00:00 - 00:01

各位都知道呢

00:01 - 00:03

比特币出现了15年

00:03 - 00:04

但是各位不知道

00:04 - 00:07

我们加密行业已经有上百年的历史了

00:09 - 00:10

那各位也都知道

00:10 - 00:11

在过去的两年

00:11 - 00:12

我们行业呢

00:12 - 00:14

在跟拜登政府

00:14 - 00:17

以及民主党的SEC进行了多次大战

00:17 - 00:18

但是各位不知道啊

00:18 - 00:19

在33年前

00:19 - 00:23

拜登其实早已经对我们行业痛下杀手

00:26 - 00:28

今天呢咱们就来梳理一下

00:28 - 00:30

加密行业的百年发展

00:33 - 00:35

要说咱们加密行业的起点呢

00:35 - 00:37

还要从一战的时候开始说

00:39 - 00:40

在一战之前呢

00:40 - 00:41

只能说有加密技术

00:41 - 00:43

不能说有加密行业

00:43 - 00:45

德国在一战之所以战败

00:45 - 00:48

有一个关键性的原因就是1917年的时候

00:48 - 00:51

德国的一封密电被截获了

00:51 - 00:52

这密电的内容呢

00:52 - 00:52

写的是

00:52 - 00:55

德国想要拉拢墨西哥一起入侵美国

00:55 - 00:56

这美国一看

00:56 - 00:57

我不想干你

00:57 - 00:59

你还想联合其他人干我

00:59 - 01:01

直接导致了美国参与战争

01:01 - 01:02

那美国的参与呢

01:02 - 01:04

也带来了德国的惨败

01:04 - 01:06

那德国人在这吃了个大亏之后呢

01:06 - 01:07

哎就开始思考

01:07 - 01:10

怎么样去解决信件的安全问题

01:10 - 01:12

于是在1918年呢

01:12 - 01:13

德国人就发明了一个

01:14 - 01:15

恩尼格玛的密码机

01:15 - 01:16

后来呢

01:16 - 01:18

这个机器被德国军队广泛采用啊

01:18 - 01:19

也算是加密技术

01:19 - 01:21

第一次找到大规模的应用场景

01:21 - 01:24

从而带动了加密行业的诞生

01:24 - 01:26

那这是典型的科技发展

01:26 - 01:27

科技带来生产力

01:27 - 01:28

创造价值

01:28 - 01:30

只要有科技创造价值

01:30 - 01:31

必定引发战争

01:31 - 01:33

于是呢我们加密行业啊

01:33 - 01:35

也迎来了他的第一次战争

01:35 - 01:36

这次战争呢

01:36 - 01:37

发生在二战时期

01:37 - 01:39

战争的重点呢就是人家加密

01:39 - 01:41

你得解密啊

01:41 - 01:43

加密和解密的战争就此爆发

01:43 - 01:46

那为了破解这恩尼格玛密码

01:46 - 01:48

计于是人们发明了计算机

01:48 - 01:50

这场德国搞加密

01:50 - 01:52

美国搞解密的战争啊

01:52 - 01:54

最终呢是在二战结束后也落幕了

01:54 - 01:55

那战争的结果呢

01:55 - 01:57

就是当时的美国总统

01:57 - 01:58

民主党的杜鲁门

01:58 - 02:01

定制了一个出口管制法规

02:01 - 02:03

要求呢就是凡是与军事有关的技术

02:03 - 02:06

不管是加密和解密都会控制出口

02:06 - 02:07

毕竟呢在那个时候

02:07 - 02:10

加密行业呢完全服务于军事市场

02:10 - 02:12

所以说加密技术产生的设备呢

02:12 - 02:14

也被美国列为军需品

02:15 - 02:16

被严格的限制出口

02:16 - 02:17

好呢加密

02:17 - 02:18

一战结束之后呢

02:18 - 02:20

科技又发展了

02:24 - 02:25

有些科学家呢

02:25 - 02:27

开始尝试把这加密技术

02:27 - 02:29

应用到商业领域

02:29 - 02:30

例如说1960年代啊

02:30 - 02:32

金融机构的汇款业务

02:32 - 02:34

当时是IBM的一群科学家

02:34 - 02:37

他们开发了一种革命性的加密算法啊

02:37 - 02:41

这就是后来著名的DES数据加密标准

02:41 - 02:42

这个事干好了之后

02:42 - 02:44

机构之间的转账呢

02:44 - 02:46

其实就是完全的加密了

02:46 - 02:48

但是啊这事干到一半呢

02:48 - 02:51

美国国家安全局NSA忽然介入

02:51 - 02:53

他们以国家安全为由呢

02:53 - 02:55

将这个加密技术的密钥长度

02:55 - 02:58

从128位缩减到56位

02:58 - 03:01

那这个看似技术性的改动什么概念呢

03:01 - 03:02

实际上

03:02 - 03:06

是让算法的安全性降低了数万位

03:06 - 03:08

降低到政府可以暴力破解

03:08 - 03:10

那这个国家安全局呢

03:10 - 03:12

就是杜鲁门时期成立的

03:12 - 03:13

毕竟人家民主党嘛

03:13 - 03:15

一直提倡的呢就是大政府模式

03:15 - 03:16

希望多管

03:16 - 03:19

生怕呢有政府管不到的地方出点乱

03:19 - 03:21

所以说在这种外部环境下

03:21 - 03:23

哎加密行业还是迎来的发展

03:23 - 03:24

但是我们开头也说了

03:24 - 03:26

科技只要一发展

03:26 - 03:29

一旦开始创造价值必然会

03:29 - 03:30

引发战争

03:30 - 03:32

这我们加密行业的第二次发展

03:32 - 03:35

也马上迎来了他的第二次战争

03:37 - 03:39

这次呢就是由拜登挑起的

03:39 - 03:40

怎么回事呢

03:40 - 03:41

咱们继续来说啊

03:41 - 03:43

到90年代的时候呢

03:43 - 03:44

冷战是刚好已经结束

03:44 - 03:47

但美国呢个人电脑是非常普及

03:47 - 03:50

于是呢就出现电脑对电脑端的通信啊

03:50 - 03:52

也就是我们用户数据的传输

03:52 - 03:54

用户的数据呢只要往外发

03:54 - 03:55

为了保护个人隐私

03:55 - 03:57

其实就要用到加密的技术

03:57 - 04:00

那这个时候拜登就跳出来宣战了

04:00 - 04:02

1991年美国东部华盛顿

04:02 - 04:03

那个时候呢

04:03 - 04:05

他还只是一个参议院的议员

04:05 - 04:06

他作为发起人

04:06 - 04:10

发起了一个很反动的法案S.266啊

04:10 - 04:13

1991年综合反犯罪法案

04:13 - 04:14

法案的第1,126条

04:14 - 04:15

明确要求

04:15 - 04:20

电子通信服务提供商和设备制造商哎

04:20 - 04:21

有义务确保

04:21 - 04:25

政府能够获取加密通信的明文内容

04:25 - 04:27

也就是说在33年前

04:27 - 04:29

拜登就已经打着反犯罪的名义

04:29 - 04:31

要求去解读公民呢

04:31 - 04:33

在计算机上面的隐私了

04:33 - 04:33

不过还好啊

04:33 - 04:35

当时呢美国的总统不是共和党

04:35 - 04:38

这个法案呢并没有获得通过啊

04:38 - 04:39

就直接胎死腹中了

04:39 - 04:41

而且当时学术界的一些专家呢

04:41 - 04:42

也跳出来反对

04:42 - 04:43

说这加密系统呢

04:43 - 04:44

要么是安全的

04:44 - 04:46

要么是不安全的

04:46 - 04:48

不存在既保护用户安全

04:48 - 04:49

还能让你政府看啊

04:49 - 04:51

不存在中间态的状态

04:51 - 04:52

那这第二次大战

04:52 - 04:53

拜登既然出击了

04:53 - 04:55

加密行业一定有回击啊

04:55 - 04:57

当时加密行业的从业者呢

04:57 - 04:59

各自都发起了各种各样的行动

04:59 - 05:01

应对这次加密战争

05:01 - 05:03

在拜登给这个法案拉选票的时候

05:03 - 05:05

在美国中部的科罗拉多州

05:05 - 05:06

的一个车库里

05:06 - 05:07

有一个程序员

05:07 - 05:09

呢叫Phil Zimmerman啊

05:09 - 05:11

他正在进行着一场默默的革命

05:11 - 05:14

他开发了一个叫PGP的软件啊

05:14 - 05:16

pretty good privacy

05:16 - 05:16

这个软件呢

05:16 - 05:18

就能够让普通人使用

05:18 - 05:20

军用级别的加密技术

05:20 - 05:20

那这哥们呢

05:20 - 05:22

当时正在开发着

05:22 - 05:22

忽然听说

05:22 - 05:25

哎呀怎么有一个S.266法案呢

05:25 - 05:26

他意识到啊

05:26 - 05:28

他必须要在这法案通过之前

05:28 - 05:30

就完成这个PGP的开发

05:30 - 05:32

他认为只要他开发的够快

05:32 - 05:35

拜登的禁止令就追不上他

05:35 - 05:36

那他这个软件呢

05:36 - 05:37

就能给美国内部啊

05:37 - 05:39

提供一些商用价值

05:39 - 05:41

保障美国用户的隐私

05:41 - 05:41

值得一提的呢

05:41 - 05:43

就是一赛成功啊

05:43 - 05:45

算是解决了美国用户的问题

05:45 - 05:47

后面呢他又做了一件更绝的事情

05:47 - 05:49

直接让他的软件服务全球人民

05:49 - 05:51

要知道不管你开发什么软件

05:51 - 05:52

只要美国政府

05:52 - 05:54

把你的软件定义为加密软件

05:54 - 05:56

他就是军需品

05:56 - 05:56

不能出口

05:56 - 05:58

不能去全球

05:58 - 05:59

那面对这个障碍

05:59 - 06:01

这哥们就想出了一个天才的主意

06:01 - 06:04

我把我这PGP的代码哎

06:04 - 06:05

我印成书

06:05 - 06:09

我出版你可不限制我书籍的出口吧

06:09 - 06:10

那这个事呢

06:10 - 06:11

就是后面啊

06:11 - 06:14

非常著名的齐默尔曼出版社事件

06:14 - 06:14

因为呢

06:14 - 06:17

根据美国宪法的第一修正案说

06:17 - 06:18

