User Controls

  1. 1
  2. 2
  3. 3
  4. ...
  5. 40
  6. 41
  7. 42
  8. 43
  9. 44
  10. 45
  11. ...
  12. 60
  13. 61
  14. 62
  15. 63

Posts by Enigma

  1. Enigma African Astronaut
    lol
  2. Enigma African Astronaut
    my friend is an expert when it comes stop old man porn
  3. Enigma African Astronaut
    Thanks I only need 1 of them to love me back to fill a deep void in my life that is causing me pain the last year or two
  4. Enigma African Astronaut
    ^ yeah this is true.
  5. Enigma African Astronaut
    I'll miss you <3
  6. Enigma African Astronaut
    Originally posted by Kinks fake lashes can easily make a girl look "overdone" but all kinds of women use them. its just harder to find ones that arent over the top when you have light skin/hair

    u look undercooked
  7. Enigma African Astronaut
    CandyRein looks welldone
  8. Enigma African Astronaut
    Aren't you like 54? You're probably gonna be dead soon, bruv.
  9. Enigma African Astronaut
    I like OP
  10. Enigma African Astronaut
    her dad? Lol
  11. Enigma African Astronaut
    BradleyB knows a lot about African American hair for some reason
  12. Enigma African Astronaut
    Yes they are more popular. But you also see Hispanics doing it.

    Same thing is edges, like fake curly hair they tape onto their foreheads.

    Never understood why. I like black people's unique hair styles so when they start trying to emulate white looks I think it's kinda cheapening their own culture



    That's my cracker opinion, but I'd rather be with a black person that has dredlocks, braids, or an afro than someone wearing a wig.
  13. Enigma African Astronaut
    wow you're piss poor and old? You must really be a failure at life.
  14. Enigma African Astronaut
    Originally posted by Cowboy2013 Candace I have a question for you. Do you consider fake eyelashes a black thing?

    I guess white women wear them but it doesn't seem to make as much of a difference with how they look. For some reason it seems to on black women (to me).

    Idk if women are supposed to have longer eyelashes than men.

