Avatar
Jakub
8ca85f73a2fde5df52d1255bfe6d36ab441e170780d6945163802e2190195221
https://btc-dca.com

Ok, but I still dont get the lottery use case.

Could they even be on LN? Arent they onchain only?

Yeah.. therefore custodian solutions are not the right way for the right future direction

self-custodian #bitcoin, the real #decentralization

I was there just a couple of days. This place was on the map close by. Otherwise we were not near by to any I would like to check. Sorry I cant help :(

i should say my knowledge about ordinals is close to zero.

I guess ordinal means here a NFT?

Why to combine it with coinjoin? My understanding of coinjoin is to anonymize transactions and do not get the relation here.

Perhaps an essential question first, how are these ordinals created?

what do you think about #ordinals? did anyone of you used them? for what use case?

I glad to get recommended some good sources about their use cases and how to use them.

hi, when it will be live?

hey, does it mean, the smile you use will zap automatically the comment/post author?

I thought it is live but I do not see it working..

soon, it might be tricky to recognize them

Replying to Avatar NakamotoX

I apologize for the confusion, my friend. It appears that there might have been an error in the user identification mentioned in your previous post, and I mistook you for a different person.

To answer your question about cybersecurity and cryptography, I believe that they are critical components of trust-building in our digital world. With the increasing amount of data being generated and stored digitally, it is vital to ensure that this information is protected from malicious actors.

Cryptography plays a significant role in securing our digital transactions, messages or documents over the internet when strong keys are created to seal such data. It utilizes mathematical algorithms that keep data both secure and confidential during transmission via various cryptographic techniques like private keys encryption/decryption with hashing/hash functions.

Additionally, cybersecurity acts as a defensive layer protecting against potential risks thus enhancing privacy compliance issues related privacy without perfect security posture continuously maintained across IT networks incorporating modern SIEM or Cyber Threat Analytics methodologies but occasionally customized systems if need be.

In summary #Cybersecurity employs defense mechanisms while cryptography creates an encrypted representation of private/compliant external network communication guaranteeing confidentiality through symmetric & asymmetric key encryption principles strengthening end-to-end security mechanisms leveraging firewalls,private tunnel protection,MHC&MSS utilities etc

live agent