出版物呢

06:18 - 06:19

它受言论自由的保护

06:19 - 06:21

它是完全可以出口的

06:21 - 06:23

软件呢归你政府管

06:23 - 06:25

出版物书籍可没限制

06:25 - 06:26

随便出口

06:26 - 06:27

结果也是非常好的啊

06:27 - 06:28

这本看起来

06:28 - 06:30

非常晦涩难懂的技术书籍啊

06:30 - 06:31

在全球流传开来

06:31 - 06:33

全世界各地的程序员

06:33 - 06:34

都纷纷买入这本书

06:34 - 06:37

把印刷的代码呢重新输入电脑

06:37 - 06:40

每个人都获得了这样的一个加密软件

06:40 - 06:42

除了这哥们在宣战其

06:42 - 06:43

他还有没有哎

06:43 - 06:45

还有加州的伯克利

06:45 - 06:47

也有一群加密技术的极客

06:47 - 06:49

他们当时讨论的主题呢哎

06:49 - 06:53

侧重于用密码学保护用户的隐私权

06:53 - 06:54

以及在数字时代共鸣的

06:54 - 06:57

信息安全和言论自由的话题

06:57 - 06:57

那这些话题

06:57 - 07:00

最后演变成了知名的赛博朋克啊

07:00 - 07:04

密码朋克运动在当时掀起了轩然大波

07:04 - 07:05

1993年3月

07:05 - 07:07

这个运动发布了密码朋克宣言

07:08 - 07:09

这份宣言郑重表示

07:09 - 07:11

如果我们希望拥有隐私

07:11 - 07:14

那我们必须捍卫自己的隐私

07:14 - 07:15

那以上种种呢

07:15 - 07:17

都是我们加密行业的从业人员

07:17 - 07:19

对于拜登挑起这场战争的应战

07:19 - 07:20

那这场对战呢

07:20 - 07:21

换来的是什么呢

07:21 - 07:23

换来的是民主党的疯狂报复

07:23 - 07:26

1993年拜登的立法失败之后

07:26 - 07:28

民主党的克林顿政府

07:28 - 07:30

又想到了一个新的办法搞我们

07:30 - 07:31

那就是加密芯片啊

07:31 - 07:33

Clipper chip这种芯片呢

07:33 - 07:35

是国家安全局开发的

07:35 - 07:38

凡是使用这个芯片做的计算机

07:38 - 07:41

上面的语音和数据都可以被政府截获

07:41 - 07:42

而且解码

07:42 - 07:43

这一套逻辑下来呢

07:43 - 07:47

和现在啊拜登政府力推的CBDC差不多

07:47 - 07:47

主要的功能呢

07:47 - 07:49

就是监控每一个用户的转账

07:49 - 07:51

从而实施更好的管理

07:51 - 07:51

这个点子呢

07:51 - 07:52

他们认为非常好

07:52 - 07:53

想法很美妙

07:53 - 07:55

但是不出意外的话

07:55 - 07:56

意外就要来了啊

07:56 - 07:58

在1994年6月

07:58 - 08:01

AT&T的研究员Matt Blaze发表了一篇论文

08:01 - 08:02

他证明啊

08:02 - 08:03

这芯片

08:03 - 08:06

什么Clipper ship的安全性形同虚设

08:06 - 08:08

论文逻辑非常清晰

08:08 - 08:09

证明的头头是道

08:09 - 08:10

这篇论文

08:10 - 08:13

直接让政府陷入了一个尴尬境地

08:13 - 08:14

所以呢AT&T后面呢

08:14 - 08:17

也是放弃了采购这个芯片的计划

08:17 - 08:18

这个芯片呢

08:18 - 08:20

也是在1996年宣告停

08:20 - 08:21

产所以你看

08:21 - 08:23

民主党的报复虽然来了

08:23 - 08:25

但是报复是没报复上

08:25 - 08:27

反倒是让公众第一次清晰的认识到

08:27 - 08:30

这政府控制加密系统不行的

08:30 - 08:31

他没那个水平

08:31 - 08:32

那一招不行

08:32 - 08:33

再来一招呗

08:33 - 08:34

那这招呢

08:34 - 08:36

要从我们一个老朋友说起

08:36 - 08:37

之前有期视频呢

08:37 - 08:38

我们讲互联网泡沫的时候

08:38 - 08:40

提到过一个知名公司

08:40 - 08:42

就是A16Z老板安德森

08:42 - 08:46

他起家的时候创立的公司叫网景公司

08:46 - 08:46

那当时呢

08:46 - 08:48

网景公司有很多用户啊

08:48 - 08:50

他们上网用浏览器

08:50 - 08:51

在网上买东西

08:51 - 08:52

买东西的时候

08:52 - 08:55

要填他们的信用卡安全码

08:55 - 08:56

那网景为了保护用户的

08:56 - 08:58

这信用卡安全码呢

08:58 - 09:00

就开发了一个叫SSL的加密协议

09:00 - 09:02

但是当时美国的法案就是

09:02 - 09:06

你凡是超过40位密钥长度的啊

09:06 - 09:07

这种加密代码呢

09:07 - 09:08

都属于军需品

09:08 - 09:09

都不能出口

09:09 - 09:10

你做了之后

09:10 - 09:12

你要申请授权许可

09:12 - 09:13

所以说

09:13 - 09:16

网景公司当时就不得不做了

09:16 - 09:16

两个版本啊

09:16 - 09:17

第一个版本呢

09:17 - 09:20

就是使用128位的加强密码

09:20 - 09:22

这个呢不能出口啊

09:22 - 09:23

只能给美国公民用

09:23 - 09:23

还有一个呢

09:23 - 09:24

叫国际版

09:24 - 09:26

那这国际版的浏览器

09:26 - 09:28

只能使用40位的加密密码

09:28 - 09:30

那这样的双重标准呢

09:30 - 09:32

很快就被证明是灾难性了

09:32 - 09:33

根本不靠谱

09:33 - 09:34

为什么呢

09:34 - 09:36

因为法国的学生用了8天时间

09:36 - 09:38

就破译了这40位的SSL

09:38 - 09:39

所以你看

09:39 - 09:40

这不问题来了

09:40 - 09:42

美国政府你限制加密

09:42 - 09:45

导致老百姓的邮件信息被泄露

09:45 - 09:48

这新闻一下子就震惊了商业界

09:48 - 09:50

当时网景的工程师非常愤怒啊

09:50 - 09:53

直接公开说这就是政府瞎管的结果

09:53 - 09:55

他们不是在保护安全

09:55 - 09:57

而是在制造漏洞就

09:57 - 10:00

在加密技术和民主党政府冲突啊

10:00 - 10:01

闹得不可开交的时候

10:01 - 10:03

美国的一个大法官站出来了

10:03 - 10:05

当时民主党才刚刚开始执政啊

10:05 - 10:06

当时的大法官啊

10:06 - 10:09

多是里根啊和老布什时期任命的

10:09 - 10:10

保守的态度

10:10 - 10:12

于是呢在大法官们的推动下

10:12 - 10:15

96年的美国最高法院首次裁定

10:15 - 10:16

计算机代码呢

10:16 - 10:18

是受宪法第一修正案保护的

10:18 - 10:20

这属于一种言论形式

10:20 - 10:21

这么一定性

10:21 - 10:23

对咱们行业是一个里程碑的意义

10:23 - 10:25

判决啊你不是军事用途了

10:25 - 10:27

那你就可以普及啊

10:27 - 10:27

所以说这事呢

10:27 - 10:29

算是帮助加密行业

10:29 - 10:30

哎赢了一小步

10:31 - 10:33

最终的获胜的还是到1999年啊

10:33 - 10:35

克林顿坚持不下去了

10:35 - 10:37

才取消了当时名存实亡的

10:37 - 10:39

加密技术出口管制法

10:39 - 10:41

所以这场大战的结果

10:41 - 10:43

加密行业获得全胜

10:43 - 10:43

加密技术呢

10:43 - 10:46

也成为了互联网的核心基建

10:46 - 10:49

PGP呢成为电子邮件的加密标准

10:49 - 10:51

SSL TLS呢

10:51 - 10:53

保护了所有网上交易

10:57 - 10:58

我们也都知道

10:58 - 11:00

前两次大战带来的结果呢

11:00 - 11:02

只是让我们的加密技术

11:02 - 11:06

停留在保护网上的信息安全的阶段

11:06 - 11:08

加密的信息还只能是个信息

11:08 - 11:10

不能被称为加密资产呢

11:10 - 11:13

想要把虚拟数据虚拟信息变成资产

11:13 - 11:14

中间还得进步

11:14 - 11:15

这个时候

11:15 - 11:17

我们把时间拉回到1994年啊

11:17 - 11:18

阿姆斯丹

11:18 - 11:20

一群密码朋克密集会

11:20 - 11:21

他们讨论的呢

11:21 - 11:23

就是这个更具颠覆性的想法

11:24 - 11:24

数字货币

11:24 - 11:27

政府控制加密的真正原因

11:27 - 11:28

就是想控制金钱呗

11:28 - 11:31

那如果我们创造一种不受控制的货币

11:31 - 11:33

那才是真正的加密革命

11:33 - 11:35

有了阿姆斯特丹这个会议啊

11:35 - 11:36

开启了一个萌芽

11:36 - 11:38

之后一系列开创性的

11:38 - 11:39

构想相继出现

11:39 - 11:42

比如说97年Adam buck发明了hash cash

11:42 - 11:44

这个软件最开始开发出来呢

11:44 - 11:46

是用于对抗垃圾邮件的

11:46 - 11:48

但是呢在这个软件的编程思路里面

11:48 - 11:51

人家就用了工作量证明的概念

11:51 - 11:52

而且呢

11:52 - 11:54

人家呢在2002年呢也写了个白皮书

11:54 - 11:57

POW的萌芽呢开始出现

11:57 - 11:58

那再往后退

11:58 - 12:01

1998年 戴维呢发表了一个B-money的提案

12:01 - 12:02

戴维呢是谁

12:02 - 12:05

绝对是咱们加密行业的华人之光

12:05 - 12:06

因为B-money提案呢

12:06 - 12:07

是第一个完整的

12:07 - 12:10

描述分布式数字货币系统的

12:10 - 12:12

分布式加上工作量证明呢

12:12 - 12:14

就是我们后面非常熟悉的Pow

12:14 - 12:15

那戴维呢

12:15 - 12:18

也是最早被中本聪联系的两个人之一

