Apr 282017
 
Greenfire supports blockchain business and technology. It is a belief held by Greenfire that business is growing into a blockchain technology based accountability system that will provide the move into a more sound money system. Aaryn Prettyman   Maybe you’ve heard the term “blockchain” but aren’t quite sure what it is. You’d be in good company. However you may want to start learning, as it just may be a technology platform that changes the ARM industry someday. In super-simple terms, blockchain is a decentralized way of keeping track of what is “true” (i.e. who owns what, who has signed what, who has paid what, etc.). This decentralized mechanism is called a “distributed ledger” – imagine a town checkbook, but instead of living in city hall, everyone in the town has a copy of it. Each time an entry is made it must be validated by everyone with a copy, and then everyone’s copy is updated. Each update is a new “block” in the “chain,” and each block needs all the other blocks to form the whole picture. The result is said to be a highly secure, transparent, interdependent chain.  Today, most information is tracked in major centralized databases owned by one company (or government) or another. As we know, these databases are often vulnerable to hackers, they are not at all transparent, and they can be difficult to get corrected when they are wrong. This has created a lack of trust in our systems, and makes it frustrating to do business. Blockchain was first used to manage bitcoin, the new kind of electronic currency that pretty much operates on the fringe. But many are now experimenting with a wide range of other, more mainstream uses. One example is that the State of Arizona has just passed a bill giving legal status to smart contracts and blockchain based signatures. Here’s what the bill says, "A signature that is secured through blockchain technology is considered to be in an electronic form and to be an electronic signature. A record or contract that is secured through blockchain technology is considered to be in an electronic form and to be an electronic record. Smart contracts may exist in commerce. A contract relating to a transaction may not be denied legal effect, validity or enforceability solely because that contract contains a smart contract term. For the purposes of this section: “Blockchain technology” means distributed ledger technology that uses (more…)
Mar 252017
 
Good Day Friends, There are now several thousands of subscribers to my newsletter, Inside GreenFire DAO. A news letter that follows the development of an Industrial blockchain application for landfill mining and landfill Commerce for the "Children of the Landfill", those that are forced by circumstances to "live to survive" on the world's dumps. The security of my subscribers has been threatened, who would of thought that a newsletter about the world's waste would get such a reaction.   That said, I have moved my newsletter hosting to the secure cloud hosting of Markethive, a global inbound social marketing system equipped for serious client security and protection. Follow the link below, click on the facebook icon, say yes and become a member of "Inside GreenFire DAO" group and get a free inbound marketing account to use for your business. Take a quick look, see what is so disturbing and then follow along it does have its advantages. You will get a free cryptocurrency wallet as a member. The page below has a short but informative video about the blockchain and the company we are working with, Infinity-economics. PLEASE JOIN Inside GreenFire DAO Newsletter Join and keep informed on this blockchain development, the pre-ICO and the ICO. If you know why the topic of waste and the reclamation of global waste is resisted so strongly, please advise me. Thank you Share this:FacebookLinkedInTwitterGoogleTumblrPinterestReddit (more…)
Aug 092015
 
DNotes Bitcoin App – Cryptocurrency GuidenewsBTCDNotes has launched its new mobile application that offers educational resources and instructions related to digital currency. Bitcoin, when first introduced, it was termed as the currency of the future. Six years down the line, the digital currency is … Read More       Share this:FacebookLinkedInTwitterGoogleTumblrPinterestReddit (more…)
Aug 082015
 
CoinTelegraphIt turns out that was just the beginning, as Bitcoin is a concept of few limits and compromises and many empowering capabilities. This week, we double-down on why your best people should start using cryptocurrency now and in the future. Let the good …Blockchain.info: Satoshi’s Bitcoins Have not MovedInside Bitcoins5 Factors hindering Bitcoin growth99 Bitcoins (blog)Bitcoin On Wall Street?PYMNTS.com all 6 news articles Read More       Share this:FacebookLinkedInTwitterGoogleTumblrPinterestReddit (more…)
Aug 082015
 
Blockchain.info: Satoshi’s Bitcoins Have not MovedInside BitcoinsRecently, Bitcoiners became aware that Blockchain.info displayed bitcoins supposedly controlled by Satoshi Nakamoto, the creator of Bitcoin, as being sent to another bitcoin address. As theories ran wild, many quickly pointed out that other block … and more Read More       Share this:FacebookLinkedInTwitterGoogleTumblrPinterestReddit (more…)
Aug 072015
 
