Chevrolet Silverado: The Legend Of Iron And Glory - Duration: 6:57.

I'm Hamoody Bamby

We have for you a legendary adventure

I'm coming to you baby

For the 100th anniversary of the Chevy trucks

I brought this legend to this legend

So we're gonna make a beast out of this truck

Come along

"100 years & the legend lives on"

Assalamu alaykum, hello

The legend has turned into pieces

So please tell me what's next

There's a lot of hard work ahead of us

But this is where all the action happens

We have sparks, grinding, cutting

So we have to bring the glamour back

I've been waiting for this part since day one

Before we do anything

we need to pick out the leather for the interior

- Do we have to go to the shop? - We don't have to go anywhere

I brought all the samples here with us

- You've got everything here? - Everything's here

Let's do it

You're invincible, you never get tired

- Need help with the wheel? - No, I'm okay

It's leather time!

How do you say leather?

- Leather, "jeld" - "Jeld"?

Yeah you're gonna make a leather interior

Yeah leather

We need to pick the colors of the interior

Do you want it light or dark?

I want the colors to be neutral

because I'm not gonna let the colors do the talking

but i'm gonna let the design do the talking

There's a camel color that I really like

Let's grab this one

- So this one... - We have so many options

We're also gonna do gold stitching like this

with the design

It'll have gold stitching with an Arabic flavor

Beautiful pick

Where'd you get your inspiration from?

A friend of mine dropped this book off to me

It's a 100 years of Chevy trucks

It shows from the 1st to the last years of Chevy trucks

So I've been going over it

& it's been showing all kinds of cool stuff

The classic ones to the modern ones

Imagine the new truck will have these two colors!

Cool!

- So we're back to work now? - Yeah it's time

- It's work time? - Time to get to work

It's wrench time baby, wrench time!

Let's do this!

We need to grind, cut and weld

different areas of the car that are damaged

Take this for instance

This is for the heater the old style

We're putting modern AC thus closing the hole

Fix some of this damage

Then we have more here that needs fixing

Right here

See, there's a big hole right here

- So we need to cut all these - Yeah

But I'm not afraid of that

Something's in here that doesn't look right

So this is what we'll check first

We need to...

Crunchy!

Put your gloves on, let's get to work

Let's do this baby, come on!

We stopped the grinding

It's not useful, the place got dusty

So it's not useful

What's the solution now? Break it off

- This? - Exactly yeah

I got a little prank set up for Bamby

Let's see how it goes down

Wait! Not here! Not here!

Alright

Wait!

This is another part?

Yeah but I didn't want to break that part

This part's okay but we need to save this

Wait, cut, cut

He wanted me to break this & I went there

- Is it that bad? - No

- I dunno - Dunno, could fix it I guess

Can we film after that?

Yeah just film it I guess, dunno

Maybe I can get or make another piece

I have to tell you something

I was just kidding

We were making a joke on you

So you didn't do anything

I don't care if you cut it all off

We can make anything here

Okay

I see now, okay... Alright

Obviously this part is really rusty

& there's a lot of damage on it

So what we'll do is cut this section out

Take this piece out, make a new one

Put it back & weld it close

All the rest of the parts...

We'll make new ones for them?

New ones all out of sheet metal

- With this machine here? - This machine yeah

This one cuts, bends & rolls metal

Fail to explain how amazing this machine is

I don't know its name, this is the first time i see it

It cuts pieces into any needed shape for the car

This is where your muscles come in handy

See this handle? We need to turn it

Go ahead

I like that!

Now that we have our two bends

The sheet has a bend like this

So we need to bend it like that

We're gonna bend it with this machine?

Yeah, this one is a shrinker

Basically the more we press the more it bends

This is the part that we made

So we're gonna weld it to the truck

Let's just line it up here

Give me that clamp right there

This is the 1st time I weld

The 1st my whole life

So I'm gonna try now

Longer

Hold the trigger longer

That's too much fun, I like that!

We've reached now half the work

As you see, a garage, covered with dirt

A man has to do manual work

I'll continue work with Bear, he's waiting

Await the new developments

For more infomation >> Chevrolet Silverado: The Legend Of Iron And Glory - Duration: 6:57.

-------------------------------------------

Regisztráció a #MADS hírlevélre - Duration: 2:27.

