00:04 - 00:07
我们加密行业已经有上百年的历史了
00:14 - 00:17
以及民主党的SEC进行了多次大战
00:19 - 00:23
拜登其实早已经对我们行业痛下杀手
00:33 - 00:35
要说咱们加密行业的起点呢
00:45 - 00:48
有一个关键性的原因就是1917年的时候
00:52 - 00:55
德国想要拉拢墨西哥一起入侵美国
01:04 - 01:06
那德国人在这吃了个大亏之后呢
01:07 - 01:10
怎么样去解决信件的安全问题
01:16 - 01:18
这个机器被德国军队广泛采用啊
01:19 - 01:21
第一次找到大规模的应用场景
01:21 - 01:24
从而带动了加密行业的诞生
01:37 - 01:39
战争的重点呢就是人家加密
01:41 - 01:43
加密和解密的战争就此爆发
01:43 - 01:46
那为了破解这恩尼格玛密码
01:52 - 01:54
最终呢是在二战结束后也落幕了
02:01 - 02:03
要求呢就是凡是与军事有关的技术
02:03 - 02:06
不管是加密和解密都会控制出口
02:07 - 02:10
加密行业呢完全服务于军事市场
02:10 - 02:12
所以说加密技术产生的设备呢
02:32 - 02:34
当时是IBM的一群科学家
02:34 - 02:37
他们开发了一种革命性的加密算法啊
02:37 - 02:41
这就是后来著名的DES数据加密标准
02:48 - 02:51
美国国家安全局NSA忽然介入
02:53 - 02:55
将这个加密技术的密钥长度
02:58 - 03:01
那这个看似技术性的改动什么概念呢
03:02 - 03:06
是让算法的安全性降低了数万位
03:13 - 03:15
一直提倡的呢就是大政府模式
03:16 - 03:19
生怕呢有政府管不到的地方出点乱
03:21 - 03:23
哎加密行业还是迎来的发展
03:30 - 03:32
这我们加密行业的第二次发展
03:32 - 03:35
也马上迎来了他的第二次战争
03:44 - 03:47
但美国呢个人电脑是非常普及
03:47 - 03:50
于是呢就出现电脑对电脑端的通信啊
03:50 - 03:52
也就是我们用户数据的传输
03:57 - 04:00
那这个时候拜登就跳出来宣战了
04:00 - 04:02
1991年美国东部华盛顿
04:03 - 04:05
他还只是一个参议院的议员
04:06 - 04:10
发起了一个很反动的法案S.266啊
04:10 - 04:13
1991年综合反犯罪法案
04:15 - 04:20
电子通信服务提供商和设备制造商哎
04:21 - 04:25
政府能够获取加密通信的明文内容
04:27 - 04:29
拜登就已经打着反犯罪的名义
04:33 - 04:35
当时呢美国的总统不是共和党
04:35 - 04:38
这个法案呢并没有获得通过啊
04:39 - 04:41
而且当时学术界的一些专家呢
04:57 - 04:59
各自都发起了各种各样的行动
05:01 - 05:03
在拜登给这个法案拉选票的时候
05:07 - 05:09
呢叫Phil Zimmerman啊
05:09 - 05:11
他正在进行着一场默默的革命
05:11 - 05:14
他开发了一个叫PGP的软件啊
05:14 - 05:16
pretty good privacy
05:22 - 05:25
哎呀怎么有一个S.266法案呢
05:26 - 05:28
他必须要在这法案通过之前
05:43 - 05:45
算是解决了美国用户的问题
05:45 - 05:47
后面呢他又做了一件更绝的事情
05:47 - 05:49
直接让他的软件服务全球人民
05:49 - 05:51
要知道不管你开发什么软件
05:52 - 05:54
把你的软件定义为加密软件
05:59 - 06:01
这哥们就想出了一个天才的主意
06:05 - 06:09
我出版你可不限制我书籍的出口吧
06:11 - 06:14
非常著名的齐默尔曼出版社事件
06:14 - 06:17
根据美国宪法的第一修正案说
06:28 - 06:30
非常晦涩难懂的技术书籍啊
06:34 - 06:37
把印刷的代码呢重新输入电脑
06:37 - 06:40
每个人都获得了这样的一个加密软件
06:49 - 06:53
侧重于用密码学保护用户的隐私权
06:54 - 06:57
信息安全和言论自由的话题
06:57 - 07:00
最后演变成了知名的赛博朋克啊
07:00 - 07:04
密码朋克运动在当时掀起了轩然大波
07:05 - 07:07
这个运动发布了密码朋克宣言
07:11 - 07:14
那我们必须捍卫自己的隐私
07:15 - 07:17
都是我们加密行业的从业人员
07:17 - 07:19
对于拜登挑起这场战争的应战
07:21 - 07:23
换来的是民主党的疯狂报复
07:23 - 07:26
1993年拜登的立法失败之后
07:28 - 07:30
又想到了一个新的办法搞我们
07:31 - 07:33
Clipper chip这种芯片呢
07:35 - 07:38
凡是使用这个芯片做的计算机
07:38 - 07:41
上面的语音和数据都可以被政府截获
07:43 - 07:47
和现在啊拜登政府力推的CBDC差不多
07:47 - 07:49
就是监控每一个用户的转账
07:58 - 08:01
AT&T的研究员Matt Blaze发表了一篇论文
08:03 - 08:06
什么Clipper ship的安全性形同虚设
08:10 - 08:13
直接让政府陷入了一个尴尬境地
08:13 - 08:14
所以呢AT&T后面呢
08:14 - 08:17
也是放弃了采购这个芯片的计划
08:25 - 08:27
反倒是让公众第一次清晰的认识到
08:27 - 08:30
这政府控制加密系统不行的
08:42 - 08:46
他起家的时候创立的公司叫网景公司
08:58 - 09:00
就开发了一个叫SSL的加密协议
09:02 - 09:06
你凡是超过40位密钥长度的啊
09:13 - 09:16
网景公司当时就不得不做了
09:17 - 09:20
就是使用128位的加强密码
09:26 - 09:28
只能使用40位的加密密码
09:34 - 09:36
因为法国的学生用了8天时间
09:36 - 09:38
就破译了这40位的SSL
09:42 - 09:45
导致老百姓的邮件信息被泄露
09:45 - 09:48
这新闻一下子就震惊了商业界
09:48 - 09:50
当时网景的工程师非常愤怒啊
09:50 - 09:53
直接公开说这就是政府瞎管的结果
09:57 - 10:00
在加密技术和民主党政府冲突啊
10:01 - 10:03
美国的一个大法官站出来了
10:03 - 10:05
当时民主党才刚刚开始执政啊
10:06 - 10:09
多是里根啊和老布什时期任命的
10:10 - 10:12
于是呢在大法官们的推动下
10:12 - 10:15
96年的美国最高法院首次裁定
10:16 - 10:18
是受宪法第一修正案保护的
10:21 - 10:23
对咱们行业是一个里程碑的意义
10:31 - 10:33
最终的获胜的还是到1999年啊
10:43 - 10:46
也成为了互联网的核心基建
10:46 - 10:49
PGP呢成为电子邮件的加密标准
11:02 - 11:06
停留在保护网上的信息安全的阶段
11:06 - 11:08
加密的信息还只能是个信息
11:10 - 11:13
想要把虚拟数据虚拟信息变成资产
11:15 - 11:17
我们把时间拉回到1994年啊
11:21 - 11:23
就是这个更具颠覆性的想法
11:28 - 11:31
那如果我们创造一种不受控制的货币
11:33 - 11:35
有了阿姆斯特丹这个会议啊
11:39 - 11:42
比如说97年Adam buck发明了hash cash
11:42 - 11:44
这个软件最开始开发出来呢
11:46 - 11:48
但是呢在这个软件的编程思路里面
11:48 - 11:51
人家就用了工作量证明的概念
11:52 - 11:54
人家呢在2002年呢也写了个白皮书
11:58 - 12:01
1998年 戴维呢发表了一个B-money的提案
12:02 - 12:05
绝对是咱们加密行业的华人之光
12:05 - 12:06
因为B-money提案呢
12:07 - 12:10
描述分布式数字货币系统的
12:12 - 12:14
就是我们后面非常熟悉的Pow
12:15 - 12:18
也是最早被中本聪联系的两个人之一
12:22 - 12:23
以太坊的创始人Vitalik
12:23 - 12:27
都把以太坊的最小单位命名为Wei
12:27 - 12:29
就是表达对戴维的崇高敬意
