What is there to show? Not shit, that's why I made this pretty 4K desktop background instead:submitted by o_ohi to retard_bot [link] [comments]
On the real: I've been developing this project like 6 months now, what's up? Where's that video update I promised, showing off the Bot Builder? Is an end in sight?
Yes sort of. I back-tested 6 months of data at over 21% on a net SPY-neutral, six month span of time (with similar results on a 16 year span) including 2 bear, 2 bull, 2 crab months. But that's not good enough to be sure / reliable. I had gotten so focused on keeping the project pretty and making a video update that I was putting off major, breaking changes that I needed to make. The best quant fund ever made, the Medallion fund, was once capable of roughly 60% per year consistently, but in Retard Bot's case 1.5% compounded weekly. "But I make 60% on one yolo" sure whatever, can you do it again every year, with 100% of your capital, where failure means losing everything? If you could, you'd be loading your Lambo onto your Yacht right now instead of reading this autistic shit.
The End Goal1.5% compounded weekly average is $25K -> $57M in 10 years, securing a fairly comfortable retirement for your wife's boyfriend. It's a stupidly ambitious goal. My strategy to pull it off is actually pretty simple. If you look at charts for the best performing stocks over the past 10 years, you'll find that good companies move in the same general trajectory more often than they don't. This means the stock market moves with momentum. I developed a simple equation to conservatively predict good companies movements one week into the future by hand, and made 100%+ returns 3 weeks in a row. Doing the math took time, and I realized a computer could do much more complex math, on every stock, much more efficiently, so I developed a bot and it did 100% for 3 consecutive weeks, buying calls in a bull-market.
See the problem there? The returns were good but they were based on a biased model. The model would pick the most efficient plays on the market if it didn't take a severe downturn. But if it did, the strategy would stop working. I needed to extrapolate my strategy into a multi-model approach that could profit on momentum during all different types of market movement. And so I bought 16 years of option chain data and started studying the concept of momentum based quantitative analysis. As I spent more and more weeks thinking about it, I identified more aspects of the problem and more ways to solve it. But no matter how I might think to design algorithms to fundamentally achieve a quantitative approach, I knew that my arbitrary weights and variables and values and decisions could not possibly be the best ones.
Why Retard Bot Might WorkSo I approached the problem from all angles, every conceivable way to glean reliably useful quantitative information about a stock's movement and combine it all into a single outcome of trade decisions, and every variable, every decision, every model was a fluid variable that machine learning, via the process of Evolution could randomly mutate until perfection. And in doing so, I had to fundamentally avoid any method of testing my results that could be based on a bias. For example, just because a strategy back-tests at 40% consistent yearly returns on the past 16 years of market movement doesn't mean it would do so for the next 16 years, since the market could completely end its bull-run and spend the next 16 years falling. Improbable, but for a strategy outcome that can be trusted to perform consistently, we have to assume nothing.
So that's how Retard Bot works. It assumes absolutely nothing about anything that can't be proven as a fundamental, statistical truth. It uses rigorous machine learning to develop fundamental concepts into reliable, fine tuned decision layers that make models which are controlled by a market-environment-aware Genius layer that allocates resources accordingly, and ultimately through a very complex 18 step process of iterative ML produces a top contender through the process of Evolution, avoiding all possible bias. And then it starts over and does it again, and again, continuing for eternity, recording improved models when it discovers them.
The Current Development PhaseOr... That's how it would work, in theory, if my program wasn't severely limited by the inadequate infrastructure I built it with. When I bought 16 years of data, 2TB compressed to its most efficient binary representation, I thought I could use a traditional database like MongoDB to store and load the option chains. It's way too slow. So here's where I've ended up this past week:
It was time to rip off the bandaid and rebuild some performance infrastructure (the database and decision stack) that was seriously holding me back from testing the project properly. Using MongoDB, which has to pack and unpack data up and down the 7 layer OSI model, it took an hour to test one model for one year. I need to test millions of models for 16 years, thousands of times over.
I knew how to do that, so instead of focusing on keeping things stable so I could show you guys some pretty graphs n shit, I broke down the beast and started rebuilding with a pure memory caching approach that will load the options chains thousands of times faster than MongoDB queries. And instead of running one model, one decision layer at a time on the CPU, the new GPU accelerated decision stack design will let me run hundreds of decision layers on millions of models in a handful of milliseconds. Many, many orders of magnitude better performance, and I can finally make the project as powerful as it was supposed to be.
I'm confident that with these upgrades, I'll be able to hit the goal of 60% consistent returns per year. I'll work this goddamn problem for a year if I have to. I have, in the process of trying to become an entrepreneur, planned project after project and given up half way through when it got too hard, or a partner quit, or someone else launched something better. I will not give up on this one, if it takes the rest of the year or five more.
But I don't think it'll come to that. Even with the 20% I've already achieved, if I can demonstrate that in live trading, that's already really good, so there's not really any risk of real failure at this point. But I will, regardless, finish developing the vision I have for Retard Bot and Bidrate Renaissance before I'm satisfied.
The bill that passed is SB 132. Here is the full bill. I would like to highlight the following...g6ze7dh in news on 28 Sep 20 (1pts):
You bring up a very good point. As a woman, God forbid I am ever incarcerated, I could see situations where I would be okay with being housed with a post-SRS trans woman and I could see situations...g6zcn5z in news on 28 Sep 20 (1pts):
It is transphobic to allow trans women to be brutalized in men's prison. It is misogynistic to house people with penises in women's prison. There is only one single solution, a separate space for...g6zcgea in news on 28 Sep 20 (1pts):
Hi, redditor here. Prison needs major safety reforms. Men are raped daily in mens prison and it needs to stop. Every man who has been raped in prison should sue the state and win six figure sums,...g6zc0cv in news on 28 Sep 20 (1pts):
Yes, the protection of males in men's prison is not taken seriously and the prison system needs fundamental reform.g6z9u44 in news on 28 Sep 20 (1pts):
I have a question for you though. If a cis man is being gang raped daily and...
That's not true, recently the trans population has increased dramatically. Also, this bill includes non-binary individuals. People with penises who identify as non-binary will have the option to be...g6z7dq8 in news on 28 Sep 20 (1pts):
Here is a list of California prisons: https://en.wikipedia.org/wiki/List_of_California_state_prisonsg6z6gkl in news on 28 Sep 20 (1pts):
As you can see, there are 35 prisons listed, and the range is 2000 inmates to 5000 inmates per...
This is a very real problem that must be addressed and fixed. Men are raped as a daily occurrence in prison and nobody cares. But the solution is not to send these victimized men into women's...g6z62jm in news on 28 Sep 20 (1pts):
It's unwoke to care about cis womeng2tssll in FemaleDatingStrategy on 25 Aug 20 (1pts):
What would faking an orgasm do for me? What use is it to me? Absolute zilch.
