Search content
Sort by

Showing 20 of 53 results by eptescudo
Post
Topic
Board Announcements (Altcoins)
Re: [ANN] Escudo Electrónico Português - CryptoNote - SHA256
by
eptescudo
on 04/05/2024, 20:42:21 UTC
We've upgrade our domains:

Website under construction: https://escudopt.pro

Explorer: http://chain.escudopt.pro

Post
Topic
Board Announcements (Altcoins)
Re: [ANN] Escudo Electrónico Português - CryptoNote - SHA256
by
eptescudo
on 19/01/2023, 03:28:48 UTC
A .wallet file is a file that contains information about your cryptocurrency wallet, such as the private keys and other sensitive information. Saving this file on a floppy disk can be a good way to keep it safe and secure, as long as the floppy disk is not lost or damaged.

Here are the steps to save a .wallet file on a floppy disk:

1. Insert a blank floppy disk into the floppy disk drive of your computer.

2. Locate the .wallet file on your computer. This file can typically be found in the directory where your cryptocurrency wallet software is installed.

3. Right-click on the .wallet file and select "Copy" or "Cut" (depending on whether you want to keep a copy of the file on your computer).

4. Open the floppy disk drive by double-clicking on the "My Computer" icon on your desktop or by selecting "Computer" from the Start menu.

5. Locate the floppy disk drive and double-click on it to open it.

6. Right-click inside the floppy disk drive window and select "Paste" to copy the .wallet file onto the floppy disk.

7. Once the file is copied, you can safely remove the floppy disk from the drive by following the prompts provided by your operating system.

It's important to note that floppy disks have a limited lifespan and may become damaged over time. So, it's recommended to make copies of the .wallet file and store them in different locations, such as a USB drive or an external hard drive. Additionally, it's also important to keep your computer and floppy disk drive clean and free of dust, to prevent any potential damage to the disk or data.

In summary, to save a .wallet file on a floppy disk, insert a blank floppy disk into the floppy disk drive, locate the .wallet file on your computer, copy or cut the file, open the floppy disk drive, paste the file and safely remove the floppy disk from the drive.

Post
Topic
Board Announcements (Altcoins)
Re: [ANN] Escudo Electrónico Português - CryptoNote - SHA256
by
eptescudo
on 19/01/2023, 02:55:35 UTC
I've just acknowledged languages are a "form of encryption"...

Language can be used as a form of encryption in various ways. One way is through the use of code words or phrases, where certain words or phrases are used to represent specific information. This method is similar to a simple substitution cipher, where each letter or group of letters in the original message is replaced with another letter or group of letters.

Another way is through the use of natural language processing (NLP) techniques, where a message is disguised as normal text and encoded using complex grammar and syntax. This makes it difficult for an unauthorized person to understand the message without a key or the necessary linguistic knowledge.

A more advanced method is steganography, which is the practice of hiding a message within another message or image. For example, a message could be hidden within an image or a document by manipulating the least significant bit of the pixels, or by using frequency domain transformations.

It's important to note that these forms of encryption using language are not as secure as traditional encryption methods, such as symmetric and asymmetric encryption, which use mathematical algorithms to secure the data. Language-based encryption is often used in combination with other forms of encryption to add an extra layer of security or to conceal the fact that a message is being encrypted at all.

In summary, language can be used as a form of encryption in various ways, such as code words or phrases, natural language processing techniques and steganography. These forms of encryption are not as secure as traditional encryption methods, but they can be used to add an extra layer of security or conceal the fact that a message is being encrypted.
Post
Topic
Board Announcements (Altcoins)
Re: [ANN] Escudo Electrónico Português - CryptoNote - SHA256
by
eptescudo
on 19/01/2023, 01:52:08 UTC


Introducing "The Rat", EPT new mascot.

The rat as a mascot for EPT is a symbol of the nimbleness and adaptability of the technology. The rat is a creature that is known for being able to survive in a variety of environments and it's able to adapt to changing circumstances. Similarly, EPT is built to be able to adapt and evolve as the crypto market and technology develops.

The mascot also represents the EPT’s potential to be a powerful force in the world of crypto, much like how a small rat can be a formidable opponent. With its focus on privacy and security, EPT has the potential to become a major player in the crypto market.

Overall, "The Rat" mascot for EPT cryptocurrency represents the cryptocurrency's adaptability, power and its focus on privacy and security. The mascot represents the EPT's potential to be a powerful force in the world of crypto and it's potential to become a major player in the crypto market.


AI wrote us a code snippet on how to change the block reward based on Portugal temperatures.