12:32 - 12:34
加密信息还是没有变成加密货币
12:35 - 12:38
到了1998年到2005年期间
12:40 - 12:42
他就提出了BitGold设想
12:43 - 12:46
它不仅将工作量证明与价值存储
12:47 - 12:50
更是提出了一个叫智能合约的
12:54 - 12:57
看似都是摸到了梦想的边缘
12:58 - 13:01
都缺少最后一块拼图都解决不了
13:01 - 13:04
如何在没有中心化机构的情况下
13:04 - 13:07
让所有参与者对交易达成共识
13:07 - 13:10
这个问题困扰了密码学家们整整20年
13:12 - 13:15
这个加密的数据永远只是个数据
13:16 - 13:20
成资产直到2008年10月31号
13:20 - 13:22
一个化名中本聪的神秘人物
13:26 - 13:29
算是巧妙地把前面的先行区整合起来
13:29 - 13:32
人家采用了Hashcash的工作量证明系统
13:32 - 13:35
啊借鉴了b money的去中心化设计理念
13:35 - 13:38
还用了Merkle树进行交易验证
13:42 - 13:45
那就是如何在完全去中心化的情况下
13:47 - 13:49
好那这个技术进步非常的重要
13:50 - 13:52
我们仍然有大量的加密项目
13:52 - 13:55
都必须采用去中心化的方式
14:08 - 14:11
从而去解决这些项目的共识问题
14:12 - 14:15
它发行的资产就只是数据丢失资产
14:17 - 14:19
我们行业给了我们很多小白用户
14:21 - 14:23
我们是有一个广告金主爸爸
14:25 - 14:28
他为了构建一个AI可用的二层网络
14:29 - 14:32
是为了帮助全球的AI开发者
14:37 - 14:39
就需要大量的去中心化节点
14:43 - 14:45
才能帮助AI项目去跑一些模型
14:46 - 14:48
你说如果他是一个别的行业的项目
14:49 - 14:51
因为他已经实现了550万
14:55 - 14:57
包括SNZ水滴Iotex
15:03 - 15:05
照样还得去布去中心化的节点
15:05 - 15:08
用户呢只要到他的官网上哎
15:13 - 15:15
那为了奖励用户成为节点呢
15:17 - 15:20
一个是奖励他们自己项目发行的代币
15:20 - 15:22
他们一个投资人Iotex
15:22 - 15:24
另外一个项目的代币Iotex呢
15:24 - 15:27
是一个已经上线币安好多年的老项目
15:29 - 15:31
所以呢奖励的也算是真金白银了
15:32 - 15:35
他们现在的全球免费节点呢
15:38 - 15:40
第一是保障了项目方的网络安全啊
15:41 - 15:44
是给我们普通参与者白嫖的机会
15:44 - 15:46
所以我们行业你去看大量的白嫖
15:52 - 15:56
CPU算力的这种硬件节点也有5,000多个
15:56 - 15:58
虽然说买硬件节点需要花钱啊
16:02 - 16:04
可以抵得上上百个软件节点
16:07 - 16:10
可以快速的搭建好他的去中心化网络
16:12 - 16:15
本来要放在一个中心化的银行里
16:16 - 16:18
毕竟呢人们对银行是有共识的
16:18 - 16:21
现在呢你的加密数据放在我去中
16:27 - 16:30
于是呢加密数据才能变成加密资产
16:32 - 16:34
把我们加密行业拉高了一个新的台阶
16:38 - 16:41
还是现在的任何一个Web3项目方
16:51 - 16:53
比特币拿出这样的一个解决方案之后
17:15 - 17:18
中本聪在人们对银行的恐惧中
17:22 - 17:25
不仅是对区块链产生时间的记录
17:25 - 17:28
更是对传统金融体系的无声控诉
17:28 - 17:30
那第一笔比特币交易的接收者呢
17:30 - 17:33
正是在DigiCash实习过的Hal Finney
17:36 - 17:38
收到中本聪发来的10个比特币时候
17:39 - 17:41
在Twitter上轻描淡写地写了一句嗯
17:46 - 17:49
后来呢成为了数字货币历史上
18:02 - 18:06
比特币就首次引起了美国政府的注意
18:07 - 18:09
遭到信用卡公司和银行封锁之后
18:14 - 18:18
独立在我们银行体系之外的货币
18:23 - 18:26
Churk随即就在新闻发布会上发出警告
18:26 - 18:29
说比特币是数字形式的洗钱工具
18:34 - 18:36
这维基解密收到的比特币哎
18:39 - 18:41
比特币只涨到了5,000美金一枚
18:52 - 18:54
那当年那个打击比特币的参议员啊
18:56 - 18:59
他已经变成民主党内为数不多的
18:59 - 19:03
坚挺支持加密货币的铁杆粉丝了
19:13 - 19:17
那2014年这场大战又得到了全面延续
19:20 - 19:22
全球最大的比特币交易所门头沟
19:27 - 19:31
这是当时全网比特币总额的7%啊
19:36 - 19:39
所以说他以保护资产的理由呢
20:17 - 20:20
发生了一件非常重要的制度性突破
20:20 - 20:23
也就是我们加密行业反击来了啊
20:25 - 20:28
和芝加哥期权交易所CBOE
20:33 - 20:36
不亚于现在的比特币上了现货ETF
20:37 - 20:39
让比特币从1,000美金
20:42 - 20:44
这个事件标志着比特币赢得了华尔街
20:51 - 20:54
从完全否定定义为洗钱工具
21:00 - 21:02
美国大学民主党拜登又上台了
21:06 - 21:08
对我们行业发起了全方位的围剿
21:08 - 21:12
他们试图通过监管呢来控制咱们行业
21:12 - 21:13
比如说在拜登政府的支持下
21:14 - 21:17
要求加密货币不可以有任何价值
21:23 - 21:25
我们在这期视频里面有详细讲过啊
21:28 - 21:31
导致我们行业现在命满天飞
21:32 - 21:35
而且呢人家还修改了会计准则啊
21:40 - 21:42
你就要准备价值一样多的现金
21:42 - 21:45
这下就把加密货币定义为债
21:46 - 21:48
你肯定要有现金资产做支撑啊
21:48 - 21:50
你说这法案多么的不公平啊
21:57 - 22:00
硬是凭借自己作为总统的一己之力
22:00 - 22:02
把这个逆天的规则还是保留着
22:04 - 22:06
在拜登执政期间被拉向了高潮啊
22:06 - 22:09
期间呢这SEC今天告这个
22:19 - 22:22
又重新拿回了总统二次就业
22:25 - 22:27
他上台之后有可能会扭转战局
22:28 - 22:31
完全有可能把这三战帮我们打完
22:34 - 22:36
虽然呢大漂亮也不是什么神仙啊
22:39 - 22:42
会对我们行业实施什么样的政策监管
22:42 - 22:44
但是总体的方向咱能把握吧
22:44 - 22:46
主要还不就是减少政府的过度监管
22:47 - 22:49
让公民有自由选择投资的权利
22:49 - 22:51
而且呢最近还有传言说这川普呢
22:53 - 22:56
加密货币的所有资本利得税
23:00 - 23:03
这三战的胜利果实有可能是巨大
23:03 - 23:07
没准是我们直接颠覆传统金融行业
23:15 - 23:17
我们加密货币直接取而代之啊
23:25 - 23:28
我们来回顾一下我们行业的百年历史
23:32 - 23:35
哈哈我们行业成为了军事的基建
23:40 - 23:42
加密最终成为了互联网的基建
23:45 - 23:48
他是否能成为金融行业的基建呢
23:54 - 23:57
背后是无数个从业者日日夜夜的奋斗
23:57 - 24:00
是无数个程序员日渐稀疏的秀发
00:00 - 00:01
You all know that.
00:01 - 00:03
Bitcoin has been around for 15 years
00:03 - 00:04
But you don't know
00:04 - 00:07
Our crypto industry is hundreds of years old
00:09 - 00:10
And you all know that.
00:10 - 00:11
In the past two years
00:11 - 00:12
What about our industry?
00:12 - 00:14
With the Biden administration
00:14 - 00:17
