Skip to main content

共识与价值

 发信人: habenaria (cme), 信区: Stock
标  题: 共识与价值
发信站: BBS 未名空间站 (Sun Apr 18 11:17:33 2021, 美东)

这些有什么用
钻石怎么样? 不能吃,有什么用,在我眼里,和玻璃没有什么区别。然而,,,女人们
喜欢!
LV, Gucci, Chanel 怎么样?又不能吃,远不如塑料袋好用。然而,,,女人们喜欢!
贝壳怎么样?不能吃,现在有什么用?曾经,,,古人把它当钱用,这些和钱相关的字
都是贝字旁:财贸贡赐贬购货贯贫贪赌赔账贼赃赊赎贿赂贮贷资赁费贵贱贺赏

你信教么
你信伊斯兰教么?有人信,在信的世界里,默罕默德在引领世界;
你信基督教么?有人信,在信的世界里,耶稣在救苦救难;
你信佛教么?有人信,在信的世界里,如来在普渡众生;

不要去嘲笑钻石名牌包包,你赚钱给心爱的女人,而她们却为之疯狂!
不要去嘲笑别人的宗教,在信仰的世界里,神佛在抚慰心灵的创伤!
不要去嘲笑你现在看不懂的比特币,在信的世界里,其价值在日增夜涨!

人与人之间存在着基本的信任问题,所以就有了中介中间人,从而交易效率低下。比特
币背后的区块链技术---去中心化,省掉了中介中间人、且具有防篡改功能,其革命性
、创造性所带来的价值不可估量。

远古时代人们凭着打斗分配财富,机器时代(工具进步)凭着机器从新分配财富,电力
时代(工具进步)又一次分配财富,互联网时代(人交流方式改变)再一次分配财富,
我们正在进入了一个全新的区块链时代(人交流方式改变),,,

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...