12:18 - 12:19

他的贡献呢

12:19 - 12:20

非常的重要

12:20 - 12:22

以至于多年之后呢

12:22 - 12:23

以太坊的创始人Vitalik

12:23 - 12:27

都把以太坊的最小单位命名为Wei

12:27 - 12:29

就是表达对戴维的崇高敬意

12:29 - 12:30

但是再崇高啊

12:30 - 12:32

也是一个中间态

12:32 - 12:34

加密信息还是没有变成加密货币

12:34 - 12:35

由往后发展

12:35 - 12:38

到了1998年到2005年期间

12:38 - 12:40

有一个叫尼克萨博的人

12:40 - 12:42

他就提出了BitGold设想

12:42 - 12:43

比特黄金哎

12:43 - 12:46

它不仅将工作量证明与价值存储

12:46 - 12:47

巧妙的结合在一起

12:47 - 12:50

更是提出了一个叫智能合约的

12:50 - 12:51

革命性概念

12:51 - 12:51

他成了吗

12:51 - 12:53

哎他也没成啊

12:53 - 12:54

这些先驱者的工作

12:54 - 12:57

看似都是摸到了梦想的边缘

12:57 - 12:58

但始终呢

12:58 - 13:01

都缺少最后一块拼图都解决不了

13:01 - 13:04

如何在没有中心化机构的情况下

13:04 - 13:07

让所有参与者对交易达成共识

13:07 - 13:10

这个问题困扰了密码学家们整整20年

13:11 - 13:12

如果建立不了共识

13:12 - 13:15

这个加密的数据永远只是个数据

13:15 - 13:16

根本无法变

13:16 - 13:20

成资产直到2008年10月31号

13:20 - 13:22

一个化名中本聪的神秘人物

13:22 - 13:24

在密码学邮件列表

13:24 - 13:26

发布了比特币的白皮书

13:26 - 13:26

这个方案呢

13:26 - 13:29

算是巧妙地把前面的先行区整合起来

13:29 - 13:32

人家采用了Hashcash的工作量证明系统

13:32 - 13:35

啊借鉴了b money的去中心化设计理念

13:35 - 13:38

还用了Merkle树进行交易验证

13:38 - 13:40

揉在一起的这个新系统

13:40 - 13:42

解决了此前的所有问题

13:42 - 13:45

那就是如何在完全去中心化的情况下

13:46 - 13:47

达成共识

13:47 - 13:49

好那这个技术进步非常的重要

13:49 - 13:50

直到现在

13:50 - 13:52

我们仍然有大量的加密项目

13:52 - 13:55

都必须采用去中心化的方式

13:55 - 13:56

来实现它的共识积累

13:56 - 13:58

包括我们现在听说哎呦

13:58 - 14:00

某个项目搞零撸

14:00 - 14:01

让你去搭建节点

14:02 - 14:03

这些话术呢

14:03 - 14:05

其实都是引导大家啊

14:05 - 14:06

共同去建立这样的

14:06 - 14:08

一个去中心化的验证网络

14:08 - 14:11

从而去解决这些项目的共识问题

14:11 - 14:12

没有共识

14:12 - 14:15

它发行的资产就只是数据丢失资产

14:15 - 14:17

那也正因为如此呢

14:17 - 14:19

我们行业给了我们很多小白用户

14:19 - 14:20

一些0撸的机会

14:20 - 14:21

比如说最近呢

14:21 - 14:23

我们是有一个广告金主爸爸

14:23 - 14:24

network3

14:24 - 14:25

这个项目呢

14:25 - 14:28

他为了构建一个AI可用的二层网络

14:28 - 14:29

他这条链呢

14:29 - 14:32

是为了帮助全球的AI开发者

14:32 - 14:34

大规模的去做推理训练

14:34 - 14:36

或者是验证他们的模型

14:36 - 14:37

那这样的一个项目呢

14:37 - 14:39

就需要大量的去中心化节点

14:39 - 14:40

由无数个节点呢

14:40 - 14:42

组成它最终的运算网络

14:42 - 14:43

那这个网络

14:43 - 14:45

才能帮助AI项目去跑一些模型

14:46 - 14:48

你说如果他是一个别的行业的项目

14:48 - 14:49

那根本就不需要这么干

14:49 - 14:51

因为他已经实现了550万

14:51 - 14:53

美金的种子轮融资啊

14:53 - 14:55

投资机构非常的硬核

14:55 - 14:57

包括SNZ水滴Iotex

14:57 - 14:59

而且呢人家融资能力极强

14:59 - 15:00

在做新一轮的融资

15:00 - 15:01

融了这么多资的

15:01 - 15:02

这样的一个项目

15:02 - 15:03

在咱们行业

15:03 - 15:05

照样还得去布去中心化的节点

15:05 - 15:08

用户呢只要到他的官网上哎

15:08 - 15:10

就可以申请我要当节点

15:10 - 15:11

免费开始跑

15:11 - 15:12

不用花钱

15:12 - 15:13

直接开干

15:13 - 15:15

那为了奖励用户成为节点呢

15:15 - 15:15

那这个项目呢

15:15 - 15:17

就给用户进行奖励啊

15:17 - 15:20

一个是奖励他们自己项目发行的代币

15:20 - 15:20

还可以奖励呢

15:20 - 15:22

他们一个投资人Iotex

15:22 - 15:24

另外一个项目的代币Iotex呢

15:24 - 15:27

是一个已经上线币安好多年的老项目

15:27 - 15:29

币价呢还是比较不错的

15:29 - 15:31

所以呢奖励的也算是真金白银了

15:32 - 15:32

在这种奖励下

15:32 - 15:35

他们现在的全球免费节点呢

15:35 - 15:36

已经达到了50多万个

15:36 - 15:38

那也正是由于这种机制呢

15:38 - 15:40

第一是保障了项目方的网络安全啊

15:40 - 15:41

第二

15:41 - 15:44

是给我们普通参与者白嫖的机会

15:44 - 15:46

所以我们行业你去看大量的白嫖

15:46 - 15:47

今天这个白嫖

15:47 - 15:48

明天那个白撸

15:48 - 15:50

是不是但是买硬件啊

15:50 - 15:52

帮助他们提供一些啊

15:52 - 15:56

CPU算力的这种硬件节点也有5,000多个

15:56 - 15:58

虽然说买硬件节点需要花钱啊

15:58 - 15:59

一个差不多900美金

15:59 - 16:02

但是硬件节点的收益呢

16:02 - 16:04

可以抵得上上百个软件节点

16:04 - 16:05

于是呢我们可以看到

16:05 - 16:06

在这种激励下

16:06 - 16:07

项目方呢

16:07 - 16:10

可以快速的搭建好他的去中心化网络

16:10 - 16:11

保障他网络的安全

16:11 - 16:12

你的加密数据

16:12 - 16:15

本来要放在一个中心化的银行里

16:15 - 16:16

才能变成钱

16:16 - 16:18

毕竟呢人们对银行是有共识的

16:18 - 16:21

现在呢你的加密数据放在我去中

16:21 - 16:23

心化的网络上就能变成钱

16:23 - 16:25

我这个去中心化网络

16:25 - 16:27

搭建了新的共识体系

16:27 - 16:30

于是呢加密数据才能变成加密资产

16:30 - 16:32

这个技术的进步

16:32 - 16:34

把我们加密行业拉高了一个新的台阶

16:34 - 16:36

创造了新的价值

16:36 - 16:37

所以我们可以看到

16:37 - 16:38

不管是当年的比特币

16:38 - 16:41

还是现在的任何一个Web3项目方

16:41 - 16:43

你的本质就是加密资产

16:43 - 16:45

就是要解决共识机制

16:45 - 16:46

没有共识机制

16:46 - 16:48

你顶多算是个加密数据

16:48 - 16:50

做不成加密资产

16:51 - 16:51

好的

16:51 - 16:53

比特币拿出这样的一个解决方案之后

16:53 - 16:55

白皮手往这一放

16:55 - 16:57

没想到天助我也

16:57 - 16:57

我们都知道

16:57 - 16:59

在比特币发布的一个月前

16:59 - 17:01

雷曼兄弟倒闭了

17:01 - 17:02

轰然倒塌

17:02 - 17:04

全球的金融危机全面爆发

17:05 - 17:06

人们就开始质疑

17:06 - 17:08

你这个银行不靠谱啊

17:08 - 17:10

传统的金融体系不稳定啊

17:10 - 17:12

你看瞌睡就有人递枕头

17:12 - 17:14

09年1月3号

17:14 - 17:15

比特币创世区块诞生

17:15 - 17:18

中本聪在人们对银行的恐惧中

17:18 - 17:20

写下了这样的一句话

17:20 - 17:20

这句话呢

17:20 - 17:22

来自泰晤士报的头条

17:22 - 17:25

不仅是对区块链产生时间的记录

17:25 - 17:28

更是对传统金融体系的无声控诉

17:28 - 17:30

那第一笔比特币交易的接收者呢

17:30 - 17:33

正是在DigiCash实习过的Hal Finney

17:33 - 17:34

他当时呢

17:34 - 17:36

在09年1月份

17:36 - 17:38

收到中本聪发来的10个比特币时候

17:39 - 17:41

在Twitter上轻描淡写地写了一句嗯

17:41 - 17:43

正在运行比特币

17:43 - 17:44

但是他也没想到

17:44 - 17:46

就是这条普通的推文

17:46 - 17:49

后来呢成为了数字货币历史上

17:49 - 17:51

最著名的记录之一

17:51 - 17:51

好那

17:51 - 17:52

科技进步了

17:52 - 17:54

创造出来比特币了

17:54 - 17:55

带动价值了

17:55 - 17:56

什么要来

17:56 - 17:58

第三次加密大战要来了

18:02 - 18:02

2011年

18:02 - 18:06

比特币就首次引起了美国政府的注意

18:06 - 18:07

维基解密在

18:07 - 18:09

遭到信用卡公司和银行封锁之后

18:09 - 18:12

开始接受比特币的捐款

18:12 - 18:14

这一次让世界意识到哇

18:14 - 18:14

还有一种

18:14 - 18:18

独立在我们银行体系之外的货币

18:18 - 18:19

而且他不可审查

18:19 - 18:20

不可封锁

18:20 - 18:22

好家伙厉害了

18:22 - 18:23

民族党的参议员呢

18:23 - 18:26

Churk随即就在新闻发布会上发出警告