Quote
#include <iostream>
#include <curl/curl.h>
#include <jsoncpp/json/json.h>

//Retrieve weather data from OpenWeatherMap API
std::string getWeatherData() {
    CURL *curl;
    CURLcode res;
    std::string readBuffer;
    curl = curl_easy_init();
    if(curl) {
        curl_easy_setopt(curl, CURLOPT_URL, "http://api.openweathermap.org/data/2.5/weather?q=Portugal&appid=YOUR_APP_ID&units=metric");
        curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, WriteCallback);
        curl_easy_setopt(curl, CURLOPT_WRITEDATA, &readBuffer);
        res = curl_easy_perform(curl);
        curl_easy_cleanup(curl);
    }
    return readBuffer;
}

//Extract maximum temperature from the weather data
double getMaxTemperature(std::string weatherData) {
    Json::Value root;
    Json::Reader reader;
    bool parsingSuccessful = reader.parse(weatherData, root);
    if (!parsingSuccessful) {
        //Error in parsing json
        return -1;
    }
    Json::Value temp = root.get("main", "temp_max", "N/A");
    return temp.asDouble();
}

//Calculate the block reward based on the maximum temperature
int calculateBlockReward(double maxTemperature) {
    int reward = 50; //base reward
    if (maxTemperature > 30) {
        reward += 20;
    } else if (maxTemperature < 10) {
        reward -= 10;
    }
    return reward;
}

int main() {
    std::string weatherData = getWeatherData();
    double maxTemperature = getMaxTemperature(weatherData);
    int reward = calculateBlockReward(maxTemperature);
    std::cout << "Block reward: " << reward << std::endl;
    return 0;
}
Post
Topic
Board Announcements (Altcoins)
Re: [ANN] Escudo Electrónico Português - CryptoNote - SHA256
by
eptescudo
on 29/10/2022, 18:59:21 UTC
Privacy in Cryptography: What You Need to Know


Keeping your private data private is hard. Nearly everyone now has a social media account, and many people have been hacked as a result. Your personal information could be anywhere online, and cybercriminals are always looking for new ways to steal it. We also live in an age of unrest regarding internet privacy. New regulations such as the GDPR have changed how companies and individuals handle user data, while the recent Cambridge Analytica scandal has sparked a renewed interest in taking back control of our information. To this end, cryptography—the art of creating codes—has emerged as a core tool in safeguarding communications against spying third parties and other attacks. Even if you’ve never heard of it before, you’re probably already using cryptography every day: It’s one of the fundamental concepts behind encryption algorithms used for secure communication over the internet (such as HTTPS).



What is cryptography?

Cryptography is the art of creating codes. The most common use of the word is to refer to codes that are used to protect information by preventing unauthorized people from accessing it. There are two main ways to use cryptography to protect information: - Encryption: This is when you use codes to scramble information so that only people who know the secret code can unscramble it and read it. - Hashing: This is when you use codes to create a fingerprint (“hash”) of a piece of information. A hash is like a fingerprint of a piece of information: It can’t be unscrambled and read like the original information.


How is cryptography used to protect privacy?

The main way that cryptography protects privacy is by scrambling the content of messages and communications so that only the intended recipient can unscramble and read them. All computer systems produce what are known as “metadata,” which is a record of who was communicating with whom, when, and what they sent. This metadata can be used to reveal useful information about a person’s behaviour and activities, including communications with journalists, doctors, lawyers, and other people who are supposed to remain confidential. Cryptography can be used to prevent this metadata from being collected and revealing sensitive information.


Why is privacy so important in cryptography?

The same properties that make cryptography useful are also what make it difficult to trust. After all, if anyone can see the code, anyone could break it. Cryptographers have developed a series of guidelines for designing and analyzing cryptographic algorithms to make sure they are secure. These guidelines are known as “best practices” in cryptography. The problem is that these practices are not universal, and different countries, companies, and people have different standards. What would be a best practice in the United States may not be in Russia, and even standards that are accepted in one country may not be accepted elsewhere.


What are some key terms when it comes to cryptography?

These terms are important to understand when it comes to cryptography. - Plaintext: This is the original information that is being encrypted. - Ciphertext: This is the scrambled information that results from the process of encrypting plaintext. - Key: This is a piece of information that people use to unscramble ciphertext. - Cryptanalysis: This is the study of techniques for breaking codes or finding flaws in cryptographic algorithms. - Cryptography: This is the process of scrambling plaintext into ciphertext using a secret code. - Cryptographic algorithm: This is a step-by-step procedure for scrambling and unscrambling data. - Key management: This is the process of managing encryption keys and ensuring that they are secure. - Privacy: This is the condition of being alone and not being observed or overheard. - Confidentiality: This is the property of information being kept secret and not disclosed to any unauthorized persons.


