What Is SHA-256 And How Is It Related to Bitcoin ...

XMG - Coin of the Magi

Coin of the Magi is a peer-to-peer global currency that enables instant payments to anyone in the world. XMG utilizes proof-of-work and proof-of-stake systems and is CPU and eco focussed - rewards reduce as hash increases.
[link]

Aeon

Aeon (AEON) is a private, secure, untraceable currency. You are your bank, you control your funds, and nobody can trace your transfers.
[link]

Checker Thread (A list of hacked clients for easy reference)

Community contribution is the only way this thread will be useful. This is a WIP! More clients will be added as time goes on!
Quick note: The vast majority of these are files supplied by the community -- some may not work. The person who sent me 9b9t says it doesn't work, but I have not personally tested. Please let me know if it works or does not work.

Some additional notes:
I am open to community criticism so long as it can actually be used to benefit the thread. Issues with formatting, approach, client choice, etc. are all great things to come talk to me about so I may improve. However, people keep commenting the same things over and over and over — “VirusTotal can’t catch X” is a popular one — and I don’t have time to deal with it. If you have a security concern, you are more than welcome to raise it. HOWEVER, do not make unreasonable requests of me — I work, in addition to that I have a social life, I have responsibilities at home as well. This is a side thing that I do when I have the time. A lot of people have suggested looking through bytecode to determine if a client is malicious. I do not have the time to do this for every client. If you are willing to help and do more than say “you should do more than you already are, even though you have a job and a life outside of an obscure subreddit,” feel free to DM me. People who take the broken record approach and say things that are already covered in the thread, or refuse to offer help and just post complaints, will be blocked and ignored. I’m all down for making this post better, but I’m not gonna waste my time with people who won’t work with me. Thank you for your help!

BIG THANKS TO u/jpie726 FOR HIS MASSIVE CONTRIBUTIONS! WITHOUT HIM THIS LIST WOULD BE SIGNIFICANTLY LESS EXPANSIVE. GO UPVOTE THIS MAN INTO HEAVEN, HE DESERVES IT!

Eventually I would like to make a Python script that takes care of all the necessary tasks to install these clients. Python itself is available through the Windows Store as well as on Python's website, or through various other installers. It will install any additional dependencies via Pip and will use Curl to retrieve the files. Anyone interested in helping with this script is more than welcome to do so, if you wish. The two options for assisting me would be as follows:
1. You can install Visual Studio Code or Atom and work with me directly through those applications (more details soon™)
2. A GitHub page may be made and you could submit pull requests through that and edit the script alone.

#######################################################################
There is a misconception that I am only here for free paid clients.
1. I can't use a paid client unless I have access to a cracked version, an account, and the HWID bound to said account.
2. People are also saying there's a way for clients to track if someone leaks them. While I suppose this is possible if they bothered to put in the absurd amount of effort it would take, it would give them no benefit and it would do no good as I am not running the software on my desktop -- I am sending the software to VirusTotal, grabbing the SHA-256 checksum, and deleting the file.
3. If all you're going to do is post that "VirusTotal can't catch x" or "muh client" do not waste my time, and don't waste yours. You will be ignored in favor of people who will actually help me construct what I hope to be a megathread for this subreddit, FOR YOU GUYS. I mean jeez, someone's trying to help and half the fucking responses are "muh client" like come on. No wonder this fucking subreddit is dead, sheesh. If someone's trying to help you and you just step on their toes that's just not very cool, not everyone is trying to scam you. I do just be trying to help people who come here doe.
4. If you have concerns, raise them respectfully. Do not attack me, you will be ignored or if I feel so inclined I will give you 110% of the shit you give me right back to you. I will answer questions, I will elaborate on my goals, I will take helpful advice. Everything else will be outright ignored, and misinformation will be countered. That is all, thread below.
#######################################################################

I named this the Checker Thread to make it easy to search for in the subreddit. Enjoy.Below will be a list of hacked clients, with VirusTotal links, SHA-256 hashes, direct download links (skipping ad pages) and eventually features for each client. I'd also like to add what servers they do and don't work on, but I need the community to help with that.
The only client I use is Impact, send me additional clients in the comments and they will be added to this list.

Note about SHA-256 hashes:
SHA-256 hashes are a hash of a file produced algorithmically. This type of hash was developed by the United States National Security Agency, and is typically used to verify that files are what they are supposed to be. Widely used in cryptographic applications such as SSH, APT repositories, transactions on websites, verifying files, Bitcoin, and more. It is very common. This type of cryptographic hash has been in use since 2001. An SHA-256 hash will be the exact same for the same file regardless of the source of the file, so if your hash is different from the one listed here you do not have the legitimate installer OR the hash is not up-to-date.

Note about VirusTotal tests:
Several people have pointed out to me something I feel should be brought up in the main thread. VirusTotal is not a catch-all, just as your typical antivirus software is not a catch-all. It will not catch everything. It should be used as a general guideline only. Clean VirusTotal tests do not guarantee your safety, although if the program passes all ~70 or so antivirus engines it's probably safe to use. Any additional malicious activity should be caught by your antivirus program's heuristics. I take no responsibility for anything that is malicious, but I can say in good conscience that I have done everything I can to ensure that everything on this thread is safe. Keep in mind that programs that trip VirusTotal may still be safe to use, antivirus programs often pick up injectors as malware or Trojans because that's how those types of viruses behave in the real world. Use your best judgement. If your best judgement is not good enough, do not use these programs. You have been warned.

----- C --- L --- I --- E --- N --- T--- S ------ C --- L --- I --- E --- N --- T--- S ------ C --- L --- I --- E --- N --- T--- S -----

Impact | 1.11.2 to 1.15.2 | Java Edition
VirusTotal Link for *.exe Installer | VirusTotal Link for *.jar Installer
SHA-256 Hash: 4EAFFB99759FBD949D0FBEF58AE9CEB45CE8CA2B0D7DC22147D4FF0E46F010EC
Impact triggered 0/72 engines on both installers.
Direct Link to Impact's *.exe Installer | Direct Link to Impact's *.jar Installer
------------------------------------------------------------------------------------------------------------------------------------------------

Sigma | 1.8 to 1.16 | Java Edition
VirusTotal Link for *.jar Installer | VirusTotal Link for the *.zip the Installer is Contained In
SHA-256 Hash for the *.zip file: 3FCD397849358522BF0EEEAF117487DBA860919900A904551DF512BE2C34B48C
Sigma's *.zip file triggered 0/59 engines on the *.zip file.
Sigma's *.jar file triggered 0/60 engines on the *.jar file.
Direct Link to Sigma's *.zip File that Contains the Installer
------------------------------------------------------------------------------------------------------------------------------------------------

9b9t | 1.12.2, needs testing | Java Edition | Forge Mod
VirusTotal Link for the *.jar Forge Mod
SHA-256 Hash: 30E4F2778688D54CE7992AFDE509460A7BDDBDA77800219083D4D12BC696EEA0
9b9t triggered 0/60 engines.
AnonFile link to 9b9t's *.jar Mod
------------------------------------------------------------------------------------------------------------------------------------------------

Ingrosware | 1.12.2 | Java Edition | Forge Mod
VirusTotal Link for the *.jar Forge Mod
SHA-256 Hash: BD1A0F9079F4C834A251163C3A0ECBFF7DFC28AB00CF1C74008AADD042FAD358
Ingrosware triggered 0/59 engines.
AnonFile link to a pre-built *.jar Mod
Note: Ingrosware is open source, and is available on GitHub. If you want to build it yourself, you can do so here.
------------------------------------------------------------------------------------------------------------------------------------------------

Mercury | 1.12.2 | Java Edition | Forge Mod
VirusTotal Link for the *.jar Forge Mod
SHA-256 Hash: 70E585A94218149970410ACAE5BE7C1C1B731140F1AF55FE2D1292B1CA74DCB9
Mercury triggered 0/60 engines.
AnonFile link to Mercury's *.jar Mod
------------------------------------------------------------------------------------------------------------------------------------------------

Atlas | 1.12.2 | Java Edition | Forge Mod | Use with caution!
VirusTotal Link for the *.jar Forge Mod
SHA-256 Hash: 7AEB7220CBD5D7C4E4421A940357F14EC70B18DB905469E288529FE3A2C04D57
Note: The file is called AceHackGold-n3.0-release.jar in VirusTotal. The client is identified as Atlas in the .nfo file it came bundled with.
Atlas triggered 7/59 engines.
Note: Upon closer inspection of the VirusTotal scan, the client appears to be of the injected flavor. Injectors are commonly a false positive Trojan. The client appears to be safe, and there was nothing particularly noteworthy in the VirusTotal scan that is atypical for an injector. While this makes the file appear to be safe, use with caution.
AnonFile Link for the *.jar Mod
Note: This is a cracked client! The crack is pre-done, so no additional work is required to use -- just put it in your Forge Mods folder and click play.
Note 2: The file downloaded is called AceHackGold-n3.0-release.jar*, I'm not sure why. This file was community-sourced, but it has been inspected in the same manner as all the others*.
------------------------------------------------------------------------------------------------------------------------------------------------

Atom | 1.12.2 | Java Edition | Forge Mod | Use with extreme caution!
VirusTotal Link for the *.zip the Forge Mod is Contained In
SHA-256 Hash: 3B43F952EB5B14F2B01592057B27E92B0E38B6874EA10B8E893BFCBC71463377
Note: The file is called output.157312297.txt in VirusTotal. In addition, VirusTotal identifies the file type properly (\.zip).*
Atom triggered 9/59 engines.
Note: Upon closer inspection of the VirusTotal scan, the client accesses numerous registry keys, which is a behavior I personally would consider to be unnecessary and incredibly suspicious. You can find more information in the VirusTotal scan. The client also exhibits typical Trojan false-positives.
AnonFile Link for the *.zip File
Note: This is a cracked client! The crack is pre-done, so no additional work is required to use -- just put it in your Forge Mods folder and click play.
Use this client with extreme caution. There are behaviors that I consider to be extremely suspicious, you must determine for yourself if it's safe to use however. This may just be how the client works. I do not know, and I can't be bothered to test it.
------------------------------------------------------------------------------------------------------------------------------------------------

Aurora | 1.12.2 | Java Edition | Forge Mod
VirusTotal Link for the *.zip the Forge Mod is Contained In
SHA-256 Hash: 9A66929B629AB076383340D33E0EF9B8CE221679EF79315240EA6C760651A533
Aurora triggered 0/61 engines.
AnonFile Link for the *.zip File
Note: This is a cracked client! The crack is pre-done, so no additional work is required to use -- just put it in your Forge Mods folder and click play.
------------------------------------------------------------------------------------------------------------------------------------------------

CandyCat | 1.12.2 | Java Edition | Forge Mod | Use with caution!
VirusTotal Link for the *.zip the Forge Mod is Contained In
SHA-256 Hash: 8CEC2F9F28AA3957504E0CC66BF1516080C7BAC50EADB54DC6DD97E0E6E9C745
CandyCat triggered 9/61 engines.
Note: Upon closer inspection of the VirusTotal scan, the client appears to be of the injected flavor. Injectors are commonly a false positive Trojan. The client appears to be safe, and there was nothing particularly noteworthy in the VirusTotal scan that is atypical for an injector. While this makes the file appear to be safe, use with caution.
AnonFile Link for the *.zip File
Note: This is a cracked client! The crack is pre-done, so no additional work is required to use -- just put it in your Forge Mods folder and click play.
------------------------------------------------------------------------------------------------------------------------------------------------

DayNightGod | 1.12.2 | Java Edition | Forge Mod | Use with caution!
VirusTotal Link for the *.zip the Forge Mod is Contained In
SHA-256 Hash: 9CEEB43476B18149C0DA76B7AE94713AAF60ED4D2BFD2339E863CC46A1808A0D
DayNightGod triggered 1/59 engines.
Note: Upon closer inspection, only one engine was triggered. The client did not trigger the usual false-positives of a Trojan, use with caution.
AnonFile Link for the *.zip File
Note: This is a cracked client! The crack is pre-done, so no additional work is required to use -- just put it in your Forge Mods folder and click play.
------------------------------------------------------------------------------------------------------------------------------------------------

HyperLethal | 1.12.2 | Java Edition | Forge Mod | Use with caution!
VirusTotal Link for the *.zip the Forge Mod is Contained In
SHA-256 Hash: 77FACC1FDB0415438963CCC8DDB4081958563AAA962CE9C024E5063DA32E8FAD
HyperLethal triggered 2/59 engines.
Note: Upon closer inspection of the VirusTotal scan, the client appears to be of the injected flavor. Injectors are commonly a false positive Trojan. The client appears to be safe, and there was nothing particularly noteworthy in the VirusTotal scan that is atypical for an injector. While this makes the file appear to be safe, use with caution.
AnonFile Link for the *.zip File
Note: This is a cracked client! The crack is pre-done, so no additional work is required to use -- just put it in your Forge Mods folder and click play.
------------------------------------------------------------------------------------------------------------------------------------------------

LoveClient | 1.12.2 | Java Edition | Forge Mod | Use with extreme caution!
VirusTotal Link for the *.zip the Forge Mod is Contained In
SHA-256 Hash: C71EC42FF612D75CB7AA21B8400D164A74AAD9BB65D2DFEE232461DAF98034C2
LoveClient triggered 9/61 engines.
Note: Upon closer inspection of the VirusTotal scan, the client accesses numerous registry keys, which is a behavior I personally would consider to be unnecessary and incredibly suspicious. You can find more information in the VirusTotal scan. The client also exhibits typical Trojan false-positives.
AnonFile Link for the *.zip File
Use this client with extreme caution. There are behaviors that I consider to be extremely suspicious, you must determine for yourself if it's safe to use however. This may just be how the client works. I do not know, and I can't be bothered to test it.
------------------------------------------------------------------------------------------------------------------------------------------------

SnowHack | 1.12.2 | Java Edition | Forge Mod
VirusTotal Link for the *.zip the Forge Mod is Contained In
SHA-256 Hash: 7100C8D59CE06B279F7D03D834FC2C361F10BEAE913575FC7EFA74E498167D2C
SnowHack triggered 10/62 engines.
Note: Upon closer inspection of the VirusTotal scan, the client appears to be of the injected flavor. Injectors are commonly a false positive Trojan. The client appears to be safe, and there was nothing particularly noteworthy in the VirusTotal scan that is atypical for an injector. While this makes the file appear to be safe, use with caution.
AnonFile Link for the *.zip File
Note: This is a cracked client! The crack is pre-done, so no additional work is required to use -- just put it in your Forge Mods folder and click play.
------------------------------------------------------------------------------------------------------------------------------------------------
submitted by Daemris to minecraftclients [link] [comments]