    aren't you the guy who made a thread about raping women after candy shut down your advances? LOL
  15. Enigma African Astronaut
    I like candy's eyelashes. I like that she doesn't wear a wig too.
  16. Enigma African Astronaut
    must be nice to be that wealthy
  17. Enigma African Astronaut
    Crispy's dads taking out all the pedophiles out one by one.
  18. Enigma African Astronaut
    Originally posted by the man who put it in my hood DigiByte
    Community
    Infopaper
    V1.0
    Introduction & History
    DigiByte is a truly decentralized UTXO blockchain that was fairly launched on
    January 10, 2014. DigiByte is also truly permissionless, since there is no central
    controlling authority. Accordingly, this Community Infopaper is written without
    requiring authorization from any single individual.
    The DigiByte blockchain is an immutable ledger, a chain of blocks all with
    verifiable digital signatures since its creation in 2014 and backed by billions of
    dollars of cryptographic computation. Its blockchain is also fully open-source,
    released under the MIT license, and completely verifiable by any individual or
    entity. DigiByte embraces the Bitcoin core ethos of “Do not trust, verify”, in that
    no entity should ever need be “trusted” in order to send/receive DigiByte (DGB)
    or to store/retrieve data from the DigiByte blockchain.
    DigiByte originally utilized the Litecoin code-base, with a completely independent
    blockchain and a unique Genesis Block. It has undergone several
    non-contentious soft-forks and hard-forks, none of which culminated in a
    chain-split, but rather a complete consensus resulting in seamless upgrades of
    the entire DigiByte network.
    DigiByte never held an ICO, but was fairly launched in an open and transparently
    planned manner. DigiByte does not take a percentage of block-rewards for a
    founders fee. The minimal 0.5% pre-mine was given away in its entirety to
    community members in the first month of its existence in order to incentivize
    early client downloads, ensure the survival of the blockchain, and to develop the
    original Android/iOS applications.
    1
    DigiByte focuses on speed, security, and scalability. It prides itself with being
    “faster, more secure, forward thinking”. With significantly faster block timings
    than any other UTXO blockchain to date (15 seconds), DigiByte has encountered
    and overcome a number of issues that many other blockchains such as Bitcoin
    will not face until the advent of the next century. It is due to this forward thinking
    nature that DigiByte adopted the SegWit protocol through a soft-fork consensus
    in 2017, being the first major blockchain to do so, well before Litecoin or Bitcoin
    adopted the upgrade.
    DigiByte believes in on-chain scalability as a core tenet of its blockchain, with
    “second layer” protocols never expected to be the primary “solution” for
    increased throughput or transaction capacity. This on-chain scaling coupled
    with OP_codes and SegWit allows for a large number of usage scenarios, such
    as distributed applications (DApps), document notarization/validation, token
    issuance, and asset digitization.
    DigiByte has a maximum supply of 21 billion DigiByte, to be fully mined by the
    year 2035. While other blockchains only utilize a single mining algorithm to mine
    new blocks and introduce new assets into circulation, DigiByte has employed
    five unique and independent algorithms in a “MultiAlgo” solution since block
    145,000 in September 2014. DigiByte holds the dominant hash-power in 3 of its
    5 algorithms globally, by an order of magnitude more than any other competing
    blockchain. This provides greater security to the network while helping prevent
    any “rented hash power” from attacking the blockchain.
    DigiByte continues to pioneer in the areas of security based on the “forward
    thinking” of its foundation by creating the Odocrypt algorithm. Odocrypt is a
    mining algorithm which rewrites and morphs itself every 10 days in order to
    prevent ASIC dominance, focusing on utilizing FPGA mining. Future algorithms
    will also likely be replaced as necessary on an on-going basis to ensure
    maximum security of the DigiByte network, while simultaneously expanding
    upon the decentralization/distribution of the DigiByte blockchain.
    DigiByte has been leading innovation with the industry-renowned DigiShield, a
    real-time difficulty adjustment mechanism which ensures the stability of block
    generation timing, despite exponential increases/decreases in mining hash
    power. DigiShield is utilized in a respectable number of other major
    cryptocurrency/blockchain projects, such as Dogecoin, ZCash and dozens more.
    DigiShield was originally created for a single mining algorithm, and shortly after
    DigiByte changed to MultiAlgo, it was ported and upgraded to become
    MultiShield. This allows for regular block timings across multiple mining
    algorithms, as well as an even block mining distribution between algorithms,
    while also preventing mining dominance in the event of a sudden inflow/outflow