For more infomation >> Regisztráció a #MADS hírlevélre - Duration: 2:27.

-------------------------------------------

Why You Should Reinvest Dividends || SugarMamma.TV - Duration: 6:46.

Hi everyone. Welcome back to my channel SugarMama TV. Before I launch into money

Monday I have a small favor to ask. If you purchased The $1000 Project,

and you really enjoyed reading it. I would greatly appreciate it if you

can leave me a review from wherever you bought the book. So whether that be

Booktopia, The Book Depository, Amazon, iTunes or iBooks or even eBay. I would

greatly appreciate if you can leave a few words explaining what you thought

about that the book and how it helped you. Now on that note if you haven't

subscribed already please make sure you do. Now moving on to money Monday it is

all about how to build up your share portfolio using dividend reinvestment

strategies. Now dividend reinvestment strategies is essentially where you

forego receiving your dividends or that is your passive income. Instead of taking

the cash you choose to have that money used to purchase a bigger ownership in

that business. For example say I have 10,000 shares in company XYZ

traded on the stock exchange. And they announced that they're going to be

paying a dividend of 17 cents per share to the dividend holders the shareholders.

Now instead of receiving $1,700 in cash. I decide that I'm really serious about

building up my wealth and creating financial freedom, and I want to make the

most of that income to really build my wealth. So instead of receiving the

$1,700 in cash. I choose to have that money used to purchase more shares in

the company. So with the dividend reinvestment plan instead of the getting

$1,700 cash I will get approximately 204 more shares in the company.

So now after the dividend reinvestment has gone through I actually own ten

10,204 shares in that company. Now this is a fantastic way of

building wealth if you could afford to forego the dividend. If you can delay the

gratification and have a little bit of a sacrifice it's a brilliant way of

building wealth. Because that share portfolio is now worth 204 shares more

than what it was previously. Plus I didn't have to pay any brokerage to pick

up those additional stocks so that's actually saved me money. Also sometimes

companies offer discounts when you choose to reinvest the

back into the company. Means the company doesn't have to pay out those profits,

and they can actually build up the capital within the company. Also it's a

fantastic set and forget strategy it's really simple. When you buy shares and

you get the paperwork in the mail confirming you're a shareholder and how

many units you have in that company. They will give you the option if it's

available to reinvest the dividends, and you simply tick a box. For full

dividend reinvestment or you can even do partial dividend reinvestment. Sign it

and send it back. You do not need to think about constantly having to buy

more shares in that company because it doesn't for you organically. Also I think

one of the best things that comes with dividend reinvestment is it's forced

investing there is no temptation for me to spend that $1,700 cash because I

simply haven't received it. It's proactively gone back into the

portfolio for more compounding growth opportunities. And as I said most of the

shares within The $1000 Dollar project SugarMama portfolio are

enrolled in an automatic dividend reinvestment. I do not want to see that

money going into my bank account if I don't want to. Because I don't want to

accidentally spend it or have any temptation I want to make sure it all

goes back for compounding growth opportunities. Now in that example that I

just used where I had ten thousand two hundred and four shares in that company.

When it comes to paying a dividend again I'm going to get even more passive

income or even more shares to reinvest. And that is because my ownership within

the companies even bigger. So next time they pay a dividend or say eighteen

cents. You know per share I'll be getting even more shares in that company, because

it's based now on not the ten thousand that I own right now but now the ten

thousand two hundred and four shares that I now own. Now there are a couple of

limitations that come with dividend reinvestment that I need to make you

aware of. When they announce a dividend and the share price might be quite high

and if you choose to enroll in a dividend reinvestment plan. That may mean

you're picking up new shares at a very high price that you're not actually

happy with. But for me because investing owning shares is a long-term investment

generally I'm not too concerned about it. Also when it comes to reinvesting your

dividends particularly over the long run. You need to be really meticulous with

keeping records. If you own stocks for say thirty years

and dividends are paid two times per year. There's essentially 60 transactions

that you need to make where of when you need to go and actually sell those

shares potentially further down the track. But for someone like myself, I

never intending selling. Why would I want to cut off my passive income stream?When

I buy shares I want to hold them indefinitely. Now the final thing and

probably the biggest concern that comes to dividend reinvestment, and that is

diversification. Say you have 20 different stocks in your share portfolio.