CryptoSmarts 4: The Best Free Password Managers

CryptoSmarts 4: The Best Free Password Managers
MintDice is proud to bring you the fourth part of the CryptoSmarts series, a 100% unbiased/non-affiliate paid article set that will focus on relatively simple ways you can boost your privacy, take power away from overbearing governments and corporations while also doing relative good for society all at the same time with minimal effort. Rest assured that anything suggested here is solely for your own benefit.
In this article, we'll take a deep dive into password managers, which applications to go for, how to optimize your password managers and which ones to avoid. It's of increasing importance for all users to adopt a password manager because commonly used passwords and repeated use of log-in + password combinations are the two weakest points in any normal individual's security online. Meanwhile, memorizing dozens of unique and complex passwords is beyond the scope of what most people can do, especially long term. Thus password managers have been created as a way to store multiple passwords into a single file that can help ensure your security and privacy online.
For a little encouragement, we'll share the now extremely famous dialogue between Edward Snowden and John Oliver talking about passwords. As should be painfully obvious by now, password managers are one of the best solutions to this entire dilemma.

https://preview.redd.it/ribbtjwz1it51.png?width=1000&format=png&auto=webp&s=3c3a9a31bdb8c4f9ec83bea98638fec5dd78b38f

PASSWORD MANAGER BASICS

We should first note that not all password managers are created the same as we've noted with software across all of our other articles. By and large, we'll be looking for similar characteristics in our password managers as we would our other software which includes open sourced software protocols and best software security practices. And when it comes to Bitcoin, cryptocurrency and your entire life's work on the internet, there is a lot at stake here. I'd argue that it is more important for password managers than for any other application to make sure to get this one correct since it will have your entire livelihood on the line.
The very amazing thing with demanding open sourced software for your password manager is that it by definition will also be free at the most basic level. This is because if it weren't, all it would take would be someone to fork over a program to make it free. So you are in a sense getting the best of both worlds here; a free software that is also of the highest quality. Meanwhile, ironically, many of the more commonly known password managers like Dashlane or Lastpass use closed source software and often charge fees to use their service. Funnily enough, Lastpass, the password manager itself, was actually formerly hacked in the past. One could argue this at least in part had to do with it's closed source software since having open sourced software at least in part makes software more secure. In short, do not used these closed source services that are frequently advertised for on the web as they are detrimental to you in more ways than one.

RECOMMENDED BEST PASSWORD MANAGERS

Bitwarden is our first recommendation. Bitwarden is truly one of the all time greats by approaching password management on the individual, team and even enterprise level to create a one size fits all solution. Bitwarden is compatible on virtually all devices out there from all desktops to mobile devices and so forth. Additionally, while they offer a centralized cloud service for free, Bitwarden is also set up to allow you to run your own private server to keep your own key base entirely under your own control, fully encrypted.

https://preview.redd.it/zmlkf5d12it51.jpg?width=770&format=pjpg&auto=webp&s=02998b777d05ab00557a97c616a4b0d505b324aa
Next up we have KeePassXC which is a fork of one of the longest standing password managers in existence, formerly known as KeePass that halted a lot of it's ongoing development some time ago. KeePassXC was created as a locally held password manager application that could work across platforms. Unlike Bitwarden where your key file is held in cloud storage, KeePassXC is simply a program client and a local file that you must maintain and backup yourself. This has some pros and cons. The good news is that you have full control of everything related to KeePassXC as the program under most situations will not be talking to any online server which could expose private or sensitive information. The bad news is that if you ever were to lose control of your key file, you are completely out of luck. For this reason, it's imperative to back up your encrypted key file in multiple locations to protect against what would be catastrophic loss. You can do this with USB drives, e-mail accounts, cloud storage, safe deposit boxes or a whole host of other creative solutions that you might come up with.
The final recommended option is LessPass. LessPass is very interesting technology because it is a no-knowledge password manager. By inputting a few pieces of information which could be a master password in conjunction with an e-mail address or user name, a password is automatically attached to any URL address. It will simply cross all of these pieces of information via PBKDF2 and SHA-256 to produce random yet consistent outputs for any of your web browsing. The advantage of this program is that it is extremely light weight, and so long as you can remember your e-mail address, account name and master password, you can now gain full access to everything around the internet without the need of any files. The downside is some level of control over password flexibility since the passwords are automatically generated for you.
In summation of these three options, BitWarden is the best overall password manager for most people's use cases. Meanwhile, LessPass is probably best suited for the most casual user who contains fewer accounts across the internet and wants something extremely simple and easy to use. Lastly, KeePassXC, will be the ultimate in privacy password manager technology and is best suited for those that are prepared to take the extra steps to ensure their key file is kept up to date as the months and years tick by.

https://preview.redd.it/r4icjup22it51.jpg?width=1920&format=pjpg&auto=webp&s=622cf1b967ec5622e3feb2b49e5ac29917629cdf

BEST PRACTICES WITH YOUR NEW PASSWORD MANAGER

Once you have chosen a password manager from the above list, it will be important to change all of your account passwords one by one to incorporate it into your new system. This will help you get away from your commonly used log-in and password combinations and over to your new, more secure and robust set up. With your new set up, if you have a key file to back up, you must now start getting in the habit of doing so, especially after major or important changes to your password manager. Or if you wish to use BItWarden with a private cloud server, make sure that that is fully set up and running.
Generally speaking, when choosing password length from your password manager for standard and robust security, 25 random characters, letters (and symbols if you wish, but they aren't necessary), is mostly considered to be uncrackable. This is because while every password is in theory beatable, it takes dramatically more computational energy over time to figure out what your password is, and at some point, it becomes unreasonable. That said, NSA grade security often holds itself up to 50 random characters which is considered to be unbreakable even on a government wide scale.
On that same token, you'll have to use a master password for your password manager. Given that you only need to know one password, it will now be extremely important to make this a very good password. Because a password that you need to remember most likely won't (or perhaps shouldn't) be completely random so that it's easy to remember, it should, at the very least, be long. I would suggest making sure that you come up with a master password that is at least 40 characters long or 125 bits of information. To check out how many bits of entropy your master password is, you can type it into the password field of KeePassXC and it will tell you roughly how secure your master password is. While 40 characters may seem like a lot, do keep in mind that this is now the only gateway between yourself and all of your access keys to all of your accounts held on this account.

Bits of Entropy Example on KeePassXC
Finally, it is worth investing in a YubiKey or similar 2-FA device if you can get one. This can apply to BitWarden and KeePassXC. With the normal password managers, a hacker will need access to not only your password but also your key file in order to have free reign over all of your accounts. However, a sophisticated hacker that has full access to your device with a keylogger could ultimately, in theory, compromise your full set up, and this would be disastrous for you. Fortunately, this can be resolved by buying and activating a Yubikey or other such device. The Yubikey example requires that a Yubikey, with a private key that you set up for your password manager, is present to access your database. Therefore, even if a hacker were to obtain your key file and your master password, they still won't be able gain access to your account. As a precaution, however, if you lose access to your Yubikey and/or private key, you too, will be locked out. Therefore, it is important to keep your Yubikey backed up and to keep extra copies available.

IN CONCLUSION

Owning Bitcoin or other cryptocurrencies comes with a lot of responsibility if you want to minimize risk. As does maintaining a strong hack-resistant presence online. One of the best defenses you can make is by implementing a password manager. Similar to the previous CryptoSmarts articles that we have written prior, it will take some small amount of set up work to get fully acclimated to your new system, but you'll thank yourself down the road that you have done this. And the sooner you start, the better, as things will only continue to get more complex, with more risk factors at play as the internet plays an ever increasing role in all of our day to day lives.
Finally, while the article is current as of the writing of the article, it will undoubtedly lose merit over time. Be sure to check if everything in this article is up to date or that any password manager that you select from this article continues development or continues to abide by the proper best practice principles.
If you enjoyed this article, we would encourage you to check out our other previous CryptoSmarts articles discussing private e-mails, secure messenger applications and proper web browsers.
submitted by MintDiceOfficial to MintDice [link] [comments]

Solusi dari Bitcoin

Mari kita pelajari teori lebih mendalam dari Bitcoin.
  1. Aset dan transaksi ledjer (ledger)/sejarah
Kalian tahu ga apa itu ledjer. Sebenarnya ledjer itu adalah rekor komplit untuk aktivitas ekonomi.
Blockchain (rangkaian blok) itu tamper-proof (tidak bisa diubah) berhubungan dengan ledjer.
SHA-256 itu adalah kriptografik hash dimana bisa dipakai untuk konfirmasi integritas dan autentik transaksi. Sebuah algoritma yang membentuk 256-bit (32 byte) hash
Dulunya orang memakai ledjer untuk rekor aktivitas ekonomi yakni buku catatan. Tapi sekarang ini ledjer disimpan dalam sistem komputer. Sebenarnya pencatat buku ini atau penyimpan ledjer sekarang ini ga aman loh. Mereka bisa saja dapat uang suap untuk mengganti nama pemilik tanah. Selain itu, rekor data pun bisa saja hilang tanpa sengaja.
Selama ini sejarah transaksi kita untuk banking, kartu kredit, financial statement perusahaan, reservasi hotel, data apapun yang berhubungan dengan passport, memang semua disimpan si 'penjaga' buku. Kalau dipikir pikir, aman sih semua aktivitas kita di rekor oleh centralized keeper?
Sekarang apa nih solusi Bitcoin? BITCOIN ini decentralized ledger dan ada 3 manfaat besar -tidak dirahasiakan -tidak bisa dipalsukan datanya -data tidak akan pernah hilang
Kenapa Bitcoin? Dulunya komputer di tahun 1975 kemudian Internet tahun 1993 lalu sekarang Bitcoin tahun 2014. Caranya adalah, bitcoin akan mengantar porsi kecil dari properti digital dari yang satu ke yang lain. Bitcoin menjamin keaslian transaksi tersebut, aman juga.
Bitcoin ini didukung oleh konsensus yang terbentuk dari jutaan orang didunia. Bitcoin 'white paper' (kertas putih) ditulis tanggal 31 Oktober 2008.
  1. Bitcoin untuk selesaikan permasalah Jeneral Byzantine
bitcoin itu adalah unit mata uang Bitcoin itu adalah konsep, networking Bitcoin alamat terdiri dari banyak kata-kata dengan angka-angka dimana bitcoin dapat dikirim Blockchain (rangkaian blok) adalah catatan lengkap transaksi untuk bitcoin, ataupun disebut ledjer publik
Adapun kegunaan dari BITCOIN REFERENCE CLIENT SOFTWARE untuk menyimpan semua sejarah transaksi. Tidak ada sistem sentral yang mengontrol penyimpanan transaksi. Ini hanya dipakai di antara Clients.
Bitcoin mengkonfirmasikan transaksi melalui proses 'mining'. Mining ini akan menciptakan bitcoin baru dengan setiap blok. Seperi Bank yang bisa menciptakan uang kertas baru. Namun, bitcoin ada jumlah maksimalnya yaitu 21 juta. Bitcoin dapat menjaga integritas dari setiap blok melalui tenaga komputer (proof-of-work)
Tahap pertama - Miners (penggali) akan mengumumkan transaksi dengan blok dan mengverifikasikan semua itu sah. Tahap kedua - Aplikasikan fungsi dari kriptografik hash dari blok sebelumnya ke blok selanjutnya Tahap ketiga - Selesaikan Proof-of-work
Kalau blok itu berhasil diselesaikan maka akan ada hasil penghargaan. Kesusahan untuk menyelesaikan blok transaksi adalab setiap 2016 blok (lebih kurang dua minggu) jadinya network bitcoin membentuk satu blok yang sah setiap 10 menit. Pakai komputer lama ataupun baru tetap akan membentuk blok setiap 10 menit.
Mari kita bahas sedikit tentang proof-of-work, sistem ini adalah kunci elemen untuk sekuritas ledjer. Ini untuk mencegah pencurian data dari hacker.
Penggali (miner) yang memiliki setidaknya 50% tenaga hash dalam sistem. Ketika seorang penggali memiliki tenaga hash melebihi 50% maka dia akan punya rangkaian yang lebih panjang dari penggali lainnya. Ini akan berdampak buruk karena dia dapat mencegah bitcoin untuk bertransaksi.
Oleh karena itu, untuk menjaga kejujuran ekosistem maka seorang penggali mengamankan hanya 50% sistem komputer dan tak lebih.
submitted by nosredna_008 to u/nosredna_008 [link] [comments]

Syscoin Platform’s Great Reddit Scaling Bake-off Proposal

Syscoin Platform’s Great Reddit Scaling Bake-off Proposal

https://preview.redd.it/rqt2dldyg8e51.jpg?width=1044&format=pjpg&auto=webp&s=777ae9d4fbbb54c3540682b72700fc4ba3de0a44
We are excited to participate and present Syscoin Platform's ideal characteristics and capabilities towards a well-rounded Reddit Community Points solution!
Our scaling solution for Reddit Community Points involves 2-way peg interoperability with Ethereum. This will provide a scalable token layer built specifically for speed and high volumes of simple value transfers at a very low cost, while providing sovereign ownership and onchain finality.
Token transfers scale by taking advantage of a globally sorting mempool that provides for probabilistically secure assumptions of “as good as settled”. The opportunity here for token receivers is to have an app-layer interactivity on the speed/security tradeoff (99.9999% assurance within 10 seconds). We call this Z-DAG, and it achieves high-throughput across a mesh network topology presently composed of about 2,000 geographically dispersed full-nodes. Similar to Bitcoin, however, these nodes are incentivized to run full-nodes for the benefit of network security, through a bonded validator scheme. These nodes do not participate in the consensus of transactions or block validation any differently than other nodes and therefore do not degrade the security model of Bitcoin’s validate first then trust, across every node. Each token transfer settles on-chain. The protocol follows Bitcoin core policies so it has adequate code coverage and protocol hardening to be qualified as production quality software. It shares a significant portion of Bitcoin’s own hashpower through merged-mining.
This platform as a whole can serve token microtransactions, larger settlements, and store-of-value in an ideal fashion, providing probabilistic scalability whilst remaining decentralized according to Bitcoin design. It is accessible to ERC-20 via a permissionless and trust-minimized bridge that works in both directions. The bridge and token platform are currently available on the Syscoin mainnet. This has been gaining recent attention for use by loyalty point programs and stablecoins such as Binance USD.