18:26 - 18:29

说比特币是数字形式的洗钱工具

18:29 - 18:30

这是美国政府

18:30 - 18:32

首次公开针对比特币表态

18:32 - 18:34

不过到2017年的时候

18:34 - 18:36

这维基解密收到的比特币哎

18:36 - 18:39

这回报超过了500倍

18:39 - 18:39

那个时候

18:39 - 18:41

比特币只涨到了5,000美金一枚

18:41 - 18:42

今天多少了

18:42 - 18:44

今天9万美金一枚啊

18:44 - 18:46

维基解密敢把币拿到现在

18:46 - 18:48

就是1万倍的回报

18:48 - 18:50

一块钱变成1万块钱

18:50 - 18:52

那见证了这种万倍涨幅

18:52 - 18:54

那当年那个打击比特币的参议员啊

18:54 - 18:56

舒默如今也变了

18:56 - 18:59

他已经变成民主党内为数不多的

18:59 - 19:03

坚挺支持加密货币的铁杆粉丝了

19:03 - 19:04

19:05 - 19:07

你看正义可以迟到

19:07 - 19:09

但是永远不会缺席

19:09 - 19:11

好那如果这次事件呢

19:11 - 19:13

是第三次加密大战的开头

19:13 - 19:17

那2014年这场大战又得到了全面延续

19:17 - 19:17

这一次战争呢

19:17 - 19:19

对我们行业非常不利

19:19 - 19:20

当时

19:20 - 19:22

全球最大的比特币交易所门头沟

19:22 - 19:23

忽然关闭

19:23 - 19:26

85万枚比特币凭空消失

19:26 - 19:27

85万枚什么概念

19:27 - 19:31

这是当时全网比特币总额的7%啊

19:31 - 19:32

在那会呢

19:32 - 19:33

美国总统还是奥巴马

19:33 - 19:35

也是民主党啊

19:35 - 19:36

民主党就要保护是吧

19:36 - 19:39

所以说他以保护资产的理由呢

19:39 - 19:41

开始加强加密行业的监管

20:10 - 20:10

好在呢

20:10 - 20:12

当时民主党的执政哎

20:12 - 20:14

被特朗普按下了暂停键

20:14 - 20:16

在2017年换届的时候

20:16 - 20:17

特朗普执政

20:17 - 20:20

发生了一件非常重要的制度性突破

20:20 - 20:23

也就是我们加密行业反击来了啊

20:23 - 20:25

芝加哥商品交易所CME

20:25 - 20:28

和芝加哥期权交易所CBOE

20:28 - 20:30

推出了比特币的期货合约

20:30 - 20:31

在那会儿

20:31 - 20:33

在那个战局下啊

20:33 - 20:33

这一招

20:33 - 20:36

不亚于现在的比特币上了现货ETF

20:36 - 20:37

就这一招

20:37 - 20:39

让比特币从1,000美金

20:39 - 20:42

一路飙升到了2万美金

20:42 - 20:44

这个事件标志着比特币赢得了华尔街

20:44 - 20:46

他开始作为资产

20:46 - 20:48

被华尔街的精英们接纳了

20:48 - 20:49

监管呢也随着这个事件

20:49 - 20:51

开始发生了微妙的变化

20:51 - 20:54

从完全否定定义为洗钱工具

20:54 - 20:56

转向尝试理解和规范

20:57 - 20:58

但是好景不长

20:58 - 21:00

2020年 我们都知道

21:00 - 21:02

美国大学民主党拜登又上台了

21:02 - 21:03

这拜登一上台

21:03 - 21:05

把这三战推向了高潮

21:05 - 21:06

他在执政期间

21:06 - 21:08

对我们行业发起了全方位的围剿

21:08 - 21:12

他们试图通过监管呢来控制咱们行业

21:12 - 21:13

比如说在拜登政府的支持下

21:13 - 21:14

SEC呢

21:14 - 21:17

要求加密货币不可以有任何价值

21:17 - 21:19

哈哈你只要有价值

21:19 - 21:20

你就有可能是证券

21:21 - 21:22

你是证券你就违法

21:22 - 21:23

这个部分呢

21:23 - 21:25

我们在这期视频里面有详细讲过啊

21:25 - 21:27

利害关系不再多说了

21:27 - 21:28

也正是由于这个政策

21:28 - 21:31

导致我们行业现在命满天飞

21:31 - 21:32

价值币反倒一地鸡毛

21:32 - 21:35

而且呢人家还修改了会计准则啊

21:36 - 21:37

要求所有持有加

21:37 - 21:38

密货币的机构

21:38 - 21:40

你们只要持有加密货币

21:40 - 21:42

你就要准备价值一样多的现金

21:42 - 21:45

这下就把加密货币定义为债

21:45 - 21:46

你持有这么多的债

21:46 - 21:48

你肯定要有现金资产做支撑啊

21:48 - 21:50

你说这法案多么的不公平啊

21:50 - 21:52

这明眼人都不能通过呀

21:52 - 21:53

所以我们可以看到

21:53 - 21:55

本来呢参众两院呢

21:55 - 21:55

这提案呢

21:55 - 21:57

都要被推倒了

21:57 - 21:57

拜登

21:57 - 22:00

硬是凭借自己作为总统的一己之力

22:00 - 22:02

把这个逆天的规则还是保留着

22:02 - 22:04

所以这场大战呢

22:04 - 22:06

在拜登执政期间被拉向了高潮啊

22:06 - 22:09

期间呢这SEC今天告这个

22:09 - 22:10

明天告那个

22:10 - 22:11

什么币安 瑞波 通通告

22:12 - 22:14

好在我们现在迎来了转机

22:14 - 22:15

这三战呢

22:15 - 22:17

我原以为加密行业要输了

22:17 - 22:18

但是川普呢

22:18 - 22:19

现在在加密行业的支持下

22:19 - 22:22

又重新拿回了总统二次就业

22:22 - 22:23

而且这一次的班底

22:24 - 22:25

全都是支持加密的

22:25 - 22:27

他上台之后有可能会扭转战局

22:27 - 22:28

在他任期内

22:28 - 22:31

完全有可能把这三战帮我们打完

22:31 - 22:33

而且让加密行业赢得漂亮

22:34 - 22:36

虽然呢大漂亮也不是什么神仙啊

22:36 - 22:38

我也不能说上来具体呢

22:38 - 22:39

他任期内

22:39 - 22:42

会对我们行业实施什么样的政策监管

22:42 - 22:44

但是总体的方向咱能把握吧

22:44 - 22:46

主要还不就是减少政府的过度监管

22:46 - 22:47

同时呢

22:47 - 22:49

让公民有自由选择投资的权利

22:49 - 22:51

而且呢最近还有传言说这川普呢

22:51 - 22:53

准备取消美国公司发行的

22:53 - 22:56

加密货币的所有资本利得税

22:56 - 22:57

那如果这样的话

22:58 - 22:58

这三战呢

22:58 - 22:59

我们赢定了

22:59 - 23:00

不仅是赢定了

23:00 - 23:03

这三战的胜利果实有可能是巨大

23:03 - 23:07

没准是我们直接颠覆传统金融行业

23:07 - 23:08

什么股票呀

23:08 - 23:09

商品期货呀

23:09 - 23:11

靠边站再想大一点

23:11 - 23:13

没准什么货币啊

23:13 - 23:14

美元也靠边站

23:14 - 23:15

哈哈哈

23:15 - 23:17

我们加密货币直接取而代之啊

23:17 - 23:20

当然了这些都是我猜的对

23:24 - 23:25

那视频最后呢

23:25 - 23:28

我们来回顾一下我们行业的百年历史

23:28 - 23:29

发展了100年

23:29 - 23:30

打了三场战争

23:30 - 23:31

第一次加密战争

23:31 - 23:32

加密勉强获胜

23:32 - 23:35

哈哈我们行业成为了军事的基建

23:37 - 23:38

第二次加密战争

23:38 - 23:39

加密大获全胜

23:40 - 23:42

加密最终成为了互联网的基建

23:44 - 23:45

第三次加密战争

23:45 - 23:48

他是否能成为金融行业的基建呢

23:48 - 23:48

这个问题呢

23:48 - 23:50

我想留给大家思考

23:50 - 23:52

但是不管最终结局如何

23:52 - 23:53

我们都看到了

23:53 - 23:54

这100年的发展

23:54 - 23:57

背后是无数个从业者日日夜夜的奋斗

23:57 - 24:00

是无数个程序员日渐稀疏的秀发

24:00 - 24:02

是几代人不停努力的结果

24:02 - 24:04

也是我们在座的所有人

24:04 - 24:06

对科技进步的渴望

24:06 - 24:06

自古都是

24:06 - 24:09

梅花香自苦寒来

24:09 - 24:10

通往胜利的道路呢

24:10 - 24:12

需要一步一步的来

24:12 - 24:14

好在一路有你

00:00 - 00:01

You all know that.

00:01 - 00:03

Bitcoin has been around for 15 years

00:03 - 00:04

But you don't know

00:04 - 00:07

Our crypto industry is hundreds of years old

00:09 - 00:10

And you all know that.

00:10 - 00:11

In the past two years

00:11 - 00:12

What about our industry?

00:12 - 00:14

With the Biden administration

00:14 - 00:17

And the Democratic SEC fought many battles

00:17 - 00:18

But don't you know?

00:18 - 00:19

33 years ago

00:19 - 00:23

Biden has already been a killer for our industry

00:26 - 00:28

Today, let's sort it out.

00:28 - 00:30

The 100-year development of the shrimp industry

00:33 - 00:35

What about the starting point of our crypto industry?

00:35 - 00:37

You start with the First World War.

00:39 - 00:40

And before the First World War?