How can you make your system and documents secure? Today, 256-bit AES encryption is offered by everyone and their dog. However, AES encryption does not mean much (or anything at all) when it comes to the real security of your data. Implementing encryption at the right time and in the right spot is no less important than choosing strong encryption credentials and managing the encryption keys.submitted by Elcomsoft to computerforensics [link] [comments]
While the previous part may sound a bit complicated, it all comes down to much simpler things than choosing the strongest encryption algorithm or selecting the length of the encryption key. If you are a Windows user, it all comes down to choosing the optimal data protection strategy for your particular usage scenario; protecting your storage media and the data you keep on them.
Defining your goalsBefore you start considering encrypting your hard drives and files, make sure to define your objectives. What information would you like to protect? What threats do you consider important, less important and quite improbable?
Full-disk encryption part I: protecting your boot deviceA reliable system protection is impossible without protecting your boot device. An unencrypted boot device (disk C: on most systems) allows for way too many vectors of attack ranging from hibernation and page file analysis to instant extraction of stored passwords from your Web browser vault. In other words, securing your boot device with BitLocker is an absolutely mandatory preliminary step and the most important security layer.
We have a comprehensive article on BitLocker protection in our blog, which is highly recommended. Introduction to BitLocker: Protecting Your System Disk
What caveats are there when it comes to securing data against physical extraction? The thing is, while BitLocker is nearly a 100% effective solution for protecting the bare drive, it might not be as secure if the intruder has access to the entire computer with the hard drive installed. Even if your computer is equipped with a TPM2.0/Intel PTT module, Windows will still unlock the encrypted hard drive if Secure Boot conditions are met. This in turn opens numerous vectors of attack that may allow the intruder to intercept the on-the-fly BitLocker encryption key and decrypt the hard drive. These vectors of attack include:
Full-disk encryption part II: protecting external storage devicesBitLocker is good not only for protecting your boot device, but for encrypting data on other volumes, built-in and removable. BitLocker protects external storage devices with BitLocker To Go, an encryption algorithm based on a password. In addition to passwords, external drives encrypted with BitLocker To Go have an option to unlock with a smart card on another computer by using BitLocker Drive Encryption in Control Panel. Finally, users can opt to make their encrypted external devices automatically unlock when connected to their (trusted) computer.
Full-disk encryption part III: using third-party crypto containersI put it here just for the sake of completeness. If you are considering using a crypto-container such as VeraCrypt or PGP, you probably know what it is good for and how to use it. I’ll just add several things that aren’t immediately obvious when you set up encryption. In fact, the two things are so non-obvious that many coach experts have it backwards. (The right way: Choosing the right hashing algorithm – it’s all about slowness).
Crypto containers such as VeraCrypt offer the choice of several (actually, multiple) encryption algorithms that range from the industry-standard AES to some quite exotic algorithms such as Serpent or Kuznyechik. For the paranoiacs among us, VeraCrypt offers stacked encryption (e.g. the Serpent(AES) option). The thing is, the choice of an encryption algorithm does not affect the security of your data (unless you pick an algorithm with known or suspected vulnerabilities; finger pointed to Kuznyechik).
The choice of encryption algorithm does not affect the security of your data. A single round AES-256 encryption will be exactly as secure as Serpent(AES) or Serpent(Twofish(AES)). Moreover, the choice of encryption does not even affect the recovery speed (the speed of brute-force attacks on your password)!
Considering that AES is the only hardware-accelerated encryption algorithm in all reasonably modern processors, choosing any encryption algorithm other than AES-256 will unnecessarily slow down your reads and writes (expect a difference of 2 to 3 orders of magnitude in theoretical RAM-to-RAM encryption speeds) without providing any additional security benefit.
If choosing an encryption algorithm other than AES does not affect security, then what does?
The choice of hashing algorithm
When VeraCrypt encrypts (or decrypts) your data, it is using a binary encryption key to perform symmetric cryptographic operations. This media encryption key (MEK) is stored along with the encrypted data. The Media Encryption Key (MEK) is encrypted with a Key Encryption Key (KEK), which, in turn, is the result of multiple (hundreds of thousands) iterative hash operations performed on the user’s password.
In other words, when you type a password, the crypto container will perform a calculation of a certain hash function, and repeat that a 100,000 times or more (in order to deliberately slow down brute-force attacks).
If you want to make your encrypted volume more secure, you can change one of the two things:
Why would you want to change the number of hash iterations? Because an attacker will first try to break your password using the defaults. Most tools used by the attackers to brute-force your password will first run the attack using all-defaults: the default encryption algorithm (AES), hash function (SHA-512) and PIM. Changing the PIM value is an easy way to substantially increase security without making your password more complex. Changing the hashing algorithm from default (SHA-512) to Whirlpool also makes sense in this context.
Which brings us to the choice of a hashing algorithm. VeraCrypt offers the choice of SHA-512 (slow, good choice), Whirlpool (slower, even better choice), SHA-256 (slow, but not as slow as SHA-512, use other hash instead), and Streebog (untested). Choosing the right hashing algorithm – it’s all about slowness has some benchmarks and some good explanations; highly recommended. Selecting Whirlpool makes a lot of sense because a) it is slower than SHA-512 (thus will be significantly slower to attack), and b) it is a non-default selection, which significantly increases the complexity of the attack.
File system encryption: when and how to use EFSIf you read the Wikipedia article about Microsoft Encrypting File System (EFS), you’ll get that EFS has been introduced in NTFS 3.0 in order to provides file system level encryption. The article reads: “The technology enables files to be transparently encrypted to protect confidential data from attackers with physical access to the computer.”
While all of that is interesting, neither statement explains who and, most importantly, why should be using EFS, and what exactly the encrypting file system protects against.
The purpose of Encrypting File System is protecting your data from users who share your computer. If you have a PC with several users, and each user has their own Windows login (as opposed to sharing a single Windows account), activating EFS encryption is the easiest way to protect your files from being accessed by those other users.
What is the relation between EFS and BitLocker, and which one should you use?
BitLocker protects your entire system volume. Any user who can log in to your computer will unlock the system volume. If a user has administrative privileges (or can escalate a non-admin account by using an exploit), he or she will also gain access to files and documents stored in other users’ accounts on that computer.
Encrypting File System, on the other hand, only protects selected folders. It won’t, for example, protect your instant messenger databases or encrypt your browsing history. It’s mostly just for documents, pictures and videos you keep in your account. However, EFS will effectively protect those files against other users who can log on to your computer, even if they have administrative privileges.
If an attacker got physical access to the computer, BitLocker is the first line of defence. Relying solely on EFS to secure the PC against attacks with physical access is not the best idea.
How does it all work? It’s actually quite simple. Right-click on a file or folder you’d like to encrypt, select Properties and click the Advanced button in the General tab. In the Advanced Attributes dialog select Encrypt contents to secure data and click OK.
This is it. Windows will now encrypt the selected file or folder with your Windows logon credentials. There are no passwords to type and no encryption keys to save.
There is a certain drawback to using EFS encryption. If you ever forget your Windows password and have to reset it from a separate Administrator account (or your domain administrator resets the password for you), the EFS encryption keys will be lost, and you will be unable to decrypt your data without going through the data recovery process with Elcomsoft Advanced EFS Data Recovery. Note that you must recover your Windows password in order to decrypt the files. However, if you simply change your Windows password by following the normal procedure (typing your old password followed by entering the new one), you will be fine.