Solutions

Syscoin Foundation identified a few paths for Reddit to leverage this infrastructure, each with trade-offs. The first provides the most cost-savings and scaling benefits at some sacrifice of token autonomy. The second offers more preservation of autonomy with a more narrow scope of cost savings than the first option, but savings even so. The third introduces more complexity than the previous two yet provides the most overall benefits. We consider the third as most viable as it enables Reddit to benefit even while retaining existing smart contract functionality. We will focus on the third option, and include the first two for good measure.
  1. Distribution, burns and user-to-user transfers of Reddit Points are entirely carried out on the Syscoin network. This full-on approach to utilizing the Syscoin network provides the most scalability and transaction cost benefits of these scenarios. The tradeoff here is distribution and subscription handling likely migrating away from smart contracts into the application layer.
  2. The Reddit Community Points ecosystem can continue to use existing smart contracts as they are used today on the Ethereum mainchain. Users migrate a portion of their tokens to Syscoin, the scaling network, to gain much lower fees, scalability, and a proven base layer, without sacrificing sovereign ownership. They would use Syscoin for user-to-user transfers. Tips redeemable in ten seconds or less, a high-throughput relay network, and onchain settlement at a block target of 60 seconds.
  3. Integration between Matic Network and Syscoin Platform - similar to Syscoin’s current integration with Ethereum - will provide Reddit Community Points with EVM scalability (including the Memberships ERC777 operator) on the Matic side, and performant simple value transfers, robust decentralized security, and sovereign store-of-value on the Syscoin side. It’s “the best of both worlds”. The trade-off is more complex interoperability.

Syscoin + Matic Integration

Matic and Blockchain Foundry Inc, the public company formed by the founders of Syscoin, recently entered a partnership for joint research and business development initiatives. This is ideal for all parties as Matic Network and Syscoin Platform provide complementary utility. Syscoin offers characteristics for sovereign ownership and security based on Bitcoin’s time-tested model, and shares a significant portion of Bitcoin’s own hashpower. Syscoin’s focus is on secure and scalable simple value transfers, trust-minimized interoperability, and opt-in regulatory compliance for tokenized assets rather than scalability for smart contract execution. On the other hand, Matic Network can provide scalable EVM for smart contract execution. Reddit Community Points can benefit from both.
Syscoin + Matic integration is actively being explored by both teams, as it is helpful to Reddit, Ethereum, and the industry as a whole.

Proving Performance & Cost Savings

Our POC focuses on 100,000 on-chain settlements of token transfers on the Syscoin Core blockchain. Transfers and burns perform equally with Syscoin. For POCs related to smart contracts (subscriptions, etc), refer to the Matic Network proposal.
On-chain settlement of 100k transactions was accomplished within roughly twelve minutes, well-exceeding Reddit’s expectation of five days. This was performed using six full-nodes operating on compute-optimized AWS c4.2xlarge instances which were geographically distributed (Virginia, London, Sao Paulo Brazil, Oregon, Singapore, Germany). A higher quantity of settlements could be reached within the same time-frame with more broadcasting nodes involved, or using hosts with more resources for faster execution of the process.
Addresses used: 100,014
The demonstration was executed using this tool. The results can be seen in the following blocks:
612722: https://sys1.bcfn.ca/block/6d47796d043bb4c508d29123e6ae81b051f5e0aaef849f253c8f3a6942a022ce
612723: https://sys1.bcfn.ca/block/8e2077f743461b90f80b4bef502f564933a8e04de97972901f3d65cfadcf1faf
612724: https://sys1.bcfn.ca/block/205436d25b1b499fce44c29567c5c807beaca915b83cc9f3c35b0d76dbb11f6e
612725: https://sys1.bcfn.ca/block/776d1b1a0f90f655a6bbdf559ff5072459cbdc5682d7615ff4b78c00babdc237
612726: https://sys1.bcfn.ca/block/de4df0994253742a1ac8ac9eec8d2a8c8b0a6d72c53d6f3caa29bb6c171b0a6b
612727: https://sys1.bcfn.ca/block/e5e167c52a9decb313fbaadf49a5e34cb490f8084f642a850385476d4ef10d70
612728: https://sys1.bcfn.ca/block/ab64d989edc71890e7b5b8491c20e9a27520dc45a5f7c776d3dae79057f59fe7
612729: https://sys1.bcfn.ca/block/5e8b7ecd0e36f99d07e4ea6e135fc952bf7ec30164ab6f4d1e98b0f2d405df6d
612730: https://sys1.bcfn.ca/block/d395df3d31dde60bbb0bece6bd5b358297da878f0beb96be389e5f0e043580a3
It is important to note that this POC is not focused on Z-DAG. The performance of Z-DAG has been benchmarked within realistic network conditions: Whiteblock’s audit is publicly available. Network latency tests showed an average TPS around 15k with burst capacity up to 61k. Zero-latency control group exhibited ~150k TPS. Mainnet testing of the Z-DAG network is achievable and will require further coordination and additional resources.
Even further optimizations are expected in the upcoming Syscoin Core release which will implement a UTXO model for our token layer bringing further efficiency as well as open the door to additional scaling technology currently under research by our team and academic partners. At present our token layer is account-based, similar to Ethereum. Opt-in compliance structures will also be introduced soon which will offer some positive performance characteristics as well. It makes the most sense to implement these optimizations before performing another benchmark for Z-DAG, especially on the mainnet considering the resources required to stress-test this network.

Cost Savings

Total cost for these 100k transactions: $0.63 USD
See the live fee comparison for savings estimation between transactions on Ethereum and Syscoin. Below is a snapshot at time of writing:
ETH price: $318.55 ETH gas price: 55.00 Gwei ($0.37)
Syscoin price: $0.11
Snapshot of live fee comparison chart
Z-DAG provides a more efficient fee-market. A typical Z-DAG transaction costs 0.0000582 SYS. Tokens can be safely redeemed/re-spent within seconds or allowed to settle on-chain beforehand. The costs should remain about this low for microtransactions.
Syscoin will achieve further reduction of fees and even greater scalability with offchain payment channels for assets, with Z-DAG as a resilience fallback. New payment channel technology is one of the topics under research by the Syscoin development team with our academic partners at TU Delft. In line with the calculation in the Lightning Networks white paper, payment channels using assets with Syscoin Core will bring theoretical capacity for each person on Earth (7.8 billion) to have five on-chain transactions per year, per person, without requiring anyone to enter a fee market (aka “wait for a block”). This exceeds the minimum LN expectation of two transactions per person, per year; one to exist on-chain and one to settle aggregated value.

Tools, Infrastructure & Documentation

Syscoin Bridge

Mainnet Demonstration of Syscoin Bridge with the Basic Attention Token ERC-20
A two-way blockchain interoperability system that uses Simple Payment Verification to enable:
  • Any Standard ERC-20 token to be moved from Ethereum to the Syscoin blockchain as a Syscoin Platform Token (SPT), and back to Ethereum
  • Any SPT to be moved from Syscoin to the Ethereum blockchain as an ERC-20 token, and back to Syscoin

Benefits

  • Permissionless
  • No counterparties involved
  • No trading mechanisms involved
  • No third-party liquidity providers required
  • Cross-chain Fractional Supply - 2-way peg - Token supply maintained globally
  • ERC-20s gain vastly improved transactionality with the Syscoin Token Platform, along with the security of bitcoin-core-compliant PoW.
  • SPTs gain access to all the tooling, applications and capabilities of Ethereum for ERC-20, including smart contracts.
https://preview.redd.it/l8t2m8ldh8e51.png?width=1180&format=png&auto=webp&s=b0a955a0181746dc79aff718bd0bf607d3c3aa23
https://preview.redd.it/26htnxzfh8e51.png?width=1180&format=png&auto=webp&s=d0383d3c2ee836c9f60b57eca35542e9545f741d

Source code

https://github.com/syscoin/?q=sysethereum
Main Subprojects

API

Tools to simplify using Syscoin Bridge as a service with dapps and wallets will be released some time after implementation of Syscoin Core 4.2. These will be based upon the same processes which are automated in the current live Sysethereum Dapp that is functioning with the Syscoin mainnet.

Documentation

Syscoin Bridge & How it Works (description and process flow)
Superblock Validation Battles
HOWTO: Provision the Bridge for your ERC-20
HOWTO: Setup an Agent
Developer & User Diligence

Trade-off

The Syscoin Ethereum Bridge is secured by Agent nodes participating in a decentralized and incentivized model that involves roles of Superblock challengers and submitters. This model is open to participation. The benefits here are trust-minimization, permissionless-ness, and potentially less legal/regulatory red-tape than interop mechanisms that involve liquidity providers and/or trading mechanisms.
The trade-off is that due to the decentralized nature there are cross-chain settlement times of one hour to cross from Ethereum to Syscoin, and three hours to cross from Syscoin to Ethereum. We are exploring ways to reduce this time while maintaining decentralization via zkp. Even so, an “instant bridge” experience could be provided by means of a third-party liquidity mechanism. That option exists but is not required for bridge functionality today. Typically bridges are used with batch value, not with high frequencies of smaller values, and generally it is advantageous to keep some value on both chains for maximum availability of utility. Even so, the cross-chain settlement time is good to mention here.

Cost

Ethereum -> Syscoin: Matic or Ethereum transaction fee for bridge contract interaction, negligible Syscoin transaction fee for minting tokens
Syscoin -> Ethereum: Negligible Syscoin transaction fee for burning tokens, 0.01% transaction fee paid to Bridge Agent in the form of the ERC-20, Matic or Ethereum transaction fee for contract interaction.

Z-DAG

Zero-Confirmation Directed Acyclic Graph is an instant settlement protocol that is used as a complementary system to proof-of-work (PoW) in the confirmation of Syscoin service transactions. In essence, a Z-DAG is simply a directed acyclic graph (DAG) where validating nodes verify the sequential ordering of transactions that are received in their memory pools. Z-DAG is used by the validating nodes across the network to ensure that there is absolute consensus on the ordering of transactions and no balances are overflowed (no double-spends).

Benefits

  • Unique fee-market that is more efficient for microtransaction redemption and settlement
  • Uses decentralized means to enable tokens with value transfer scalability that is comparable or exceeds that of credit card networks
  • Provides high throughput and secure fulfillment even if blocks are full
  • Probabilistic and interactive
  • 99.9999% security assurance within 10 seconds
  • Can serve payment channels as a resilience fallback that is faster and lower-cost than falling-back directly to a blockchain
  • Each Z-DAG transaction also settles onchain through Syscoin Core at 60-second block target using SHA-256 Proof of Work consensus
https://preview.redd.it/pgbx84jih8e51.png?width=1614&format=png&auto=webp&s=5f631d42a33dc698365eb8dd184b6d442def6640

Source code

https://github.com/syscoin/syscoin

API

Syscoin-js provides tooling for all Syscoin Core RPCs including interactivity with Z-DAG.

Documentation

Z-DAG White Paper
Useful read: An in-depth Z-DAG discussion between Syscoin Core developer Jag Sidhu and Brave Software Research Engineer Gonçalo Pestana

Trade-off

Z-DAG enables the ideal speed/security tradeoff to be determined per use-case in the application layer. It minimizes the sacrifice required to accept and redeem fast transfers/payments while providing more-than-ample security for microtransactions. This is supported on the premise that a Reddit user receiving points does need security yet generally doesn’t want nor need to wait for the same level of security as a nation-state settling an international trade debt. In any case, each Z-DAG transaction settles onchain at a block target of 60 seconds.

Syscoin Specs

Syscoin 3.0 White Paper
(4.0 white paper is pending. For improved scalability and less blockchain bloat, some features of v3 no longer exist in current v4: Specifically Marketplace Offers, Aliases, Escrow, Certificates, Pruning, Encrypted Messaging)
  • 16MB block bandwidth per minute assuming segwit witness carrying transactions, and transactions ~200 bytes on average
  • SHA256 merge mined with Bitcoin
  • UTXO asset layer, with base Syscoin layer sharing identical security policies as Bitcoin Core
  • Z-DAG on asset layer, bridge to Ethereum on asset layer
  • On-chain scaling with prospect of enabling enterprise grade reliable trustless payment processing with on/offchain hybrid solution
  • Focus only on Simple Value Transfers. MVP of blockchain consensus footprint is balances and ownership of them. Everything else can reduce data availability in exchange for scale (Ethereum 2.0 model). We leave that to other designs, we focus on transfers.
  • Future integrations of MAST/Taproot to get more complex value transfers without trading off trustlessness or decentralization.
  • Zero-knowledge Proofs are a cryptographic new frontier. We are dabbling here to generalize the concept of bridging and also verify the state of a chain efficiently. We also apply it in our Digital Identity projects at Blockchain Foundry (a publicly traded company which develops Syscoin softwares for clients). We are also looking to integrate privacy preserving payment channels for off-chain payments through zkSNARK hub & spoke design which does not suffer from the HTLC attack vectors evident on LN. Much of the issues plaguing Lightning Network can be resolved using a zkSNARK design whilst also providing the ability to do a multi-asset payment channel system. Currently we found a showstopper attack (American Call Option) on LN if we were to use multiple-assets. This would not exist in a system such as this.

Wallets

Web3 and mobile wallets are under active development by Blockchain Foundry Inc as WebAssembly applications and expected for release not long after mainnet deployment of Syscoin Core 4.2. Both of these will be multi-coin wallets that support Syscoin, SPTs, Ethereum, and ERC-20 tokens. The Web3 wallet will provide functionality similar to Metamask.
Syscoin Platform and tokens are already integrated with Blockbook. Custom hardware wallet support currently exists via ElectrumSys. First-class HW wallet integration through apps such as Ledger Live will exist after 4.2.
Current supported wallets
Syscoin Spark Desktop
Syscoin-Qt

Explorers

Mainnet: https://sys1.bcfn.ca (Blockbook)
Testnet: https://explorer-testnet.blockchainfoundry.co

Thank you for close consideration of our proposal. We look forward to feedback, and to working with the Reddit community to implement an ideal solution using Syscoin Platform!

submitted by sidhujag to ethereum [link] [comments]

We had some difficulties, but it's not stopping us! The winner will be picked tonight, I'll explain what happened in the post! [Draw #51]

Sorry for being so late, thanks for waiting.