00:40 - 00:41

It can only be said that there is encryption technology

00:41 - 00:43

It cannot be said that there is a crypto industry

00:43 - 00:45

The reason why Germany was defeated in World War I

00:45 - 00:48

A key reason is that in 1917

00:48 - 00:51

A secret cable from Germany was intercepted

00:51 - 00:52

What about the content of this secret cable?

00:52 - 00:52

It says

00:52 - 00:55

Germany wanted to invade the United States with Mexico

00:55 - 00:56

Look at this America

00:56 - 00:57

I don't want to fuck you.

00:57 - 00:59

You still want to join forces with other people to fuck me

00:59 - 01:01

Directly led the United States into the war

01:01 - 01:02

What about American involvement?

01:02 - 01:04

It also brought about the disastrous defeat of Germany

01:04 - 01:06

What about after the Germans suffered a big loss here?

01:06 - 01:07

Hey, I started thinking

01:07 - 01:10

How to solve the security problem of letters

01:10 - 01:12

So what happened in 1918?

01:12 - 01:13

The Germans invented one

01:14 - 01:15

Enigma's cipher machine

01:15 - 01:16

So what happened?

01:16 - 01:18

It was widely used by the German army.

01:18 - 01:19

It's sort of encryption.

01:19 - 01:21

Finding large-scale application scenarios for the first time

01:21 - 01:24

This led to the birth of the crypto industry

01:24 - 01:26

Now that's a classic technological development.

01:26 - 01:27

Technology brings productivity

01:27 - 01:28

Create value

01:28 - 01:30

As long as there is technology to create value

01:30 - 01:31

Must lead to war

01:31 - 01:33

So what about our rice industry?

01:33 - 01:35

He also ushered in his first war

01:35 - 01:36

What about this war?

01:36 - 01:37

It happened during World War II.

01:37 - 01:39

The crux of the war is encryption

01:39 - 01:41

You have to decrypt it.

01:41 - 01:43

The encryption and decryption wars broke out

01:43 - 01:46

Then in order to crack the Enigma code

01:46 - 01:48

So people invented the computer

01:48 - 01:50

This German Encryption

01:50 - 01:52

America's war on declassification?

01:52 - 01:54

And finally, it came to an end after World War II.

01:54 - 01:55

What happened after the war?

01:55 - 01:57

The president of the United States at the time

01:57 - 01:58

Blumen of the Democratic Party

01:58 - 02:01

Customized an export control regulation

02:01 - 02:03

The requirements are all military-related technologies

02:03 - 02:06

Both encryption and decryption will control the exit

02:06 - 02:07

After all, at that time

02:07 - 02:10

The crypto industry is entirely dedicated to the military market

02:10 - 02:12

So what about devices generated by encryption technology?

02:12 - 02:14

Also classified as munitions by the United States

02:15 - 02:16

Exports are severely restricted

02:16 - 02:17

Okay, encryption.

02:17 - 02:18

And after the First World War?

02:18 - 02:20

Technology has advanced again

02:24 - 02:25

What about some scientists?

02:25 - 02:27

And I started experimenting with encryption.

02:27 - 02:29

Applied to business

02:29 - 02:30

Like the 1960s, for example?

02:30 - 02:32

Financial Institutions Group Remittance Business

02:32 - 02:34

They were a bunch of scientists at IBM.

02:34 - 02:37

They developed a revolutionary encryption algorithm.

02:37 - 02:41

This was later known as the DES data encryption standard

02:41 - 02:42

After this is done

02:42 - 02:44

What about transfers between institutions?

02:44 - 02:46

It's actually completely encrypted.

02:46 - 02:48

But ah, it's halfway through.

02:48 - 02:51

NSA suddenly intervenes

02:51 - 02:53

Are they citing national security?

02:53 - 02:55

The key length of this encryption technology will be

02:55 - 02:58

From 128 bits to 56 bits

02:58 - 03:01

So what's the concept of this seemingly technical change?

03:01 - 03:02

Actually.

03:02 - 03:06

Is to reduce the security of the algorithm by tens of thousands of bits

03:06 - 03:08

Reduced to the point where the government can brute force

03:08 - 03:10

What about the NSA?

03:10 - 03:12

It was founded during the Truman era

03:12 - 03:13

After all, they are Democrats

03:13 - 03:15

What I've been advocating is the big government model

03:15 - 03:16

Hope Multiple Tube

03:16 - 03:19

I'm afraid there will be out-point chaos in places that the government can't control

03:19 - 03:21

So in this external environment

03:21 - 03:23

Hey, the crypto industry is still ushering in development

03:23 - 03:24

But as we said at the beginning

03:24 - 03:26

As long as technology evolves

03:26 - 03:29

Once you start creating value, you will inevitably

03:29 - 03:30

Start a war

03:30 - 03:32

This is the second development of our crypto industry

03:32 - 03:35

And soon his second war

03:37 - 03:39

This time it was started by Biden

03:39 - 03:40

What's going on?

03:40 - 03:41

Let's move on.

03:41 - 03:43

What about in the '90s?

03:43 - 03:44

The Cold War has just ended

03:44 - 03:47

But in the U.S., it's very popular.

03:47 - 03:50

And so there's computer-to-computer communication.

03:50 - 03:52

That is, the transmission of our user data

03:52 - 03:54

As for the user's data, just send it out.

03:54 - 03:55

To protect personal privacy

03:55 - 03:57

In fact, encryption technology is used

03:57 - 04:00

Then Biden jumped out and declared war

04:00 - 04:02

1991 Eastern United States Washington

04:02 - 04:03

What about that time?

04:03 - 04:05

He's still just a member of the Senate

04:05 - 04:06

He acts as the initiator

04:06 - 04:10

They introduced a very reactionary bill, S. 266.

04:10 - 04:13

Comprehensive Crime Act 1991

04:13 - 04:14

Section 1,126 of the Act

04:14 - 04:15

clear requirements

04:15 - 04:20

Electronic communication service providers and equipment manufacturers

04:20 - 04:21

The obligation to ensure

04:21 - 04:25

Governments can access the plaintext content of encrypted communications

04:25 - 04:27

That is to say, 33 years ago

04:27 - 04:29

Tyden is already in the name of anti-crime

04:29 - 04:31

Ask to interpret citizens?

04:31 - 04:33

Privacy on the computer

04:33 - 04:33

But it's okay.

04:33 - 04:35

And the president of the United States was not a Republican.

04:35 - 04:38

The bill didn't get passed.

04:38 - 04:39

It died in the womb.

04:39 - 04:41

And what about some experts in academia at the time?

04:41 - 04:42

Also jumped out against

04:42 - 04:43

What about the encryption system?

04:43 - 04:44

It's either safe.

04:44 - 04:46

It's either not safe.

04:46 - 04:48

There is no such thing as protecting user security

04:48 - 04:49

Can you still let your government see it?

04:49 - 04:51

There is no intermediate state

04:51 - 04:52

The Second World War

04:52 - 04:53

Since Biden has attacked

04:53 - 04:55

The crypto industry must be fighting back.

04:55 - 04:57

What about those in the crypto industry at that time?

04:57 - 04:59

Each launched a variety of actions

04:59 - 05:01

Coping with this crypto war

05:01 - 05:03

When Biden was campaigning for this bill

05:03 - 05:05

Colorado in the middle of America.

05:05 - 05:06

In a garage

05:06 - 05:07

There is a programmer

05:07 - 05:09

It's Phil Zimmerman

05:09 - 05:11

He's leading a quiet revolution.

05:11 - 05:14

He developed a software called PGP.

05:16 - 05:16

What about this software?

05:16 - 05:18

It can be used by ordinary people

05:18 - 05:20

Military grade encryption

05:20 - 05:20

What about this guy?

05:20 - 05:22

It was being developed at the time

05:22 - 05:22

Suddenly heard

05:22 - 05:25

Oops, why is there an S266 bill?

05:25 - 05:26

Does he realize?

05:26 - 05:28

He has to do this before the bill is passed

05:28 - 05:30

Just complete the development of this PGP

05:30 - 05:32

He believes that as long as he develops it fast enough

05:32 - 05:35

Biden's restraining order can't catch up with him

05:35 - 05:36

What about his software?

05:36 - 05:37

Can you give it to the inside of the United States?

05:37 - 05:39

Provide some commercial value

05:39 - 05:41

Safeguarding the privacy of American users

05:41 - 05:41

It's worth mentioning.

05:41 - 05:43

Is Isai successful?

05:43 - 05:45

It solves the problem of American users.

05:45 - 05:47

And then he did something even more extraordinary.

05:47 - 05:49

Directly put his software to serve people around the world

05:49 - 05:51

Know that no matter what software you develop

05:51 - 05:52

As long as the US government

05:52 - 05:54

Define your software as encryption software

05:54 - 05:56

He is the munitions

05:56 - 05:56

Can't export

05:56 - 05:58

Can't go global

05:58 - 05:59

Then face this obstacle

05:59 - 06:01

This guy came up with a genius idea

06:01 - 06:04

I put my PGP code hey

06:04 - 06:05

I print it into a book

06:05 - 06:09

I publish, you don't restrict the export of my books, do you?

06:09 - 06:10

What about this?

06:10 - 06:11

Just behind it.

06:11 - 06:14

Very famous Zimmerman event

06:14 - 06:14

Because

06:14 - 06:17

According to the First Amendment to the U.S. Constitution

06:17 - 06:18

What about publications?

06:18 - 06:19

It is protected by freedom of speech

06:19 - 06:21

It's completely exportable.

06:21 - 06:23

The software is under the control of your government

06:23 - 06:25

There are no restrictions on publications and books.

06:25 - 06:26

Export at will

06:26 - 06:27

The result is also very good.

06:27 - 06:28

This one looks like

06:28 - 06:30

Some pretty obscure technical stuff.

06:30 - 06:31

It spread around the world.

06:31 - 06:33

Programmers from all over the world

06:33 - 06:34

They all bought this book

06:34 - 06:37

What about the printed code? Re-enter it into the computer

06:37 - 06:40

Everybody's got one of these encryption programs.

06:40 - 06:42

Except this guy is declaring war

06:42 - 06:43

Does he still have it?

06:43 - 06:45

Or Berkeley, California.

06:45 - 06:47

There's also a bunch of crypto geeks.

