What’s up today?

8 posts were split to a new topic: Altilly Crypto Exchange

Yeah, because that’s how the world works, things are worth as much as they “should” :joy:

More complex models have not usually been the most successful ways to go about noisy data.

1 Like
1 Like

Get 1TB free for 2 months from Storj:

I added an automatic translation of the weekly news and shared it in Twitter and Facebook

3 Likes
3 Likes

https://blog.sia.tech/mutating-the-immutable-behind-the-scenes-of-skydb-137df8105c17

1 Like

“Power is shifting to the algorithms”.

1 Like

Seriously? A man called Noah on human evolution!

6 Likes

Probably building a ship on a dry land!

3 Likes

Is that interesting enough to pay the effort? Cause it’s unfortunately “This site isn’t currently available in the EU” for me.

1 Like

https://omny.fm/shows/science-rules-with-bill-nye/yuval-noah-harari-charts-the-evolution-of-homo-sapiens

1 Like

I feel it is and hopefully the link @JBishop provided will work for you.

That one works perfectly, thanks!

1 Like

In a Friday evening announcement, the Treasury’s Financial Crimes Enforcement Network, or FinCEN, announced proposed rules requiring registered crypto exchanges to verify the “identity of their customers, if a counterparty uses an unhosted or otherwise covered wallet and the transaction is greater than $3,000.”

The rule is currently just a proposal. The Treasury has given stakeholders 15 days to respond with comments.

1 Like

The United States Department of the Treasury is looking for expert advice on cryptocurrencies to tackle legal challenges associated with the industry.

If I could get that job, I’d go in on the first day and just tell them they are F*****D, then resign! :rofl: :rofl:

8 Likes
7 Likes

“industry crimes”

LOL

The public are moving to crypto to isolate themselves from banking criminals.

7 Likes

Solarwinds attack turns out to be a very easy password hack. US gov. in damage control blaming Russians to cover-up the complete ineptitude of their own government bureaucrats as we learn that a child hacker anywhere could have cracked open their security.

5 Likes