And only 15 of them have this dividend reinvestment plan. The other five

remaining stocks or companies in your share portfolio have to pay those

dividends as cash. Over time you end up risking the portfolio being out of

balance. Those 15 stocks that have dividend reinvestment plants have really

grown. And they have a heavier weighting in your share portfolio than the remaining

5 that couldn't actually have dividend reinvestment plans. You have to actually

monitor and track the diversification. So that you never have too much business

ownership in one or two companies in comparison to the whole portfolio. Now

one of the ways to overcoming that is with new money or when you receive those

dividends that cannot be reinvested. Is you manually and proactively go and buy

more shares in those companies that don't offer that plan. So you make sure

that your portfolio is equally balanced across a whole range of different stocks

and of course different industries. This is really important for helping reduce

investment risk in your share portfolio. So if you're in a situation where you're

building a share portfolio and you're working and you're able to survive

financially living off your own salary. And you are really enthusiastic and

motivated to build your share portfolio. Using a dividend reinvestment strategy

is a fantastic one and it's not just available for shares you can also do

this with some of the exchange-traded funds and also listed investment

companies. Which are also a fantastic way of building up a diversified share

portfolio. Alright everyone that is it for this

video. I really hope you've enjoyed it it's a little bit more technical than my

other videos. But as I like to say I'm helping build your level of financial

knowledge and information. If you haven't subscribed please make sure you do and

as always feel free to share any of these videos. And make sure you check out

many of my other Money Monday financial advice videos. Ciao for now

For more infomation >> Why You Should Reinvest Dividends || SugarMamma.TV - Duration: 6:46.

-------------------------------------------

| LML Story | Giải Mã Cơn Sốt Bánh Trà Sữa Trân Châu Đường Đen - Yay Or Nay ? - Duration: 8:48.

For more infomation >> | LML Story | Giải Mã Cơn Sốt Bánh Trà Sữa Trân Châu Đường Đen - Yay Or Nay ? - Duration: 8:48.

-------------------------------------------

[CS198.2x Week 2] Intro: Proof-of-Stake - Duration: 1:01.

Now you understand how economics is used to incentivize good decisions and how cryptography

is used to secure those decisions.

The combination of these two frames of mind will give you a holistic view of cryptoeconomics,

the approach for analyzing decentralized networks with incentive schemes.

We mentioned Proof-of-Stake in the previous lecture in terms of how it works and it's

general mechanics.

In this section, we'll go more in depth at it through the lens of cryptoeconomics.

Proof-of-Stake is a particular type of blockchain system that assumes all voting power is tied

to financial resources.

Through cryptoeconomics, we want to understand how actors in a Proof-of-Stake system can

be incentivized to do the right thing and disincentivized to cheat.

Through the cryptographic and economic primitives we learned in the previous sections, we'll

break down Proof-of-Stake choices at an architectural level.

For more infomation >> [CS198.2x Week 2] Intro: Proof-of-Stake - Duration: 1:01.

-------------------------------------------

TTD Bramorchavam 2018 | Bramorchavam | Mana Balaji | Tirupati Garuda Seva 2018 - Duration: 5:09.

Please Like Comments Share

For more infomation >> TTD Bramorchavam 2018 | Bramorchavam | Mana Balaji | Tirupati Garuda Seva 2018 - Duration: 5:09.

-------------------------------------------

[CS198.2x Week 2] Intro: Attacks - Duration: 0:53.

In this last section, we'll cover Proof-of-Stake attacks, again analyzing them from the perspective

of cryptoeconomics.

Each attack represents a scenario in which the incentives of an individual are not aligned

with the incentives of a group.

In other words, these game theoretical attacks allow individuals to gain an unfair advantage.

In Proof-of-Work, some penalties are implicit – wasting mining power on a malicious fork

will cost you computational power if the attack doesn't succeed.

In Proof-of-Stake, however, because all the information is virtual, every penalty needs

to be explicitly defined.

Because the resource consumed is monetary value, bad actors need to receive an explicit

monetary penalty with each attempted attack to keep the system in check.

For more infomation >> [CS198.2x Week 2] Intro: Attacks - Duration: 0:53.