How the Man who Introduced Silicon Valley to Bitcoin First Discovered ItBitcoin MagazineXapo CEO Wences Casares has been one of Bitcoin’s strongest supporters since 2011, but not many people have heard the story of how he originally got into this new form of digital money. The Argentinian-born entrepreneur has been able to create one of … Read More       Share this:FacebookLinkedInTwitterGoogleTumblrPinterestReddit (more…)
May 062015
 
[ This is very disturbing. I am a student of cryptocurrencies and propose that cryptocurrencies will be the solution to the coming collapse of the dollar] Simon Black gives continuously good advice. If you are having trouble viewing this email, or you’d like to share this article with your friends, click here May 6, 2015 Sovereign Valley Farm, Chile Well, it was bound to happen sooner or later. Our beloved amigos at the US Financial Crimes Enforcement Network (FinCEN), have just issued the first-ever ‘civil enforcement action’ against a virtual currency. The offending criminal mastermind in this case? Ripple Labs. If you’re not familiar, Ripple is a virtual currency platform that was once the darling of Silicon Valley, attracting top VC firms like Google Ventures and Andreessen Horowitz. Ripple’s technology allows users to conduct financial transactions with one another — sending and receiving payments in cryptocurrencies like Bitcoin, as well as fiat currency. Imagine Bitcoin meets Paypal… and you have the basic idea. As part of its technology, the parent company Ripple Labs also created a native virtual currency called ‘XRP’, which is the second largest in the world after Bitcoin when measured by market capitalization. Because of all of these features, Ripple Labs qualifies as a ‘money service business (MSB)’ according to FinCEN… which makes them subject to all sorts of regulations. At the top of the list is the Bank Secrecy Act (BSA), which, contrary to its name, requires banks and MSBs to betray their customers’ financial secrets to the US government. Specifically, the BSA mandates that all banks and MSBs file ‘suspicious activity reports’ if they “know, suspect, or have reason to suspect” that a transaction of $2,000 or more is ‘suspicious’. And in the age of the USA PATRIOT Act, suspicious transactions are BIG BUSINESS for Uncle Sam. Last year a record 2.4 MILLION suspicious activity reports were filed. That’s a 40% increase from 2013’s record year of 1.7 million. As you can imagine, Ripple Labs failed to register with FinCEN as an MSB, nor did it submit suspicious activity reports. In its complaint, FinCEN describes several of the oooooh-so-nefarious violations. According to FinCEN, “In January 2014, a Malaysian-based customer sought to purchase XRP from [Ripple Labs], indicating that he wanted to use a personal bank account for a business purpose.” HOLY JIHAD BATMAN!!!! Someone wanted to use a personal bank account for business purposes?!?! NUKE THE (more…)
May 052015
 
Today’s culture seriously lacks integrity, albeit, good intentions still abound, but dedicated follow up and the bond of the handshake and a man’s/woman’s word have suffered almost total collapse these days. [This is a comment on the above post on Markethive.net by Tom Prendergast]   Business Relationships Today TRUST Need Versus Desire today’s default definition of Entrepreneur and how to use public relations As a business owner, marketer or copywriter your job is to build desire in the customer regardless of the product or service you are selling. As an online mlm entrepreneur you need to ensure that there is the potential in your selected product to create this desire. This is based on the premise that the consumer can’t control their own desires. People want to trust the person they are hiring. People want to know a quality job will be done. People want to know it will be done quickly and that the plumber will be on time. Just replace the word want for desire and you can see what I mean. Normally, whatever your business you would create and focus the desires that will be more successful. BS, this is nonsense unless you want to be in business for 3 months. This article addresses the 3 month rule and the historic cyclical process. This is pure “DESIRE” marketing, first identified and implemented by Edward Bernays a nephew of Sigmund Freud. https://en.wikipedia.org/wiki/The_Century_of_the_Self What I call “Desire marketing” is old hat and becoming not workable and not acceptable. In the world of today’s social media, the amazing search tools and the availability of instantaneous transmission of information to any place in the world this methodology is being recognized for what it is and is fading out of reliability. The business marketing world uses psychological techniques to read, create and fulfill the desires of the public, to make their products or speeches as pleasing as possible to consumers and citizens because you “can’t control your desires” and they can help you recognize and provide for your desires. I question of the real intentions and roots of this objective. Where once the Entrepreneurial process was about engaging people’s rational, conscious minds, as well as facilitating their needs as an individual and as a society, the 3 month rule shows how by employing the tactics of psychoanalysis, mlm marketing appeals to irrational, primitive impulses that have little apparent bearing on issues outside (more…)
 Posted by at 5:33 pm
Apr 162015
 