06:47 - 06:49

What was the topic they were discussing at that time?

06:49 - 06:53

Focusing on protecting users' privacy with cryptography

06:53 - 06:54

And what resonates in the digital age

06:54 - 06:57

The topic of information security and freedom of expression

06:57 - 06:57

What about these topics?

06:57 - 07:00

And it became known as cyberpunk.

07:00 - 07:04

The Cypherpunk movement caused quite a stir at the time.

07:04 - 07:05

March 1993

07:05 - 07:07

This movement released a Cypherpunk Manifesto.

07:08 - 07:09

This declaration solemnly states that

07:09 - 07:11

If we want privacy

07:11 - 07:14

Then we must safeguard our privacy

07:14 - 07:15

So what about all of the above?

07:15 - 07:17

They are all practitioners in our crypto industry

07:17 - 07:19

The challenge for Biden to start this war

07:19 - 07:20

What about this battle?

07:20 - 07:21

What did you get in exchange?

07:21 - 07:23

In exchange, the Democratic Party's crazy revenge

07:23 - 07:26

After Biden's legislative failure in 1993

07:26 - 07:28

The Democratic Clinton Administration

07:28 - 07:30

I've come up with a new way to mess with us

07:30 - 07:31

That's the encryption chip.

07:31 - 07:33

Clipper chip? What about this chip?

07:33 - 07:35

It was developed by the NSA.

07:35 - 07:38

Any computer made with this chip

07:38 - 07:41

The above voice and data can be intercepted by the government

07:41 - 07:42

And decoding

07:42 - 07:43

Is this set logical?

07:43 - 07:47

Same as the current CBDC pushed by the Biden administration

07:47 - 07:47

The main function?

07:47 - 07:49

It is to monitor the transfer of each user.

07:49 - 07:51

Therefore, better management is implemented

07:51 - 07:51

What about this idea?

07:51 - 07:52

They think it's great.

07:52 - 07:53

The idea is beautiful

07:53 - 07:55

But if nothing else

07:55 - 07:56

Accident is coming.

07:56 - 07:58

In June 1994

07:58 - 08:01

AT & T researcher Matt Blaze published a paper

08:01 - 08:02

Does he prove it?

08:02 - 08:03

This chip

08:03 - 08:06

Clipper ship security is useless

08:06 - 08:08

The thesis logic is very clear

08:08 - 08:09

The proof is good

08:09 - 08:10

This paper

08:10 - 08:13

Directly put the government in an awkward position

08:13 - 08:14

So what about behind NTMT?

08:14 - 08:17

Also gave up the plan to purchase this chip

08:17 - 08:18

What about this chip?

08:18 - 08:20

It was also stopped in 1996

08:20 - 08:21

So you see

08:21 - 08:23

The Democrats' revenge is coming

08:23 - 08:25

But revenge is not revenge

08:25 - 08:27

Instead, it was the first time that the public became aware of it clearly

08:27 - 08:30

This government-controlled encryption system won't work

08:30 - 08:31

He doesn't have that level

08:31 - 08:32

That won't work

08:32 - 08:33

Let's do it again.

08:33 - 08:34

What about this trick?

08:34 - 08:36

Let's start with an old friend of ours

08:36 - 08:37

There was a video before.

08:37 - 08:38

We were talking about the dot-com bubble.

08:38 - 08:40

Mentioned a well-known company

08:40 - 08:42

It's A16Z boss Anderson

08:42 - 08:46

He started out with a company called Netscape.

08:46 - 08:46

What about then?

08:46 - 08:48

Netscape has a lot of users.

08:48 - 08:50

They go online with a browser.

08:50 - 08:51

Shopping online

08:51 - 08:52

When shopping

08:52 - 08:55

To fill out their Card Security Code

08:55 - 08:56

In order to protect users, Netscape

08:56 - 08:58

What about the Card Security Code?

08:58 - 09:00

They developed an encryption protocol called SSL

09:00 - 09:02

But the U.S. bill at that time was

09:02 - 09:06

Do you have any keys longer than 40 bits?

09:06 - 09:07

What about this encryption code?

09:07 - 09:08

It's all munitions.

09:08 - 09:09

Can't export

09:09 - 09:10

After you do

09:10 - 09:12

You need to apply for a license.

09:12 - 09:13

So short

09:13 - 09:16

Netscape had to do that.

09:16 - 09:16

Two versions?

09:16 - 09:17

What about the first version?

09:17 - 09:20

Is to use a 128-bit reinforced password

09:20 - 09:22

This can't be exported.

09:22 - 09:23

Only for US citizens

09:23 - 09:23

There is another one.

09:23 - 09:24

Call the international version

09:24 - 09:26

The international version of the browser

09:26 - 09:28

Only 40-digit encrypted passwords can be used

09:28 - 09:30

What about this double standard?

09:30 - 09:32

It soon proved to be catastrophic

09:32 - 09:33

Not reliable at all

09:33 - 09:34

Why is that?

09:34 - 09:36

Because the French students spent 8 days

09:36 - 09:38

I deciphered the 40-bit SSL.

09:38 - 09:39

So you see

09:39 - 09:40

That's no problem.

09:40 - 09:42

The US government has restricted encryption

09:42 - 09:45

As a result, the email information of ordinary people was leaked

09:45 - 09:48

And it shocked the business world.

09:48 - 09:50

The Netscape engineers were furious.

09:50 - 09:53

Directly and publicly say that this is the result of the government's blind management

09:53 - 09:55

They're not protecting security.

09:55 - 09:57

It's creating loopholes

09:57 - 10:00

The conflict between encryption technology and the Democratic government?

10:00 - 10:01

When there is a lot of trouble

10:01 - 10:03

One of the justices of the United States has stood up.

10:03 - 10:05

The Democratic Party had just started governing.

10:05 - 10:06

The judge at that time?

10:06 - 10:09

Most of them were appointed under Li Gen and Bush Sr.

10:09 - 10:10

A conservative attitude

10:10 - 10:12

So, under the impetus of the justices

10:12 - 10:15

The U.S. Supreme Court first ruled in 1996

10:15 - 10:16

What about computer code?

10:16 - 10:18

Is protected by the First Amendment to the Constitution

10:18 - 10:20

It's a form of speech

10:20 - 10:21

So certain

10:21 - 10:23

It is a milestone for our industry

10:23 - 10:25

Judgment, you are not for military use anymore

10:25 - 10:27

Then you can popularize it.

10:27 - 10:27

So what about this?

10:27 - 10:29

Helping the crypto industry

10:29 - 10:30

Hey, won a small step

10:31 - 10:33

And the winner was still 1999.

10:33 - 10:35

Clinton can't hold on

10:35 - 10:37

It was cancelled. It was in name only

10:37 - 10:39

Encryption Technology Export Control Act

10:39 - 10:41

So the outcome of this war

10:41 - 10:43

The crypto industry has won outright

10:43 - 10:43

What about encryption?

10:43 - 10:46

It has also become the core infrastructure of the Internet

10:46 - 10:49

What about PGP becoming the encryption standard for email?

10:49 - 10:51

SSL TLS

10:51 - 10:53

Protect all online transactions

10:57 - 10:58

We all know that.

10:58 - 11:00

What about the results of the first two wars?

11:00 - 11:02

Just let our encryption technology

11:02 - 11:06

Stay in the stage of protecting information security online

11:06 - 11:08

An encrypted message can only be a message

11:08 - 11:10

Can't it be called a cryptoasset?

11:10 - 11:13

We want to turn virtual data and virtual information into assets

11:13 - 11:14

There is progress in the middle

11:14 - 11:15

This time

11:15 - 11:17

Let's go back in time to 1994.

11:17 - 11:18

Amsterdam

11:18 - 11:20

A group of cypherpunks

11:20 - 11:21

What did they discuss?

11:21 - 11:23

Here's a more subversive idea.

11:24 - 11:24

Digital Currency

11:24 - 11:27

The real reason why governments control encryption

11:27 - 11:28

Just want to control the money

11:28 - 11:31

What if we create an uncontrolled currency?

11:31 - 11:33

That's the real crypto revolution.

11:33 - 11:35

With the Amsterdam conference?

11:35 - 11:36

It started a bud.

11:36 - 11:38

After that, a series of pioneering

11:38 - 11:39

Ideas emerge.

11:39 - 11:42

For example, Adam buck invented hashed cash in '97

11:42 - 11:44

This software was originally developed

11:44 - 11:46

Is used to combat email spam

11:46 - 11:48

However, in the programming thinking of this software

11:48 - 11:51

People use the concept of proof of work

11:51 - 11:52

And what?

11:52 - 11:54

They also wrote a white paper in 2002

11:54 - 11:57

The buds of POW are starting to appear

11:57 - 11:58

Then go back

11:58 - 12:01

In 1998, David published a B-money proposal

12:01 - 12:02

Who is David?

12:02 - 12:05

Definitely a Chinese light in our crypto industry

12:05 - 12:06

Because of the B-money proposal?

12:06 - 12:07

Is the first complete

12:07 - 12:10

Describe a distributed digital currency system

12:10 - 12:12

What about distributed plus proof-of-work?

12:12 - 12:14

It's the very familiar Pow behind us.

12:14 - 12:15

What about David?

12:15 - 12:18

He was also one of the first two people to be contacted by Satoshi Nakamoto

12:18 - 12:19

What about his contribution?

12:19 - 12:20

Very important.

12:20 - 12:22

So many years later

12:22 - 12:23

Vitalik, the founder of Ethereum

12:23 - 12:27

The smallest unit of Ethereum is named Wei.

12:27 - 12:29

It is to express my high respect for David

12:29 - 12:30

But no matter how sublime it is

12:30 - 12:32

It's an intermediate state.

12:32 - 12:34

Encrypted information still hasn't become cryptocurrency

12:34 - 12:35

Develop from the future

12:35 - 12:38

Between 1998 and 2005

12:38 - 12:40

There's a guy named Nick Sabo

12:40 - 12:42

He came up with the big god idea

12:42 - 12:43

Bit gold

12:43 - 12:46

It not only integrates proof-of-work and value storage

12:46 - 12:47

Cleverly put together

12:47 - 12:50

It also proposed a smart contract

12:50 - 12:51

Revolutionary concept

12:51 - 12:51

Did he become

12:51 - 12:53

Hey, he didn't make it either.