-------------------------------------------

[CS198.2x Week 2] Intro: Economics - Duration: 1:26.

Now you understand the basics of cryptography, its purpose, and some useful tools, we're

ready to take a look at the other half of cryptoeconomics.

Economics describes the movement and use of wealth, boiling down to a fundamental question:

how do you determine the best choice to make with your limited resources to maximize your

profit?

In addition, how do you design a system that motivates actors to behave a certain way?

When it comes down to it, economics analyzes games.

Each actor, or "player," seeks to maximize their personal profit within certain restrictions

while competing with a number of other player.

The building blocks of economics and game theory will teach us how to understand and

even design incentive schemes for blockchain networks.

The whole point of a decentralized network is to make decisions together.

Sure, with cryptography, we can secure any decision we'd like; what's equally important

is ensuring that all actors in the network make the decision that's most beneficial

for the group.

Using incentive schemes which reward honest behavior and punish malicious or dishonest

behavior, it's possible to design a network joining together untrusting third parties

by aligning individual goals.

For more infomation >> [CS198.2x Week 2] Intro: Economics - Duration: 1:26.

-------------------------------------------

[CS198.2x Week 2] Origins of Cryptography - Duration: 10:18.

Before we talk about the specifics of cryptography, let's go over some situations which gave

birth to the field of cryptography.

A famous example you may be familiar with is the Caesar cipher.

Julius Caesar, a famous leader and general of the Roman Empire, would often send messages

with sensitive information to his fellow generals, such as information about an impending attack

from an enemy.

Of course, this information could be misused if it got into the wrong hands.

What would be the ideal scenario, then?

It's one in which Caesar sends a message to his recipient, but only he and the recipient

can read it.

Anyone else trying to understand the information would fail.

Is there any way to achieve this?

Well, there was term developed in the last half a millenium to mean precisely this, known

as "encryption," the process of transforming information into an unintelligible intermediary

piece of information which can be transformed back into its original state with decryption.

(This is different from cryptographic hash functions, as the input is not meant to be

inverted by anyone, after the function is applied.)

Encryption schemes have two functions in use: the encryption function, and the decryption

function.

The encryption function will take some meaningful data and turn it into something illegible.

The decryption function, on the other hand, will take the illegible information and make

it meaningful.

How can we use this?

Let's say we have a piece of information, known as x, which we want to keep secret.

If we encrypt x, it becomes E(x).

Anyone who reads E(x) should not be able to figure out what the value of x is.

In other words, they do not know the decryption function.

Let's say Alice sends E(x) to Bob, and Bob has the decryption function.

This means that he can run the decryption function on E(x) to get the original input,

x.

In other words, D(E(x)) should always equal x.

As long as only trusted third parties have access to a decryption function, only they

can read the encrypted information.

So how does this relate to Caesar ciphers?

Caesar designed a scheme to perform exactly this.

A Caesar cipher is meant to be used on text.

As you can see in the image on the right, each input corresponds to some output letter.

Caeser ciphers rely on what is known as substitution, meaning that every letter is replaced with

a different one.

Let's go through the process of how a Caesar cipher works.

First, a random number is chosen.

This random number represents the amount of spaces the letter will be shifted.

It is called a "key" because it unlocks the secret message, making it the secret which

allows someone to figure out the decryption scheme.

If the key were publicly known, then the Caeser cipher could be easily broken.

It is said that Caesar used the key 3 for all his ciphers, as demonstrated in the diagram.

In this section, however, we'll consider that any key between 1 and 25 can be chosen.

(Since there are only 26 letters, there's no point in choosing anything higher, since

we'd just end up looping around to where we started.)

Once the key is chosen, we now know how to algorithmically generate an output from any

given input.

We then take our specific input, run it through the encryption function which shifts each

letter over some number of times equal to the key, and spits out the scrambled result.

This encrypted message has no discernable meaning.

The only use is to be decrypted later.

This encrypted message can be sent to others safely now, assuming no one else but the recipient

knows how to decrypt the message.

When the recipient receives the message, they will use the key to recover the meaning from

the previously illegible information.

In this case, decrypting the message requires shifting every letter in the opposite direction

as the encryption function by the same amount, the value of the key.

Now, the recipient has the information, but no one else does.

Voila!