    of substantial mining hash power.
    2
    DigiByte Key Specifications
    Launch Date January 10th, 2014
    Genesis Block Hash "USA Today: 10/Jan/2014, Target: Data stolen
    from up to 110M customers"
    Blockchain Type Public, Decentralized, UTXO, Proof of Work,
    Multi-Algorithm
    Ticker Symbol DGB
    Maximum supply 21,000,000,000
    Block Reward Reduction 1% reduction monthly
    Block emission schedule Fully mined by 2035
    Mining Algorithms SHA256, Scrypt, Odocrypt, Skein & Qubit
    Algorithm Block Share 20% per-algo, contested each block
    Difficulty Retarget Every block, 5 separate difficulties (Per-algo)
    Block Timing 15 seconds per-block (75 per-algo approx)
    Segregated Witness Support Yes (First major blockchain to activate)
    3
    Key Aspects of DigiByte
    Decentralization
    DigiByte is the most decentralized Proof-of-Work-mined blockchain in the world.
    Decentralization means there is no central controlling entity that is able to
    dictate direction, terms, use of the network, changes, charges and fees, locking
    of funds, or undoing transactions. Although the world predominantly
    understands centralized control, the mind-shift to decentralization is an
    incredibly important progression in today’s global society. Where many other
    cryptocurrencies concede significant compromises in one or more aspects of
    decentralization (if not all), DigiByte remains unwavering in its dedication to
    decentralization as a key aspect of being a globally distributed blockchain
    solution.
    DigiByte maintains this decentralization through a combination of methods,
    namely:
    1) Multiple algorithms;
    2) GPU/FPGA mining;
    3) On-chain scaling;
    4) Educating the importance of running a full-node;
    5) Embracing code contributions that uphold the ethos of DigiByte.
    This decentralized nature is of vital importance not only for the survival of the
    DigiByte blockchain, but also to prevent any tampering from malicious actors,
    governments or corporations. Due to the lack of any “head” or controlling party,
    there is no entity to manipulate, blackmail, or “lean on”. In a world growing ever
    divided, there is solace in the consensus of the DigiByte network, that it can be
    relied upon as accurate and truthful without reservation.
    4
    Pure Consensus
    This consensus is the core foundation of the DigiByte blockchain. Since its
    inception in January 2014, DigiByte has had its consensus mechanism reliant on
    the belief in on-chain scaling, speed, security, and forward-thinking progression
    of the DigiByte blockchain.
    This consensus is obtained through a vastly distributed network of nodes
    running the Core DigiByte wallet, which holds a complete and continuously
    updated copy of the DigiByte blockchain, as well as block creation via the
    “Proof-of-Work” (POW) mining method. Other blockchains have shown that
    Staking, Distributed Proof-of-Stake, and other such poor attempts at alternative
    consensus methods are far too susceptible to centralization, manipulation, and
    tampering by various malicious individuals or organizations. Similarly, trusting a
    3rd-party for consensus defeats the purpose of being a distributed and
    decentralized blockchain in the first place, with users genuinely being better off
    with a centralized database.
    Permissionless Network
    DigiByte is a completely permissionless blockchain. Since there is no centrally
    controlling entity to dictate the network, there is no need to seek “permission”
    from anyone. As such, permission is implied no matter what “use case” you
    would like to implement or accomplish with DigiByte. Examples include
    advertising the acceptance of DigiByte as a payment method, listing DigiByte on
    an exchange, using DigiByte with your platform/service, or when
    spending/sending/receiving DigiByte. In addition, anyone is free to speak on
    behalf of DigiByte, to promote DigiByte, or to even author a community Infopaper
    such as this.
    5
    Proof-of-Work is the only proven and reliable method of obtaining a distributed
    and decentralized consensus (A solution to the Byzantine Generals Problem),
    which is why DigiByte proudly remains true to POW. Proponents of alternatives
    usually cite delays in block creation and propagation; however, thanks to
    DigiSpeed, the DigiByte blockchain overcomes this. Which is why the most
    battle-hardened POW consensus method is still being utilized today for DigiByte.
    There has never been any rational argument against the ability of POW to arrive
    at a sound consensus.
    DigiByte’s permissionless nature is both a by-product of decentralization, as well
    as an intentional aspect that the community deeply values and celebrates. This
    is what also prevents influence, changes, or take-overs by malicious parties,
    because the permissionless nature requires consensus from the majority of the
    network. It is a key characteristic of DigiByte which has held up against any
    would-be attempts from malicious actors for the past six years and counting.
    On-Chain Scaling