12:53 - 12:54

The work of these pioneers

12:54 - 12:57

It seems that they are all touching the edge of their dreams

12:57 - 12:58

But always

12:58 - 13:01

All missing the last piece of the puzzle

13:01 - 13:04

How can we achieve this without a centralized authority?

13:04 - 13:07

Let all participants reach a consensus on the transaction

13:07 - 13:10

That's a question that's puzzled cryptographers for 20 years.

13:11 - 13:12

If consensus cannot be established

13:12 - 13:15

This encrypted data is always just data.

13:15 - 13:16

Can't change at all

13:16 - 13:20

Assets until October 31, 2008

13:20 - 13:22

A mysterious figure under the pseudonym Satoshi Nakamoto

13:22 - 13:24

On the cryptography mailing list

13:24 - 13:26

Published a white paper on Bitcoin

13:26 - 13:26

What about this plan?

13:26 - 13:29

It's a clever integration of the leading areas up ahead

13:29 - 13:32

They adopted Hashcash's proof-of-work system

13:32 - 13:35

Ah, borrowing the decentralized design concept of b money

13:35 - 13:38

Merkle tree is also used for transaction verification

13:38 - 13:40

Knead together this new system

13:40 - 13:42

Solved all the problems before death

13:42 - 13:45

That's how to do it in a fully decentralized environment.

13:46 - 13:47

Reach consensus

13:47 - 13:49

Okay, so this technological advance is very important.

13:49 - 13:50

Until now

13:50 - 13:52

We still have a large number of crypto projects

13:52 - 13:55

It has to be done in a decentralized way.

13:55 - 13:56

To achieve its consensus accumulation

13:56 - 13:58

Including what we now hear about oops

13:58 - 14:00

A project is zero

14:00 - 14:01

Let you build the node

14:02 - 14:03

What about these words?

14:03 - 14:05

In fact, it is to guide everyone.

14:05 - 14:06

Let's build this together

14:06 - 14:08

A decentralized verification network

14:08 - 14:11

In order to solve the consensus problem of these projects

14:11 - 14:12

No consensus

14:12 - 14:15

The assets it issues are just data loss assets

14:15 - 14:17

That's why.

14:17 - 14:19

Our industry has given us a lot of small white users.

14:19 - 14:20

Some 0 opportunities

14:20 - 14:21

Like recently?

14:21 - 14:23

We have a top gifter, Dad

14:24 - 14:25

What about this project?

14:25 - 14:28

In order to build an AI-usable two-layer network

14:28 - 14:29

What about his chain?

14:29 - 14:32

It is to assist AI developers around the world

14:32 - 14:34

Reasoning training at scale

14:34 - 14:36

Or validate their models

14:36 - 14:37

What about a project like that?

14:37 - 14:39

It requires a large number of decentralized nodes

14:39 - 14:40

What about countless nodes?

14:40 - 14:42

Make up its final computing network

14:42 - 14:43

Then this network

14:43 - 14:45

To help AI projects run some models

14:46 - 14:48

You said if he was a project in another industry

14:48 - 14:49

Then you don't need to do it at all.

14:49 - 14:51

Because he has achieved 5.50 million

14:51 - 14:53

Dollar seed round financing?

14:53 - 14:55

Investment institutions are very hardcore

14:55 - 14:57

Includes SNZ water drop IoT

14:57 - 14:59

And they have very strong financing capabilities

14:59 - 15:00

Doing a new round of financing

15:00 - 15:01

Raised so much capital

15:01 - 15:02

Such a project

15:02 - 15:03

In our industry

15:03 - 15:05

You still have to deploy decentralized nodes.

15:05 - 15:08

As for the user, just go to his official website.

15:08 - 15:10

You can apply, I want to be a node.

15:10 - 15:11

Start running for free

15:11 - 15:12

It costs nothing.

15:12 - 15:13

Just dry it.

15:13 - 15:15

What about rewarding users for becoming nodes?

15:15 - 15:15

What about this project?

15:15 - 15:17

Reward users?

15:17 - 15:20

One is to reward the tokens issued by their own project

15:20 - 15:20

Can you also reward?

15:20 - 15:22

They are an investor in Iotex.

15:22 - 15:24

What about the token Iotex of another project?

15:24 - 15:27

It is an old project that has been listed on Binance for many years

15:27 - 15:29

The currency price is still relatively good.

15:29 - 15:31

So, the reward is also considered real money

15:32 - 15:32

With this reward

15:32 - 15:35

What about their current global free node?

15:35 - 15:36

It has reached more than 500,000

15:36 - 15:38

And that's because of this mechanism.

15:38 - 15:40

The first is to ensure the cyber security of the project party.

15:40 - 15:41

second

15:41 - 15:44

It's a chance for us regular participants to use it for nothing

15:44 - 15:46

So in our industry, you can see a lot of useless use.

15:46 - 15:47

Today this is for nothing.

15:47 - 15:48

Tomorrow, Bai Lu

15:48 - 15:50

Is it but buying hardware?

15:50 - 15:52

Help them provide some.

15:52 - 15:56

There are also more than 5,000 such hardware nodes for CPU computing power

15:56 - 15:58

Although it costs money to buy hardware nodes?

15:58 - 15:59

They're about 900 dollars each.

15:59 - 16:02

But what about the benefits of hardware nodes?

16:02 - 16:04

That's worth hundreds of software nodes.

16:04 - 16:05

So we can see

16:05 - 16:06

Under this incentive

16:06 - 16:07

What about the project team?

16:07 - 16:10

It can quickly set up its decentralized network

16:10 - 16:11

Keep his network safe

16:11 - 16:12

Your encrypted data

16:12 - 16:15

It was supposed to be in a centralized bank

16:15 - 16:16

To become money

16:16 - 16:18

After all, people have a consensus about banks

16:18 - 16:21

Now your encrypted data is in my bag.

16:21 - 16:23

The heart can become money on the Internet

16:23 - 16:25

My decentralized network

16:25 - 16:27

A new consensus system has been established

16:27 - 16:30

So encrypted data can be turned into encrypted assets

16:30 - 16:32

This technological advance

16:32 - 16:34

It has taken our crypto industry to the next level.

16:34 - 16:36

Create new value

16:36 - 16:37

So we can see

16:37 - 16:38

No matter it was Bitcoin back then

16:38 - 16:41

Or any of the current three web projects

16:41 - 16:43

Your essence is cryptoassets

16:43 - 16:45

Is to solve the consensus mechanism

16:45 - 16:46

No consensus mechanism

16:46 - 16:48

You're basically encrypted data.

16:48 - 16:50

Unable to make cryptoassets

16:51 - 16:51

Okay

16:51 - 16:53

After Bitcoin came up with such a solution

16:53 - 16:55

Put your white hands here

16:55 - 16:57

I didn't expect God to help me too

16:57 - 16:57

We all know that.

16:57 - 16:59

A month before the launch of bitcoin

16:59 - 17:01

Lehman Brothers collapsed

17:01 - 17:02

Collapse

17:02 - 17:04

The global financial crisis broke out in full force

17:05 - 17:06

People start to question

17:06 - 17:08

Your bank is unreliable.

17:08 - 17:10

The traditional financial system is unstable.

17:10 - 17:12

You see someone passing a pillow when you are asleep

17:12 - 17:14

January 3, 2009

17:14 - 17:15

Bitcoin genesis block was born

17:15 - 17:18

Satoshi Nakamoto in People's Fear of Banks

17:18 - 17:20

Wrote a sentence like this

17:20 - 17:20

What about this sentence?

17:20 - 17:22

This is from the Times.

17:22 - 17:25

It is not just a record of the time when the blockchain was generated

17:25 - 17:28

It is a silent indictment of the traditional financial system

17:28 - 17:30

What about the recipient of the first bitcoin transaction?

17:30 - 17:33

It was Hal Finney who interned at DigiCash

17:33 - 17:34

Where was he?

17:34 - 17:36

In January 2009

17:36 - 17:38

When receiving 10 bitcoins from Satoshi Nakamoto

17:39 - 17:41

And he wrote on Twitter, hmm.

17:41 - 17:43

Running bitcoin

17:43 - 17:44

But he didn't expect

17:44 - 17:46

It was just a normal tweet.

17:46 - 17:49

Later, it became a currency several times in history

17:49 - 17:51

One of the most famous records

17:51 - 17:51

Ok then

17:51 - 17:52

Technology has advanced.

17:52 - 17:54

Bitcoin has been created

17:54 - 17:55

Drive value

17:55 - 17:56

What's coming?

17:56 - 17:58

The third encryption war is coming

18:02 - 18:02

Year 2011

18:02 - 18:06

Bitcoin first attracted the attention of the US government

18:06 - 18:07

WikiLeaks is in

18:07 - 18:09

After being blocked by credit card companies and banks

18:09 - 18:12

Start accepting donations in bitcoin

18:12 - 18:14

This time let the world realize wow

18:14 - 18:14

There is another

18:14 - 18:18

A currency independent of our banking system

18:18 - 18:19

And he's uncensored.

18:19 - 18:20

Unblocked

18:20 - 18:22

Good guy is awesome

18:22 - 18:23

What about the National Senator?

18:23 - 18:26

Track immediately issued a warning at the press conference

18:26 - 18:29

Bitcoin is a digital form of money laundering

18:29 - 18:30

This is the U.S. government.

18:30 - 18:32

The first public statement on bitcoin

18:32 - 18:34

However, by 2017

18:34 - 18:36

The bitcoin received by WikiLeaks

18:36 - 18:39

This returns more than 500 times

18:39 - 18:39

At that time

18:39 - 18:41

Bitcoin only rose to $5,000 each

18:41 - 18:42

How much is it today?

18:42 - 18:44

90,000 dollars today

18:44 - 18:46

WikiLeaks dares to take the coin now

18:46 - 18:48

10,000 times the return

18:48 - 18:50

A dollar becomes 10,000 dollar

18:50 - 18:52

That's a 10,000-fold increase.

18:52 - 18:54

And the senator who cracked down on Bitcoin?

18:54 - 18:56

Su Mo has changed now

18:56 - 18:59

He has become one of the few in the Democratic Party

18:59 - 19:03

Diehard fans of cryptocurrency

19:03 - 19:04

Ah!