And the Democratic SEC fought many battles
00:17 - 00:18
But don't you know?
00:18 - 00:19
33 years ago
00:19 - 00:23
Biden has already been a killer for our industry
00:26 - 00:28
Today, let's sort it out.
00:28 - 00:30
The 100-year development of the shrimp industry
00:33 - 00:35
What about the starting point of our crypto industry?
00:35 - 00:37
You start with the First World War.
00:39 - 00:40
And before the First World War?
00:40 - 00:41
It can only be said that there is encryption technology
00:41 - 00:43
It cannot be said that there is a crypto industry
00:43 - 00:45
The reason why Germany was defeated in World War I
00:45 - 00:48
A key reason is that in 1917
00:48 - 00:51
A secret cable from Germany was intercepted
00:51 - 00:52
What about the content of this secret cable?
00:52 - 00:55
Germany wanted to invade the United States with Mexico
00:55 - 00:56
Look at this America
00:56 - 00:57
I don't want to fuck you.
00:57 - 00:59
You still want to join forces with other people to fuck me
00:59 - 01:01
Directly led the United States into the war
01:01 - 01:02
What about American involvement?
01:02 - 01:04
It also brought about the disastrous defeat of Germany
01:04 - 01:06
What about after the Germans suffered a big loss here?
01:06 - 01:07
Hey, I started thinking
01:07 - 01:10
How to solve the security problem of letters
01:10 - 01:12
So what happened in 1918?
01:12 - 01:13
The Germans invented one
01:14 - 01:15
Enigma's cipher machine
01:15 - 01:16
So what happened?
01:16 - 01:18
It was widely used by the German army.
01:18 - 01:19
It's sort of encryption.
01:19 - 01:21
Finding large-scale application scenarios for the first time
01:21 - 01:24
This led to the birth of the crypto industry
01:24 - 01:26
Now that's a classic technological development.
01:26 - 01:27
Technology brings productivity
01:27 - 01:28
Create value
01:28 - 01:30
As long as there is technology to create value
01:30 - 01:31
Must lead to war
01:31 - 01:33
So what about our rice industry?
01:33 - 01:35
He also ushered in his first war
01:35 - 01:36
What about this war?
01:36 - 01:37
It happened during World War II.
01:37 - 01:39
The crux of the war is encryption
01:39 - 01:41
You have to decrypt it.
01:41 - 01:43
The encryption and decryption wars broke out
01:43 - 01:46
Then in order to crack the Enigma code
01:46 - 01:48
So people invented the computer
01:48 - 01:50
This German Encryption
01:50 - 01:52
America's war on declassification?
01:52 - 01:54
And finally, it came to an end after World War II.
01:54 - 01:55
What happened after the war?
01:55 - 01:57
The president of the United States at the time
01:57 - 01:58
Blumen of the Democratic Party
01:58 - 02:01
Customized an export control regulation
02:01 - 02:03
The requirements are all military-related technologies
02:03 - 02:06
Both encryption and decryption will control the exit
02:06 - 02:07
After all, at that time
02:07 - 02:10
The crypto industry is entirely dedicated to the military market
02:10 - 02:12
So what about devices generated by encryption technology?
02:12 - 02:14
Also classified as munitions by the United States
02:15 - 02:16
Exports are severely restricted
02:16 - 02:17
Okay, encryption.
02:17 - 02:18
And after the First World War?
02:18 - 02:20
Technology has advanced again
02:24 - 02:25
What about some scientists?
02:25 - 02:27
And I started experimenting with encryption.
02:27 - 02:29
Applied to business
02:29 - 02:30
Like the 1960s, for example?
02:30 - 02:32
Financial Institutions Group Remittance Business
02:32 - 02:34
They were a bunch of scientists at IBM.
02:34 - 02:37
They developed a revolutionary encryption algorithm.
02:37 - 02:41
This was later known as the DES data encryption standard
02:41 - 02:42
After this is done
02:42 - 02:44
What about transfers between institutions?
02:44 - 02:46
It's actually completely encrypted.