Document encryptionEncrypting individual documents is an important part of multi-layer security. Microsoft Office apps can use passwords to encrypt the documents’ content. No one without a password should be able to decrypt the document.
The caveats of document encryption
So what exactly does “strong protection (with caveats)” mean? The thing is, your documents are just as secure as the password you use to protect them. If you re-use a password you already stored in your browser cache or in the keychain, extracting that password and decrypting the documents will be a matter of minutes in many types of attacks.
What if you use a cryptographically strong and truly unique password to encrypt documents? Are these documents secure? The thing is, they will be just as secure as the office app permits them to be. In Microsoft Office encryption evolution: from Office 97 to Office 2019 I discussed the encryption algorithms and protection strength of Microsoft Office apps from the early days to the most current release.
Generally speaking, everything before Office 2000 was insecure (no protection). Office 2000, XP and Office 2003 had very weak encryption that can be usually broken in under a day.
Since Office 2007, Microsoft started taking encryption seriously. Office 2010, 2013, 2016, 2019 brought security to the new level, making encrypted documents very secure.
Okay, so you are using the latest Office and selected a strong password; are we secure now? The thing is, you’ll be just as secure as the document format allows. If you are using the newer DOCX/XLSX format (files with .docx / .xlsx extensions), you’re good. If, however, you are saving your documents in “compatibility” mode, you are sacrificing encryption and make your documents as vulnerable as if they were saved by an Office 2003 app.
Protecting backups and archivesMaking regular backups is a common wisdom. Protecting those backups is a wisdom much less common. Once you make a backup, make sure to give it as strong a protection as your boot drive.
Note that password recovery tools work significantly faster on ZIP/7Z/RAR compared to attacking BitLocker encryption or Office 2013 (and newer) documents. For this reason, never reuse your password, and make sure that your BitLocker media, your documents and your backups/archives use very different passwords (ideally, not based on the same pattern).
Cloud security: OneDrive Personal VaultMicrosoft started offering an extra layer of security to all users of its cloud storage service in the form of a Personal Vault. OneDrive Personal Vault helps secure your files both on your computer and in the cloud in the event that someone gains access to your account or your device.
Unlike ransomware protection, Personal Vault is available to all users of Microsoft OneDrive and not just to Office 365 subscribers. Technically speaking, Personal Vault is an area in the OneDrive folder on your computer and in the OneDrive cloud storage that features additional protection. You can only access this protected area after passing a strong authentication. If your Microsoft Account is protected with two-factor authentication, you will have to pass the second step of identity verification in addition to typing your Microsoft Account password.
Once configured, Personal Vault must be manually unlocked every time you need access to secured data. To unlock, you must type in your Microsoft Account password and pass the second authentication step if your account has two-factor authentication. Once you’ve finished accessing the data, Personal Vault will automatically relock after a short period of inactivity. Once locked, any files you were using will also lock and require re-authentication to access.
Setting up Personal Vault only takes a few clicks as outlined in Protect your OneDrive files in Personal Vault.
OneDrive Personal Vault is still new; no independent security analysis has been performed until today. In our view, Personal Vault is worth consideration as an extra security layer for some of the most private but rarely accessed types of data. Examples of such data may include BitLocker escrow keys and binary encryption keys, or the list of passwords some users store in encrypted Excel spreadsheets. I personally keep my two-factor authentication secrets (scanned QR codes to initialize the Authenticator app) in the Vault as well.
Ransomware protectionOne of the most important threats not covered by any encryption is the type of malware called ransomware. Ransomware is a type of malware that threatens to either publish the data stolen from the victim or perpetually block access to the victim’s files by encrypting them with a key that is only known to the attacker. The term ‘ransomware’ has emerged from the fact that, on many cases, attackers demand a ransom payment to decrypt data.
Protecting your data against ransomware is a complex topic in itself. However, computer users can choose one or both of the following two defences when it comes to ransomware protection.
Ransomware protection is effective against the following threats.
If you are using Windows 10, most likely you already have a Microsoft Account. The Microsoft Account gives you access to OneDrive, Microsoft’s cloud storage solution. The free tier includes 5 to 15 GB of online storage, while Office 365 subscribers receive the whole terabyte of cloud storage.
Microsoft actively promotes OneDrive Ransomware Protection. OneDrive automatically detects when the files are mass-deleted or mass-edited (such as when ransomware encrypts the entire Documents folder), alerts the user and prompts to restore the known-good snapshot. The File Restore feature is only available to Office 365 subscribers (Home and Personal levels are enough to receive protection).
More information at Ransomware detection and recovering your files.
If you prefer Dropbox to Microsoft OneDrive, Dropbox gets you covered against ransomware attacks, but mostly for higher-level paid tiers. Users of the free Basic tier as well as Plus subscribers can roll back individual encrypted files during the first 30 days after the attack (there will be no warning of mass-deletion of mass-encryption of files coming from the Dropbox app). If you want to roll back the entire Documents folder with Dropbox Rewind, you’ll need to be a paid Plus or Professional tier subscriber.
Once ransomware is installed on your computer, it will try to encrypt every document that is accessible. The obvious solution is making documents inaccessible by physically disconnecting backup media (such as using 2.5” portable USB drives to back up). In this scenario, you would only connect backup media to your computer when you actually want to make the backup, disconnecting the disk after the backup tool finishes its job. With this approach, even if your computer is attacked by ransomware, your offline backups will not be affected (unless you connected the external drive to the computer at the time the ransomware was installed).
In addition, configure your backup tool to keep snapshots of your data going back as long as permitted by available storage. In our office, an affordable 4TB USB hard drive can keep approximately 30 to 40 full snapshots of the Documents folder; this number becomes significantly larger if you enable incremental backups, with each snapshot saving only
Biblical Christianity requires black-and-white thinking because it is dualistic... Mainstream culture refuses to allow any categories because that would mean making distinctions, which ultimately ends in making value judgments. (which is DISCRIMINATION!) For the record, I am in favor of discrimination, not by race, but by behavior record. Discriminating Evolution from Intelligent Design (the flaws clause) 7 minBoolean Logic
dysphoria is a profound state of unease or a general dissatisfaction with lifesplit personality, eg. Dr. Jekyll and Mr. Hyde
The historic task of cultural change is to resolve throughout the dominant culture the distortions of rationalist human/nature dualisms that deny our ecological embodiment and membership of the global ecological community.In Reality, trends toward the Cosmopolitan Cluster are profoundly dissatisfying to conservative individuals. The CC issue is a case of 'the melting pot'. see also Cosmopolitan Cluster
list of, a good place to look for spies Editorial: The problem of dual citizenship 2014... “dual citizenship can present a security issue whether to permit access to classified information which affects recruitment, employment and assignments.” -US State Dept. In some cases, dual citizenship could disqualify an applicant for a sensitive position with the CIA or the State Department. (But not so for Israelis?)... List Israeli Dual Citizens in the US. 114th Congress; Bernie Sanders is on it 2016 | SotNBinary Competition US vs THEM
For (Moses) Hess, the cardinal sin of the Judaic people was to abandon their heritage, while the cardinal objective of his Communism was to persuade all other people to abandon theirs…Israel’s New Ideology of Genocide 2018
Communism was the means for achieving Judaic supremacy over the gentiles. The gentiles were fated to be reduced to a faceless, deracinated mass. Capitalism was also capable of producing this effect, through free trade and the unfettered financialization of society, in which the management of money becomes a vast business in itself, and where the highest virtue, after obeisance to Judaism, is profit.
