All Tasks
Earn Bitcoin for completing tasks & tutorials.
Introduction
The network state is built cloud first, land last. Rather than starting with the physical territory, we start with the digital community.

Inheritance, Incentives, Ideology
There are three ways to align large groups of people: genetics, economics, and politics.

Infinite Frontier, Immutable Money, Eternal Life
Our purpose is to pursue transhumanism in the broadest sense: infinite frontier, immutable money, eternal life.

Social Trees and Network Unions
A network union is a global, mobile social network capable of collective bargaining with companies and states alike.

America, India, Israel, and Singapore
America, India, Israel, and Singapore are different forks of the original United Kingdom codebase.

100% Democracy vs 51% Democracy
Technological democracy uses Tiebout sorting, crowdchoice, and the ledger of record to enable 100% of the population to consent – rather than just 51%.

Decentralizing Media
Redistribute power from centralized legacy media and social media corporations to a million hubs and a billion spokes.

Getting started with 1729
Set up Metamask, register an ENS name, and complete your first task.
The Network State
Technology has allowed us to start new companies, new communities, and new currencies. But can we use it to create new cities, or even new countries?

Introduction To Cryptocurrency
A free course on cryptocurrencies for developers. Covers history, cryptographic foundations, networking, consensus, game theory, Bitcoin, Ethereum.

A Cambrian Explosion of Crypto Proofs
In 2019, we saw an explosion of activity in zero-knowledge proofs. This brief review for cryptographers surveys the field.

What will happen to cryptocurrency in the 2020s?
Scalable and private blockchains, barbell adoption curves, crypto as a core part of tech, and traction with institutions and governments.

Bitcoin becomes the Flag of Technology
Tech is internationalist, capitalist, decentralized, hyperdeflationary, networked, encrypted, digital, volatile, ambitious, and quietly revolutionary. So is Bitcoin.
What are the Key Properties of Bitcoin?
There are plenty of unwritten rules when it comes to proposing protocol changes in Bitcoin. Some are philosophical, some are technical, and some are a blend.
Credible Neutrality As A Guiding Principle
When building mechanisms that decide high-stakes outcomes, it’s important for those mechanisms to be credibly neutral.

It Will Take Years for Smart People to Understand Cryptocurrencies
Smart people just don’t want to hear about the religion of crypto anymore. They want to see the reality of what it can do. And that will take time.

A beginner's guide to DeFi
An introduction to decentralized finance. Covers stablecoins, composability, decentralized lending, dexes, and identity.

Coinbase’s Pragmatic Crypto Culture
If there is a defining cultural trait that was responsible for Coinbase's success, it was the company’s pragmatism.
Zcash, the HTTPS of Blockchains
Zcash encrypts data on a public blockchain much like HTTPS encrypts data on the public internet.


Bitcoin's P2P Network
Bitcoin's P2P network comes with its own unique challenges: bootstrapping your initial peers, defending against spam, and ensuring network-level privacy.

Gnutella: an Intro to Gossip
Gnutella was one of the first decentralized P2P protocols to take off after the death of Napster. It's a direct predecessor to Bitcoin's networking design.

P2P Networking
Bitcoin is built atop the shoulders of the early P2P file sharing protocols. And the history of P2P file sharing starts with the grandfather of all massive P2P protocols, Napster.

Public-Key Cryptography
Without public key cryptography, Bitcoin would be impossible. It lays the foundation for digital identities and cryptographically enforced property rights.

Hashcash
To understand Bitcoin's consensus mechanism and the concept of proof-of-work, we first have to understand Hashcash.

Merkle Trees
Merkle trees magically represent arbitrary amounts of data with a constant amount of space.

Satoshi Nakamoto
We don't know who Satoshi Nakamoto was, where they came from, or where they are today. But here's what we do know.

The Cypherpunks
"Cypherpunks write code. We know that someone has to write software to defend privacy, and we're going to write it." — The Cypherpunk's Manifesto, 1993

A Brief History of Money
To understand why cryptocurrencies were invented, you first have to understand the problem they were meant to solve.