02:46 - 02:48
But ah, it's halfway through.
02:48 - 02:51
NSA suddenly intervenes
02:51 - 02:53
Are they citing national security?
02:53 - 02:55
The key length of this encryption technology will be
02:55 - 02:58
From 128 bits to 56 bits
02:58 - 03:01
So what's the concept of this seemingly technical change?
03:02 - 03:06
Is to reduce the security of the algorithm by tens of thousands of bits
03:06 - 03:08
Reduced to the point where the government can brute force
03:08 - 03:10
What about the NSA?
03:10 - 03:12
It was founded during the Truman era
03:12 - 03:13
After all, they are Democrats
03:13 - 03:15
What I've been advocating is the big government model
03:15 - 03:16
Hope Multiple Tube
03:16 - 03:19
I'm afraid there will be out-point chaos in places that the government can't control
03:19 - 03:21
So in this external environment
03:21 - 03:23
Hey, the crypto industry is still ushering in development
03:23 - 03:24
But as we said at the beginning
03:24 - 03:26
As long as technology evolves
03:26 - 03:29
Once you start creating value, you will inevitably
03:30 - 03:32
This is the second development of our crypto industry
03:32 - 03:35
And soon his second war
03:37 - 03:39
This time it was started by Biden
03:39 - 03:40
What's going on?
03:40 - 03:41
Let's move on.
03:41 - 03:43
What about in the '90s?
03:43 - 03:44
The Cold War has just ended
03:44 - 03:47
But in the U.S., it's very popular.
03:47 - 03:50
And so there's computer-to-computer communication.
03:50 - 03:52
That is, the transmission of our user data
03:52 - 03:54
As for the user's data, just send it out.
03:54 - 03:55
To protect personal privacy
03:55 - 03:57
In fact, encryption technology is used
03:57 - 04:00
Then Biden jumped out and declared war
04:00 - 04:02
1991 Eastern United States Washington
04:02 - 04:03
What about that time?
04:03 - 04:05
He's still just a member of the Senate
04:05 - 04:06
He acts as the initiator
04:06 - 04:10
They introduced a very reactionary bill, S. 266.
04:10 - 04:13
Comprehensive Crime Act 1991
04:13 - 04:14
Section 1,126 of the Act
04:14 - 04:15
clear requirements
04:15 - 04:20
Electronic communication service providers and equipment manufacturers
04:20 - 04:21
The obligation to ensure
04:21 - 04:25
Governments can access the plaintext content of encrypted communications
04:25 - 04:27
That is to say, 33 years ago
04:27 - 04:29
Tyden is already in the name of anti-crime
04:29 - 04:31
Ask to interpret citizens?
04:31 - 04:33
Privacy on the computer
04:33 - 04:33
But it's okay.
04:33 - 04:35
And the president of the United States was not a Republican.
04:35 - 04:38
The bill didn't get passed.
04:38 - 04:39
It died in the womb.
04:39 - 04:41
And what about some experts in academia at the time?
04:41 - 04:42
Also jumped out against
04:42 - 04:43
What about the encryption system?
04:43 - 04:44
It's either safe.
04:44 - 04:46
It's either not safe.
04:46 - 04:48
There is no such thing as protecting user security
04:48 - 04:49
Can you still let your government see it?
04:49 - 04:51
There is no intermediate state
04:51 - 04:52
The Second World War
04:52 - 04:53
Since Biden has attacked
04:53 - 04:55
The crypto industry must be fighting back.
04:55 - 04:57
What about those in the crypto industry at that time?
04:57 - 04:59
Each launched a variety of actions
04:59 - 05:01
Coping with this crypto war
05:01 - 05:03
When Biden was campaigning for this bill
05:03 - 05:05
Colorado in the middle of America.
05:06 - 05:07
There is a programmer
05:07 - 05:09
It's Phil Zimmerman
05:09 - 05:11
He's leading a quiet revolution.
05:11 - 05:14
He developed a software called PGP.
05:16 - 05:16
What about this software?
05:16 - 05:18
It can be used by ordinary people
05:18 - 05:20
Military grade encryption
05:20 - 05:20
What about this guy?
05:20 - 05:22
It was being developed at the time
05:22 - 05:22
Suddenly heard
05:22 - 05:25
Oops, why is there an S266 bill?
05:25 - 05:26
Does he realize?
05:26 - 05:28
He has to do this before the bill is passed
05:28 - 05:30
Just complete the development of this PGP
05:30 - 05:32
He believes that as long as he develops it fast enough
05:32 - 05:35
Biden's restraining order can't catch up with him
05:35 - 05:36
What about his software?
05:36 - 05:37
Can you give it to the inside of the United States?
05:37 - 05:39
Provide some commercial value
05:39 - 05:41
Safeguarding the privacy of American users
05:41 - 05:41
It's worth mentioning.
05:41 - 05:43
Is Isai successful?
05:43 - 05:45
It solves the problem of American users.
05:45 - 05:47
And then he did something even more extraordinary.
05:47 - 05:49
Directly put his software to serve people around the world
05:49 - 05:51
Know that no matter what software you develop
05:51 - 05:52
As long as the US government
05:52 - 05:54
Define your software as encryption software
05:54 - 05:56
He is the munitions
05:56 - 05:56
Can't export
05:56 - 05:58
Can't go global
05:58 - 05:59
Then face this obstacle
05:59 - 06:01
This guy came up with a genius idea
06:01 - 06:04
I put my PGP code hey
06:04 - 06:05
I print it into a book
06:05 - 06:09
I publish, you don't restrict the export of my books, do you?
06:09 - 06:10
What about this?
06:10 - 06:11
Just behind it.
06:11 - 06:14
Very famous Zimmerman event
06:14 - 06:17
According to the First Amendment to the U.S. Constitution
06:17 - 06:18
What about publications?
06:18 - 06:19
It is protected by freedom of speech
06:19 - 06:21
It's completely exportable.
06:21 - 06:23
The software is under the control of your government
06:23 - 06:25
There are no restrictions on publications and books.
06:25 - 06:26
Export at will
06:26 - 06:27
The result is also very good.
06:27 - 06:28
This one looks like
06:28 - 06:30
Some pretty obscure technical stuff.
06:30 - 06:31
It spread around the world.
06:31 - 06:33
Programmers from all over the world
06:33 - 06:34
They all bought this book
06:34 - 06:37
What about the printed code? Re-enter it into the computer
06:37 - 06:40
Everybody's got one of these encryption programs.
06:40 - 06:42
Except this guy is declaring war
06:42 - 06:43
Does he still have it?
06:43 - 06:45
Or Berkeley, California.
06:45 - 06:47
There's also a bunch of crypto geeks.
06:47 - 06:49
What was the topic they were discussing at that time?
06:49 - 06:53
Focusing on protecting users' privacy with cryptography
06:53 - 06:54
And what resonates in the digital age
06:54 - 06:57
The topic of information security and freedom of expression
06:57 - 06:57
What about these topics?
