That was the rule, unfortunately, and we were warned from the start.
David_John
--
đ„ PI MINERSâIS THIS HOW IT ENDS? đ„
For SIX YEARS, weâve mined. Weâve believed. Weâve built a community from the ground up. And now? A huge chunk of our hard-earned Pi might vanishâburned forever.
Why? Because some referrals havenât completed KYC. Not our fault. Not our choice. But our loss?
Imagine waking up one day to see a massive portion of your mined Pi gone. Just like that. No reward for loyalty. No appreciation for years of dedication.
This isnât just about tokens. Itâs about trust. Itâs about the countless hours, the hope, the commitment weâve poured into this project.
đ„ Should the #PiCoreTeam rethink this? đ„ Should miners be penalized for an incomplete KYC system? đ„ Should loyalty be met with lossâor recognition?
This isnât just another crypto update. This is about usâthe Pioneers who made Pi what it is today.
If you believe in fairness, speak up. Tag the #PiCoreTeam. Let them know our time, our loyalty, our PiâMATTERS.
đŹ Drop your thoughts below. Letâs make some noise.
A new initiative has emerged to create a decentralized infrastructure network (DIN) that brings together major players in the technology sector, including #Microsoft and #Tencent and 16 other giants.
This project is supported by #Infura a company specilizing in the provision of cloud services for decentralized applications.
Infura is particularly known for managing the default network used by the #MetaMask wallet, which allows interaction with the Ethereum #Blockchain .
In the United States, Marathon Digital will create a Bitcoin mining farm using energy generated from methane produced by a landfill owned by Nadal Power.
The first tests will initially be carried out with a power of 280 kW/h.
#Binance , the world's largest cryptocurrency exchange, has strengthened the security of its users with the launch of #wallet "BNB Safe". This wallet is based on the Gnosis Safe protocol, which allows digital assets to be managed in a decentralized and collective manner.
The âBNB Safeâ wallet is available on the channel #BNB , a #blockchain dedicated to smart contracts and decentralized finance. It offers a simple and intuitive interface to access #dApps (decentralized applications) and DeFi (decentralized finance) services on the BNB chain. Users can also send and receive BNB tokens, the native currency of the BNB chain, as well as other tokens compatible with the BEP-2 and BEP-20 standards.
The âBNB Safeâ wallet stands out from other cryptocurrency wallets by its security and ease of use. It allows users to control their private keys without having to enter them or store them on a centralized server. It also uses a PIN or fingerprint to authenticate transactions. In addition, it integrates practical features such as QR code scanning, instant token swap and testnet support.
The âBNB Safeâ wallet is an essential tool for cryptocurrency enthusiasts who wish to take advantage of the opportunities offered by the BNB chain, which is positioned as an alternative to Ethereum in terms of speed, cost and innovation. With the âBNB Safeâ wallet, users can explore the thriving ecosystem of the BNB chain, which has more than 1000 dApps and more than 200 DeFi projects.
âI worked on a new electronic cash system, which works entirely peer-to-peer, without a trusted third party.
The main characteristics:
- Double spending is avoided thanks to a peer-to-peer network. - No currency or other trusted third parties. - Participants can be anonymous. - New coins are created using#Hashcashproof of work. - Proof of work for generating new coins also powers the network to prevent double spending.
Summary :
A fully peer-to-peer electronic money system would allow online payments to be made directly from one party to another without going through a financial institution. Digital signatures offer such a solution, but lose their interest when a trusted third party is required to prevent double payment.
We propose a solution to this problem using a peer-to-peer network. The network timestamps transactions using a hash function that translates them into a continuous chain of proof-of-work, forming a record that cannot be changed without re-performing the proof-of-work.
The longest chain serves not only as proof of how the observed events unfolded, but also as proof that it comes from the largest pool of computing power.
As long as the majority of computing power is controlled by nodes that do not cooperate in attacking the network, they will generate the longest chain and outperform the attackers.
The network itself requires only a reduced structure. Messages are broadcast on a best-effort basis, and nodes can leave or rejoin the network at will, accepting the longest proof-of-work chain upon return as proof of what happened while they were away.
Imagine you have $253 million in #bitcoins on a USB stick, but you can't remember the password to access it. This is the situation in which Stefan Thomas finds himself, a German programmer who received these bitcoins in 2011 for a video he made.
He only has two attempts left to enter the correct code, otherwise he will lose his precious bitcoins forever. But he hasn't said his last word. He was contacted by an American #startup , Cipher Mining, who offered to help him unlock his USB key.
How ? By using a brute force technique, which consists of trying millions of possible combinations of passwords until the right one is found. Cipher Mining claims to have already managed to recover several #crypto wallets in the past, in exchange for part of the sum.
Will Stefan Thomas accept this offer? Or will he prefer to keep hoping to find his password on his own? At the moment he doesn't seem interested in receiving help. What would your decision be if you were in his place?