Which 3 tools should you use to encrypt your data?

- Password Managers: Password managers are an essential tool for encrypting sensitive information like login credentials, credit card numbers, and logins. Password managers store these sensitive bits of information in an encrypted database that only you have the key to unlock. - Email Encryption: There are a number of services that let you send encrypted emails and that let you send and receive encrypted emails. - File Encryption: There are a number of tools that let you encrypt files so that only you can open them. Be sure to use a service that has a solid track record when it comes to security and privacy.


Wrapping up: Don’t be afraid of the dark!

One of the most important skills we can develop is learning to be comfortable in the dark. This means understanding the potential threats and knowing how to protect yourself. When it comes to privacy, cryptography is an essential tool for protecting your data. You can use password managers to encrypt sensitive information, email encryption to protect communications, and file encryption to protect sensitive files.
Post
Topic
Board Announcements (Altcoins)
Re: [ANN] Escudo Electrónico Português - CryptoNote - SHA256
by
eptescudo
on 29/10/2022, 16:45:54 UTC
ePT Growth Plan

1. Increase visibility of ePT in the Portuguese market.

2. Educate users about the benefits of using ePT.

3. Improve customer service and user experience.

4. Increase the number of merchants who accept ePT.

5. Promote ePT as a secure and private means of payment.
Post
Topic
Board Announcements (Altcoins)
Re: [ANN] Escudo Electrónico Português - CryptoNote - SHA256
by
eptescudo
on 29/10/2022, 15:25:38 UTC
Portugese language, unmatched cryptography

The Portuguese language has a long and rich history, and it is no surprise that it is also the perfect language for cryptography. For centuries, the Portuguese have used their language to protect their secrets, and now they are using it to protect their Bitcoin holdings.
The Portuguese have always been at the forefront of cryptography, and they have used their language to develop some of the most secure encryption methods. This is why the Portugese Bitcoin community has developed its own version of the Bitcoin blockchain that is completely untraceable.
This new Portugese Bitcoin blockchain uses a unique form of cryptography that makes it impossible to trace transactions. This means that your identity will be secure when you use Portugese Bitcoin. You can rest assured knowing that your funds are safe from theft or fraud.
Post
Topic
Board Portugal
Re: [ANN] Escudo Electrónico Português - Mainnet Live
by
eptescudo
on 27/10/2022, 23:21:19 UTC
Post
Topic
Board Announcements (Altcoins)
Re: [ANN] Escudo Electrónico Português - CryptoNote - SHA256
by
eptescudo
on 27/10/2022, 23:03:20 UTC
Post
Topic
Board Portugal
Re: [ANN] Escudo Electrónico Português - Mainnet Live
by
eptescudo
on 26/10/2022, 10:12:41 UTC
Podes novamente indicar um tutorial para a mineração?

Como começar a minar?

1. Abrir
Quote
ePTdaemon.exe

2. Criar uma carteira na simplewallet.exe

3.
Quote
start_mining address nrofthreads

onde nrofthreads = número the threads do cpu

      `    `                 `              ΦKµ ` `       `
           »                               Ñ,▄          »
          `                      `   ,  Å,           ` `
`    `            `  `  `    `    `  j.  █╫╫»▓          ` `  `
                                   ,`     "w
  »             `  `    `          H       »╨░╙╔╫╫▓    ` `  `
      `                      `         `   ╫▒╫╫W
                                  ]   ]      ██
  `        »`                 `Γ      ╫▀╫▌        »`  `
       `            `  `      . H r        ⌐       `    `
                             ▌   `    ▄         `
»               »   `»      `ÑH  D H    »»»▀▓⌐  `»       »`
      `    `    `          j` Ñ r`  ,,X"  `  w   `
      `    `       `       ▓    ,#`     ` `   `
           »    »          Φ╫▓▀    ▓   »        
          ` `     Φæ     `` L`         ``     ` `
            ╨    ,, ~. M`   `          ▄     ` `  `
»       »       » ╨  ..,"H  ,m"█▓▓w÷.ª▓∩    
             mm «^"``"^:. M^ ,÷^└"╙`  `    `  ╫▓H »
   `  `       "    `         "╙▒▌Ö«"`              ` `  ╫╫`
           »                                              ▀▀▀^
`  `»   `                 `       `  `    `   »`  `    `   »`  `    `    `  `

Post
Topic
Board Portugal
Re: [ANN] Escudo Electrónico Português - Mainnet Live
by
eptescudo
on 26/10/2022, 01:17:11 UTC
Tem como principal final direito à privacidade económica e inovação.