06:57 - 07:00
And it became known as cyberpunk.
07:00 - 07:04
The Cypherpunk movement caused quite a stir at the time.
07:05 - 07:07
This movement released a Cypherpunk Manifesto.
07:08 - 07:09
This declaration solemnly states that
07:09 - 07:11
If we want privacy
07:11 - 07:14
Then we must safeguard our privacy
07:14 - 07:15
So what about all of the above?
07:15 - 07:17
They are all practitioners in our crypto industry
07:17 - 07:19
The challenge for Biden to start this war
07:19 - 07:20
What about this battle?
07:20 - 07:21
What did you get in exchange?
07:21 - 07:23
In exchange, the Democratic Party's crazy revenge
07:23 - 07:26
After Biden's legislative failure in 1993
07:26 - 07:28
The Democratic Clinton Administration
07:28 - 07:30
I've come up with a new way to mess with us
07:30 - 07:31
That's the encryption chip.
07:31 - 07:33
Clipper chip? What about this chip?
07:33 - 07:35
It was developed by the NSA.
07:35 - 07:38
Any computer made with this chip
07:38 - 07:41
The above voice and data can be intercepted by the government
07:41 - 07:42
And decoding
07:42 - 07:43
Is this set logical?
07:43 - 07:47
Same as the current CBDC pushed by the Biden administration
07:47 - 07:47
The main function?
07:47 - 07:49
It is to monitor the transfer of each user.
07:49 - 07:51
Therefore, better management is implemented
07:51 - 07:51
What about this idea?
07:51 - 07:52
They think it's great.
07:52 - 07:53
The idea is beautiful
07:53 - 07:55
But if nothing else
07:55 - 07:56
Accident is coming.
07:56 - 07:58
In June 1994
07:58 - 08:01
AT & T researcher Matt Blaze published a paper
08:01 - 08:02
Does he prove it?
08:03 - 08:06
Clipper ship security is useless
08:06 - 08:08
The thesis logic is very clear
08:08 - 08:09
The proof is good
08:10 - 08:13
Directly put the government in an awkward position
08:13 - 08:14
So what about behind NTMT?
08:14 - 08:17
Also gave up the plan to purchase this chip
08:17 - 08:18
What about this chip?
08:18 - 08:20
It was also stopped in 1996
08:21 - 08:23
The Democrats' revenge is coming
08:23 - 08:25
But revenge is not revenge
08:25 - 08:27
Instead, it was the first time that the public became aware of it clearly
08:27 - 08:30
This government-controlled encryption system won't work
08:30 - 08:31
He doesn't have that level
08:31 - 08:32
That won't work
08:32 - 08:33
Let's do it again.
08:33 - 08:34
What about this trick?
08:34 - 08:36
Let's start with an old friend of ours
08:36 - 08:37
There was a video before.
08:37 - 08:38
We were talking about the dot-com bubble.
08:38 - 08:40
Mentioned a well-known company
08:40 - 08:42
It's A16Z boss Anderson
08:42 - 08:46
He started out with a company called Netscape.
08:46 - 08:46
What about then?
08:46 - 08:48
Netscape has a lot of users.
08:48 - 08:50
They go online with a browser.
08:50 - 08:51
Shopping online
08:51 - 08:52
When shopping
08:52 - 08:55
To fill out their Card Security Code
08:55 - 08:56
In order to protect users, Netscape
08:56 - 08:58
What about the Card Security Code?
08:58 - 09:00
They developed an encryption protocol called SSL
09:00 - 09:02
But the U.S. bill at that time was
09:02 - 09:06
Do you have any keys longer than 40 bits?
09:06 - 09:07
What about this encryption code?
09:07 - 09:08
It's all munitions.
09:08 - 09:09
Can't export
09:09 - 09:10
After you do
09:10 - 09:12
You need to apply for a license.
09:13 - 09:16
Netscape had to do that.
09:16 - 09:16
Two versions?
09:16 - 09:17
What about the first version?
09:17 - 09:20
Is to use a 128-bit reinforced password
09:20 - 09:22
This can't be exported.
09:22 - 09:23
Only for US citizens
09:23 - 09:23
There is another one.
09:23 - 09:24
Call the international version
09:24 - 09:26
The international version of the browser
09:26 - 09:28
Only 40-digit encrypted passwords can be used
09:28 - 09:30
What about this double standard?
09:30 - 09:32
It soon proved to be catastrophic
09:32 - 09:33
Not reliable at all
09:33 - 09:34
Why is that?
09:34 - 09:36
Because the French students spent 8 days
09:36 - 09:38
I deciphered the 40-bit SSL.
09:39 - 09:40
That's no problem.
09:40 - 09:42
The US government has restricted encryption
09:42 - 09:45
As a result, the email information of ordinary people was leaked
09:45 - 09:48
And it shocked the business world.
09:48 - 09:50
The Netscape engineers were furious.
09:50 - 09:53
Directly and publicly say that this is the result of the government's blind management
09:53 - 09:55
They're not protecting security.
09:55 - 09:57
It's creating loopholes
09:57 - 10:00
The conflict between encryption technology and the Democratic government?
10:00 - 10:01
When there is a lot of trouble
10:01 - 10:03
One of the justices of the United States has stood up.
10:03 - 10:05
The Democratic Party had just started governing.
10:05 - 10:06
The judge at that time?
10:06 - 10:09
Most of them were appointed under Li Gen and Bush Sr.
10:09 - 10:10
A conservative attitude
10:10 - 10:12
So, under the impetus of the justices
10:12 - 10:15
The U.S. Supreme Court first ruled in 1996
10:15 - 10:16
What about computer code?
10:16 - 10:18
Is protected by the First Amendment to the Constitution
10:18 - 10:20
It's a form of speech
10:21 - 10:23
It is a milestone for our industry
10:23 - 10:25
Judgment, you are not for military use anymore
10:25 - 10:27
Then you can popularize it.
10:27 - 10:27
So what about this?
10:27 - 10:29
Helping the crypto industry
10:29 - 10:30
Hey, won a small step
10:31 - 10:33
And the winner was still 1999.
10:33 - 10:35
Clinton can't hold on
10:35 - 10:37
It was cancelled. It was in name only
10:37 - 10:39
Encryption Technology Export Control Act
10:39 - 10:41
So the outcome of this war
10:41 - 10:43
The crypto industry has won outright
10:43 - 10:43
What about encryption?
10:43 - 10:46
It has also become the core infrastructure of the Internet
10:46 - 10:49
What about PGP becoming the encryption standard for email?
10:51 - 10:53
Protect all online transactions
10:57 - 10:58
We all know that.
10:58 - 11:00
What about the results of the first two wars?
11:00 - 11:02
Just let our encryption technology
11:02 - 11:06
Stay in the stage of protecting information security online
11:06 - 11:08
An encrypted message can only be a message
11:08 - 11:10
Can't it be called a cryptoasset?