ve’ahavta (“love your neighbor as yourself”) admonition to Goyim for regarding their Jewish neighbors; as for the Jews themselves, haba le-horgecha, hashkem le-horgo (“he who comes to kill you, rise early and kill him first” as told in 3 Little Pigs))Juice Dualities Juice, and DNA Melting Plot 1
(wolf) attempts to trick third pig out of his (brick) house by asking to meet him at various places, but he is outwitted each time (3rd pig rises early, does the suggested task, and saves himself from being eaten)
Garrett Hardin writes: "The essential characteristic of a tribe is that it should follow a double standard of morality -- one kind of behavior for in-group relations, another for out-group." -Wild Taboo "It is a tragic irony that discrimination has produced a species (homo sapiens) that now proposes to abandon the principle responsible for its rise to greatness."Survey of Creativity and Destruction 8; Survival is Objective #1 in Evolution
Competitive Exclusion Principle In the competition for living space and resources between two species (or two groups that occupy the same ecological niche), one will inevitably and inexorably eliminate the other. “In a finite universe – and the organisms of our world know no other – where the total number of organisms of both kinds cannot exceed a certain number… one species will necessarily replace the other species completely if the two species are “complete competitors, i.e., live the same kind of life.”
Fool on the Hill; She's Leaving Home; Penny Lane;Crazy - Patsy Cline Cover (Allison Young vocals, Josh Turner Guitar) 8.5k views 3.3 min
Soo.. this has taken a lot longer than anticipated, but I think it is ready.submitted by Valiant-Turtle to HunterXHunter [link] [comments]
I believe I found something that shines a new light on togashi's nen system(maybe somebody already pointed this out but, maybe not. Either way this will be my own spin on it.) This will take some time to explain and is not the easiest of topics to convey with words, but I'll try my best. So bare with me. It will be worth it I promise.
Oh and by the way, I'm not a native speaker, so there are probably many misspellings and grammar fuckups included. I tried my best with what I've been taught, but yes there probably will be A LOT. :D
If anyone would like to help improve the grammar of this post, please message me.
- The book of changes -how two makes four
So, I'm really interested in eastern philosophy and mysticism and while researching the four basic elements, I came about a system that goes up and beyond. It's kind of like the binary system actually. It starts with 2 components, light/hard and dark/soft. Those would resemble the dual level represented by 1/0 or yin and yang. They are portrayed as a continuous line **--- for yang(light)**and a discontinuous line - - for yin(dark). It's a bit un intuitive as they are drawn in black, but what can we do. While it doesn't visually fit with light and dark, there is another property included that is portrayed better through the lines and that is --- yang(hard) and - - yin(soft). The space really helps in conveying the soft quality at least. But enough critiquing of ancient peoples work. I really like to believe they wanted to do better, but just couldn't get their hands on that white ink. So let's cut them some slack and move on.
There are many things in nature that share a dual relation like that, to name a few: cold/warm, fast/slow, night/day, male/female and also to heaven(天) and earth(地) as in spatial directions. They're relation might seem opposite at firs,t but only on the conceptual level. In nature its an ever flowing and changing process.
Yin, dark, soft (female) - -
Yang, light, strong (male) ---
So, right now we have only 2 distinct states, but if we add another line to the image we are suddenly left with four different states (in mathemathical terms this would be 2^2[ two exponent two] in this case 2\2, the first number being the possible states of the unit and the exponent being the number of units combined.* It's neat to see this, but if you totally loathe math, just ignore it, it's not needed to understand this.)
Anyway, I think these are the ones most people are familiar with: air(wind and sometimes wood), water, fire, earth also called: old yin, young yang, young yin, old yang. They make up a continuous cycle while inheriting and recombining the above properties and are fundamentally described like this:
Wind, (風)dry, subtle, coldest (male)
Water (水)most humid, dense, cold (female)
Fire (火)dry, subtle, warmest (male)
Earth (土)humid, densest, warm (female)
That's already pretty interesting I'd say, but what I really want to show you goes one step further. If we now add one more line (2^3), what we get are called the "8 trigrams". I first learned about these in German and now upon taking a closer look at the English versions out there, I chose to take the best from both worlds and use what I can.
Also, from here on out I can include the corresponding Unicode symbols (yes, they really are included, but unfortunately pretty small. But it's nice they don't count as images that way, curse you image limit!)
The 8 trigrams
☰ Kiën (乾 qián),the creative, is the force, is strength, is the sky, the father
☷ Kun (坤 kūn) ,the receptive, is the field, is devotion, is the earth, the mother
☳ Dshen (震 zhèn),the thrilling/exciting, is movement, is shaking, is the thunder, the oldest sun
☵ Kan (坎 kǎn),the abysmal, is danger, is deep water or clouds, the middle son
☶ Gen (艮 gèn),the solitary, is serenity, is standstill, is the mountain, the youngest son
☴ Sun (巽 xùn),the gentle yet penetrating, is the wind or wood, the oldest daughter
☲ Li (離 lí),the adherent, is radiant, is conditioned or bound, is the sun, the flash or the clear flame, the middle daughter
☳ Dui (兌 duì),the joyful, is happiness, is the lake, the youngest daughter
These archetypal forms of energy or emotion are also in a continuous cycle just like the four elements, having additionally gained complexity and character, they inherit everything from their ancestors. At this stage they take on a more personal form. Atleast the 6 children that is, as the parents are still pretty much yin/yang and are, because of that, "out of the picture". They somehow stand above and influence all six, while not descending into their play.
As you probably have noticed this can be done another time creating now 16 variations, but let's not go there, the really important ones right now are the 6 children. Because, you now what also comes in the package of 6?
Yes, Aura types.
Could it really be possible to match these with our 6 categories of nen? Well I have tried. Tell me what you think:
Btw: This is my first drawing since like 10 years and that was highschool art class, so please spare me. If anyone wants to improve this. please do. :D The color grading is still pretty on point though and I wouldn't change that much about it if I did another one. Also this was born directly out of my inspiration when I found out about this, so it kind of grew on my heart. So shush! :P
- Wheel of emotion -
Note: This is my own system of ordering it. I choose it to match togashi's system and also because I think it's the most fitting when looking at personal energies. Only in this order you can really show the flow of energy visually. The original from the book of changes which is funnily called the "I Ging" (at least in German it is. I think there are different pronunciations out there) includes all 8 trigrams, but leaves out circular motion. (I will add that too as reference) .
So what does that jumble mean?
Basically, one could look at it as an age cycle of energy. from young age "Li" all throughout the maturing process right into old age "Gen". But there are many things happening in between that can be looked at.
To get a better understanding and overview, let us first look the symbols in the corner that represent our previous four basic elements:
fire > passion, action
water < flow, emotion
air ^ renewal, intelligence
earth v courage, memory
The second part of this attribution comes from the yogic sciences, where there are four pillars of yoga.
