oobiyou on Nostr: All ideas at inception seem impossible. We should still try, who knows what may ...
All ideas at inception seem impossible. We should still try, who knows what may happen.
“We have proposed a system for electronic transactions without relying on trust. We started with the usual framework of coins made from digital signatures, which provides strong control of ownership, but is incomplete without a way to prevent double-spending. To solve this, we proposed a peer-to-peer network using proof-of-work to record a public history of transactions that quickly becomes computationally impractical for an attacker to change if honest nodes control a majority of CPU power.”
-Satoshi Nakamoto-
Published at
2023-04-22 17:38:27Event JSON
{
"id": "0e48b08dd41892975a3100c8db23c0d4d510e7e61ce15590331062be19c5d317",
"pubkey": "feb4e6277e69aedd3b6c0f2c1904976397f30b8f003b201a4908ea3fa7a7bfe8",
"created_at": 1682185107,
"kind": 1,
"tags": [
[
"e",
"1a0def2e6272b51ee375658843e930ca1079d3e79fb370262ed05be9660d52dc"
],
[
"e",
"5461c0ccd33a7dce79c7b8db800f3f8ab22b6cb8049967d70463fcd502b0cc6d"
],
[
"p",
"a723805cda67251191c8786f4da58f797e6977582301354ba8e91bcb0342dc9c"
],
[
"p",
"0f65aa4d25518263873889f3047fd5e218d33b32d864e8a211d9c04522fd311d"
],
[
"p",
"0f65aa4d25518263873889f3047fd5e218d33b32d864e8a211d9c04522fd311d"
],
[
"p",
"0f65aa4d25518263873889f3047fd5e218d33b32d864e8a211d9c04522fd311d"
],
[
"p",
"0f65aa4d25518263873889f3047fd5e218d33b32d864e8a211d9c04522fd311d"
],
[
"p",
"c5516e7117083d39c14616a6197b83e955dae12464610e6886fce0ae72997d5d"
]
],
"content": "All ideas at inception seem impossible. We should still try, who knows what may happen. \n\n“We have proposed a system for electronic transactions without relying on trust. We started with the usual framework of coins made from digital signatures, which provides strong control of ownership, but is incomplete without a way to prevent double-spending. To solve this, we proposed a peer-to-peer network using proof-of-work to record a public history of transactions that quickly becomes computationally impractical for an attacker to change if honest nodes control a majority of CPU power.”\n-Satoshi Nakamoto-",
"sig": "248b87351c9804274633afece77f84140ea19bbe8c9c3a05d9fbf01699f2dfc24fb87249960998b52eba3493bc50f9ae38389e0dbaa6651001ee309c8a8c1ecc"
}