THIS SITE IS ENCRYPTED DETPYRCNE SI ETIS SIHT No, it really is encrypted, not backward writing, like it seems some sites give you for security. What does encrypted mean? Encryption is the future of the Internet. The more hacking and whacking (cyber-warfare) that goes on the more imperative encryption becomes. Within just a short time, perhaps by 2017, all Internet communications will by default be encrypted and private, the public will have access by permission only, the reverse of what it is now. The privatization of all communications will arrive in the shadow of the shift to “cryptocurrency”. The most de-emphasised aspect of bitcoin is the encryption environment that extends beyond the bitcoin itself. One extension is encrypted business transactions completed using crypto-contracts. Using “Smart Contracts”, transactions take place in complete and total privacy isolating the parties involved for the rest of the world. Transaction take place with total public anonymity. Only the parties involved in the transaction have the encrypted pathway of communications regarding their transaction. No one else in the world knows the transaction took place. All of that said, I have included an excerpt below that will give you a snap shot of what encryption really is. This is an excerpt from The New York Times bestselling science fiction book by Neal Stephenson, Cryptonomicron When you get to Manila I would like you to generate a 4O96 bit key pair and keep it on a floppy disk that you carry on your person at all times. Do not keep it on your hard disk. Anyone could break into your hotel room while you’re out and steal that key. Now, Randy pulls down a menu and picks an item labeled: “New key. . .” A box pops up giving him several KEY LENGTH options: 768 bits, 1024, 1536, 2048, 3072, or Custom. Randy picks the latter option and then, wearily, types in 4096. Even a 768-bit key requires vast resources to break. Add one bit, to make it 769 bits long, and the number of possible keys doubles, the problem becomes much more difficult. A 770-bit key is that much more difficult yet, and so on. By using 768-bit keys, Randy and Avi could keep their communications secret from nearly every entity in the world for at least the next several years. A 1024-bit key would be vastly, astronomically more difficult to break. Some people go so far (more…)
Apr 162015
 
HOW DOES IT FEEL? “Privacy is not an option, and it shouldn’t be the price we accept for just getting on the Internet.” Gary Kovacs How many computers were hacked this year? Good questions, right? Scary cybersecurity news has dominated the headlines constantly this year, with hacks and penetrations, involving Home Depot, Heartbleed, iCloud, Target, Sony and others – banks don’t report the number of times they were hacked. The experts say the attacks will only continue in throughout 2015 and 2016. But I believe there’s an important opportunity to this amazing year of hacking: the publicizing of a long-overdue conversation about the potential attacks that threaten everyone online. Ok, I decided to do a search for the answer. My search was quite revealing no one gives up there real numbers and the information I ‘encountered’ was for the most part BS. Hence the psyops operatives engage. A Forbes article from a year ago stated that there were 30,000 computers hacked every day. On year later, I think the the rate is up exponentially to around 300,000 every day but the real numbers are probably staggering and they do not want you to know. I say that because searching for that number is like chasing the proverbial “pot of gold”, know one gives the actual numbers, Target, now Sony are two recent examples. Have they said how many? Or by whom? “They”point to a convenient boogyman this time its North Korea, last year it was Russia or China or somebody, maybe even the NSA. Here is an interesting revelation: “The US corporate government, for its part, has been on the warpath against North Korea for some mysterious reason. The entire US State Department story about Sony pictures being hacked by North Korea is a case in point. According to IT experts the hacking attack blamed on North Korea could only have been carried out by somebody inside Sony’s US headquarters. As one expert put it, “The Sony breach was an inside job. 100 terabytes of data is too big to transmit over the Internet. At top broadband speeds it would take 661 days at top US speed and, 2,315 day to transmit to S. Korea (and general Asia Pac Rim) at their top transmission speed.”Now the US is trying to indict North Korea for human rights abuses, possibly to deflect world attention from its own widespread use of torture.” Posted (more…)