Keep in mind that this scheme does not imply anything about the integrity of the message

or guarantee of its delivery.

If this message were a note carried by a bird, there's nothing to stop someone from shooting

the bird and tearing up the note, or even changing a few letters during transit.

This means that all we have is the guarantee that the information will not be read by an

attacker, but they may be able to mutate or even destroy the message entirely.

Those other guarantees might be secured by other cryptographic or computer science measures,

but those are out of scope for this lecture.

Let's consider a scenario in which we might actually use a Caesar cipher.

Let's say that, in 69 BCE, Nadir and I are generals in the Roman army.

He wants to send me a message.

Nadir and I are both good friends with Caesar, so we're familiar with his famous encryption

scheme.

As everyone knows, aliens played a big part in building the cities of Rome.

During their trip, they gave Nadir and myself a great deal of knowledge about blockchain.

We decide to leverage that during this process.

For whatever reason, he wants to send me the word "blockchain."

How can he use the Caesar cipher to protect his message from foreign eyes?

Some time when Nadir and I met in person, we decided to use the number 21 as our key,

since Bitcoin has a cap of 21 million bitcoins.

This means that our table would look something like the image below:

As you'll see, there are two rows of 26 letters.

In the top row are the letters A through Z as normal.

In the bottom row, every letter has been shifted to the right 21 times.

Instead of starting with A, this row instead starts with F and ends with E. Essentially,

the 1st letter now corresponds to the 6th letter in the alphabet, the 2nd letter to

the 7th, and so on.

So now that we've generated our table, how can we use it?

Let's try plugging the word "blockchain" into the table and see what happens.

The first step is to locate the letter "B" in the top row of letters.

Once we've done that, we can then use the table to figure out which letter it should

correspond to.

As you can see, it happens to be G.

We go ahead and append that letter to our new encrypted message.

With the second letter, "L", we go ahead and do the same thing.

We locate the letter…

… locate the corresponding letter, "Q", …

… and add that to our list.

If we skip ahead to the end, this is what our final result looks like.

I'm not even going to try to pronounce that because it makes absolutely no sense.

But that's exactly what we're trying to do!

We want it to make no sense.

Nadir can now send this message to me without fear of anyone else reading it.

Let's say Gloria, a traitor general giving secrets to the enemy, happens to intercept

this message.

What can she do with this message?

She can burn or corrupt it, but she can't read it.

Perhaps she doesn't want to mess with the message, since that could inform Nadir and

myself of a traitor, so she decides not to do anything.

By using the Caesar cipher, we've foiled her attempts at betraying the Roman Empire.

I've now received the encrypted message.

How can I turn it back into the original message?

As mentioned before, I need to decrypt it with the decryption function.

In the case of the Caesar cipher, I'd be using the key to make the function.

Only this time, instead of shifting letters to the right, I'd shift them to the left.

In other words, I'm undoing the shift that Nadir did on the original message.

Again, I plug the messages into the table, and I get the original word, blockchain.

Success!

Nadir and I, as an added layer of obfuscation outside the Caesar cipher, happen to use blockchain

as a keyword to mean "prepare your defenses," meaning that he knows of an impending attack

on my fortress, possibly due to aliens.

I set up my defenses and am safe from the enemy attack, all thanks to encryption.

The Caesar cipher wasn't the oldest kind of cryptography, nor was it the last.

There are several other examples, from ancient Egypt to modern life.

The Enigma machine, cracked by English hero and computer scientist Alan Turing, was developed

by the German army during World War II to make messages indecipherable during transmission.

The machine was possibly the most complex encryption scheme on the planet at the time.

During World War I and World War II, America also devised a way to keep messages private.

However, instead of coming up with a code, they chose to seek help from bilingual Native

Americans from various tribes, known during the wars as "code talkers."

Because of the complexity of Native American languages and scarcity of speakers, they were

asked to serve as communication intermediaries.

A general would safely give a message to a code talker, and the code talker would translate

then relay the message over a long distance to another one.

Notice that the translation from English to the code talker's language, such as Navajo

or Cherokee, represents the encryption step.

The second code talker would receive the encrypted message and translate it back to English for

a second general to hear.

To tie this back to cryptography in cryptoeconomics, you can tell that each of these devices are

used after a decision is made, such as crafting a message or file for delivery.

