Dominik Nitsche

Dominik Nitsche (born 1990) is a professional poker player, originally from Minden, Germany but now residing in Edinburgh, Scotland.

Dominik Nitsche
Dominik Nitsche in 2018
Nickname(s)Bounatirou (PokerStars), JustLuck1337 (Full Tilt)
World Series of Poker
Bracelet(s)4
Money finish(es)33
Highest ITM
Main Event finish
195th, 2017
World Poker Tour
Title(s)1
Final table(s)3
Money finish(es)6
European Poker Tour
Title(s)None
Final table(s)None
Money finish(es)6

Nitsche began playing poker online in 2006, amassing winnings exceeding $3 million.[1] In 2009, playing in his first live poker tournament, he won a Latin American Poker Tour event in Mar del Plata, Argentina, earning $381,000. In 2012 he won his first World Series of Poker bracelet, outlasting a field of 4,620 in a $1,000 No Limit Hold'em tournament and earning $654,000. Later that same year he won a World Poker Tour title in South Africa. The next year he made the final table of the same tournament before finishing in 4th place.

In 2014 Nitsche added two WSOP bracelets. First, he won the WSOP National Championship for $352,000. He then won another $1,000 NLHE tournament, becoming at age 23 the youngest player to win 3 bracelets (Phil Ivey was 26 when he won his third).[2] He also made the final table of the WSOP Europe Main Event in 2013, finishing in 3rd place.

At the 2017 WSOPE Nitsche won his fourth bracelet in the €111,111 High Roller for One Drop event. The prize of €3,487,463 ($4,064,000) was his largest career cash.[3]

As of 2018, his live tournament winnings exceed $14,600,000. His 33 WSOP cashes equal $6,280,000 of those earnings.

World Series of Poker Bracelets

Year Tournament Prize (US$)
2012 $1,000 No Limit Hold'em $654,797
2014 $10,000 WSOP National Championship $352,800
2014 $1,000 No Limit Hold'em $335,659
2017E €111,111 High Roller for One Drop No Limit Hold'em €3,487,463

An "E" following a year denotes bracelet(s) won at the World Series of Poker Europe

gollark: Also, just using `==` to compare ~~a password and hash~~ secret values of some kind is actually somewhat unsafe because timing channel attacks.
gollark: 2 xor 1024?
gollark: Password hashing algorithms generally let you pass the salt as a separate parameter.
gollark: Anyway, good password hashing algorithms are designed to be hard to parallelize, and to require large amounts of memory, so that they're hard to implement on FPGAs/ASICs/GPUs and run fastest on general-purpose CPU hardware (this is what your server has).
gollark: Basically!

Notes

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.