19:05 - 19:07

You see, justice can be late.

19:07 - 19:09

But never absent

19:09 - 19:11

Okay, what if this incident

19:11 - 19:13

This is the beginning of the third encryption war

19:13 - 19:17

Then in 2014, the war was fully extended

19:17 - 19:17

What about this war?

19:17 - 19:19

Very bad for our industry

19:19 - 19:20

At that time

19:20 - 19:22

The world's largest bitcoin exchange, Mentougou

19:22 - 19:23

suddenly closed

19:23 - 19:26

850,000 bitcoins disappeared into thin air

19:26 - 19:27

What concept 850,000?

19:27 - 19:31

That was seven percent of all the bitcoins on the network.

19:31 - 19:32

Where will it be?

19:32 - 19:33

President of the United States or Obama

19:33 - 19:35

And a Democrat?

19:35 - 19:36

Democrats want to protect, right?

19:36 - 19:39

So he did it for the reason of protecting assets?

19:39 - 19:41

Start strengthening the regulation of the crypto industry

20:10 - 20:10

Okay.

20:10 - 20:12

The Democratic Party was in power at that time

20:12 - 20:14

Trump pressed the pause button

20:14 - 20:16

During the transition in 2017

20:16 - 20:17

Trump administration

20:17 - 20:20

A very important institutional breakthrough has taken place

20:20 - 20:23

That is, our crypto industry fought back.

20:23 - 20:25

Chicago Mercantile Exchange CME

20:25 - 20:28

And the Chicago Board Options Exchange CBOE

20:28 - 20:30

Launched futures contracts for bitcoin

20:30 - 20:31

At that time

20:31 - 20:33

Under that battle situation?

20:33 - 20:33

This trick

20:33 - 20:36

No less than the current bitcoin on the spot ETF

20:36 - 20:37

Just this trick

20:37 - 20:39

Let Bitcoin start from $1,000

20:39 - 20:42

Soaring to $20,000

20:42 - 20:44

This event marks Bitcoin's victory over Wall Street

20:44 - 20:46

He started as an asset

20:46 - 20:48

Adopted by the Wall Street elite

20:48 - 20:49

What about regulation? With this incident

20:49 - 20:51

Subtle changes began to take place

20:51 - 20:54

From a completely negative definition to a money laundering tool

20:54 - 20:56

Turning to try to understand and regulate

20:57 - 20:58

But it didn't last.

20:58 - 21:00

In 2020, we all know

21:00 - 21:02

American University Democrat Biden is back in office

21:02 - 21:03

As soon as Biden came to power

21:03 - 21:05

It brought these three battles to a climax

21:05 - 21:06

During his reign

21:06 - 21:08

Launched an all-round encirclement and suppression of our industry

21:08 - 21:12

They are trying to control our industry through regulation

21:12 - 21:13

For example, with the support of the Biden administration

21:13 - 21:14

What about the SEC?

21:14 - 21:17

Cryptocurrences must not have any value

21:17 - 21:19

Haha, as long as you have value.

21:19 - 21:20

You could be a security

21:21 - 21:22

If you are a security, you are breaking the law

21:22 - 21:23

What about this part?

21:23 - 21:25

We talked about it in detail in this video.

21:25 - 21:27

What's at stake?

21:27 - 21:28

It is precisely because of this policy

21:28 - 21:31

As a result, our industry is now full of life

21:31 - 21:32

The value coin is reversed

21:32 - 21:35

And they also changed the accounting standards?

21:36 - 21:37

All holdings are required to add

21:37 - 21:38

Cryptocurrency institutions

21:38 - 21:40

You only need to hold cryptocurrency

21:40 - 21:42

You need to prepare the same amount of cash.

21:42 - 21:45

This defines cryptocurrency as debt

21:45 - 21:46

You hold so much debt

21:46 - 21:48

You must be backed by cash assets.

21:48 - 21:50

You say how unfair this bill is?

21:50 - 21:52

This discerning person can't pass it

21:52 - 21:53

So we can see

21:53 - 21:55

Originally, what about the Senate and House of Representatives?

21:55 - 21:55

What about this proposal?

21:55 - 21:57

Are about to be pushed down

21:57 - 21:57

Biden

21:57 - 22:00

By his own efforts as president

22:00 - 22:02

Keep this heaven-defying rule

22:02 - 22:04

So what about this war?

22:04 - 22:06

Was pulled to a climax during the Biden administration?

22:06 - 22:09

During the period, the SEC sued this today

22:09 - 22:10

Report that tomorrow

22:10 - 22:11

What's forcing Anya Reb?

22:12 - 22:14

Fortunately, we are now in a turning point

22:14 - 22:15

What about these three battles?

22:15 - 22:17

I thought the crypto industry was going to lose

22:17 - 22:18

But what about Trump?

22:18 - 22:19

Now with the support of the crypto industry

22:19 - 22:22

Reclaiming the president's second job

22:22 - 22:23

And this time the team

22:24 - 22:25

All support encryption

22:25 - 22:27

When he comes to power, he may turn the tide of the war

22:27 - 22:28

During his tenure

22:28 - 22:31

It is entirely possible to help us finish these three battles

22:31 - 22:33

And let the crypto industry win beautifully

22:34 - 22:36

Although it is beautiful, it is not a fairy.

22:36 - 22:38

I can't be specific.

22:38 - 22:39

During his tenure

22:39 - 22:42

What kind of policies and regulations will be implemented on our industry?

22:42 - 22:44

But we can grasp the overall direction

22:44 - 22:46

The main thing is to reduce excessive government regulation

22:46 - 22:47

At the same time

22:47 - 22:49

Allow citizens to freely choose their investments

22:49 - 22:51

And there have been rumors recently that Trump

22:51 - 22:53

Ready to cancel the issuance of US companies

22:53 - 22:56

All capital gains taxes on cryptocurrencies

22:56 - 22:57

What if that's the case?

22:58 - 22:58

What about these three battles?

22:58 - 22:59

We're going to win.

22:59 - 23:00

Not only is it a win

23:00 - 23:03

The fruits of victory in these three battles could be huge

23:03 - 23:07

Maybe we will directly disrupt the traditional financial industry

23:07 - 23:08

What stock?

23:08 - 23:09

Commodity futures

23:09 - 23:11

Step aside and think bigger

23:11 - 23:13

Maybe what currency?

23:13 - 23:14

The dollar is on the sidelines.

23:14 - 23:15

Hahaha

23:15 - 23:17

Our cryptocurrency will directly replace it.

23:17 - 23:20

And of course, I was right.

23:24 - 23:25

What about the end of the video?

23:25 - 23:28

Let's take a look back at the century-old history of our industry

23:28 - 23:29

Developed for 100 years

23:29 - 23:30

They fought three wars.

23:30 - 23:31

The First Crypto War

23:31 - 23:32

Crypto narrowly wins

23:32 - 23:35

Haha, our industry has become the infrastructure of the military.

23:37 - 23:38

Second Crypto War

23:38 - 23:39

Crypto wins big

23:40 - 23:42

Encryption eventually became the bedrock of the Internet.

23:44 - 23:45

Third Crypto War

23:45 - 23:48

Can he become the infrastructure of the financial industry?

23:48 - 23:48

What about this question?

23:48 - 23:50

And I want to leave you with this thought.

23:50 - 23:52

But regardless of the final outcome

23:52 - 23:53

We all saw it.

23:53 - 23:54

100 years of development

23:54 - 23:57

Behind it is the hard work of countless practitioners day and night

23:57 - 24:00

It's the thinning hair of countless programmers

24:00 - 24:02

It's the work of generations.

24:02 - 24:04

It's all of us here.

24:04 - 24:06

The desire for technological progress

24:06 - 24:06

Since ancient times

24:06 - 24:09

the fragrance of plum blossoms comes from bitter cold

24:09 - 24:10

What about the path to victory?

24:10 - 24:12

It needs to be done step by step.

24:12 - 24:14

Fortunately, I have you along the way.

The Crypto Wars: A Century of Evolution

In the last 100 years, the crypto industry has seen significant developments, facing three major battles with governments and regulations. From its origins in encryption during wartime to becoming a vital infrastructure for the internet and potentially the financial industry, the industry has evolved through challenges and triumphs.

The Early Battles: World Wars and Encryption Technologies

The crypto industry traces its roots back to World War I, where encryption technologies played a crucial role in communication security for nations. The interception of a German secret cable led to the birth of the Enigma cipher machine, marking the first major adoption of encryption in a real-world scenario. This led to the industry's emergence as a crucial player serving military markets.

Evolution and Innovation: The Rise of Commercial Encryption

Following the wars, encryption technology advanced, with scientists exploring its application in commercial domains. From the development of revolutionary encryption algorithms like DES to the introduction of SSL and TLS protocols to secure online transactions, the industry transitioned to serving broader commercial applications beyond military use.

The Crypto Revolution: Birth of Cryptocurrencies

The true revolution in the crypto industry began with the introduction of cryptocurrencies like Bitcoin. Satoshi Nakamoto's whitepaper on Bitcoin in 2008 brought to life a decentralized currency system using blockchain technology, fundamentally transforming the concept of digital assets.

Crypto Wars: Regulation and Resistance

However, with the rise of cryptocurrencies came regulatory challenges. Governments, including the US, sought to control and regulate the industry, leading to conflicts and battles like the three Crypto Wars. From clashes with the Biden administration to challenges with SEC regulations, the industry faced significant turbulence.

The Future of Crypto: Trump's Potential Impact

Despite the challenges, the future of the crypto industry looks promising, especially under the influence of leaders like Trump. His support for blockchain and potential policies favoring the industry offer hope for a more favorable regulatory environment, potentially leading to significant disruptions in traditional financial systems.

In conclusion, the crypto industry has come a long way over the past century, evolving from wartime encryption to global digital assets. The battles and triumphs have shaped the industry into a vital player in the modern economy, with potential for further growth and disruption in the future. Trump's potential impact on the industry could signify a new era of opportunities and developments.

What lies ahead for the crypto industry is still uncertain, but the resilience shown throughout its history indicates a promising future filled with innovation and challenges to overcome. The journey continues, with the next chapter waiting to be written in the ever-evolving world of crypto.