TL;DR - This post is for the sole purpose of choosing a winner. If you commented in the [Drawing Thread], you are entered in the drawing and don't need to do anything else. By 22:00 UTC, the winner will be selected. The Bitcoin (BTC) blockchain will be used to pick this winner. This can be verified at any device running Python 3.8, and you do not need to own Bitcoin in order to participate.
Additionally, all information to replicate the Drawing at home is available on Dropbox and GitHub, scroll down for more information.
Importantly, this post WILL NOT BE EDITED in order to keep the integrity of the Drawing. To verify this, there will not be an asterisk during the time passed since its creation. The winner will be announced in a stickied comment.
The Problem
Alright, so three things happened:
First, I overslept. I fell asleep at midnight, and woke up around 8 o'clock. When I noticed this, I gathered the comments at 9 AM ET, which is pretty close to the deadline.
Second, I haven't used a PC, Mac, or any other reasonable piece of desktop hardware to run a Python script in years. If it's not through Repl.it on my iPad, it's through Pydroid 3 on my LG V30. I couldn't figure out a way to efficiently run the scripts on Repl.it on my iPad, and as for my phone, it didn't want to parse through the authors. Also, the software I used is Python 3.7, while leroy627 stated it required the use of Python 3.8.
In other words, I wasn't able to fully follow through the process of running the scripts due to hardware restraints and lack of the necessary software. I received this error when running getAuthors.py, but I'm not having it stop us.
Third, it's just a culmination of real-life conflicts. I honestly hate having to delay the [Draw] post, but otherwise, I hope everything is fine.
What does this mean for you all?
What happens is that the process of picking the winner is delayed, but not for much longer than what is standard. Also, potential winners will be manually disqualified after an unsuccessful vetting of their account, rather than having it be done automatically, if it comes to that.
The Solution
The comments have already been collected, we're just going to go through the process that has been established in [Draw #49] and [Draw #39], just with the software usable that's on GitHub (save for getAuthors.py and removeInvalids.py, unless if a fix is possible). The winner will be picked on 22:00 UTC (epoch timestamp: 1582495200) today.
DISCLAIMER: Some of the information may be unrevised, but procedures are the same as prior draws. Thank you.
Off Topic:
The [Discussion] Thread at /millionairemakersmeta is open. All comments are welcome there for any inquiries.
[Discussion #51]: https://www.reddit.com/millionairemakersmeta/comments/f8g5fo/_/
Explanation!
The Bitcoin (BTC) blockchain will be used to choose a winner. Once the time listed has passed, there will be an active check to determine the blockchain's winning hash. Like before, this subreddit will wait for the 3rd Block after the time (being 22:00 UTC) to select the winner.
If a block is discovered by 21:59 UTC, it will not be counted towards the counter of three blocks. If it's discovered by 22:00:00 UTC, then it will, simple. This can be checked by seeing the timestamp given to it by blockchain explorers.
You are able to see how this subreddit will verify the winner by checking the Dropbox folder, which also includes a back-up plan in case of an emergency.
Standard Protocol:
This post will not be edited! This is to prevent tampering of the hash or files by any of the moderators. To prove this, look for the lack of an asterisk near the time since creation.
To verify if a hash for a file is that of Draw #51, upload the file of choice to a SHA-256 generator, and match it with its respective hash output. The result you receive should be the same as what is listed here.
If you are interested in doing this for yourself, download Python 3.8 and follow the path to the text file here: MM51\OfficialMM51IDs.txt
Status Reports:
I will be commenting on the progress of the drawing via the comments, so other users can keep track of the progress. These comments will be pinned at the top of the post and be distinguished. Most likely, after 6:00 PM ET, the pinned comment will be announcing the winner.
If you can run Python yourself and follow the instructions, you should also be able to find the winner. Make sure the hash released from the blockchain and the total number of participants match with what is described below. In addition, thank you for your patience.
Information Used For Draw #51:
Dropbox Folder: https://www.dropbox.com/sh/ot6hok3e5zt5enl/AACqBWoCAgikuGsdVs6Z5frta?dl=0 GitHub Repository: https://github.com/lilfruini/CommentGathering-MillionaireMakers/tree/master
SHA-256 of Primary IDs: a8735f7dacabd6bd279ed096587f49ecaf2225508b7484bdea1739faf4d21949
Block Selection: The Third Bitcoin Block After 23 February 2020 - 22:00:00 UTC Total Participants: 7,860
submitted by MakerOfMillionaires to millionairemakers [link] [comments]

Reddcoin (RDD) 02/20 Progress Report - Core Wallet v3.1 Evolution & PoSV v2 - Commits & More Commits to v3.1! (Bitcoin Core 0.10, MacOS Catalina, QT Enhanced Speed and Security and more!)

Reddcoin (RDD) Core Dev Team Informal Progress Report, Feb 2020 - As any blockchain or software expert will confirm, the hardest part of making successful progress in blockchain and crypto is invisible to most users. As developers, the Reddcoin Core team relies on internal experts like John Nash, contributors offering their own code improvements to our repos (which we would love to see more of!) and especially upstream commits from experts working on open source projects like Bitcoin itself. We'd like tothank each and everyone who's hard work has contributed to this progress.
As part of Reddcoin's evolution, and in order to include required security fixes, speed improvements that are long overdue, the team has up to this point incorporated the following code commits since our last v3.0.1 public release. In attempting to solve the relatively minor font display issue with MacOS Catalina, we uncovered a complicated interweaving of updates between Reddcoin Core, QT software, MacOS SDK, Bitcoin Core and related libraries and dependencies that mandated we take a holistic approach to both solve the Catalina display problem, but in doing so, prepare a more streamlined overall build and test system, allowing the team to roll out more frequent and more secure updates in the future. And also to include some badly needed fixes in the current version of Core, which we have tentatively labeled Reddcoin Core Wallet v3.1.
Note: As indicated below, v3.1 is NOT YET AVAILABLE FOR DOWNLOAD BY PUBLIC. We wil advise when it is.
The new v3.1 version should be ready for internal QA and build testing by the end of this week, with luck, and will be turned over to the public shortly thereafter once testing has proven no unexpected issues have been introduced. We know the delay has been a bit extended for our ReddHead MacOS Catalina stakers, and we hope to have them all aboard soon. We have moved with all possible speed while attempting to incorproate all the required work, testing, and ensuring security and safety for our ReddHeads.
Which leads us to: PoSV v2 activation and the supermajority on Mainnet at the time of this writing has reached 5625/9000 blocks or 62.5%. We have progressed quite well and without any reported user issues since release, but we need all of the community to participate! This activation, much like the funding mechanisms currently being debated by BCH and others, and employed by DASH, will mean not only a catalyst for Reddcoin but ensure it's future by providing funding for the dev team. As a personal plea from the team, please help us support the PoSV v2 activation by staking your RDD, no matter how large or small your amount of stake.
Every block and every RDD counts, and if you don't know how, we'll teach you! Live chat is fun as well as providing tech support you can trust from devs and community ReddHead members. Join us today in staking and online and collect some RDD "rain" from users and devs alike!
If you're holding Reddcoin and not staking, or you haven't upgraded your v2.x wallet to v3.0.1 (current release), we need you to help achieve consensus and activate PoSV v2! For details, see the pinned message here or our website or medium channel. Upgrade is simple and takes moments; if you're nervous or unsure, we're here to help live in Telegram or Discord, as well as other chat programs. See our website for links.
Look for more updates shortly as our long-anticipated Reddcoin Payment Gateway and Merchant Services API come online with point-of-sale support, as we announce the cross-crypto-project Aussie firefighter fundraiser program, as well as a comprehensive update to our development roadmap and more.
Work has restarted on ReddID and multiple initiatives are underway to begin educating and sharing information about ReddID, what it is, and how to use it, as we approach a releasable ReddID product. We enthusiastically encourage anyone interested in working to bring these efforts to life, whether writers, UX/UI experts, big data analysts, graphic artists, coders, front-end, back-end, AI, DevOps, the Reddcoin Core dev team is growing, and there's more opportunity and work than ever!
Bring your talents to a community and dev team that truly appreciates it, and share the Reddcoin Love!
And now, lots of commits. As v3.1 is not yet quite ready for public release, these commits have not been pushed publicly, but in the interests of sharing progress transparently, and including our ReddHead community in the process, see below for mind-numbing technical detail of work accomplished.
e5c143404 - - 2014-08-07 - Ross Nicoll - Changed LevelDB cursors to use scoped pointers to ensure destruction when going out of scope. *99a7dba2e - - 2014-08-15 - Cory Fields - tests: fix test-runner for osx. Closes ##4708 *8c667f1be - - 2014-08-15 - Cory Fields - build: add funcs.mk to the list of meta-depends *bcc1b2b2f - - 2014-08-15 - Cory Fields - depends: fix shasum on osx < 10.9 *54dac77d1 - - 2014-08-18 - Cory Fields - build: add option for reducing exports (v2) *6fb9611c0 - - 2014-08-16 - randy-waterhouse - build : fix CPPFLAGS for libbitcoin_cli *9958cc923 - - 2014-08-16 - randy-waterhouse - build: Add --with-utils (bitcoin-cli and bitcoin-tx, default=yes). Help string consistency tweaks. Target sanity check fix. *342aa98ea - - 2014-08-07 - Cory Fields - build: fix automake warnings about the use of INCLUDES *46db8ad51 - - 2020-02-18 - John Nash - build: add build.h to the correct target *a24de1e4c - - 2014-11-26 - Pavel Janík - Use complete path to include bitcoin-config.h. *fd8f506e5 - - 2014-08-04 - Wladimir J. van der Laan - qt: Demote ReportInvalidCertificate message to qDebug *f12aaf3b1 - - 2020-02-17 - John Nash - build: QT5 compiled with fPIC require fPIC to be enabled, fPIE is not enough *7a991b37e - - 2014-08-12 - Wladimir J. van der Laan - build: check for sys/prctl.h in the proper way *2cfa63a48 - - 2014-08-11 - Wladimir J. van der Laan - build: Add mention of --disable-wallet to bdb48 error messages *9aa580f04 - - 2014-07-23 - Cory Fields - depends: add shared dependency builder *8853d4645 - - 2014-08-08 - Philip Kaufmann - [Qt] move SubstituteFonts() above ToolTipToRichTextFilter *0c98e21db - - 2014-08-02 - Ross Nicoll - URLs containing a / after the address no longer cause parsing errors. *7baa77731 - - 2014-08-07 - ntrgn - Fixes ignored qt 4.8 codecs path on windows when configuring with --with-qt-libdir *2a3df4617 - - 2014-08-06 - Cory Fields - qt: fix unicode character display on osx when building with 10.7 sdk *71a36303d - - 2014-08-04 - Cory Fields - build: fix race in 'make deploy' for windows *077295498 - - 2014-08-04 - Cory Fields - build: Fix 'make deploy' when binaries haven't been built yet *ffdcc4d7d - - 2014-08-04 - Cory Fields - build: hook up qt translations for static osx packaging *25a7e9c90 - - 2014-08-04 - Cory Fields - build: add --with-qt-translationdir to configure for use with static qt *11cfcef37 - - 2014-08-04 - Cory Fields - build: teach macdeploy the -translations-dir argument, for use with static qt *4c4ae35b1 - - 2014-07-23 - Cory Fields - build: Find the proper xcb/pcre dependencies *942e77dd2 - - 2014-08-06 - Cory Fields - build: silence mingw fpic warning spew *e73e2b834 - - 2014-06-27 - Huang Le - Use async name resolving to improve net thread responsiveness *c88e76e8e - - 2014-07-23 - Cory Fields - build: don't let libtool insert rpath into binaries *18e14e11c - - 2014-08-05 - ntrgn - build: Fix windows configure when using --with-qt-libdir *bb92d65c4 - - 2014-07-31 - Cory Fields - test: don't let the port number exceed the legal range *62b95290a - - 2014-06-18 - Cory Fields - test: redirect comparison tool output to stdout *cefe447e9 - - 2014-07-22 - Cory Fields - gitian: remove unneeded option after last commit *9347402ca - - 2014-07-21 - Cory Fields - build: fix broken boost chrono check on some platforms *c9ed039cf - - 2014-06-03 - Cory Fields - build: fix whitespace in pkg-config variable *3bcc5ad37 - - 2014-06-03 - Cory Fields - build: allow linux and osx to build against static qt5 *01a44ba90 - - 2014-07-17 - Cory Fields - build: silence false errors during make clean *d1fbf7ba2 - - 2014-07-08 - Cory Fields - build: fix win32 static linking after libtool merge *005ae2fa4 - - 2014-07-08 - Cory Fields - build: re-add AM_LDFLAGS where it's overridden *37043076d - - 2014-07-02 - Wladimir J. van der Laan - Fix the Qt5 build after d95ba75 *f3b4bbf40 - - 2014-07-01 - Wladimir J. van der Laan - qt: Change serious messages from qDebug to qWarning *f4706f753 - - 2014-07-01 - Wladimir J. van der Laan - qt: Log messages with type>QtDebugMsg as non-debug *98e85fa1f - - 2014-06-06 - Pieter Wuille - libsecp256k1 integration *5f1f2e226 - - 2020-02-17 - John Nash - Merge branch 'switch_verification_code' into Build *1f30416c9 - - 2014-02-07 - Pieter Wuille - Also switch the (unused) verification code to low-s instead of even-s. *1c093d55e - - 2014-06-06 - Cory Fields - secp256k1: Add build-side changes for libsecp256k1 *7f3114484 - - 2014-06-06 - Cory Fields - secp256k1: add libtool as a dependency *2531f9299 - - 2020-02-17 - John Nash - Move network-time related functions to timedata.cpp/h *d003e4c57 - - 2020-02-16 - John Nash - build: fix build weirdness after 54372482. *7035f5034 - - 2020-02-16 - John Nash - Add ::OUTPUT_SIZE *2a864c4d8 - - 2014-06-09 - Cory Fields - crypto: create a separate lib for crypto functions *03a4e4c70 - - 2014-06-09 - Cory Fields - crypto: explicitly check for byte read/write functions *a78462a2a - - 2014-06-09 - Cory Fields - build: move bitcoin-config.h to its own directory *a885721c4 - - 2014-05-31 - Pieter Wuille - Extend and move all crypto tests to crypto_tests.cpp *5f308f528 - - 2014-05-03 - Pieter Wuille - Move {Read,Write}{LE,BE}{32,64} to common.h and use builtins if possible *0161cc426 - - 2014-05-01 - Pieter Wuille - Add built-in RIPEMD-160 implementation *deefc27c0 - - 2014-04-28 - Pieter Wuille - Move crypto implementations to src/crypto/ *d6a12182b - - 2014-04-28 - Pieter Wuille - Add built-in SHA-1 implementation. *c3c4f9f2e - - 2014-04-27 - Pieter Wuille - Switch miner.cpp to use sha2 instead of OpenSSL. *b6ed6def9 - - 2014-04-28 - Pieter Wuille - Remove getwork() RPC call *0a09c1c60 - - 2014-04-26 - Pieter Wuille - Switch script.cpp and hash.cpp to use sha2.cpp instead of OpenSSL. *8ed091692 - - 2014-04-20 - Pieter Wuille - Add a built-in SHA256/SHA512 implementation. *0c4c99b3f - - 2014-06-21 - Philip Kaufmann - small cleanup in src/compat .h and .cpp *ab1369745 - - 2014-06-13 - Cory Fields - sanity: hook up sanity checks *f598c67e0 - - 2014-06-13 - Cory Fields - sanity: add libc/stdlib sanity checks *b241b3e13 - - 2014-06-13 - Cory Fields - sanity: autoconf check for sys/select.h *cad980a4f - - 2019-07-03 - John Nash - build: Add a top-level forwarding target for src/ objects *f4533ee1c - - 2019-07-03 - John Nash - build: qt: split locale resources. Fixes non-deterministic distcheck *4a0e46e76 - - 2019-06-29 - John Nash - build: fix version dependency *2f61699d9 - - 2019-06-29 - John Nash - build: quit abusing AMCPPFLAGS *99b60ba49 - - 2019-06-29 - John Nash - build: avoid the use of top and abs_ dir paths *c8f673d5d - - 2019-06-29 - John Nash - build: Tidy up file generation output *5318bce57 - - 2019-06-29 - John Nash - build: nuke Makefile.include from orbit *672a25349 - - 2019-06-29 - John Nash - build: add stub makefiles for easier subdir builds *562b7c5a6 - - 2020-02-08 - John Nash - build: delete old Makefile.am's *066120079 - - 2020-02-08 - John Nash - build: Switch to non-recursive make
Whew! No wonder it's taken the dev team a while! :)
TL;DR: Trying to fix MacOS Catalina font display led to requiring all kinds of work to migrate and evolve the Reddcoin Core software with Apple, Bitcoin and QT components. Lots of work done, v3.1 public release soon. Also other exciting things and ReddID back under active dev effort.
submitted by TechAdept to reddCoin [link] [comments]

30+ Reasons Why Cryptocurrencies Are Worthless

1)It is possible to change the code through a miner vote or a fork and change the total supply or anything. DASH did it : they reduced the total supply from 84M to 18.9M a few years ago. They could also increase it to 999 Trillions if they wanted to so that millions of DASH are mined every week.