O Escudo Electrónico Português é uma moeda digital de Portugueses para Portugueses.

Especificações:
Code:
Ticker: EPT
Emissão Total: 21 M moedas
Tempo do Bloco: 60 segundos
Prémio do bloco: ~10 moedas
Algoritmo: SHA256
Github: https://github.com/ptdotps2/ePT
Binários : https://github.com/ptdotps2/ePT/releases/tag/v0.0.1
Hardware: CPU
Explorador de blocos: http://blocks.escudo.digital/

Se um dos princípios da moeda é o anonimato, por que ela "de portugueses para portugueses"? Qual a relação dela com Portugal e pq tem alguma diferença se eu for de outro país?

qual o atrativo da moeda? e se ela realmente for sha256, nao vai ser cpu-only...

Existe uma implementação em progresso baseada na ideia de "spow" https://github.com/volbil/spow que tenta eliminar "pool-mining".

"This seemingly harmless concept centralize control over hash power around small group of peoples and goes against Satoshis idea of one-CPU-one-vote [2]."

Acabar com o pool mining seria um "winner takes all" e isso reduz os lucros e aumenta os riscos dos usuários pequenos, contribuindo para a centralização.

O que o alexrossi falou está certo, não é eficiente minerar com CPU um algoritmo SHA256.
Rapidamente vao vir usuários com GPU e ASICS e vao dominar o hashrate da rede.
 A não ser que exista algo diferente rolando q nao esta explicado.

"Winner takes all" é a ideia original de satoshi, one-CPU-one-vote. Na realidade a centralização também existe nas pools, não só na quantidade das mesmas como também o número de miners reais e não apenas a hashrate total de cada um, a verdadeira definição de descentralização não se pode ligar a lucros/investidores ou ao número de miners pois este é na realidade impossível de saber, o que se consegue ver na realidade é a velocidade nas pools e rede. 1000 asics do mesmo modelo a minarem para a mesma pessoa não é o mesmo que 1000 asics / 1000 pessoas ou 1 asic por pessoa, o maior valor possível será sempre definido na última.

As pools na realidade não contribuem para a descentralização, satoshi sempre instruio os usários a utilizarem endereços descartáveis não só por motivos de privacidade ( mesmo a bitcoin tendo transacções públicas) o ip de "relay" da transacção é visível, mesmo este não ser prova de nada...

Existe centralização nas pools, na realidade a verdadeira descentralização seria solo-mining no caso da bitcoin, no entanto o protocolo teria que ser alterado, algo que não faz sentido para os que pensam que são grandes investidores de bitcoin pois o preço obviamente cairia, e porquê? Mais uma vez... existe centrlização nas pools. No entanto também não faz muito sentido alterar mesmo que existísse "poder" para o fazer por parte dos core devs da bitcoin.

Na realidade o prótotipo que temos para eliminar pool's é um "blockchain dependant hash" com signed proof-of-work, o 1o faz com que o uso do daemon seja mandatório/full node para miners.

É notório até à data que não existem gpu/s ou mesmo asic's na rede, tal como a bitcoin no início.

Even though ePT algorithm is SHA-256 there is wip for spow, meaning any of "old" claims of being asicable are not valid. Further studies took us to the conclusion we would need indeed a "CPU-only" algorithm to keep us "CPU-only", however, we all know this is only temporary. You can "watch" for instance XMR evolution which aims to keep itself CPU-only mineable. Spow comes in, spow disallows any sort of "temporary" CPU algorithm. For legendary members to understand, where you would think ASIC would be possibility it simply won't. This is a complex problem, cause we are not only trying to solve adoption by minorities with less expensive hardware such as IoT devices but are also concerned with "banning" botnets and pool-mining. The aim is to keep it CPU, however we concluded GPU is also a possibility within core. Making ePT a "solo-gpu" coin even though using SHA-256. This is however sad on our eyes, cause let's face it, we want "less-expensive" (IoT) devices to be allowed along with expensive CPUs. For us to keep fairness extra measures would have to be taken ( such as a "limiter"), RAM is a possibility to "kick" out not-so-expensive GPUs (e.g. add a 32gb scratchpad loaded within RAM).    

CryptoNote started as Bytecoin with CryptoNight algorithm, a L3 cache bounded structure, and evolved to ASIC's, meaning measures have to be taken along time to keep either up or against ASIC manufacturers.