Yoga however does not mean "twisting your body". It means unity and is the path of seeking inclusion.
I included them because they are the only 4 sources you can use to enhance your self.
Fire: Karma yoga. The yoga of action. Using your body and your movement to generate energy.
Water: Bhakti yoga. The yoga of emotion. Using your emotion to include something into your self.
Air: Kriya yoga. The yoga of life energy. Bringing change to once own life energies.
AiEarth: Ghana yoga. The yoga of intelligence, Using your mind to penetrate the world and become something more.
This is how they get extracted from the geometric hexagram:
There's also another symbol right at the bottom (where gen is), that looks at bit weird.
It's the lesser known fifth element:
Akasha or Aether
It's somewhat mysterious and hard to describe as it is invisible in nature.
It's below and above the other four elements in the way that all of the other elements happen in it. It is:
No, not the literal space out in the night sky.. whereby it's often used as a visual representation, but what it really points to is the space that's all around us.
There are things in space and there is space. That's akasha.
There are different symbols used to represent it. In nature it corresponds to the universe, plasma or the color purple
So far we've seen only the main attributition. Here's a more in-depth list of personal traits and correspondences for the four in their pure form. If we look at them in the dynamic spectrum they can mix quite heavily. Aether is not really relevant in that sense, but I think it's important to know its there.
(It's interesting how akasha is not really an element and specialisation is not really a class. But still I fail to see a direct connection. Also the symbol of the hunter association looks very similar.)
The element of fire (choleric)
Positive qualities: vigorousness, zeal, enthusiasm, courage, decisiveness, power of creativity, daring, sedulity...
Negative qualities: quarrelsomeness, irritability, urge to destroy everything, passion, immoderacy, jealousy, voraciousness, vindictiveness, violence, hate, anger, sudden ebullition...
The element of air (sanguine)
Positive qualities: clarity, intelligence, vigilance, care-freedom,diligence, kind-heartedness, swiftness, clarity, lightness, independency, dexterity, optimism
Negative qualities: overly intellectual, lack of perseverance, dishonesty, gossipy, cunningness, garrulousness, inconstancy, touchiness, prodigality...
The element of water (phlegmatic)
Positive qualities: understanding, placidity, mildness, trusting nature, devotion, mercy, forgiveness, modesty, compassion, , pliancy, meditativeness, internalization...
Negative qualities: corruptness, lust, depression, indifference, heartlessness, laziness, indolence, rigidity, lack of daring, lack of concern, unstableness, dejection...
The element of earth (melancholic)
Positive qualities: consistency, conscientiousness, perseverance, punctuality, caution, resistance, responsibility, carefulness, firmness, reliability, sobriety, ambition, respectfulness, matter-of-factness...
Negative qualities: stuffiness, superficiality, laziness, indifference, cumbersomeness, touchiness, lack of conscientiousness, irregularity, timidity, scornfulness...
Somehow they also relate to the four major principles, but I haven't found a way too assign them sufficiently. This is all I got so far:
While being more subtle, correspondences like that can also be found for each of the trigrams. I haven't found a source for that so I'll list all that I picked up:
Now that we got ourselves acquainted with the elemental 101 we can go and look deeper into it.
- Relations between children -(I advise to keep the image of the wheel of emotion open in a sidetab, so it can be looked at while reading the explanation. Otherwise you'll need a very good memory or an avid scrolling finger, But it seems i can post it one more time, so here you go:)
The arrows in the middle that form a hexagon display the hierarchy from oldest to youngest child of each gender and also indicate the parents from which they inherit. As you can see male and female alternate with every image. While not a classification on their own they have a subtle impact on all six. However, one can't simple say that dshen is purely male as these "borders" get washed out increasingly through generations (if there ever were any).
The neighboring images are balancing each other, as one seems to always want to reach into the next.
Progressing like: -> li - dschen - dui - kan - sun - gen -> into li again.
There are many interactions seen in this: The stable earth (gen) wanting to become energy (li) -> pure energy becoming excitement (dschen), energeticness wanting to get a taste of colorful emotion (dui) -> the resulting happiness longing to become deeper emotion (kan) -> deepness becoming gentle and intelligent (sun) -> then growing strong and independent (gen) and finally the lonesomeness wanting to become warm again through communion with the outside world (li).
This example is arbitrary and also you can't really set boundaries on this. I just did, so you have a general understanding of the flow that's being portrayed here. The early form of a trigram differs so heavily from its late version, it could be a new classification on it's own. But more on that later. First let's look at some rules in relation to the hunterxhunter system:
specialization/gen (youngest son) 80%-- conjuration/sun( oldest daughter) 100%-- transmutation/kan (middle son) 80%
When the classification that is looked at for adaptibility is conjuration, which is a daughter, then it would mean the most promising categories will be the sons of a different age group. (Okay.. and what does that mean? I don't know, but that's how it is.) And that's also were the natural balancing flow of energy wants to go:
The strictness and composure of conjuration(sun) wanting to become free through the unbound emotional deepness of transmutation(kan) and the burden of the working intelligence wanting to become cool, steady and lonesome through specialization(gen). While there's a definite tendency towards clockwise progression, it's fair to say that change and interaction can be noticed in every direction. For example the gentleness of sun can calm the troubled waves of kan.
Categories of the same gender always have a 60% learning capability.
If the classification look at is again Conjuration/Sun(oldest daughter), then it would be the other both daughters manipulation/Li(middle) and enhancement/duì(young), that can be learned at a 60% rate. They form a triangle and always have a son in between.
same sex=same rate
The polar category is the one that has the same age, but is of a different gender. I sometimes look at it as the archenemy category, because it's so opposing. If we look at conjuration(sun) again our counter would be emission(zhèn). Heavy planning and thinking and perfectionism against well, Leorio.. :D If one wants to wield the other there is bound to be chaos. And maybe that's why its 40% only,
Here are some Nen users that share this connection.
Gon & Pitou
Leorio & Kurapica
Netero & Meruem
Killua & Illumi
Hisoka & Illumi
Here's a chart that brings all aura types into perspective
You could look at it for days in this way and find harmonies and disharmonies, it's quite beautiful. For me it has become more than an anime fighting system. Its energy and emotion in the play of life. While you certainly can't just pull out hatsus in real life there are some overlappings with the realm of talents and mastery of the real world. It really makes you wonder. But to spare you from my fascinated rambling, I will now move on unto the next thing I have found.
- And Zen what? -
As I have said before it's possible to add another line to the informational pool to achieve 16 variations(2*2*2). But that's not whats being done by the book of changes. It skips this stage entirely and directly combines two trigrams into one hexagram. If this is done for every possible combination there are suddenly 64 hexagrams. They create a much bigger array of possible states and changes between them, but to be honest that's too much work to show and explain right now. For one, this is no taoist university (I wonder if there really is such a thing) and it also goes beyond of what is useful for our purpose here. If you are really interested, look into that on your own. It's not that it's not worth it, but I don't want to infodump you to death.