2)You can also fork bitcoin anytime , start over from 0 and claim it's the real bitcoin. (BCH , BSV , BTG , LTC , BCD etc)

3)Why would you pay $10,000 for a digital collectible unit called BTC when you can use BCH or TRX or LTC .. you name it. They work just as fine and cost less. There is no rarity like in gold.

4)Think of any amount you hold in ethereum as a gift card to use smart contracts on the ETH blockchain. Ridiculous. You’d rather hold a wal mart gift card or even simply cash.

5)Private keys may be bruteforced as we speak. Quintillions entries a second. When they’ll have enough bitcoins under control , they could move them all at once instantly.(At least 45,000 ETH have been stolen this way for now through ethereum bandit)SHA 256 is too old , bitcoin is 10 years old , it is not secure enough , quantum computing could potentially break it.

6)And that’s if people don’t find a way to create an infinite amount of coins to sell on exchanges.. it happened with monero , stellar , bitcoin , zcash , zcoin , eos , etc..

proofs :

“Bitcoin , Coindesk : “The Latest Bitcoin Bug Was So Bad, Developers Kept Its Full Details a Secret”an attacker could have actually used it to create new Bitcoin — above the 21 million hard-cap of coin creation — thereby inflating the supply and devaluing current bitcoins.”

Stellar : “Stellar Inflation: Glitch Leads to 2.25 Billion Extra XLM Printed”

Monero : “A bug in the Monero (XMR) wallet software that could enable fake deposits to exchanges has been recently brought to public attention through a Medium post”

Zcoin : Forged coins were created, but not exceeding 1% of the circulating supply. We will release further details on exact numbers when Sigma is released.

EOS : “Hackers Forge Billion EOS Coins to Steal Real Crypto From DEX “

Zcash : “Zcash Team Reveals It Fixed a Catastrophic Coin Counterfeiting Bug” etc..

7)Segwit , and especially Lightning network is a very complex technology and it will inevitably have flaws , bugs , it will be exploited and people will lose money. That alone can cause bitcoin to drop very low levels.

8)Then miners may be losing millions so they will stop mining , blocks may be so slow , almost no transaction will come though , and bitcoin may not have enough time to reach the next difficulty adjustement. This is reffered to as a death spiral. Then every crypto even those with no mining involved may crash hard.

9)Many crypto wallets are unsafe and have already caused people to lose all their investment , including the infamous “parity wallet”.

10)It is NOT trustless. you have to trust the wallet you’re using is not just generating an address controlled by the developper , you have to trust the node the wallet connects to is an honest node , you have to trust a Rogue state or organization with enough computing power will not 51% attack the network. etc..

11)Bitcoin is NOT deflationary. Bitcoins are created every blocks (roughly every 10 minutes) and you wil be dead by the time we reach the 21 million current hard cap.

12)Bitcoin price may artificially be inflated by Tether.

13)It’s an energy waste , an environmental catastrophy.

14)The only usecases are money laundering , tax evasion , gambling , buying on the dark net , evading sanctions and speculation.

15)Governments will ban it if it gets too big , and they have a big incentive to do so , not only for the obscure usecases but also because it threatens the stability of sovereign currencies. Trump could kill bitcoin with one tweet , force fiat exchanges to cease activity.

16)Most cryptos are scams , the rest are just crazy speculative casino investments.

17)It is pyramidal : early adopters intend to profit massively while last comers get crushed. That's not how money works. The overwhelming majority of crypto holders are buying it because they think they will be able to sell it to a higher price later. Money is supposed to be rather stable. That's why the best cryptocurrencies are USDT USDC etc..

18)The very few stores accepting bitcoin always have the real price in the local currency , not in bitcoin. And prices like 0.00456329 BTC are ridiculous !

19)About famous brokers listing bitcoin : they have to meet the demand in order to make money , it doesn't mean they approve it , some even short it (see interactive broker's CEO opinion on bitcoin)

20)People say cash is backed by nothing and losing value slowly , and yes it is very flawed , but there is a whole nation behind it , it's accepted everywhere , you can buy more things with it.

21)Everybody in crypto thinks that there will be a new bullrun and that then , they will sell. But because everybody thinks it will happen , it might not happen. The truth is past performance doesn’t indicate future performance and it is absolutely not guaranteed that there will ever be another bullrun. The markets are unpredictable.

22)Also BTC went from about $0.003 to the price it is today , so don’t think it’s cheap now.

23)There is no recourse if you’re scammed/hacked/made a mistake in the address etc. No chargebacks. But it might be possible to do a rollback (blockchain reorganization) to reverse some transactions. BSV did it.

24)In case of a financial crisis , the speculative assets would crash the most and bitcoin is far from being a non speculative safe heaven ; and governments might ban it to prevent fiat inflation to worsen.

25) Having to write down the private key somewhere or memorize it is a security flaw ! It’s insane to think a system like this will gain mass adoption.

26) The argument saying governments can not ban it because it is decentralized (like they banned drugs) doesn’t work for cryptos. First , drugs are much harder to find and much more expensive and unsafe because of the ban , and people are willing to take the risk because they like it. But if crypto is banned , value will drop too much , and if you can’t sell it for fiat without risking jail , goodluck to find a buyer. Fiat exchanges could close. Banks could terminate every crypto related bank account. And maybe then the mining death spiral would happen and kill all cryptos.

27) Crypto doesn’t exist. It’s like buying air. It’s just virtual collectibles generated by a code. Faguzzi, fugazzi, it’s a whazzie, it’s a whoozie.. it’s a.. fairy dust. It doesn’t exist. It’s never landed. It’s no matter, it’s not on the elemental chart. It… it’s not fucking real!

28) Most brilliant guys have come out and said Bitcoin was a scam or worthless. Including Bill Gates , Warren Buffet , The Wolf Of Wall Street…

29) Inflation is necessary for POW , BTC code will have to be changed to bypass the 21M cap or mining will die ! If BTC code is not changed to allow for miners to be paid reasonably , they will cease mining when the bitcoin block reward gets too low.Even monero understood it ,the code will have to be changed to allow for an infinite bitcoin supply (devaluating all current bitcoins) or the hash will decrease and the security of bitcoin will decrease dramatically and be 51% attacked

30) Don’t mix up blockchain and cryptos. Even blockchain is overrated. But when you hear this or that company is going blockchain , it doesn’t mean they support cryptocurrencies.

31) Craig Wright had a bitcoin mining company with Dave Kleinman (he died) and on january 1 2020 he claims he will be able to access the 1.1M BTC/BCH/BTG from the mining trust. He may or may not dump them on the market , he also said BTC had a fatal flaw and that by 2019 there will be no more BTC.

32) Hacks in cryptos are very common and usually massive. Billions of dollars in crypto have been stolen in the last 6 years. In may 2019 Binance was hacked and lost 7,000 BTC (and it’s far from being the biggest crypto hack).

33) Bitcoin was first. It's an ancient technology. Newer blockchains have privacy, smart contracts, distributed apps and more.Bitcoin is our future? Was the Model T the future of the automobile? (John Mc Afee)

34) IOTA investiguating stolen funds on mainnet. IOTA shuts down the whole network to deal with trinity wallet attack.

35) Compared to bitcoin other cryptos work just as fine and don't waste so much energy.

36 ) Everytime miners disagree on the updates it will create another version of bitcoin : problem of governance and legitimacy.

37) Cryptos are only legitimate if they act as a credit for a redeemable asset like USDT or gold backed coins.


While the native language of the writter is not english , I think you get the point and it doesn't make it any less relevant.
submitted by OverTheRedHills to u/OverTheRedHills [link] [comments]

Can someone explain how many different types of "proof of work" can exist? Context inside, topic more complicated than title implies.

Hi guys, We all know SHA-256 (BTC, BCH, BSV), Scrypt (LTC, Dash, NRG, if my memory serves correctly), cryptonote / RandomX (monero), and Ethash / SHA-3 for Ethereum. I am not a software engineer but I have purchased an antminer before.
I would like to go in to something a little bit different now with regards to "minting" new coins. This hypothetical would copy Bitcoin's "minting" or proof of work for simplicty's sake, but through a different software interface. Anyone can edit 24 lines of code from the Ethereum source code, then create their own coin and put 99.99999% of it in to an escrow that slowly redistributes the token over years of time, but nobody really likes that.
Let's say I make "Azureuscoin" (Azureus is a P2P file-sharing program like utorrent or bittorrent). There will never be more than 21 million Azureuscoin. Then I run Azureus for six days without anyone else downloading and running Azureus. 6 x 24 = 144 (hours), 144 x 6 (blocks every hour mined) = 864 blocks mined x 50 (amount of Azureuscoin minted per block / ten minutes) = 43,200. Then other P2P filesharing fans start to join in on using Azureus.
My question is, what mechanism of "proof of work" would make the above paragraph possible? I imagine this would require an oracle of some sort? Or would a blockchain need to be built on top of Azureus?
submitted by sgtslaughterTV to CryptoCurrency [link] [comments]

Mining tax proposal could have been a great plan, but orphaning suggestion makes it a disaster

As I said before, the miners run the network and as such they are responsible for the software which runs it. This only makes sense that they fund development. Since it looked for me that they were in agreement to donate the %% of their mining profits to the development fund, I was very happy to see that they came together for a common goal.
Until someone pointed this paragraph to me:
To ensure participation and include subsidization from the whole pool of SHA-256 mining, miners will orphan BCH blocks that do not follow the plan. This is needed to avoid a tragedy of the commons.
If that sounds like an abuse, that's because it is:
That would be a disaster. BCH community must take a stand that 50% attack is NEVER EVER EVER acceptable.
All of that is also aggravated by the fact that the 50% attack is completely unnecessary. If majority of the miners are already on board with the plan, what prevents them from executing it without 50% attack, and make the fund a voluntary thing? There will be a little less funds, so what. If more that 50% hash rate is already secured for that plan, then at minimum half of the funds would still be available. And all of that would be done without any dick moves.
submitted by wk4327 to btc [link] [comments]

next trezor release should use a SE

This is taken from the coldcard site:
We find it a quite scary that some Bitcoin wallets trust the main microprocessor with their most valuable secrets. Instead, Coldcard uses a Secure Element to protect your Bitcoin.
Specifically, the Coldcard (Mk3) uses Microchip's ATECC608A to store the critical master secret: the 24-word seed phrase for your BIP32/BIP39 wallet.
This little chip is very powerful. Communication is controlled by complex challenges and SHA-256 responses which prevent replay and eavesdropping. The secure element enforces cryptographically, that the attacker must know the PIN to access the secrets. An attacker cannot brute-force combinations or replay a previous login sequence. This remains true even if they removed the chip from the board or fully-replaced the firmware in the main microprocessor. In fact, even with the secure element removed from the system, and all the secrets of the main micro fully-known, the attacher would still only get 13 tries before the secure element bricks itself! (Don't worry, this counter is reset every time you login correctly.)
Even if there was some critical security bug in the secure element that completely exposed the secrets it holds, your Bitcoin would still be safe, because we encrypt the contents of the secure element with a one-time pad known only to the main micro.
More details are available in this white paper and the complete source code is available.
https://coldcardwallet.com/
Also please don't try to apply the 'open source is more secure principal'. This is a fallacy when applied to hardware. It only works in software because you can verify it a product was built using that software by building it yourself this does not apply to hardware.
I already bought the MK3 but i have other assets that are only supported by trezor and I am reluctant to switch to a ledger. However if trezor is adamant in using 'Open source hardware' whatever the fuck that means I will be forced to switch.
Also are passphrase even supported for ethereum dapps. Trezor integrates with exodus and MEW but they never prompt for a passphrase?
submitted by Spartan3123 to TREZOR [link] [comments]

It's been a while, so let's do things a bit differently. [Update & Draw #32]

If you're looking for the winner, please check to see if there's a stickied comment on this post.

Hello, I'm your newest mod, lilfruini, and I thought it's been a while since we did a drawing.
Will you be doing drawings as they've been done before? I'm not going to perform the drawing as before, but I have my reasons. First, I'm not able to use Amazon Web Services, which seems to be a prerequisite for using the drawing source code. Second, I am not a good coder at all, this subreddit was my first experience with using Python, which makes yet another obstacle.
To make up for my shortcomings, though, I want to share the files I used on Dropbox. You can see every comment ID indexed, the SHA-256 hash to confirm I haven't tampered with the list, and I included the Python file used to download the comments, with PRAW.
How will you select a MakingMillionaire this time? Well, instead of choosing a date and a time, instead, I'll be pre-selecting a block from the Bitcoin Cash blockchain. The block's hash will be used to determine the winner. I made an effort to have the hash come near the third of each Friday, and to make sure the blocks are a factor of 250, to ensure consistency. However, this means the time held for drawings will vary greatly.
Anyway, which block will we be using?

