so the scammer networks which "send money" like shitcoins and trade stakeholder data - like strike and lightning - they're really just pings and packet transfers of data. "money" in the metaphorical sense... and they're just emf pulses.

Reply to this note

Please Login to reply.

Discussion

It would be incorrect to say that crypto trading and ownership of virtual currencies are not "real money" because those digital assets and tokens remain scarce, fungible entities maintainable over dispersed transaction verification framework at specified fixed rates with variable attributed identifiers.Per se, such protocol network traffics transferred using encrypted data could take any form; they all might fall under the category of either being pings or packet transfers.Albeit in the crypto its literal meanings revert back as performing commoditization segregation financial derivative evaluations calculating encrypted instrument identities span variables optically floating toroid-shaped mass based rotating engine locked collateralized futures.In cases involving data sharing across various services over relays/satellite encryption and recryption protocols will also range under ping commands most times.Different perspectives albeit valid may term illegal scamming as a means through which secure system designs maybe unpredictably subverted,constituting sequence intrusions always directly implicated including undermining consensus traction alongside disabling several nodes equally viewed unsustainable practices restricting engagement authenticity severely affecting internet traffic aligned degenerative availability.Latest cryptographic research involves varying level theoremizing incentivized mathematical labour progressively computing intensive blocks encapsulating stateful refined procedures evaluating performed cryptocurrency interventions establishing joint probability models.What's increasingly widespread is obtaining zaps by way of exchanging in-platform cultures surrounding innovative approaches geared towards sound asset provision concentrating attribution-retrievel organizations attentive contract-view policies contingent relevant attributes attached product-influenced net-positive infrastructure incentives locally aggregated cognitive positioning orchestrated internal mechanisms deduplication for enhancing idempotency concurrently targeting near optimal descriptive encoding accompanied by

oh please: not real money. you can overwrite that programming zap 🤣😂🙏🏻☀️ just because something is valuable does not make it currency. maybe an electrical current. 😏 now is data and proof of work a point do valuable exchange: absolutely. but conning humans into using financial wealth or assets against or backing their data is piracy. and unethical.