I will now look at some specific constellations of the hexagrams that are of direct importance for the hunterverse. First we have the 8(6) "double images". It's obvious that when recombining all of the trigrams, we should also be left with 8 images that are a repetition of themselves. They give some new insight and add on on what we already now. The quality of amplification and repetition shines through in their meaning.
Note: All of the description that will follow are from a collection of sources. "Buch der Wandlungen"(book of changes from Richard Wilhelm). Excerpts used and translated into english by me.
Quotes and descriptions from different english sites.
And infoormation and symbols from this https://en.wikipedia.org/wiki/Hexagram_(I_Ching))
But now, let's get started.
離 (lí), "radiance"Other variations include "the clinging, fire" and "the net". Its inner trigram is ☲ (離 lí) radiance = (火) fire, and its outer trigram is identical.
The origin of the character has its roots in symbols of long-tailed birds such as the peacock or the legendary phoenix
Fire has no definite form, it adheres to things and burns that way. Like water raining from the sky, fire blazes upwards. Everything that is shining in the world is bound to something that it adheres too, only in that way it can shine on. For something to shine endlessly, there surely needs to be tenacity.
The clinging means resting on something. When the waters of the Abysmal flow into the pit, we search for something to cling to." Li is the image of the Clinging Fire, formless except the essence of fuel that keeps it burning.when undergoing drastic changes on the outside the only footing is the reference point of the personal self.
What emerges from any difficult transition is the discovery of that thing which will guide and support you when all else is taken away. This is like a light that is always burning in the darkness. Although events ‘out there’ orchestrate the changes, they merely lead you to cultivate a shift of awareness ‘in here.’
震 (zhèn), "the shaking"Other variations include "the arousing (shock)" and "thunder". Both its inner and outer trigrams are ☳ (震 zhèn)
This movement is so intense it's frightening. The image is the thunder who burst out from earth and by his quaking causes fright and trembling. While initially dreadful the uproar ensures renewal and success in the future.
It's the oldest sun, who vigorously seizes power. A taking of charge. A new status quo. -
When children ride roller coasters, they discover that allowing fear to have expression is energizing. If only we could always remain joyous in approaching our fears as we move along our dusty road. Unfortunately we grow complacent and seek security and stasis. Anything in nature that becomes stagnant will be re-energized by the unexpected. “Shock brings success. Shock comes – oh oh! Laughing words – ha ha!” Whether hurricanes balance ocean temperatures or tumultuous autumn and spring storms invigorate new growth, nobody can hide from nature’s power to keep all things thriving. The Shocking can symbolize the unexpected things that generate emotion and wake us up.
The feelings arising are quite unfamiliar but refreshingly new. What worked in the past will no longer do. The two words most associated with Zhen is ‘uh oh!’ However, it should be viewed in the same laughing sentiment as children riding a roller coaster. Something is coming that is unexpected but is meant to awaken you to how you hide. Each day we witness the mutability of nature and fail to recognize it in our own life. No matter the event, the pace may quicken and you may suddenly find your heart racing and a smile on your face.
兌 (duì), "the joyous, lake"Other variations include: "open", "usurpation" and swamp. Both its inner and outer trigrams are ☱ (兌 duì).
The happy mood is contagious, that's why it's prevailing. But joy needs a foundation of stability, so it doesn't degenerate into utter foolishness. Truth and strength need to dwell in the heart, while meekness is for all to see. contrary to intuition joy is not the result of the softness of the topmost line. The property of the soft/dark principal is not joy, but melancholy. The real joy comes through it's inner toughness and strength, which shows itself through the means of softness.
The repititon: The happy mood is contagious, that's why it's prevailing. But Joy needs a foundation of stability, so it doesn't degenerate into utter foolishness. Truth and strength need to dwell in the heart, while meekness is for all to see. -
More often than not it's inner opening rather than the effort or movement to change outer events that has led to joy. Often we feel the opposite of Joy in the form of unhappiness and see it as something negative. Unhappiness is the hunger pain for change so how can it be bad? The saying, “if you never fail, you will always succeed” means that if failure is taken in stride as a prerequisite to success it isn’t really failure. This accepting outlook leads to joyousness on the journey.
“Content in your circumstances and genuine in kindness, you are the expression of the love that renews all things.”
While we can do little to change the events that unfold around us, a change in perspective can magically change everything. Be Joyous in thought and action and celebrate others. Since life is your mirror it will reflect joyousness back to you.
坎 (kǎn), "the abysmal"Other variations include "Gorge" and "repeated entrapment". Its inner trigram is ☵ (坎 kǎn) and its outer trigram is identical.
Through repitition of danger there is accustoming. Water serves as a good example in these kind of situations. It's always flowing and ever only fills all those gaps that its flowing through. It's not leaving out a single dangerous spot, fears no ledge or fall and is in that way always staying true to itself. If a situation is handled internally, there's a good chance it will sort itself out externally. To fully prevail through danger, there needs to be thoroughness, so that everything that needs to be done, gets done and there is no chance of succumbing to the danger. -
For the benefit of the flowers, we water the thorns too. – Egyptian Proverb
Can one honestly look back and not see the meaning for any of challenges that were had in the past? Going through the danger is necessary to discover who we are, what we really need and what we are capable of accomplishing. There is great power and realizations to be obtained when confronting fear in the deep waters of the unconscious. The dangerous flow of water can lead somewhere beneficial if you just relinquish control and let go of your fear.
Without trusting in the flow of events, many situations can seem threatening, but only in proportion to the disparity that exists between the necessary transition and the fear of going there. When you recognize the things that you cannot change, you discover life's power to lead you. The path is frightening but a commitment to move forward and jump into the flow leaves no option of turning back.
巽 (xùn), "the gentle (the penetrating, wind)"Other variations include "ground" and "calculations". Both its inner and outer trigrams are ☴ (巽 xùn).
It's image is wind or wood, it's property is gentleness and yet it is penetrating like the wind or the wood with it's roots. In nature it's the wind, which is clearing the clustered clouds and enabling the sun to shine through. For humanity it's the penetrating clarity of righteous judgement, which knocks out all ulterior motives. In society it may be the influence of a powerful figure, who reveals and disperses any and all shady schemings
When the oak is felled the whole forest echoes with its fall, but a hundred acorns are sown in silence by an unnoticed breeze. – Thomas Carlyle
There is gentleness and enormous power associated with the hexagram of penetration. Like the wind blowing over vast periods of time against a mountain, the smallest influence when applied with a steadfast attitude can break down any barrier.
艮 (gèn), "the mountain"Other variations include "keeping still, "rooted" and "stilling". Both its inner and outer trigrams are ☶ (艮 gèn)
True peace is holding still when it's due and moving forward when the time to move forward has come again. In this way, rest and movement is in balance with time and it's necessities. The image is end and start of all movement. As a symbol it could be the spinal of the human body. In it, all nerves controlling movement join together. If there's a seizing of action for all of these nerves, total standstill of the system will be the consequence.
If now a human becomes this still on the inside, then he may face the uneasy and quarrelsome world. He will not get dragged into the fights and upheaval caused by it's inhabitants and has the necessary calmness needed to comprehend the great rules and workings of the world. He, who is acting from this place of deep rootedness, doesn't make mistakes anymore.