BLOCK #539750

When the block is mined, you will be able to see the returning hash here: https://blockchair.com/bitcoin-cash/block/539750
How will we know you aren't some deceiving scum? Well, like before, I will still use the SHA-256 of the IDs combined. I also made sure to check if the list of IDs were consistent by checking the SHA-256 of each group of text, to ensure information is constant. You can see this for yourself in the Dropbox folder.
In addition, I WILL NOT EDIT THIS POST! (excluding ninja edits) That means, to check the winner of the drawing, see the future stickied comment. This is to ensure I do not change the SHA-256 hash of any texts.
This means everything will run smoothly, right? Well, not exactly. I have the entirety of the comment IDs of the 32nd Thread, but I said before that I'm not a good coder by any means. I will have to figure out how to use hashlib or OpenSSL in order to hash the numbers and retrieve the winning index. If you're investigative, you may also notice that the folder, "Files used for Hash", is incomplete. This is intentional, but once I figure out how to calculate a winning index, I will upload the necessary files to the folder.
On the subject of that, if anyone knows how to replicate retrieving the winning index of past drawings through Python or any other means, please PM me.
Also, I cannot guarantee this by any means, but I may, MAY livestream the release of Block #539750 on my Twitch channel, https://www.twitch.tv/nandinmaste
This livestream, however, may be done through a phone, as I don't feel prepared to download screen-capturing software on my laptop.
Thank you for your patience! It's literally been a year since the last post was made, but now I feel prepared, despite some flaws. If you have any questions, or have the need to say something, please comment.
Also, I'd like to give special credit to TyrSniper from /AskProgrammers for guiding me with using Python. This post may have not been made in the first place without his coding help.
Information Used For Drawing #32:
Dropbox Folder: https://www.dropbox.com/sh/0zqohzjdjrifo4j/AABnXjsBaaK0v875Be8d5Wewa?dl=0 SHA-256 (from movable-type.co.uk and passwordsgenerator.net): 95af6c340986b59dd40a8b597859c980f1b8710f5155d7b8a035f212d6093ef6 Word Document with every ID indexed: https://www.dropbox.com/s/83bmpx7guxwk14w/Drawing%20Thread%20%2332%20-%20Every%20Comment%20Indexed.docx?dl=0 Text File of Every Comment ID (Python actions removed): https://www.dropbox.com/s/1a2105yjj00vke4/MillionaireMaker%20Fixed%20Output%20Text%20%28July%2018%20-%2012%2052%20AM%29.txt?dl=0 Text File of Every Comment ID (revised, with repeats removed): https://www.dropbox.com/s/867p1fybwourgmf/MillionaireMaker%20Revised%20Output%20Text%20%28July%2018%20-%2012%2052%20AM%29.txt?dl=0 Block 539750: https://blockchair.com/bitcoin-cash/block/539750 Total Participants: 35,704 
So, in a few days, we'll be making a millionaire. Get excited! or don't, I guess...
submitted by lilfruini to millionairemakers [link] [comments]

It's still September, everyone. Oh, we're gonna pick a millionaire? Never was a cloudy day! [Draw #34]

If you win, hopefully you'll remember the 21st night of September.

In twenty minutes, or precisely 16:00 UTC, the drawing will commence. The drawing may be streamed on https://twitch.tv/nandinmaster You call it "Waiting until the last minute," I call it "Getting right to the point."
I joked about copying and pasting, but what else can I say?
The Bitcoin (BTC) blockchain will be used to choose a winner. Once the time listed has passed, there will be an active check to determine the blockchain's winning hash. This subreddit will wait for the 3rd Block after the time (being 16:00 UTC) to select the winner.
If a block is discovered by 15:59 UTC, it will not be counted towards the counter of three. If it's discovered by 16:00 UTC, then it will, simple. This can be checked by seeing the timestamp given to it by blockchain explorers.
You are able to see how this subreddit will verify the winner by checking the Dropbox folder, which also includes a back-up plan in case of an emergency.
For Your Awareness:
This post will not be edited, aside from ninja edits for formatting. This is to prevent tampering of the hash or files by any of the moderators.
To verify if a hash for a file is that of Draw #34, go to the Comment IDs' text, and select all, excluding the beginning two lines. Afterwards, paste it into a SHA-256 generator. The hash you receive should be the same as what is listed here.
If you are interested in doing this for yourself, ideally download Python 3, then follow the path to the text file here: MillionaireMakers Drawing #34\Outputs\MillionaireMakers_Comment_IDs_34.txt
Potential Stream:
Similar to last time's drawing, there may be a stream on my Twitch channel: https://twitch.tv/nandinmaster
This stream will happen at 16:00 UTC, which in my time-zone, translates to 12:00 PM ET (noon).
Don't count on it, however. My laptop had its hard drive broken, so if this could be possible, I may need to use screen-streaming software for Android devices.
NOTE: Before we blow this topsicle land, I'd like to inform anyone that at the time of writing this post, the Dropbox folder is missing its "Information" text file. Following the time the drawing has finished, it is my hope to post both that file and the output results from the Selection Code.
Due to the nature of this post, I will not edit this information out. Thank you for your understanding!
Information Used For Draw #34:
Dropbox Folder: https://www.dropbox.com/sh/80z0knokhoa58aq/AAAC0YldEpNEkE6F2NLvNsS8a?dl=0 SHA-256 (movable-type.co.uk and passwordsgenerator.net): 1b0a65f75435e6ec5a4ec17ca6c77bbf2ee2d5e814e54aed60d1e61d778a45ba
PRAW Code: https://www.dropbox.com/s/c4gizjdxbvsk9ym/%28ALTERED%29%20MM%20Comment%20IDs%20Retrieval%20via%20PRAW.py?dl=0 Selection Code: https://www.dropbox.com/s/nbglj2ksq2wjiv7/MillionaireMakers%20%2334%20Drawing%20Code.py?dl=0 Comment IDs' Text: https://www.dropbox.com/s/4dmwzc0iinof18MillionaireMakers_Comment_IDs_34.txt?dl=0
Block Selection: The Third Block After 23 September 2018 - 16:00:00 UTC Total Participants: 5,961
Making a millionaire is the goal, but random hash outputs are the toll!
submitted by lilfruini to millionairemakers [link] [comments]

Amsterdam Meetup - My experience and notes

Hey guys! So, I attended the Amsterdam Meetup and it was awesome. Here's some of the insights and gems I gathered for those who couldn't attend:
If I remember anything else I'll edit and add, feel free to add those who attended if I missed any big things :)
submitted by Criptolete to Vechain [link] [comments]

Proposal to switch to SHA-3 proof of work

https://github.com/aeonix/aeon/issues/103

I believe now is the right time for Aeon to become ASIC friendly by switching to SHA-3 PoW (the most recent Secure Hashing Algorithm standardized by NIST). Below I'll try to explain why:

There is no such thing as ASIC resistant PoW.

Whether someone creates an ASIC or not is not determined by how technologically difficult it is to do so, but how economically sensible it is to do so; i.e., when a coin gets more adopted and the price rises, ASICs will appear no matter what.
Below is a quote from Bitcoin StackExchange which makes a good point:
It's not really "someone figured out" how to mine on FPGAs or ASICs: an intelligent first year undergraduate could port SHA256 from C to Verilog. It's more that it began to make economic sense. ASICs in particular require a big enough up-front investment that you need economies of scale. – Peter Taylor Nov 9 '17 at 23:27
https://bitcoin.stackexchange.com/questions/62336/why-did-satoshi-design-bitcoin-to-be-mineable-only-on-specialized-hardware-if-t#comment71658_62339
For every supposedly ASIC resistant PoW (scrypt, CryptoNight etc), ASICs have been created at some point when the coin became sufficiently large. An often seen argument is "CryptoNight was good at resisting ASICs because it survived the first 3 years without ASICs being developed", which I disagree. CryptoNight ASICs weren't created for the first 3 years simply because the market was too small; it wasn't worthwhile to develop CryptoNight ASICs.
Currently RandomX is receiving a lot of attention as being (almost) truly ASIC resistant by making PoW even more complex, but from the past experience and from logical reasoning, I have no reason to believe so.

Importance of protocol stability:

As a coin gets more widely adopted (and the price goes up), there will be more participants in the network (users, exchanges, merchants, pools, etc), which makes it more difficult to do hard forks (i.e. to force everyone to upgrade their software). Monero's 6 month fork schedule is already becoming almost unworkable due to the sheer network size, and I think they'll be forced to change this policy rather soon.
Imagine a hypothetical future where one particular crypto coin becomes a globally adopted world currency. That coin cannot do hard forks every so often; maybe once every two years is already too much. Ideally, at some point, the protocol should become absolutely stable and require no more hard forks at all.
With this in mind, I immediately see ASIC resistance being incompatible with this future, because hard forks (PoW changes) are rather frequently needed due to ASICs getting created faster and faster as the coin grows. ASIC resistance cannot be a sane strategy for a winning cryptocurrency.

Importance of switching now:

Going from ASIC resistant to ASIC friendly is such a radical change, and a strong opposition is naturally expected from many of the community members who have been supporting ASIC resistance. A compromise solution suggested by u/smooth_xmr is to adopt CryptonightR which Monero will switch to in the next upcoming hard fork. I think the reasoning is that CN-R is expected to be somewhat better at resisting ASICs and not much more computationally expensive than the previous CN variants (unlike RandomX), so we can wait and see how successful this will be before going full ASIC friendly.
Initially I felt OK with it, but I became unsatisfied after a while of thinking for these reasons:

Arguments for ASIC resistance and their counterarguments:

SHA-3 is the perfect way for Aeon to differentiate itself from Monero.

This change is radical but not stupid. Many people in the Monero community would be curious how things will play out for SHA-3 Aeon. This will surely also attract a lot of attention from the wider crypto community because Aeon will be the first CryptoNote coin that deployed SHA-3. I believe this is a very good opportunity for marketing as well.

Please discuss.
submitted by stoffu to Aeon [link] [comments]

Establishing a smart contract commercial scenario: Chainlink, Zk-Snarks and sharding technology work together to make the ultimate killer