11:10 - 11:13
We want to turn virtual data and virtual information into assets
11:13 - 11:14
There is progress in the middle
11:15 - 11:17
Let's go back in time to 1994.
11:18 - 11:20
A group of cypherpunks
11:20 - 11:21
What did they discuss?
11:21 - 11:23
Here's a more subversive idea.
11:24 - 11:24
Digital Currency
11:24 - 11:27
The real reason why governments control encryption
11:27 - 11:28
Just want to control the money
11:28 - 11:31
What if we create an uncontrolled currency?
11:31 - 11:33
That's the real crypto revolution.
11:33 - 11:35
With the Amsterdam conference?
11:35 - 11:36
It started a bud.
11:36 - 11:38
After that, a series of pioneering
11:38 - 11:39
Ideas emerge.
11:39 - 11:42
For example, Adam buck invented hashed cash in '97
11:42 - 11:44
This software was originally developed
11:44 - 11:46
Is used to combat email spam
11:46 - 11:48
However, in the programming thinking of this software
11:48 - 11:51
People use the concept of proof of work
11:52 - 11:54
They also wrote a white paper in 2002
11:54 - 11:57
The buds of POW are starting to appear
11:57 - 11:58
Then go back
11:58 - 12:01
In 1998, David published a B-money proposal
12:01 - 12:02
Who is David?
12:02 - 12:05
Definitely a Chinese light in our crypto industry
12:05 - 12:06
Because of the B-money proposal?
12:06 - 12:07
Is the first complete
12:07 - 12:10
Describe a distributed digital currency system
12:10 - 12:12
What about distributed plus proof-of-work?
12:12 - 12:14
It's the very familiar Pow behind us.
12:14 - 12:15
What about David?
12:15 - 12:18
He was also one of the first two people to be contacted by Satoshi Nakamoto
12:18 - 12:19
What about his contribution?
12:19 - 12:20
Very important.
12:20 - 12:22
So many years later
12:22 - 12:23
Vitalik, the founder of Ethereum
12:23 - 12:27
The smallest unit of Ethereum is named Wei.
12:27 - 12:29
It is to express my high respect for David
12:29 - 12:30
But no matter how sublime it is
12:30 - 12:32
It's an intermediate state.
12:32 - 12:34
Encrypted information still hasn't become cryptocurrency
12:34 - 12:35
Develop from the future
12:35 - 12:38
Between 1998 and 2005
12:38 - 12:40
There's a guy named Nick Sabo
12:40 - 12:42
He came up with the big god idea
12:43 - 12:46
It not only integrates proof-of-work and value storage
12:46 - 12:47
Cleverly put together
12:47 - 12:50
It also proposed a smart contract
12:50 - 12:51
Revolutionary concept
12:51 - 12:51
Did he become
12:51 - 12:53
Hey, he didn't make it either.
12:53 - 12:54
The work of these pioneers
12:54 - 12:57
It seems that they are all touching the edge of their dreams
12:58 - 13:01
All missing the last piece of the puzzle
13:01 - 13:04
How can we achieve this without a centralized authority?
13:04 - 13:07
Let all participants reach a consensus on the transaction
13:07 - 13:10
That's a question that's puzzled cryptographers for 20 years.
13:11 - 13:12
If consensus cannot be established
13:12 - 13:15
This encrypted data is always just data.
13:15 - 13:16
Can't change at all
13:16 - 13:20
Assets until October 31, 2008
13:20 - 13:22
A mysterious figure under the pseudonym Satoshi Nakamoto
13:22 - 13:24
On the cryptography mailing list
13:24 - 13:26
Published a white paper on Bitcoin
13:26 - 13:26
What about this plan?
13:26 - 13:29
It's a clever integration of the leading areas up ahead
13:29 - 13:32
They adopted Hashcash's proof-of-work system
13:32 - 13:35
Ah, borrowing the decentralized design concept of b money
13:35 - 13:38
Merkle tree is also used for transaction verification
13:38 - 13:40
Knead together this new system
13:40 - 13:42
Solved all the problems before death
13:42 - 13:45
That's how to do it in a fully decentralized environment.
13:46 - 13:47
Reach consensus
13:47 - 13:49
Okay, so this technological advance is very important.
13:50 - 13:52
We still have a large number of crypto projects
13:52 - 13:55
It has to be done in a decentralized way.
13:55 - 13:56
To achieve its consensus accumulation
13:56 - 13:58
Including what we now hear about oops
13:58 - 14:00
A project is zero
14:00 - 14:01
Let you build the node
14:02 - 14:03
What about these words?
14:03 - 14:05
In fact, it is to guide everyone.
14:05 - 14:06
Let's build this together
14:06 - 14:08
A decentralized verification network
14:08 - 14:11
In order to solve the consensus problem of these projects
14:11 - 14:12
No consensus
14:12 - 14:15
The assets it issues are just data loss assets
14:15 - 14:17
That's why.
14:17 - 14:19
Our industry has given us a lot of small white users.
14:19 - 14:20
Some 0 opportunities
14:20 - 14:21
Like recently?
14:21 - 14:23
We have a top gifter, Dad
14:24 - 14:25
What about this project?
14:25 - 14:28
In order to build an AI-usable two-layer network
14:28 - 14:29
What about his chain?
14:29 - 14:32
It is to assist AI developers around the world
14:32 - 14:34
Reasoning training at scale
14:34 - 14:36
Or validate their models
14:36 - 14:37
What about a project like that?
14:37 - 14:39
It requires a large number of decentralized nodes
14:39 - 14:40
What about countless nodes?
14:40 - 14:42
Make up its final computing network
14:42 - 14:43
Then this network
14:43 - 14:45
To help AI projects run some models
14:46 - 14:48
You said if he was a project in another industry
14:48 - 14:49
Then you don't need to do it at all.
14:49 - 14:51
Because he has achieved 5.50 million
14:51 - 14:53
Dollar seed round financing?
14:53 - 14:55
Investment institutions are very hardcore
14:55 - 14:57
Includes SNZ water drop IoT
14:57 - 14:59
And they have very strong financing capabilities
14:59 - 15:00
Doing a new round of financing
15:00 - 15:01
Raised so much capital
15:01 - 15:02
Such a project
15:02 - 15:03
In our industry
15:03 - 15:05
You still have to deploy decentralized nodes.
15:05 - 15:08
As for the user, just go to his official website.
15:08 - 15:10
You can apply, I want to be a node.
15:10 - 15:11
Start running for free
15:11 - 15:12
It costs nothing.
15:12 - 15:13
Just dry it.
15:13 - 15:15
What about rewarding users for becoming nodes?
15:15 - 15:15
What about this project?
15:15 - 15:17
Reward users?
15:17 - 15:20
One is to reward the tokens issued by their own project
15:20 - 15:20
Can you also reward?