    DigiByte is a network that believes on-chain scaling should be the primary
    method for future growth in transaction volume and frequency. A true
    transaction only happens when it occurs on-chain and has been incorporated
    into the blockchain. Compare this to second-layer methods where transacting
    can occur without ever being presented to the network, thus defeating one of the
    primary reasons blockchain as a technology was created, immutability.
    Broad support & network participation
    DigiByte aspires to be broadly supported across a variety of platforms, to
    encourage participation from as many entities as possible. Part of pushing the
    boundaries regarding block timings / sizes means that not all will be able to
    participate with a full Core Node (for example, drivespace / data transfer /
    memory requirements), however broad support is available across Windows,
    Linux & OSX.
    DigiByte development has also intentionally added backwards compatibility for
    older versions of Android that are prominent in developing & impoverished
    nations. This allows for greater participation, despite aging hardware devices.
    Broad network participation is also why the Android / iOS applications have
    been translated to 50+ native languages.
    6
    The very essence of the DigiByte blockchain is predicated upon the fact that all
    blocks since the very first Genesis Block are able to be replayed and
    cryptographically validated, with all transactions being visible. There are no
    anonymous/shielded transactions employed, as DigiByte believes a key defense
    for anonymity is the significant growth of on-chain transactions and the
    pseudo-anonymous nature of the UTXO’s architecture. In keeping with that
    philosophy, the DigiByte blockchain will scale in future through block-size
    increases, with proposals for the size to double every 2 years.
    Protocol Upgrades
    DigiByte at Launch
    DigiByte was the brainchild of Jared Tate, who wanted to create a blockchain
    that addressed many of the perceived shortcomings of Bitcoin. DigiByte
    originally started out as a Scrypt-only mined blockchain, with 60 second block
    times and a two hour difficulty retargeting frequency. Compared to every other
    Proof-of-Work UTXO blockchain that existed during its 2014 launch, this was
    considered incredibly revolutionary, and still is to this day. Although the
    block-timing has changed with network upgrades, the maximum supply of
    DigiByte will always remain fixed at 21 billion and the last DigiByte to be mined
    is scheduled to occur prior to the year 2035. DigiByte was created to be
    “forward-thinking”, with two primary objectives: cybersecurity and on-chain
    scalability. This is why the news article headline “USA Today: 10/Jan/2014,
    Target: Data stolen from up to 110M customers” was hashed into the Genesis
    Block. These guiding principles have remained in effect over the past five years,
    and will continue to guide the future of DigiByte.
    DigiShield
    During the launch of DigiByte back in 2014, most blockchains utilized either
    SHA256 or Scrypt algorithms. Mining pools that would automatically
    profit-switch known as “Multipools” would regularly switch back and forth
    between cryptocurrencies that they mined, depending on the mining difficulty
    and the block-rewards. Miners utilizing these Multipools would have their
    hashing power changed between a variety of blockchains - such as from
    DigiByte to Dogecoin to Litecoin.
    These fluctuations would cause blockchains to sometimes experience
    exponential increases in mining hash-power of up to 10 times the normal level,
    which would rapidly speed up block production until the next difficulty retarget.
    Once the difficulty retarget for the blockchain had occurred, making mining
    more difficult and less profitable, the hash-power would then be taken to
    another more profitable blockchain. This led to many blockchains seeing a rush
    of block production, followed by a complete stalling when the hash-power fell
    off. Some blockchains could go for days without a block being found as a result
    of the major difficulty adjustment. This unsustainable volatility led to the
    development of DigiShield. DigiShield was created as a mechanism for real-time
    adjustment of block-difficulty, which allows for the effective handling of sudden
    influxes of mining hash-power or the equally significant outflux.
    7
    This prevented “chain-freeze” and also helped smooth out block creation times.
    DigiShield was implemented on the DigiByte network as the first protocol
    upgrade on February 28, 2018 at block height 67,200.
    The DigiByte core developers then directly assisted the Dogecoin development
    team to implement DigiShield, another of many blockchains that had been
    suffering as a result of erratic Multipool hash-power swings. DigiShield has
    since been implemented in dozens of other blockchains such as Zcash, Ubiq,
    and Monacoin.
    MultiAlgo
    DigiByte upgraded its network yet again on September 1, 2014 at block height
