The source code reflects the work but not the pooled data. And the algorithmic process is identical but the illusion is created by segregating the bits in that there is never an identified symmetry EXCEPT that each hash compliments the succeeding hash. There is linear connectivity but its not logged by miners or represented in process.. but they are shared back to the core for validation ie whomever manages that pool etc (wink)
Have followed you awhile, but this one I have a bit of experience on.
You seem to be saying Bitcoin miners are not only (as per official storyline) generating value by performing mathematically verifiable labor, but also having their labor secretly diverted toward deep-state functions.
However, any miner can verify what is being computed, and it's merely a very game-based attempt to generate a rare hash with a set process. There can be no insertion of separately useful computation in the hash generation process because that would be a waste and miners fight each other for efficiency.
The only ways your implication would be true would be if the programming contained some unauditable, unfindable segment (but surely an end-to-end security check would find it and surely this has been done); or if the math contained some secret dual function (but because of the complementary hash chain there is no infusion of new data for a miner to assist with analyzing). Satoshi's whole point was to produce a math system that broad consensus would agree is unhackable and performs its purpose of creating value without any (or hardly any) central control or doubt. He published the white paper and then verified that the emergent community had established the consensus. If someone today could outthink Satoshi it wouldn't be found out like this.
Ayh have had a miner running for several months now. Ayh did this to watch the cpu, gpu, ram, net.. and the actual truth is that there is leakage.
This leakage is then the sum of parts but the sum of nothing to miners. The papers speak nothing to the end to end mechanisms without skipping a crucial part -- what happens between.
Ayh have long explained that there is no such thing as privacy when we do not own the wires that traverses the web.
Just take a look at source code of your miner and you wiil find all answers you need,
Some pools were caught on spreading source code that include some fee for pool. You sould account it as fair share for organising pool or theft, It is up to you, to accept that or deny.
If you get source code for your pool miner from third party, then you could fing that it do some work for third party.. That's also up to you to believe in some "better performance" of third party miner or check it by yourself and find out what is the real price.
If you use some binary you downloaded from some source and you didn;t check and compile source code by yourself, then it is you the worst enemy of yourself.
That's it. either you question everything, either you are fucked up. Simple as that.
I know you, you are smart enough to qestion everything. So just do it.
Then someone else should be able to report on it too, right? Been a long time and only you the keeper of narratives noticed it? I don't doubt you, but "extraordinary claims".
There are others who have been researcher the patterns. Aym not solo in this -- and it has been suggested for some time actually -- but the patterns have become too cogent to dismiss any longer. Ayh have seen the data discrepancies my self and have seen high end cryptographers examine how the algorithms assemble and then fire back data for "validation".
Meanwhile the retorts to this conspiracy theory has been still just "a packet of mysterious data algorithmically resorted and decrypted/encrypted for absolutely no purposeful reason"
The source code reflects the work but not the pooled data. And the algorithmic process is identical but the illusion is created by segregating the bits in that there is never an identified symmetry EXCEPT that each hash compliments the succeeding hash. There is linear connectivity but its not logged by miners or represented in process.. but they are shared back to the core for validation ie whomever manages that pool etc (wink)
Have followed you awhile, but this one I have a bit of experience on.
You seem to be saying Bitcoin miners are not only (as per official storyline) generating value by performing mathematically verifiable labor, but also having their labor secretly diverted toward deep-state functions.
However, any miner can verify what is being computed, and it's merely a very game-based attempt to generate a rare hash with a set process. There can be no insertion of separately useful computation in the hash generation process because that would be a waste and miners fight each other for efficiency.
The only ways your implication would be true would be if the programming contained some unauditable, unfindable segment (but surely an end-to-end security check would find it and surely this has been done); or if the math contained some secret dual function (but because of the complementary hash chain there is no infusion of new data for a miner to assist with analyzing). Satoshi's whole point was to produce a math system that broad consensus would agree is unhackable and performs its purpose of creating value without any (or hardly any) central control or doubt. He published the white paper and then verified that the emergent community had established the consensus. If someone today could outthink Satoshi it wouldn't be found out like this.
u/CrazyRussian explains accurately in more detail.
Ayh have had a miner running for several months now. Ayh did this to watch the cpu, gpu, ram, net.. and the actual truth is that there is leakage.
This leakage is then the sum of parts but the sum of nothing to miners. The papers speak nothing to the end to end mechanisms without skipping a crucial part -- what happens between.
Ayh have long explained that there is no such thing as privacy when we do not own the wires that traverses the web.
The sum of parts.
Just take a look at source code of your miner and you wiil find all answers you need,
Some pools were caught on spreading source code that include some fee for pool. You sould account it as fair share for organising pool or theft, It is up to you, to accept that or deny.
If you get source code for your pool miner from third party, then you could fing that it do some work for third party.. That's also up to you to believe in some "better performance" of third party miner or check it by yourself and find out what is the real price.
If you use some binary you downloaded from some source and you didn;t check and compile source code by yourself, then it is you the worst enemy of yourself.
That's it. either you question everything, either you are fucked up. Simple as that.
I know you, you are smart enough to qestion everything. So just do it.
Then someone else should be able to report on it too, right? Been a long time and only you the keeper of narratives noticed it? I don't doubt you, but "extraordinary claims".
There are others who have been researcher the patterns. Aym not solo in this -- and it has been suggested for some time actually -- but the patterns have become too cogent to dismiss any longer. Ayh have seen the data discrepancies my self and have seen high end cryptographers examine how the algorithms assemble and then fire back data for "validation".
Meanwhile the retorts to this conspiracy theory has been still just "a packet of mysterious data algorithmically resorted and decrypted/encrypted for absolutely no purposeful reason"