Skip to content
Is Bitcoin True?
Full Privacy
Initializing search
About
Saving
Commerce
Proof of Work
References
Is Bitcoin True?
About
About
Bitcoin as Money
Bitcoin as Money
Unit of Account
Medium of Exchange
Store of Value
Fixed Supply
Monetary Policy
Money and State
In the Year 2140
Criticisms
Criticisms
Bitcoin is not Perfect
Cantillon Bubbles
Deflation
Environment
Inequality
Mining is Negative Sum
Quantum Computing
Scalability
Surveillance
Toxic Maximalists
Why is it not Worth More?
Is Bitcoin True?
Saving
Saving
Understand the Terms
Sovereignty
Sovereignty
Level 1: Getting Started
Level 2: Your Keys
Level 3: Dedicated Hardware
Level 4: Full Node
Level 5: Airgap Quarantine
Level 6: Metal Backup
Level 7: Protocols + Multisig
Level 8: DMZs
Level 9: Fault Tolerance
Level 10: Fail-safes
Level 11: Countermeasures
Level 12: Off-grid
Wealth Preservation
Wealth Preservation
Full Privacy
Inheritance Planning
Physical Security
Appendix
Appendix
A: Airgapped Computer
A: Using Dice
A: Custom Protocols
A: Keyless Vaults
A: Mnemonic Memorization
Commerce
Commerce
Understand the Terms
Sovereignty
Sovereignty
Level 1: On-chain Limitations
Level 2: Primitive Tokens
Level 3: Private Channels
Level 4: Public Channels
Level 5: Point-of-Sale
Level 6: Layer-2 Wallets
Appendix
Appendix
A: Bitcoin Script
A: Coinjoin
A: Network Security
A: Physical Security
Proof of Work
Proof of Work
Understand the Terms
Sovereignty
Sovereignty
Level 1: Start Hashing
Level 2: Hash Farms
Level 3: Demand Response Curtailment
Level 4: Solo Mining
Level 5: Block Broadcasting
Level 6: Opensource Firmware
Level 7: Commodity Hardware
Appendix
Appendix
A: Energy Money
A: ASICBoost
References
References
Nostr
Full Privacy
¶
work in progress
Back to top