    145,000 with the implementation of multiple mining algorithms. While some
    blockchains had initially launched with multiple mining algorithms, DigiByte was
    the first blockchain to upgrade from single to multiple algorithms.
    The change to five algorithms (SHA256, Scrypt, Qubit, Myr-gr and Skein) was
    initiated in order to improve the security of the blockchain, while allowing for
    equitably distributed mining, decentralization, and increased protection from
    51% attacks. By having some of the algorithms remaining “GPU friendly”, it
    allowed for people to mine DigiByte from home, contributing to the security of
    the DigiByte network from their desktop PC.
    It was also at this point where the block timing was adjusted from 60 seconds to
    30 seconds, which was approximately 150 seconds in between each mining
    algorithm finding a block. This further affirmed DigiByte as a leader in the UTXO
    blockchain space and was also the second seamless and non-contentious
    network upgrade that DigiByte successfully executed.
    8
    MultiShield
    Since DigiShield was originally created only for single mining-algorithm
    blockchains, this necessitated the launch of the MultiShield network upgrade
    which occurred on December 10, 2014 at block height 400,000. The MultiShield
    upgrade allowed for the real-time mining difficulty adjustment of DigiByte spread
    across all 5x algorithms, which further ensured that block timings would remain
    steady. MultiShield also allows for a sudden influx and exit of hash-power on
    one or more mining algorithms, all in real-time, further protecting the DigiByte
    network.
    MultiShield works by increasing the difficulty for an algorithm every time it finds
    a block, while simultaneously decreasing the difficulty of the other algorithms,
    which protects against a single-algorithm takeover. Should a manufacturer of an
    ASIC ever be found to intentionally or inadvertently placing a back-door into their
    miners that would allow them to redirect the hash rate elsewhere, MultiShield
    would prevent that malicious hashrate from affecting the production of blocks
    and a double-spend occurring. Where other single-algorithm blockchains would
    fall victim to such an attack, or to pool collusion from 2-3 operators, MultiShield
    would render such an attack futile.
    Even if an attacker was able to secure 90% of the hash rate on their primary
    attack algorithm, and 35% on the remaining 4 algorithms, they would still not
    have the majority of hash power and be unable to successfully attack the
    DigiByte network.
    Rented attacks are the most common types of attacks on single-algorithm
    blockchains, however despite there being several SHA256 pools which have over
    50% of the hash-power of the entire DigiByte network, that is still insufficient to
    attack against MultiShield. Should an attacker somehow gain control of all the
    remaining SHA256 hashpower being used by BTC in the whole world (61,000
    PH/s at the time of writing), they would have 2^10 SHA256 hashpower
    compared to DigiBytes 40PH/s. Attempting to attack DigiByte with that hash
    power would double the difficulty every 5x blocks, meaning that after approx 50
    blocks (12.5 minutes) the honest miners would have outpaced such a
    doublespend attempt. By contrast, that same hashpower could be used to
    attack any other SHA256-only blockchain such as BTC, BCH, BSV repeatedly and
    continuously. It is for this reason that many exchanges require a mere 40 block
    confirmation (10 minutes) for most deposits.
    9
    MultiShield also renders DigiByte impervious to the plague of single-algorithm
    51% attacks that rented hash power made so common during 2018, along
    with the timestamp vulnerability attacks that affected other multi-algorithm
    blockchains.
    Since 2018, DigiByte has constantly remained the dominant global hash-power
    for Qubit, Myr-Gr, and Skein by an order of magnitude, and now also with the
    Odocrypt algorithm.
    MultiShield was the third seamless and non-contentious network upgrade that
    DigiByte successfully executed.
    DigiSpeed
    The DigiSpeed upgrade also implemented a block-size doubling every two years
    in order to consistently increase the transaction processing capacity twofold
    until the year 2035. This was done in order for DigiByte to remain true to its
    ethos of always being forward-thinking, in order to prepare the network for
    growth and avoid being limited by an insufficient block size. However, the
    block-size doubling aspect was grandfathered as part of the SegWit upgrade,
    due to it’s 4X weighted capacity increase, with expectations of further
    refinement and reimplementation in the future.
  19. Enigma African Astronaut
    I definitely could live on different soups, smoothies, and salads for life. I pretty much do already.
  20. Enigma African Astronaut
    I eat a honeybun every couple of years. Same thing with doughnuts and candy bars.

    I don't even drink soda regularly.
  1. 1
  2. 2
  3. 3
  4. ...
  5. 40
  6. 41
  7. 42
  8. 43
  9. 44
  10. 45
  11. ...
  12. 60
  13. 61
  14. 62
  15. 63
Jump to Top