Cryptography in all these examples focuses on securing the decision decided upon by some

entity.

We'll now go over some of the primitives in cryptography, which serve as building blocks

for larger devices to accomplish this decision securing.

For more infomation >> [CS198.2x Week 2] Origins of Cryptography - Duration: 10:18.

-------------------------------------------

КУКЛЫ ЛОЛ ШПИОНЫ МОЯ КОЛЛЕКЦИЯ! LOL SURPRISE BABY DOLLS! Мультик лол РАСПАКОВКА с TOYS AND DOLLS - Duration: 11:53.

For more infomation >> КУКЛЫ ЛОЛ ШПИОНЫ МОЯ КОЛЛЕКЦИЯ! LOL SURPRISE BABY DOLLS! Мультик лол РАСПАКОВКА с TOYS AND DOLLS - Duration: 11:53.

-------------------------------------------

[TOOZI] 🐝DEEP FRIED HONEYCOMB AND HOW'S THE TASTE? - Duration: 4:26.

For more infomation >> [TOOZI] 🐝DEEP FRIED HONEYCOMB AND HOW'S THE TASTE? - Duration: 4:26.

-------------------------------------------

How to Make Colored Sand at Home | Colored Sand Easy DIY | DIY Colored Sand//GREEN PLANTS - Duration: 10:10.

welcome to my channel

in this video i'm going to show you how to make colored sand at home

making the color sand for growing cactus and succulents with beautiful color sand art

now

i just put the sand in a sifter to sieve the sand

i'm sieving the natural river sand to remove pebbles or stones and other organic materials

next

put the sieved sand in separate plates or dishes to mix the colors

next

pour the poster paints or tempera paints on the sand

next

mix the paint and sand

we can mix the paint with some water because the tempera or poster paints are water soluble

next

leave them to dry for 24 hours

after 24 hours, they are completely dried

now i'm going to sift the colored sand using a sifter

now colored sand is ready to use

thanks for watching

For more infomation >> How to Make Colored Sand at Home | Colored Sand Easy DIY | DIY Colored Sand//GREEN PLANTS - Duration: 10:10.

-------------------------------------------

Leaving On A Jet Plane - John Denver (Double Trouble Acoustic Cover) - Duration: 5:39.

All my bags are packed, I'm ready to go

I'm standin' here outside your door I hate to wake you up to say goodbye.

But the dawn is breakin', It's early morn

The taxi's waitin', He's blowin' his horn

Already I'm so lonesome I could die.

So kiss me and smile for me Tell me that you'll wait for me

Hold me like you'll never let me go. 'Cause I'm leavin' on a jet plane

Don't know when I'll be back again Oh babe, I hate to go.

There's so many times I've let you down So many times I've played around

I tell you now, they don't mean a thing. Ev'ry place I go, I'll think of you

Ev'ry song I sing, I'll sing for you When I come back, I'll wear your wedding ring.

So kiss me and smile for me

Tell me that you'll wait for me Hold me like you'll never let me go.

'Cause I'm leavin' on a jet plane Don't know when I'll be back again

Oh babe, I hate to go.

Now the time has come to leave you

One more time Let me kiss you

Then close your eyes I'll be on my way

Dream about the days to come When I won't have to leave alone

About the times, I won't have to say Oh, kiss me and smile for me

Tell me that you'll wait for me Hold me like you'll never let me go

'Cause I'm leavin' on a jet plane Don't know when I'll be back again

Oh babe, I hate to go But, I'm leavin' on a jet plane

Don't know when I'll be back again Oh babe, I hate to go.

Leaving on a jet plane,

Leaving on a jet plane,

Leaving on a jet plane.

[Knock, knock, knock}

Surprise!

Ha!

Oh. I thought you were coming next week.

Aww, the flowers are beautiful. Thank you.

... yeah, that was really crazy but

I'm so happy I'm here, really.

And...

I brought you something else.

Really? What is that?

Will you marry me?

I feel embarassed now.

I don't know what to say.

But...

I'm sorry, someone gave me a ring already

Because you were gone for so long,

I thought I'd never see you again.

It's ok. It's fine.

Really, it's cool.

Maybe next time, after you divorce.

Let's have some more wine, shall we?

Không có nhận xét nào:

Đăng nhận xét