The hottest Market cap Substack posts right now

And their main takeaways
Category
Top Crypto Topics
Category Pirates 471 implied HN points 10 Apr 23
  1. Driving market capitalization for a growth company involves getting people to understand category potential.
  2. Marketing grounded in Category Design helps create economic conditions for a company to win by creating new market categories.
  3. Investors bet on a company's future potential, not just past performance, which relies heavily on understanding and driving the size and growth of its category.
Senatus’s Newsletter 19 implied HN points 12 Jan 24
  1. Every Proof of Work coin must choose between specialized hashing, leading to centralization over time, or generalized hashing, resulting in a constantly insecure chain.
  2. Specialized hashing algorithms for Proof of Work require specific hardware, electricity, space, maintenance, and capital, leading to centralization over time.
  3. Generalized hashing algorithms allow more participation but can make the chain insecure due to the vast latent hashrate available for potential attacks.
Get a weekly roundup of the best Substack posts, by hacker news affinity:
Senatus’s Newsletter 39 implied HN points 10 Jul 23
  1. Bitcoin's security spending is decreasing in proportion to its market cap, making it vulnerable to attacks.
  2. As Bitcoin's block rewards decrease, security spending as a percentage of market cap also decreases, making attacks more profitable.
  3. Without a significant increase in fee income, Bitcoin's security vulnerability will worsen unless solutions like a tail emission are considered.
The Great Reset Diary 2022- 19 implied HN points 08 May 23
  1. The Bitcoin network is currently congested, with over 460,000 pending transactions which has led to a significant increase in transaction fees.
  2. Binance suspended BTC withdrawals due to the congestion, highlighting the fragility of the Bitcoin network.
  3. Unlike Ethereum, Bitcoin doesn't have robust mechanisms to handle congestion issues, making it vulnerable to potential deliberate attacks.