15:20 - 15:22
They are an investor in Iotex.
15:22 - 15:24
What about the token Iotex of another project?
15:24 - 15:27
It is an old project that has been listed on Binance for many years
15:27 - 15:29
The currency price is still relatively good.
15:29 - 15:31
So, the reward is also considered real money
15:32 - 15:32
With this reward
15:32 - 15:35
What about their current global free node?
15:35 - 15:36
It has reached more than 500,000
15:36 - 15:38
And that's because of this mechanism.
15:38 - 15:40
The first is to ensure the cyber security of the project party.
15:41 - 15:44
It's a chance for us regular participants to use it for nothing
15:44 - 15:46
So in our industry, you can see a lot of useless use.
15:46 - 15:47
Today this is for nothing.
15:47 - 15:48
Tomorrow, Bai Lu
15:48 - 15:50
Is it but buying hardware?
15:50 - 15:52
Help them provide some.
15:52 - 15:56
There are also more than 5,000 such hardware nodes for CPU computing power
15:56 - 15:58
Although it costs money to buy hardware nodes?
15:58 - 15:59
They're about 900 dollars each.
15:59 - 16:02
But what about the benefits of hardware nodes?
16:02 - 16:04
That's worth hundreds of software nodes.
16:04 - 16:05
So we can see
16:05 - 16:06
Under this incentive
16:06 - 16:07
What about the project team?
16:07 - 16:10
It can quickly set up its decentralized network
16:10 - 16:11
Keep his network safe
16:11 - 16:12
Your encrypted data
16:12 - 16:15
It was supposed to be in a centralized bank
16:15 - 16:16
To become money
16:16 - 16:18
After all, people have a consensus about banks
16:18 - 16:21
Now your encrypted data is in my bag.
16:21 - 16:23
The heart can become money on the Internet
16:23 - 16:25
My decentralized network
16:25 - 16:27
A new consensus system has been established
16:27 - 16:30
So encrypted data can be turned into encrypted assets
16:30 - 16:32
This technological advance
16:32 - 16:34
It has taken our crypto industry to the next level.
16:34 - 16:36
Create new value
16:36 - 16:37
So we can see
16:37 - 16:38
No matter it was Bitcoin back then
16:38 - 16:41
Or any of the current three web projects
16:41 - 16:43
Your essence is cryptoassets
16:43 - 16:45
Is to solve the consensus mechanism
16:45 - 16:46
No consensus mechanism
16:46 - 16:48
You're basically encrypted data.
16:48 - 16:50
Unable to make cryptoassets
16:51 - 16:53
After Bitcoin came up with such a solution
16:53 - 16:55
Put your white hands here
16:55 - 16:57
I didn't expect God to help me too
16:57 - 16:57
We all know that.
16:57 - 16:59
A month before the launch of bitcoin
16:59 - 17:01
Lehman Brothers collapsed
17:02 - 17:04
The global financial crisis broke out in full force
17:05 - 17:06
People start to question
17:06 - 17:08
Your bank is unreliable.
17:08 - 17:10
The traditional financial system is unstable.
17:10 - 17:12
You see someone passing a pillow when you are asleep
17:12 - 17:14
January 3, 2009
17:14 - 17:15
Bitcoin genesis block was born
17:15 - 17:18
Satoshi Nakamoto in People's Fear of Banks
17:18 - 17:20
Wrote a sentence like this
17:20 - 17:20
What about this sentence?
17:20 - 17:22
This is from the Times.
17:22 - 17:25
It is not just a record of the time when the blockchain was generated
17:25 - 17:28
It is a silent indictment of the traditional financial system
17:28 - 17:30
What about the recipient of the first bitcoin transaction?
17:30 - 17:33
It was Hal Finney who interned at DigiCash
17:33 - 17:34
Where was he?
17:34 - 17:36
In January 2009
17:36 - 17:38
When receiving 10 bitcoins from Satoshi Nakamoto
17:39 - 17:41
And he wrote on Twitter, hmm.
17:41 - 17:43
Running bitcoin
17:43 - 17:44
But he didn't expect
17:44 - 17:46
It was just a normal tweet.
17:46 - 17:49
Later, it became a currency several times in history
17:49 - 17:51
One of the most famous records
17:51 - 17:52
Technology has advanced.
17:52 - 17:54
Bitcoin has been created
17:55 - 17:56
What's coming?
17:56 - 17:58
The third encryption war is coming
18:02 - 18:06
Bitcoin first attracted the attention of the US government
18:06 - 18:07
WikiLeaks is in
18:07 - 18:09
After being blocked by credit card companies and banks
18:09 - 18:12
Start accepting donations in bitcoin
18:12 - 18:14
This time let the world realize wow
18:14 - 18:14
There is another
18:14 - 18:18
A currency independent of our banking system
18:18 - 18:19
And he's uncensored.
18:20 - 18:22
Good guy is awesome
18:22 - 18:23
What about the National Senator?
18:23 - 18:26
Track immediately issued a warning at the press conference
18:26 - 18:29
Bitcoin is a digital form of money laundering
18:29 - 18:30
This is the U.S. government.
18:30 - 18:32
The first public statement on bitcoin
18:32 - 18:34
However, by 2017
18:34 - 18:36
The bitcoin received by WikiLeaks
18:36 - 18:39
This returns more than 500 times
18:39 - 18:39
At that time
18:39 - 18:41
Bitcoin only rose to $5,000 each
18:41 - 18:42
How much is it today?
18:42 - 18:44
90,000 dollars today
18:44 - 18:46
WikiLeaks dares to take the coin now
18:46 - 18:48
10,000 times the return
18:48 - 18:50
A dollar becomes 10,000 dollar
18:50 - 18:52
That's a 10,000-fold increase.
18:52 - 18:54
And the senator who cracked down on Bitcoin?
18:54 - 18:56
Su Mo has changed now
18:56 - 18:59
He has become one of the few in the Democratic Party
18:59 - 19:03
Diehard fans of cryptocurrency
19:05 - 19:07
You see, justice can be late.
19:07 - 19:09
But never absent
19:09 - 19:11
Okay, what if this incident
19:11 - 19:13
This is the beginning of the third encryption war
19:13 - 19:17
Then in 2014, the war was fully extended
19:17 - 19:17
What about this war?
19:17 - 19:19
Very bad for our industry
19:19 - 19:20
At that time
19:20 - 19:22
The world's largest bitcoin exchange, Mentougou
19:22 - 19:23
suddenly closed
19:23 - 19:26
850,000 bitcoins disappeared into thin air
19:26 - 19:27
What concept 850,000?
19:27 - 19:31
That was seven percent of all the bitcoins on the network.
19:31 - 19:32
Where will it be?
19:32 - 19:33
President of the United States or Obama
19:33 - 19:35
And a Democrat?
19:35 - 19:36
Democrats want to protect, right?
19:36 - 19:39
So he did it for the reason of protecting assets?