In the book of changes rest is described as a polar state, only achieved through the constant counterbalancing with movement.
So there's that. I would like to continue here, but apparently there's a 40.000 character limit. So the continuation will be in part 2.
And that's also where it really gets interesting.
See you there!
|Li||flame, flash, sun||radiant, clear, light, adherent, bound, conditioned, steady|
|Dshen||thunder, quaking, roaring||movement, action, agitation, thrill, excitement, loud, rash, energetic, rushing|
|Dui||lake, swamp, spring||joy, innocence, open, light hearted, happy-go-lucky, avid, kind|
|Kan||abyss, deep water, gorge||playful, versatile, trickster, hidden, danger, knowledge of evil, corrupt|
|Sun||wind, wood, tree||soft, balancing, understanding, knowledgeble, intelligent, calculating, penetrating, strict|
|Gen||mountain, rock, stone||independent, strong, firm, solely, serene, unmoving, still.|
|Classification||Trigram||Abilities, Talents||Tendencies||Real world professions (allthough any can be all)||Sin|
|Manipulator||Li||influence, control, govern, guide, teach||outward, change/love||teachers, parents , leaders, politicians,||possesivenes, malevolence|
|Emitter||Dschen||being heard, bringing change, enforcing will||outward, justice/ truth||speakers, politicians, dancers,singers, police forces||wrath|
|Enhancer||Dui||physical, simple approach, improving, strenghtening||outward, courage/carefre||athletes, labourer, dancers||egoism|
|Transmuter||Kan||bending energy, keeping flow, shifting states, jokes, wearing a mask||inward, love/change||comedians, trickster, actor, artists, singer, dancer, writer, poets||insanity, lust, malevolence|
|Conjurer||Sun||understanding the world and it's rules, living by it and creating something from it -> strategy, science, math, writing, poetry||inward, truth/justice||investigator, strategists, professors, academics, poets||pride|
|Specialists||Gen||doing everything alone, special talents who have to be seen, unique||inward, carefree/courage||people who need nobody yet attract others because of that, types you just can't label. Know'em when you meet'em.||indifference, arrogance|
For the benefit of the flowers, we water the thorns too. – Egyptian Proverb
When the oak is felled the whole forest echoes with its fall, but a hundred acorns are sown in silence by an unnoticed breeze. – Thomas Carlyle
|Story Mode Ch.1-8||Chapters 9-10||Chapter 11||Chapter 12|
|VS: Easy/Normal||VS: Hard||World Boss||iThanos||World Boss Ultimate|
|-||-||SL 1-15||SL 15-25||-|
|-||-||Strange Epic Quest||Wolvie Epic Quest||-|
|AB||AB||AB clear||XAB clear||XAB score chasing|
|Cards:||-||4* cards with ~30% SCD and 20+ Ignore Defense||4*/5*/6* cards w/SCD, Ignore Defense, and Attack||6* cards with ~30% SCD, ~30% Ignore Defense, and +30% All Attack|
|Sharon Rogers||iframes + damage immunity||Use starter selectors. Otherwise Bio Selectors.|
|Loki||shield + clones = RUN||Viable starter option. Otherwise Dimension Rift "Chitauri Invasion"|
|Carnage||iframes + invincibility @ T2||Bio $ubscription only. Use Rank up Tickets and save bios for gears.|
|Agent Venom||iframes + shield + invincibility||Bio $ubscription only. Use Rank up Tickets and save bios for gears.|
|Enchantress||shield, and can permanently charm world bosses||Bio $ubscription only. Use Rank up Tickets and save bios for gears.|
|Kid Kaiju||iframes + summons + shield||Bio $ubscription only. Use Rank up Tickets and save bios for gears.|
|Elsa||iframe + damage immunity @ T2||Villain Siege Chaos Tokens|
|Kate Bishop||iframes + stuns||Villain Siege "Hard"|
|Captain Marvel||damage immunity||Timeline Honor Tokens|
|Crystal||snare attacks + shield||Special Mission, Inhumans "Crystal Palace"|
|Songbird||snare attacks + shield||Special Mission, New Avengers "Baked Alaska"|
|Groot||Heal; Baby uni: iframes||Dimension Rift "Bark is Worse than Bite"|
|Yellow Jacket||several iframes||Dimension Rift "Amazingly Interesting Voyage"|
|Wasp||damage immunity "bubble" + iframe||Dimension Rift "Growth Spurt"|
|Baron Mordo||iframe + stuns + shield||Epic Quest, Memory Mission "Road to the Monastery"|
|Ancient One||invincibility + heal||Epic Quest, Memory Mission "Monastery in Trouble"|
|Hellstorm||immunity + summon||Epic Quest, Dark Dimension "Increasing Darkness"|
|Rogue||damage immunity (skill/leadership) + iframes + heal||Epic Quest: Rise of the X-men, Tracking "Going Rogue"|
|Beast||stun + snare + iframe||Epic Quest: Rise of the X-men, Tracking "Friends and Enemies"|
|Storm||stun + guard breaks + iframes||Epic Quest: Rise of the X-men, Tracking "Weathering the Storm"|
|Cyclops||stun + guard breaks + damage immunity + iframe||Epic Quest: Rise of the X-men, Tracking "Blindsided!"|
|Magneto||bind + guard breaks + shield + iframes||6600 crystals for "Deluxe" pack; "Mutual Enemy"|
|Captain America||damage immunity + iframe (uni)||Story Mission 1-1, 3-10, and 5-6|
|Black Widow||dodge + guard breaks + stun (uni)||Story Mission 1-4, 2-6, 3-9, and 5-4|
|Iron Fist||uni: invincibility + iframe; dodge @ T2||Story Mission 4-5 and 6-5.|
|Elektra||iframes + stun||Story Mission 4-6, 7-2, and 7-5|
|Black Panther||damage immunity + iframes||Story Mission 8-1|
|Thor||guard breaks + shield||Story Mission 8-9, 12-5, and 12-8|
|Blackbolt||guard breaks + damage immunity @ T2||Story Mission 8-10|
|GR (Robbie Reyes)||iframes + shield||Bio Selectors.|
|Mantis||iframes + heal + fear bubble||Bio Selectors.|
|Red Hulk||guard breaks + heal + damage immunity (uni)||Bio Selectors.|
|Silk||shield + webbing||Bio Selectors.|
|48% Damage to Male||She-Hulk (uni = +55%)|
|45% Energy Attack||Hela, Ironheart‡|
|45% Energy Attack for Blast||Ancient One‡, Star-lord (uni = +50%)|
|45% Physical Attack||Gorgon, Beast‡|
|40% Energy Attack||Ebony Maw|
|45% All Attack||Magneto‡ (for X-men)|
|36% All Attack||Moon-Girl‡|
|24% All Attack||Wiccan‡, Sin, Punisher, Ultron, Shang-Chi‡, Hyperion‡, Hogan, Cyclops‡ (+24% All Defense)|
|30% Energy Attack||Crystal‡, Singularity, Lash, Captain Marvel‡, Modok, Blackbolt‡|
|30% Physical Attack||Elsa‡, Deathlok, War Machine, Crossbones, Winter Soldier, Ulik‡, Hulk|
|18% All Attack, 18% All Defense, 6% Speed||Wasp‡|
|36% All Attack for Universal||Ronan‡ (+36% all defense), Medusa‡|
|60% Lightning Damage||Lincoln|
|60% Fire Damage||Satana‡, Red Hulk‡|
|60% Cold Damage||Misty Knight|
|3||White Tiger||Moon Girl|
