Skip to main content

“Pandora’s box has been opened.”

McAfee had perfectly captured the crypto enthusiasts’ sentiment. Blockchain technology has begun to erode governments’ control over money and will continue to do so. These governments has responded by lashing out in a form of crypto inquisition that parallels the American prohibition. We also learned that many bitcoin exchange executives were not allowed to leave China amidst the recent regulation rulings. Surprisingly, McAfee’s comments did not encourage fear, but inspired a strong sense of community among the crowd. He walked off the stage to a thunderous applause.

Shape the Future also provided insights into an alternative view of Bitcoin not shaped by the mainstream r/bitcoin pages at Reddit. Both Jihan Wu and Roger Ver shared the view that the mainstream bitcoin media has been censoring any views that opposes that of bitcoin core and blockstream. Both speeches revolved around the strength of the larger block sizes in Bitcoin cash which makes it better for scaling. Lastly, they believed that the cryptomarkets were highly competitive and that the main reason why bitcoin had been losing market share to altcoins was because of the high transaction fees combined with the slow confirmation times for bitcoin transfers.

Things got really heated during Roger Ver’s speech, especially when someone in the audience shouted that Roger was wrong and that the lightning network would solve slow transaction speed and high fees. Roger responded by telling him not to use Bitcoin Cash if he didn’t like it.

Betting Offer On Bitcoin Cash

During the round table discussion there was a bitcoin cash vs bitcoin core debate. The debate escalated to the point where Bitcoin Cash was compared to dogecoin and that it would be doomed to fail. Roger Ver responded by betting 1 million dollars that Bitcoin Cash would still be around in two years. It was an offer the other participants did not appear keen on accepting.

At the end of the event, they showcased an informative and exciting documentary on the 9 year development of Bitcoin and China’s role in the industry.

For all your website hosting services and domain names registration,  Josidel hosting is the place to be.

Comments

Popular posts from this blog

Dangerous sex Positions For Men

The most common cause of pénile injury is found among the variety of potentially dangerous positions used for séxual intercourse. The most popular is the ‘woman-on-top’. This type of position can result in an impact between the pénis against the female pelvis or perineum that can easily traumatize the pénile cylinders. A pénis becomes érect when the lining of the cylinder within it is engorged with blood.  A pénis fracture can occur when there is trauma to the eréct pénis, resulting in a rupture of the cylinder lining. This very painful injury is often accompanied by an abrupt, distressing cracking noise that is immediately followed by dark bruising of the pénis due to blood escaping the cylinder. In ten to 30% of pénis fractures, the urethra is damaged and blood may be visible at the urinary opening. Given these signs, an injury should be relatively simple to diagnose, right? You would be surprised, even with the unsettling sounds of a fracture occurring, many men...

Google Authenticator, a formidable layer of protection to your account.

​Google Authenticator is a free security app that can protect your accounts against password theft. It's easy to set up and can be used in a process called two-factor authentication (2FA) offered on popular social media services like Gmail, Facebook, Twitter, Instagram, etc.  The app ( iOS / Android ) generates a random code used to verify your identity when you're logging into various services. The code can technically be sent to your phone via text message every time— but the Google Authenticator app provides an extra level of security.  SMS-based 2FA has a  known security flaw , and any devoted hacker can attempt to  socially engineer  an attack against your phone company. The Google Authenticator app eliminates the possibility of an SMS-based attack  using algorithms  to generate the codes on your phone. Here's how to set it up: 1. Download Google Authenticator from either the Apple App Store or the Android Google Play store. It's free. 2. Nex...

AWS Battles Rivals: Advertising Campaign

Amazon Web Services has defeated IBM in a competition for lucrative federal contracts, threatened Microsoft's core businesses, and reshaped corporate technology. In the last few months, the pioneering cloud-computing unit of the online retail giant has taken a page from the playbook of some of its more traditional competitors: It started advertising. Ads have been splashed across billboards and in airport terminals, television spots and web videos, featuring a whiteboard full of sketches of software architecture and appeals to invent something using Amazon's collection of rented computing services. The advertising campaign, which bears the "Build On" tagline, represents a milestone in AWS' march from technology upstart to one of the major players in business software, technologists and marketers say. For many years, AWS didn't advertise, partly because it didn't have to. The service held a wide lead over the competition, and word-of-mouth was enough to...