Seen options:

1. Keep it CPU/GPU minable along a big-sized scratchpad loaded in RAM.
2. Ditch spow idea and go SHA-256 mineable with ASIC's. ( pool-mining)
3. Any other

Our aim is / would be to keep SHA-256. However in 1st option to "kill" old gen/not so expensive GPUs we are also "killing" IOT devices. We strongly believe these should be an option along a fast algo as SHA-256 is.

Ideas/Proposals are welcome.

Pergunte a si mesmo, onde estão os gpu's/asics e pools na rede até ao momento? Não existem por várias razões...

Relativamente à 1a pergunta não tem nenhuma diferença substancial excepto o facto de podermos bloquear no futuro o acesso ao core por ip ranges, algo que faz algum sentido mas não 100 %.






Post
Topic
Board Announcements (Altcoins)
Re: [ANN] Escudo Electrónico Português - CryptoNote - SHA256
by
eptescudo
on 25/10/2022, 22:51:03 UTC
the coins is alive ?

the pool is down ...

There is no pool as far as I'm aware. ( unless private ) . I believe you meant the explorer, unfortunately the explorer is again down for maintenance but the chain is on-going, you can connect using latest seed-nodes from github as usual.
Post
Topic
Board Announcements (Altcoins)
Re: [ANN] Escudo Electrónico Português - CryptoNote - SHA256
by
eptescudo
on 23/09/2022, 07:05:27 UTC
Explorer is back online.
Post
Topic
Board Announcements (Altcoins)
Re: [ANN] Escudo Electrónico Português - CryptoNote - SHA256
by
eptescudo
on 10/09/2022, 22:11:09 UTC


40kh/s on raspberry pi running 3 threads.
Post
Topic
Board Portugal
Re: [ANN] Escudo Electrónico Português - Mainnet Live
by
eptescudo
on 07/09/2022, 18:04:27 UTC
FakeGucci - https://bitcointalk.org/index.php?topic=5403894.0

Será uma "trading exchange" sem KYC obrigatório.

Soberania anónima monetária é um direito internacional.

https://unsdg.un.org/sites/default/files/UNDG_BigData_final_web.pdf
Post
Topic
Board Portugal
Re: [ANN] Escudo Electrónico Português - Mainnet Live
by
eptescudo
on 07/09/2022, 17:45:21 UTC


Post
Topic
Board Announcements (Altcoins)
Re: [ANN] Escudo Electrónico Português - CryptoNote - SHA256
by
eptescudo
on 06/09/2022, 12:27:20 UTC
A sneak peak to FakeGucci Trading exchange



https://t.me/fakegucci_pt

Post
Topic
Board Service Announcements
Re: FakeGucci - A concept trading exchange
by
eptescudo
on 06/09/2022, 12:14:10 UTC
Post
Topic
Board Announcements (Altcoins)
Re: [ANN] Escudo Electrónico Português - CryptoNote - SHA256
by
eptescudo
on 26/08/2022, 02:54:11 UTC
While explorer is in maintenance we would like to announce binance smart chain bridge is now fully working.

Post
Topic
Board Announcements (Altcoins)
Re: [ANN] Escudo Electrónico Português - CryptoNote - SHA256 - CPU ONLY - SOLO
by
eptescudo
on 18/07/2022, 23:13:53 UTC
A message to the world : https://www.youtube.com/watch?v=B4H4OVVyQUQ

Who doesn't remember furby?


      ,._              ,              _.,
      |  `.          )\|`(          ,'  ;
      | ;-.`.       \'/.'\(       ,',-; |
      | |  `.`.     \{. ; /     ,','  | |
      ; ;    `.`..--" `` `"--..','    ; ;
       \ '.   ;       __        ;   ,' /
        `. `./  .-""-:  :-""-.   \,' ,'
          ``|  /\\\\._\/_.////\   |``
            |  `// o\\  // o\\'   |
            |   \\__//  \\__//    |
            \    '--'.--.'--'     /
             \      /____\       /
             /'.    \'--'/     .'\
            ;   \    '--'     /   ;
           |     ;--......---;     |
           |    ;             ;    |
           ;    ;             ;    ;
            \ .-.--.-.   .-.--.-. /
             (  (  (  )-(  )  )  )
              `"`""`""`  `"`""`"`

I dont. I ll put it this way, who needs cryptonote coins? You failed to realize this straightforward thing, no one pays attention to your life nor to what you do online. People tend to have their attention diverted from ridiculous things. In your case, your multi-year endeavor achieved no goal since nothing of what you have done eventually mattered to anybody in this world of doom. Its self-deception that makes you believe your peers do care about and share your agenda. Time to wrap your feckless life up. No more avolition. Stop wasting our time.

CryptoNote is the law.

what about EscudoNavacense coin that I mined

We are not affiliated.