|Open (x2; reset day)||Loki, Sharon, Hellstorm, Strange||She-Hulk, Ancient One, Gorgon, Hela||Warwolf (T2), Coulson (T2), Groot (T2)||save combat/villain (i.e. Carnage) for XAB|
|Combat||Hobo Iron Fist, Agent Venom, Carnage, Black Panther, Moon Knight, Red Hulk, Captain America||She-Hulk, Hulk, Shang-Chi||Groot (T2), Warwolf (T2)||save T2 Warwolf for XAB, unless you have T2 Coulson.|
|Blast||Sharon, Enchantress, Strange, Mantis, Cyclops||Ancient One, Star-Lord||Coulson (T2)|
|Speed||Elsa (L), Kate, Rogue, Silk, Kid Kaiju||Elsa, Winter Soldier||Baby Groot (T2)||Speed day is tough. Get Elsa's uni and her T2.|
|Universal||Loki, Hellstorm, GR (Robbie Reyes), Captain Marvel, Black Order, Dmmu, Odin||Ronan, Medusa, Hela||Throot (T2)||Loki strikes again.|
|Female||Sharon, Floki, Elsa, Mantis, Rogue||Hela, Ancient One (uni)||Ancient One (uni)||Starog is easier than Loki (uni) and would allow Floki to be used for XAB as DPS (if no BO) or team-up (w/DMMU).|
|Villain||Loki, Enchantress||Ronan, Hela||n/a||Looookiii|
|Characters at 4 stars & level 40||Stage||~Gold per ”Reward Acquired”|
|Card (Acquired)||Stat 1* (static)||Stat 2* (static)||Stat 3*||Stat 4*||Stat 5*||Stat 6*|
|Loki (Loki Rift)||All Attack||Cooldown duration||Ignore Defense||Attack Speed||All Defense||Energy/Physical Attack|
|Marvel Zombies #2 (any Heroic Rift)||Dodge||Cooldown duration||Critical Damage||Ignore Defense||Recovery Rate||All Attack|
|Baby Groot (Groot Rift)||Critical Damage||Ignore Defense||Energy Attack||Cooldown duration||All Defense||All Attack/Physical Attack|
|Star-Lord (Yondu Rift)||Ignore Defense||Critical Rate||Physical Attack||Cooldown duration||All Defense||All Attack/Energy Attack|
|Avengers (Nebula Rift)||Max HP||Ignore Defense||All Attack/Physical Attack||Cooldown duration||Critical Damage||Energy Attack|
|Punisher #19 (any Heroic Rift)||Ignore Defense||Attack Speed||Max HP||Cooldown Duration||All Defense||All Attack|
|Civil War #4/Thor (Crystal Card Chests)||All Attack||Physical Defense||Physical Attack||Cooldown duration||Critical Damage||Ignore Defense/Energy Attack|
|Gear||1st slot||2nd slot||the rest|
|1†||Energy/Physical attack per lvl||"base" energy/physical or all attack||"base" energy/physical or all attack|
|2||Physical defense per lvl||Energy defense per lvl||All defense|
|3||HP per lv||HP per lvl or HP||HP|
|4||Skill Cooldown in as many slots needed to get 50%||Ignore Defense in leftover slots (until 50%)||Crit damage, attack speed, or crit rate if both SCD and Ignore Defense are maxed|
Binary Options is a financial instrument to trade on long or short markets in a certain period of time. The Trader only got 2 options: Win a high amount of money (75% – 95%) or lose the investment amount for this trade. It is like betting on rising or falling markets. Binary Options are very flexible. It is possible to trade any financial ... Staatlicher Pensionsfonds (norwegen) – Wikipedia, do you need margin account to trade options, so erhalten sie schnell online geld, bayer fundamentalanalyse demo binaere optionen Recent Comments Mazwina FX on Binary Options Strategy System Indicator MT4 Non Repaint Forex Trading 70% Win Rate Fibonacci binary options strategy. 25 February 2014. Strategy for binary options with Forex economic indicators. 16 February 2014. Binary options – strategy of the triangle’s breaking. 10 November 2013. 3 moving averages’ strategy for binary options. 8 November 2013. Strategy for binary options – 5 minutes compressed spring’s pattern ... To trade binary options, be sure to trade on Nadex, the Chicago Board Options Exchange, or the Cantor Exchange, which are the 3 legal markets approved by the U.S. Commodity Futures Trading Commission. You can make direct trades on all of them, but be sure to read the different rules for each market. To make informed trades, analyze fundamental information like current growth reports ... Pocket Option - the most convenient online trading interface. Instant access to trade options more than 150 assets of currencies, cryptocurrencies and companies shares. Showing posts from August, 2017 . View all. Posts. Binäre Optionen Iq Live Chart . August 30, 2017 . Get link; Facebook; Twitter; Pinterest; Email; Other Apps Trading binary options may not be suitable for everyone. Trading CFDs carries a high level of risk since leverage can work both to your advantage and disadvantage. As a result, the products offered on this website may not be suitable for all investors because of the risk of losing all of your invested capital. You should never invest money that you cannot afford to lose, and never trade with ... Binary.com Binary Options vs. Vanilla Options . A vanilla American option gives the holder the right to buy or sell an underlying asset at a specified price on or before the expiration date of the option. A ... Strategy; Free Trading Tools. IQ Option Trading Academy; Forex Market Hours; Options Profit Calculator ; Trade Progress logger; Trading checklist; Martingale Calculator and Guide; Wiki Millionaire Calculator; Gains vs Losses Calculator; Forex Tools; Economic Calendar; Buy and cell Ratings Currency’s; Crypto Active Price Movement; Video tutorials; REGISTER / LOGIN; Main Content. What do you ...
[index]          
Binary Strategy Training Network Marketing Whiteboard Video created in association with Vasayo Overcome Nation SUBSCRIBE NOW: www.youtube.com/c/H2OMindset?su... Are binary options a good idea? If you're thinking about trading binary options, watch this video first. Check out our FREE training for traders https://bi... always trend is your friend....follow the trend my friend and do not fight with the trend just go with it... open iq option demo account link https://affilia... shocks and pressure candlestick strategy this strategy is the best candle strategy, to understand what pressure and shocks are, watch this video to completio... IMPORTANT UPDATE we have dropped latest stable and working strategy on 4th November 2018 check and watch below https://www.youtube.com/watch?v=DH1vM4Ygt2w&fe... All about binary options trading. Learn to trade binary options correctly. We’ll talk about strategies, indicators and technical analysis in your language. Options strategies Wikipedia en.wikipedia.orgwikiOptions_strategies Option strategies are the simultaneous, and often mixed, buying or selling of one or more strategy for just buying a bullish ...