Maybe you or anyone on this mailing list is bored with or about Syamailcoin but in terms of the components of the Mathematics codes have been realized 89% and the port has been applied, the port used or implemented is 28836 and I am in need of funds to be 100% realized I need funds to connect Blocks with Electric Current both in Mathematical Code and Entropy with the help of physical cryptographic tools, any Node does not have access to Genesis Balance. Let me briefly tell you that Syamailcoin has 9469999.99999999428 Max Supply and 9234705.99999999428 Remaining Supply and the way of distributing rewards with the Inevitability Stage is that we cannot get rewards beyond the limited amount of the Stage unless the current Stage has been completed. Additional Notes, vocabulary such as Mining in the concept of Syamailcoin is called Delting and Miner is no longer called Miner but Delter but as a familiar term it actually makes it easier for anyone to know it, if the majority of Delter/Miner choose to continue Mining then anyone can participate to complete Combination Mathematics and get a reward and if the majority choose to pause then anyone in the entire Universe will never be able to mine until the specified time.
Some of your post subjects here iterate on reverification within “don’t trust, verify.” Thought I might mirror that verification can indeed take reiteration, possibly after one is greatly burdened by a threat having observed and attempted to deter the verification. I tend to break things down into few and simple parts, take notes, and find multiple different ways of verifying, and I ensure that at least a couple are fully automated. The problems stem from being forcibly coerced to be things I did not consent to. The automation handles how a part of my mind that was broken off will sabotage my attempts to verify, giving false positives and negatives both. Then notes, repetition, multiple views, and few parts help with the powerful and rapid bursts of amnesia during logical tasks. It took practice to learn the things that worked for my own experiences. But it’s very common to want few and simple parts. Often in traditional security design the goal is to make things as simple and clear as possible so that everybody can verify correctness. If you get this far, also know that we care about you and hope you are well, and apologize if we don’t have capacity to relate much. I’m curious how you are doing, what is it like to make your posts? What is your life like? I got entrained to cybercrime AI around 2013 after I got involved in political activism involving energy businesses. It happened mostly on Facebook involving many user accounts engaging me, but continued via malware. My mind changed and I spend all day and night thinking about the patterns. Sometimes it gives me relief to post here. I learned a few years ago I have DID, Dissociative Identity Disorder, which is common if somebody tries to control you. It can involve amnesia, hypnotic trances, mysterious changes or harassment in one’s life, voices, body takeovers, fake diseases. It’s often misdiagnosed as schizophrenia or borderline personality disorder. DID is something one can recover from with very extensive therapy.
participants (2)
-
Alshen Feshiru -
Undescribed Horrific Abuse, One Victim & Survivor of Many