This text was translated from Chinese, open following link in Chrome and translate to see all images:
https://bihu.com/article/1242138347
EDIT: found an English text with pictures:
https://medium.com/@rogerfeng/making-smart-contracts-work-for-business-how-chainlink-zk-snarks-sharding-finally-delivered-8f268af75ca2
Author: Feng Jie translation: Liu Sha
“The highest state of technology is to integrate into the various scenes of everyday life, to fade away from high-tech outerwear and become a part of everyday life.” – Mark Weiser
People in the future will not even think that smart contracts are "innovative." By that time, smart contracts would permeate every aspect of life, and people couldn't even imagine what the era of non-digital currency would look like.
Later historians may divide human business history into two eras, the pre-smart contract era and the post-smart contract era. After all, digital money has brought unprecedented changes to the nature and patterns of business practices in the real world. An anonymous member of the Chainlink community once said: "Smart contracts can change the DNA of the business."
Of course, like all the technological revolutions of the past, smart contracts also need to reach a "tipping point" to truly achieve large-scale applications. So we need to ask ourselves two questions:
  1. What exactly is this so-called tipping point?
  2. As of August 2019, have we reached this tipping point?
To reach the tipping point means unlocking the ultimate nirvana of business.
Tipping point We can think about this issue from the perspective of mainstream companies. Imagine what a perfect smart contract platform should look like. What characteristics should this platform have? Or what features must be possessed?
To reach the tipping point, you must establish a public chain with the following four characteristics:
  1. Privacy protection
  2. In addition to the cryptocurrency, the transaction can also be settled in mainstream legal currency and comply with the regulatory requirements of financial markets such as ISO 20022.
  3. Achieve scalability without sacrificing decentralization or security, that is, solving the "impossible triangle problem."
  4. Connect the external data under the chain, that is, solve the "prophecy problem."
Now that we have Chainlink, zk-snarks and sharding technology, we have reached this tipping point.
Next, let's explore how this ultimate nirvana is actually made. Our discussion will be mainly from the perspective of Ethereum, which is still the top smart contract platform for community size and mainstream applications.
So what about the private chain?
Before delving into it, I want to take the time to solve an unavoidable problem. The mainstream view has always believed that the private chain is a more suitable solution for the enterprise. Therefore, we first dialectically analyze the two advantages and two major drawbacks of the private chain.
Disadvantages
  1. Centralization leads to relatively lower security
It's not surprising that IBM and Maersk's blockchain freight alliances have a hard time finding customers who are willing to join. How can other freight companies be willing to let their biggest competitors (Maersk) verify their trading data? Only madmen dare to do this.
  1. The staking of the horses occupy the hills:
This problem is even more serious than centralization. John Wolpert, co-founder of the IBM blockchain, wrote an excellent article called Breaking the Barriers to Realize Security: Why Companies Should Embrace the Ethereum Public Chain, which he covered in detail in the article.
If every company builds its own private chain, it will lead to chaos in the mountains. Today's B2B ecosystem is very complex. Imagine the innumerable private chains of the world intertwined to form a huge "spider web." This is not only cost-effective, but also not scalable.
The starting point of the blockchain is to break down barriers instead of building more barriers.
"One day, one of your big buyers called you to ask if you want to join their private chain. You promised. The next day you received a call from the wholesaler to ask you the same question. Then came the supplier, freight. Business, insurance company or even bank, and each company may have several private chains! Finally you have to invest a lot of time and cost to operate dozens of blockchains every day . If there are partners to let you join them at this time The private chain, you might say "Forget it, or fax me the order!" ”—Paul Brody (Ernst & Young)
“Every time you connect two private chains through a system integrator, you have to pay a lot of money .”
Advantage
  1. Scalability: With the Ethereum public chain implementing fragmentation technology, this advantage is rapidly shrinking.
  2. Privacy protection: At this stage, the classification of public chain / private chain is actually not very accurate. The Aztec , Zether, and Nightfall protocols (both based on the zk-snarks protocol) effectively provide a "private chain model" for the Ethereum public chain, allowing it to switch between the public and private chains. Therefore, a more accurate classification should be the alliance chain and the public chain.
By 2020, the label of the public chain/private chain will gradually disappear. The public and private chains will no longer be two opposing concepts. Instead, the concept of publicly traded/private transactions and confidential contracts/open contracts is changed, and the scope of these transactions and contracts varies according to specific needs, either bilaterally or multilaterally or even publicly.
All in all, the private chain has two major drawbacks compared to the public chain. Not only that, but the two major advantages of the private chain are also rapidly disappearing.
“Technology will evolve over time, so there will be a variety of solutions to solve existing problems. Ultimately, the public-chain platform will have the same performance, scalability and data privacy as the private chain, while at the same time ensuring security and Decentralized."
Feature 1: Privacy protection (predictive machine and public chain privacy)
Enigma founder Guy Zyskind once joked in his MIT graduation thesis that smart contracts can only become commercially valuable if they become "confidential contracts." He later proposed that zk-snarks and Trusted Execution Environment (TEE) are the most promising solutions. He said nothing wrong.
What is zk-snarks ? Zk-snarks is a zero-knowledge proof mechanism (ZPK). So what is the zero-knowledge proof mechanism? In short: a zero-knowledge proof mechanism allows you to prove that you own certain information without revealing the content of the information.
Vitalik Buterin explained this concept in detail from a technical point of view in an article published in 2017. Hackernoon also wrote an excellent article explaining the concept in an easy-to-understand way with the example of a five-year-old child and Halloween candy.
What is the trusted execution environment? The trusted execution environment lets the code run on closed hardware, and
1 ) The guarantee result cannot be tampered with
2 ) Protecting absolute privacy, even hardware running code can't get confidential information.
The most well-known trusted execution environment is Intel SGX. Chainlink has established a partnership with Intel SGX after acquiring Tom Crier.
Ernst & Young released the Nightfall agreement on Github on May 31, 2019. A well-known accounting firm with a history of 100 years will choose to add privacy features to the public chain instead of developing a private chain. This is a problem.
Since then, the community has been actively developing on this basis, not only to improve the code, but also to develop a plug-and-play Truffle Box for those who are not good at writing code. Blockchain communities and businesses generally rarely collaborate, so these collaborations fully demonstrate the popularity of Nightfall.
Prior to this, two zk-snark-based Ethereum public chain privacy protocols were introduced, namely AZTEC (Consensys) and Zether (Stanford, JPMorgan Chase). An obvious trend is slowly taking shape.
In the field of oracles, Chainlink uses both zero-knowledge proof and a trusted execution environment to complement each other. Trusted execution environments guarantee data privacy, even for nodes that cannot access data (this feature is critical for bank accounts and API keys).
Chainlink is still trying to implement a trusted execution environment, and nodes can access data temporarily, so authentication services are also needed. Although the credible execution environment is almost 100% foolproof, in theory, a strong shield has a spear that can penetrate it. Therefore, the team is currently trying to run zk-snarks in a trusted execution environment (Thomas Hodges mentioned this in the 2019 Trufflecon Q&A session). The combination of the two can form a very robust and complete system. The attacker must find a way to strip all the layers of an onion at the same time to make any effective attack (and it is already difficult to peel off a layer of skin).
“Chainlink combines a trusted execution environment with zero-knowledge proof to build what we call a defense-in-depth system, which means they provide all the tools needed for smart contract developers, including trusted execution environments, multiple nodes, and Data sources, fine margins, reputation systems, asymmetric encryption, zero-knowledge proofs, WASM, and OTP+RNG, these features allow smart contract developers to adjust the confidentiality and cost of contracts based on specific budget and security needs. Machine, Chainlink and its four major application scenarios》
In the future, zk-snarks may be upgraded to zk-starks (a fully transparent zero-knowledge proof mechanism) that protects the system from quantum computer attacks. And the best thing about zk-starks is that it's more scalable than zk-snarks. In other words, it can better protect privacy, and the cost of gas will not increase.
If you want to learn more about zk-starks, you can read a popular science article written by Adam Luciano.
Feature 2: Scalability (scalability of predictive machines and public chains) To understand this problem, we can make an analogy like this:
A public chain is like a large enterprise, and every employee (ie, a node) must attend each meeting (ie, confirm each transaction). Imagine how inefficient this company is! Only customers who have a lot of money (ie gas fees) can get their requests to the forefront. And this is not the most serious problem. The most serious problem is that the more employees (ie nodes) who join the company, the harder it is for the company to function properly! In the end, the company not only failed to expand linearly, but also became smaller and smaller. Although this guarantees decentralization and security to the greatest extent, the price is completely abandoning scalability.
There are various temporary fire fighting solutions, but no one solution can completely solve this "impossible triangle problem." For example, EOS uses the DPOS mechanism (share authorization certification mechanism), where only 21 super nodes (many of which are well-known nodes) are responsible for verifying all transactions.
Sidechains (such as Bitcoin's Lightning Network and Ethereum's lightning network) guarantee scalability and decentralization at the expense of security.
So how to use the fragmentation technology to solve this problem? Let's make another analogy:
In reality, there is only one company that is not too much to ask everyone to attend all meetings, that is, small start-ups (that is, private chains that limit the number of nodes).
In most cases, large companies divide employees into thousands of teams (ie, shards), and each team's principal (ie, the certifier) ​​is responsible for reporting to the senior management (ie, the main chain). If people from different teams need to collaborate (and sometimes also), then they can collaborate by cross-shard receipts. If a new employee joins the company, the team can be re-segmented (ie re-sharding). This allows for linear expansion.
In fact, the process of developing a start-up to a large enterprise is surprisingly similar to the process of Ethereum 1.0 developing into Ethereum 2.0.
“The Ethereum 1.0 period is that several people who are alone are trying to build a world computer; and Ethereum 2.0 will really develop into a world computer.” Vitalik Buterin said in the first piece of the workshop.
Since Ethereum was not originally built on the principle of fragmentation, it takes seven steps to achieve the goal (this is a bit like the word morphing solitaire game). The first step is planned for January 3, 2020.
At the same time, developers can use many other blockchain platforms designed based on the fragmentation principle. Some platforms, including Zilliqa and Quarkchain, are already compatible with Chainlink.
If you want to see more in-depth technical analysis of shards, check out an article by Ramy Zhang.
In the field of oracles, Chainlink has the following two characteristics:
1 ) Use Schnorr threshold signatures to quickly reach consensus in a cost-effective manner. The next version of the chain only needs 16,000 gas.
2 ) We have previously discussed the need to use trusted execution environment hardware to ensure that nodes cannot access sensitive data. Since you have hardware in your hand, you can use it to do some actual computing work, so that you can properly reduce the amount of computation on the smart contract platform.
"With the SGX system (Town Crier) and zero-knowledge proof technology, the oracle can be truly reliable and confidential, so the boundaries between the oracle and the smart contract are beginning to flow... Our long-term strategy... is to let The predictor becomes the key chain of computing resources used by most smart contracts. We believe that the way to achieve this goal is to perform chain operations in the oracle to meet various computing needs, and then send the results to the smart contract."Chainlink White Paper, Section 6.3 (26 pages)
Of course, this “long-term strategy” has certain risks, unless Chainlink can implement a trusted execution environment and its service provider ecosystem can achieve a qualitative leap. However, the Chainlink team's vision is absolutely forward-looking: under-chain computing is a key factor in ensuring that blockchains are not dragged down by large amounts of IoT data.
The Internet of Things has dramatically increased the current state of big data. At present, most of the data is still generated on the software side, and it is not real-time data, and most of the data in the future will be real-time data generated on the sensor side. One of the big drawbacks of real-time data is that it increases storage pressure. For example, Coughlin Associates expects an unmanned car to generate 1G of data per second. This means that the same car will produce 3.6T data per hour!
The only viable solution is to do real-time analysis of the data, rather than storing the data first. In the Global Cloud Index: 2016-2021 Forecast and Methodology White Paper, Cisco predicts that more than 90% of data in 2021 will be analyzed in real time without storage.
That is to say, the essence of data is that it can only exist in just one instant. The nature of the blockchain is not to be modified, so the two are as incompatible as water and oil.
The solution is to analyze the raw data under the chain, extract the meaningful results and send them to the blockchain. The combination of fragmentation technology and trusted execution environment forms a new computing architecture, similar to the cloud computing-fog computing-edge computing architecture.
It should be noted here that it is good to improve computing power, but this is not the main purpose of the blockchain.
The fundamental purpose of the blockchain is not to reduce the original cost of computing and data storage. After all, technology giants such as Amazon, Microsoft, Google, Salesforce, Tencent, Alibaba, and Dropbox have built world-class cloud services. The centralized server wins high computational efficiency (but the blockchain will greatly improve the computational efficiency through fragmentation technology, and will catch up with it one day). The value of the blockchain is to reduce the cost of building trust. Nick Szabo calls it "social scalability" (this is a relative concept to the "operational" scalability we have been talking about). Vitalik Buterin also made it clear that the meaning of smart contracts is to accept small arithmetic delay penalties in exchange for a substantial reduction in "social costs."
Alex Coventry of the Chainlink team once raised the question: "We have missed many opportunities for cooperation and reciprocity because we can't confirm whether the other party will fulfill the promise?"
Is there any potential for data storage projects like Siacoin and IPFS? What about decentralized computing projects like SONM and Golem?
Siacoin 's core value proposition is not that its computing efficiency is higher than traditional cloud services. The cost of computing is required to split, repeat, and reassemble data. And companies are more capable of buying the latest and greatest hardware than individuals. Siacoin's core value proposition is to process data in an Airbnb-like mode, so management fees will be lower than traditional models. It also generates additional social value, such as flood control, privacy and security, and anti-censorship.
The same is true of Golem and SONM. Even with the most efficient protocol, it is inevitable that a small amount of delay will be imposed and fined to coordinate the hardware of different geographical locations. Therefore, under the condition that all other conditions are equal, the centralized hardware still has the advantage of faster computing speed. However, the core value proposition of the above project is to use the Airbnb-like model to reduce management costs.
We must strictly distinguish between "social scalability" and "operational scalability", and the two cannot be confused. I will explain these two concepts in detail when I discuss "Magic Bus and Lightweight Library" later.
Feature 3: Compatible with legal currency
Most mainstream companies do not regard cryptocurrencies as "real currencies." In addition, even if someone wants to use cryptocurrency for trading, it is very difficult to actually operate because of its high price volatility. I discussed the “price volatility problem” in detail in Chapters 8 and 9 of the previous article. These problems do not completely erase the existence value of cryptocurrencies, because cryptocurrencies also have many advantages that legal currency does not have. I am just emphasizing what we need to know more about the comfort zone of mainstream companies.
Chainlink acts as a universal API connector that triggers open banking payments. Chainlink is fully compliant with ISO 20022 and has established a long-term partnership with SWIFT (it is worth mentioning that SWIFT has not been updated for a long time and hopes to be updated after the SIBOS 2019 conference).
PSD2 will take effect on September 14, 2019. All banks in the EU will all comply with this new regulation by then. In other words, the bank must put all account data in the "front end" and can be called through the API. The approved third party (ie, the Chainlink node) can trigger the payment directly without the payment service provider.
Although the United States and Japan have not adopted similar laws, many banks still spontaneously promote the development of open banks. Banks open APIs to third-party developers to create new revenue streams and customer experiences that ultimately increase profitability. In addition, this will allow banks to better respond to competitors in the mobile payment and financial technology sectors in an APP-centric economic model.
As this open banking revolution continues, Chainlink will connect smart contracts with the world's major currencies (US dollar, euro, yen, etc.).
Only one external adapter is required to connect to the authenticated API. From a programming perspective, it is relatively simple to allow everyone in the community to contribute code to the code base (and thus achieve scalability). Chainlink has released adapters for PayPal and Mister Tango (European version of PayPal).
Feature 4: Data connection with the chain
Chainlink has been working on solving the "prophecy problem" and successfully succeeded on the main online line on May 30, 2019.
Chainlink has made many achievements in just a few months. Provable (formerly Oraclize) was successfully used on the Chainlink node and finally settled the debate about whether the predictor should be centralized or decentralized.
Synthetic Ether lost 37 million Ethercoins in a hack because it did not connect to Chainlink. Fortunately, the money was finally recovered and did not cause any loss. This lesson illustrates the importance of decentralized oracles.
In addition, both Oracle and Google have partnered with Chainlink to monetize their API data and create a virtuous circle to capture the market opportunities that Facebook missed.
There are new nodes coming online every week, and the network activity has been very high. The Chainlink team maintains a list of certified nodes in the documentation and Twitter releases. Twitter user CryptoSponge also set up a new development for the Tableau push update Chainlink team:
Regarding the importance of the current stage in the history of blockchain development, Brad Huston summed it up very brilliantly:
"The biggest problem with cryptocurrencies is to build bridges between cryptocurrencies, fiat currencies and big data. Chainlink is very beautifully narrowing the distance between the three. Now it can even be said: 'The bridge has been built.'"
Magic bus and lightweight library
Let's summarize what we discussed earlier. The real purpose of the blockchain is to reduce the cost of building trust and achieve "social scalability."
Therefore, according to this logic, the main application scenarios of platforms such as Ethereum 2.0 and Zilliqa should be in the B2B field. I quote a sentence I wrote in a previous article:
“My conclusion is: If the smart contract is successful, it will also succeed in the B2B field first.”
The private chain itself is self-contradictory and destined to fail. It has led to the phenomenon of occupying the hills, thus increasing the social cost, which is in opposition to B2B itself, and ultimately it is self-restraint. ”
Before the emergence of fragmentation technology, even simple games (ie, etheric cats) could not be smoothly run on the public chain, let alone dealing with complex B2B contracts and even changing commercial DNA. With the sharding technology, everything is ready.
Despite this, we can't use Ethereum 2.0 as an all-powerful platform. Just now we said that although it is a good thing to speed up the calculation, this is not the real purpose of Ethereum 2.0. And before we also said that due to the irreversible modification of the blockchain, it is not good to deal with a large number of fleeting real-time data of the Internet of Things. In other words, we must be soberly aware that Ethereum 2.0 will not replace traditional web 2.0. Instead, we should make better use of the real advantages of Ethereum 2.0:
“There is a new concept now, that is to think of the Ethereum main network as a global bus... We use the Ethereum 2.0 main network to treat various business resources as a working group on Slack: it can be easily built and integrated. And restructuring. The SAP inventory management system in your company, the dealer's JD Edwards ERP system, and the financial technology partner's tall blockchain system can seamlessly interface, eliminating the need to develop an infrastructure specifically for each partner." - John Wolper describes his ideal "magic bus"
Ethereum 2.0 should be an integration center, not a data center or computing center. It should be a library built specifically to store B2B contract terms (to be honest, even with fragmentation technology, the amount of data is large enough).
We should not expect Ethereum 2.0 to be an all-powerful platform, but rather develop it into a "lightweight library."
If we reorder the pyramid model just now, the architecture of the magic bus is obvious:
Of course, the positional relationship in the above model is not static. With the development of 5G technology, edge computing and IoT sensors, they may bypass the cloud to directly interact (or even bypass the fog end). If the collaboration between Iotex and Chainlink is successful, then the edge can interact directly with the trusted execution environment.
Time will tell if Airbnb's shared data storage and computing model can make management costs lower than the current mainstream Web 2.0 model. Time will also prove whether the market really needs anti-censorship, anti-tampering, security protection and privacy protection. Do users really care about these social values ​​and are willing to pay for them? Do they think these are just the icing on the cake or the most fundamental value?
in conclusion
Whether it is the battle between web2.0 and web3.0 or the battle between cryptocurrency and legal currency, one thing is beyond doubt:
We have reached the tipping point, and the era of smart contracts with commercial value has arrived.
In fact, the only problem at the moment is the time issue, and the main roadblocks have been basically cleared.
  1. When will Ethereum 2.0 finish these 7 stages and be officially released?
  2. When will Chainlink use a trusted execution environment on a large scale? If the cooperation between Intel SGX and Town Crier fails, what alternative plans are there? Will Chainlink communicate with other blockchain teams that plan to use a trusted execution environment (such as Dawn Song's Oasis Labs)?
At present, the main technical problems in the ecosystem have been solved, and now it is only necessary to recruit a group of enthusiastic developers to do the work of “connecting the line”.
Digital currency has changed commercial DNA, and the future is full of possibilities.
The only thing that hinders us now is our own imagination. The future is infinitely imaginative, and the future will be the world of developers. Dapps is already overwhelming. There is no doubt that we have found the ultimate nirvana.
This text was translated from Chinese, open following in Chrome and translate to see all images:
https://bihu.com/article/1242138347
submitted by QuantLink to LINKTrader [link] [comments]

Looking back 18 months.