19:39 - 19:41
Start strengthening the regulation of the crypto industry
20:10 - 20:12
The Democratic Party was in power at that time
20:12 - 20:14
Trump pressed the pause button
20:14 - 20:16
During the transition in 2017
20:16 - 20:17
Trump administration
20:17 - 20:20
A very important institutional breakthrough has taken place
20:20 - 20:23
That is, our crypto industry fought back.
20:23 - 20:25
Chicago Mercantile Exchange CME
20:25 - 20:28
And the Chicago Board Options Exchange CBOE
20:28 - 20:30
Launched futures contracts for bitcoin
20:30 - 20:31
At that time
20:31 - 20:33
Under that battle situation?
20:33 - 20:36
No less than the current bitcoin on the spot ETF
20:36 - 20:37
Just this trick
20:37 - 20:39
Let Bitcoin start from $1,000
20:39 - 20:42
Soaring to $20,000
20:42 - 20:44
This event marks Bitcoin's victory over Wall Street
20:44 - 20:46
He started as an asset
20:46 - 20:48
Adopted by the Wall Street elite
20:48 - 20:49
What about regulation? With this incident
20:49 - 20:51
Subtle changes began to take place
20:51 - 20:54
From a completely negative definition to a money laundering tool
20:54 - 20:56
Turning to try to understand and regulate
20:57 - 20:58
But it didn't last.
20:58 - 21:00
In 2020, we all know
21:00 - 21:02
American University Democrat Biden is back in office
21:02 - 21:03
As soon as Biden came to power
21:03 - 21:05
It brought these three battles to a climax
21:05 - 21:06
During his reign
21:06 - 21:08
Launched an all-round encirclement and suppression of our industry
21:08 - 21:12
They are trying to control our industry through regulation
21:12 - 21:13
For example, with the support of the Biden administration
21:13 - 21:14
What about the SEC?
21:14 - 21:17
Cryptocurrences must not have any value
21:17 - 21:19
Haha, as long as you have value.
21:19 - 21:20
You could be a security
21:21 - 21:22
If you are a security, you are breaking the law
21:22 - 21:23
What about this part?
21:23 - 21:25
We talked about it in detail in this video.
21:25 - 21:27
What's at stake?
21:27 - 21:28
It is precisely because of this policy
21:28 - 21:31
As a result, our industry is now full of life
21:31 - 21:32
The value coin is reversed
21:32 - 21:35
And they also changed the accounting standards?
21:36 - 21:37
All holdings are required to add
21:37 - 21:38
Cryptocurrency institutions
21:38 - 21:40
You only need to hold cryptocurrency
21:40 - 21:42
You need to prepare the same amount of cash.
21:42 - 21:45
This defines cryptocurrency as debt
21:45 - 21:46
You hold so much debt
21:46 - 21:48
You must be backed by cash assets.
21:48 - 21:50
You say how unfair this bill is?
21:50 - 21:52
This discerning person can't pass it
21:52 - 21:53
So we can see
21:53 - 21:55
Originally, what about the Senate and House of Representatives?
21:55 - 21:55
What about this proposal?
21:55 - 21:57
Are about to be pushed down
21:57 - 22:00
By his own efforts as president
22:00 - 22:02
Keep this heaven-defying rule
22:02 - 22:04
So what about this war?
22:04 - 22:06
Was pulled to a climax during the Biden administration?
22:06 - 22:09
During the period, the SEC sued this today
22:09 - 22:10
Report that tomorrow
22:10 - 22:11
What's forcing Anya Reb?
22:12 - 22:14
Fortunately, we are now in a turning point
22:14 - 22:15
What about these three battles?
22:15 - 22:17
I thought the crypto industry was going to lose
22:17 - 22:18
But what about Trump?
22:18 - 22:19
Now with the support of the crypto industry
22:19 - 22:22
Reclaiming the president's second job
22:22 - 22:23
And this time the team
22:24 - 22:25
All support encryption
22:25 - 22:27
When he comes to power, he may turn the tide of the war
22:27 - 22:28
During his tenure
22:28 - 22:31
It is entirely possible to help us finish these three battles
22:31 - 22:33
And let the crypto industry win beautifully
22:34 - 22:36
Although it is beautiful, it is not a fairy.
22:36 - 22:38
I can't be specific.
22:38 - 22:39
During his tenure
22:39 - 22:42
What kind of policies and regulations will be implemented on our industry?
22:42 - 22:44
But we can grasp the overall direction
22:44 - 22:46
The main thing is to reduce excessive government regulation
22:46 - 22:47
At the same time
22:47 - 22:49
Allow citizens to freely choose their investments
22:49 - 22:51
And there have been rumors recently that Trump
22:51 - 22:53
Ready to cancel the issuance of US companies
22:53 - 22:56
All capital gains taxes on cryptocurrencies
22:56 - 22:57
What if that's the case?
22:58 - 22:58
What about these three battles?
22:58 - 22:59
We're going to win.
22:59 - 23:00
Not only is it a win
23:00 - 23:03
The fruits of victory in these three battles could be huge
23:03 - 23:07
Maybe we will directly disrupt the traditional financial industry
23:08 - 23:09
Commodity futures
23:09 - 23:11
Step aside and think bigger
23:11 - 23:13
Maybe what currency?
23:13 - 23:14
The dollar is on the sidelines.
23:15 - 23:17
Our cryptocurrency will directly replace it.
23:17 - 23:20
And of course, I was right.
23:24 - 23:25
What about the end of the video?
23:25 - 23:28
Let's take a look back at the century-old history of our industry
23:28 - 23:29
Developed for 100 years
23:29 - 23:30
They fought three wars.
23:30 - 23:31
The First Crypto War
23:31 - 23:32
Crypto narrowly wins
23:32 - 23:35
Haha, our industry has become the infrastructure of the military.
23:37 - 23:38
Second Crypto War
23:38 - 23:39
Crypto wins big
23:40 - 23:42
Encryption eventually became the bedrock of the Internet.
23:44 - 23:45
Third Crypto War
23:45 - 23:48
Can he become the infrastructure of the financial industry?
23:48 - 23:48
What about this question?
23:48 - 23:50
And I want to leave you with this thought.
23:50 - 23:52
But regardless of the final outcome
23:52 - 23:53
We all saw it.
23:53 - 23:54
100 years of development
23:54 - 23:57
Behind it is the hard work of countless practitioners day and night
23:57 - 24:00
It's the thinning hair of countless programmers
24:00 - 24:02
It's the work of generations.
24:02 - 24:04
It's all of us here.
24:04 - 24:06
The desire for technological progress
24:06 - 24:06
Since ancient times
24:06 - 24:09
the fragrance of plum blossoms comes from bitter cold
24:09 - 24:10
What about the path to victory?
24:10 - 24:12
It needs to be done step by step.
24:12 - 24:14
Fortunately, I have you along the way.