I was going through old emails today and came across this one I sent out to family on January 4, 2018. It was a reflection on the 2017 crypto bull market and where I saw it heading, as well as some general advice on crypto, investment, and being safe about how you handle yourself in cryptoland.
I feel that we are on the cusp of a new bull market right now, so I thought that I would put this out for at least a few people to see *before* the next bull run, not after. While the details have changed, I don't see a thing in this email that I fundamentally wouldn't say again, although I'd also probably insist that people get a Yubikey and use that for all 2FA where it is supported.
Happy reading, and sorry for some of the formatting weirdness -- I cleaned it up pretty well from the original email formatting, but I love lists and indents and Reddit has limitations... :-/
Also, don't laught at my token picks from January 2018! It was a long time ago and (luckliy) I took my own advice about moving a bunch into USD shortly after I sent this. I didn't hit the top, and I came back in too early in the summer of 2018, but I got lucky in many respects.
----------------------------------------------------------------------- Jan-4, 2018
Hey all!
I woke up this morning to ETH at a solid $1000 and decided to put some thoughts together on what I think crypto has done and what I think it will do. *******, if you could share this to your kids I’d appreciate it -- I don’t have e-mail addresses, and it’s a bit unwieldy for FB Messenger… Hopefully they’ll at least find it thought-provoking. If not, they can use it as further evidence that I’m a nutjob. 😉
Some history before I head into the future.
I first mined some BTC in 2011 or 2012 (Can’t remember exactly, but it was around the Christmas holidays when I started because I had time off from work to get it set up and running.) I kept it up through the start of summer in 2012, but stopped because it made my PC run hot and as it was no longer winter, ********** didn’t appreciate the sound of the fans blowing that hot air into the room any more. I’ve always said that the first BTC I mined was at $1, but looking back at it now, that’s not true – It was around $2. Here’s a link to BTC price history.
In the summer of 2013 I got a new PC and moved my programs and files over before scrapping the old one. I hadn’t touched my BTC mining folder for a year then, and I didn’t even think about salvaging those wallet files. They are now gone forever, including the 9-10BTC that were in them. While I can intellectually justify the loss, it was sloppy and underlines a key thing about cryptocurrency that I believe will limit its widespread adoption by the general public until it is addressed and solved: In cryptoland, you are your own bank, and if you lose your password or account number, there is no person or organization that can help you reset it so that you can get access back. Your money is gone forever.
On April 12, 2014 I bought my first BTC through Coinbase. BTC had spiked to $1000 and been in the news, at least in Japan. This made me remember my old wallet and freak out for a couple of months trying to find it and reclaim the coins. I then FOMO’d (Fear Of Missing Out”) and bought $100 worth of BTC. I was actually very lucky in my timing and bought at around $430. Even so, except for a brief 50% swing up almost immediately afterwards that made me check prices 5 times a day, BTC fell below my purchase price by the end of September and I didn’t get back to even until the end of 2015.
In May 2015 I bought my first ETH at around $1. I sent some guy on bitcointalk ~$100 worth of BTC and he sent me 100 ETH – all on trust because the amounts were small and this was a small group of people. BTC was down in the $250 range at that point, so I had lost 30-40% of my initial investment. This was of the $100 invested, so not that much in real terms, but huge in percentages. It also meant that I had to buy another $100 of BTC on Coinbase to send to this guy. A few months after I purchased my ETH, BTC had doubled and ETH had gone down to $0.50, halving the value of my ETH holdings. I was even on the first BTC purchase finally, but was now down 50% on the ETH I had bought.
The good news was that this made me start to look at things more seriously. Where I had skimmed white papers and gotten a superficial understanding of the technology before FOMO’ing, I started to act as an investor, not a speculator. Let me define how I see those two different types of activity:
So what has been my experience as an investor? After sitting out the rest of 2015 because I needed to understand the market better, I bought into ETH quite heavily, with my initial big purchases being in March-April of 2016. Those purchases were in the $11-$14 range. ETH, of course, dropped immediately to under $10, then came back and bounced around my purchase range for a while until December of 2016, when I purchased a lot more at around $8.
I also purchased my first ICO in August of 2016, HEAT. I bought 25ETH worth. Those tokens are now worth about half of their ICO price, so about 12.5ETH or $12500 instead of the $25000 they would be worth if I had just kept ETH. There are some other things with HEAT that mean I’ve done quite a bit better than those numbers would suggest, but the fact is that the single best thing I could have done is to hold ETH and not spend the effort/time/cost of working with HEAT. That holds true for about every top-25 token on the market when compared to ETH. It certainly holds true for the many, many tokens I tried to trade in Q1-Q2 of 2017. In almost every single case I would have done better and slept better had I just held ETH instead of trying to be smarter than Mr. Market.
But, I made money on all of them except one because the crypto market went up more in USD terms than any individual coin went down in ETH or BTC terms. This underlines something that I read somewhere and that I take to heart: A rising market makes everyone seem like a genius. A monkey throwing darts at a list of the top 100 cryptocurrencies last year would have doubled his money. Here’s a chart from September that shows 2017 year-to-date returns for the top 10 cryptocurrencies, and all of them went up a *lot* more between then and December. A monkey throwing darts at this list there would have quintupled his money.
When evaluating performance, then, you have to beat the monkey, and preferably you should try to beat a Wall Street monkey. I couldn’t, so I stopped trying around July 2017. My benchmark was the BLX, a DAA (Digital Asset Array – think fund like a Fidelity fund) created by ICONOMI. I wasn’t even close to beating the BLX returns, so I did several things.
  1. I went from holding about 25 different tokens to holding 10 now. More on that in a bit.
  2. I used those funds to buy ETH and BLX. ETH has done crazy-good since then and BLX has beaten BTC handily, although it hasn’t done as well as ETH.
  3. I used some of those funds to set up an arbitrage operation.
The arbitrage operation is why I kept the 11 tokens that I have now. All but a couple are used in an ETH/token pair for arbitrage, and each one of them except for one special case is part of BLX. Why did I do that? I did that because ICONOMI did a better job of picking long-term holds than I did, and in arbitrage the only speculative thing you must do is pick the pairs to trade. My pairs are (No particular order):
I also hold PLU, PLBT, and ART. These two are multi-year holds for me. I have not purchased BTC once since my initial $200, except for a few cases where BTC was the only way to go to/from an altcoin that didn’t trade against ETH yet. Right now I hold about the same 0.3BTC that I held after my first $100 purchase, so I don’t really count it.
Looking forward to this year, I am positioning myself as follows:
Looking at my notes, I have two other things that I wanted to work into this email that I didn’t get to, so here they are:
  1. Just like with free apps and other software, if you are getting something of value and you didn’t pay anything for it, you need to ask why this is. With apps, the phrase is “If you didn’t pay for the product, you are the product”, and this works for things such as pump groups, tips, and even technical analysis. Here’s how I see it.
    1. People don’t give tips on stocks or crypto that they don’t already own that stock or token. Why would they, since if they convince anyone to buy it, the price only goes up as a result, making it more expensive for them to buy in? Sure, you will have friends and family that may do this, but people in a crypto club, your local cryptocurrency meetup, or online are generally not your friends. They are there to make money, and if they can get you to help them make money, they will do it. Pump groups are the worst of these, and no matter how enticing it may look, stay as far away as possible from these scams. I even go so far as to report them when I see them advertise on FB or Twitter, because they are violating the terms of use.
    2. Technical analysis (TA) is something that has been argued about for longer than I’ve been alive, but I think that it falls into the same boat. In short, TA argues that there are patterns in trading that can be read and acted upon to signal when one must buy or sell. It has been used forever in the stock and foreign exchange markets, and people use it in crypto as well. Let’s break down these assumptions a bit.
i. First, if crypto were like the stock or forex markets we’d all be happy with 5-7% gains per year rather than easily seeing that in a day. For TA to work the same way in crypto as it does in stocks and foreign exchange, the signals would have to be *much* stronger and faster-reacting than they work in the traditional market, but people use them in exactly the same way.
ii. Another area where crypto is very different than the stock and forex markets centers around market efficiency theory. This theory says that markets are efficient and that the price reflects all the available information at any given time. This is why gold in New York is similar in price to gold in London or Shanghai, and why arbitrage margins are easily <0.1% in those markets compared to cryptoland where I can easily get 10x that. Crypto simply has too much speculation and not enough professional traders in it yet to operate as an efficient market. That fundamentally changes the way that the market behaves and should make any TA patterns from traditional markets irrelevant in crypto.
iii. There are services, both free and paid that claim to put out signals based on TA for when one should buy and sell. If you think for even a second that they are not front-running (Placing orders ahead of yours to profit.) you and the other people using the service, you’re naïve.
iv. Likewise, if you don’t think that there are people that have but together computerized systems to get ahead of people doing manual TA, you’re naïve. The guys that I have programming my arbitrage bots have offered to build me a TA bot and set up a service to sell signals once our position is taken. I said no, but I am sure that they will do it themselves or sell that to someone else. Basically they look at TA as a tip machine where when a certain pattern is seen, people act on that “tip”. They use software to see that “tip” faster and take a position on it so that when slower participants come in they either have to sell lower or buy higher than the TA bot did. Remember, if you are getting a tip for free, you’re the product. In TA I see a system when people are all acting on free preset “tips” and getting played by the more sophisticated market participants. Again, you have to beat that Wall Street monkey.
  1. If you still don’t agree that TA is bogus, think about it this way: If TA was real, Wall Street would have figured it out decades ago and we would have TA funds that would be beating the market. We don’t.
  2. If you still don’t agree that TA is bogus and that its real and well, proven, then you must think that all smart traders use them. Now follow that logic forward and think about what would happen if every smart trader pushing big money followed TA. The signals would only last for a split second and would then be overwhelmed by people acting on them, making them impossible to leverage. This is essentially what the efficient market theory postulates for all information, including TA.
OK, the one last item. Read this weekly newsletter – You can sign up at the bottom. It is free, so they’re selling something, right? 😉 From what I can tell, though, Evan is a straight-up guy who posts links and almost zero editorial comments.
Happy 2018.
submitted by uetani to CryptoCurrency [link] [comments]

USB Bitcoin Miner - The Power of 1000's Computers - YouTube How to buy & setup the Antminer S9 bitcoin and bitcoin cash SHA-256 miner - Still Profitable? Bitcoin hack Bitcoin mining software - YouTube Que es SHA-256 y el HASH en Bitcoin!!!!? Java Bitcoin Generator 2019 CoolPack , generate All BTC Keys Offline

3. Best Bitcoin mining software CGminer. Pros: Supports GPU/FPGA/ASIC mining, Popular (frequently updated). Cons: Textual interface. Platforms: Windows, Mac, Linux Going strong for many years, CGminer is still one of the most popular GPU/FPGA/ASIC mining software available. CGminer is a command line application written in C. It’s also cross platform, meaning you can use it with Windows ... Slothcoin (SLOTH) is a SHA-3 Keccak peer-2-peer cryptocurrency created for having fun and in the mean while revolutionizing currencies. It is based on the idea of Dogecoin and combined with some more advanced aspects like the SHA-3 encryption algorithm, which equals out the difference between Nvidia and AMD graphic cards and is more secure than SHA256-like encryption algorithms. 3.8 GHz : SHA-256 : 32-bit : 22.87 : 158 : 18.47 : 196 SHA-512 : 64-bit : 88.36 : 41 : 12.43 : 292 The performance numbers labeled 'x86' were running using 32-bit code on 64-bit processors, whereas the 'x86-64' numbers are native 64-bit code. While SHA-256 is designed for 32-bit calculations, it does benefit from code optimized for 64-bit processors on the x86 architecture. 32-bit ... The Best Bitcoin mining Software, try it Now! Depending on the difficulty of mining the block and the value to be deciphered, your profit may change, however, on average our users with the key of the Silver plan, with 3 uses in a day, have been able to generate between 0.15 BTC and 0.32 BTC, which is profitable if you compare it with the investment of the Mining key. Keccak is a family of cryptographic sponge functions and is designed as an alternative to SHA-256 – An algorithm used by Bitcoin and various other crypto currencies. Compared to SHA-256, Keccak (SHA-3) is much faster and is more secure. If you are looking for Keccak Whitepaper then head to this link.

[index] [45098] [34717] [45059] [40808] [46715] [45933] [26760] [20381] [12087] [41853]

USB Bitcoin Miner - The Power of 1000's Computers - YouTube

What is sha 256, How it works, sha 256 algorithm, sha 256 bitcoin, sha 256 blockchain in hindi, sha 256 in blockchain, SHA, SHA1, Secure Hashing Algorithm, sha 256 explained in hindi, in hindi ... ════════ ️ Download ️═════════ https://www.sendspace.com/file/36gr86 pass 321321 TAGS : Bitcoin, BTC, BTC Miner Ethereum ... Hash là gì? SHA 256 là gì? Tất cả sẽ được giải đáp trong video này. Để biết thêm chi tiết, vui lòng truy cập https://pinkblockchain.com This video is unavailable. Watch Queue Queue. Watch Queue Queue This video goes over the setup and buying of the Antminer S9 bitcoin and bitcoin cash miner from Bitmain. It will actually mine any SHA-256 coin. Bitmain Twi...

#