June 12, 2014: The Guardian • Pentagon preparing for mass civil breakdown. Social science is being militarised to develop 'operational tools' to target peaceful activists and protest movements Source HerePentagon preparing for mass civil breakdown. It seemed ludicrous back in 2014, didn't it? Inconceivable. Sure some preppers believed it, but they're always getting ready and nothing happened. Doomsday was always right around the corner, and then the next corner, and on and on. Televangelists have probably accused more politicians of being the antichrist than the number of politicians went to Epstein's Island.
February 20, 2020: History Network • Here’s Why These Six Ancient Civilizations Mysteriously Collapsed. From the Maya to Greenland’s Vikings, check out six civilizations that seemingly disappeared without a trace. Source HereAll of these civilizations vanished because of some combination of exhausting their natural resources, drought, plauge, and the little ice age. Sound familiar? Don't tell me that the Rockefeller Foundation and BlackRock became environmentally aware out of a sense of obligation to the planet. They're setting the groundwork for what's coming down the pipe. This isn't about money anymore, this is about control and survival. Throw out the rulebook because the rules no longer apply.
March 15, 2012 • More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them. Earlier this month, Petraeus mused about the emergence of an "Internet of Things" -- that is, wired devices -- at a summit for In-Q-Tel, the CIA's venture capital firm. "'Transformational' is an overused word, but I do believe it properly applies to these technologies," Petraeus enthused, "particularly to their effect on clandestine tradecraft." All those new online devices are a treasure trove of data if you're a "person of interest" to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the "smart home," you'd be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room's ambiance. "Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters -- all connected to the next-generation internet using abundant, low-cost, and high-power computing," Petraeus said, "the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing." Petraeus allowed that these household spy devices "change our notions of secrecy" and prompt a rethink of "our notions of identity and secrecy." All of which is true -- if convenient for a CIA director. The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation. That's not the only data exploit intriguing Petraeus. He's interested in creating new online identities for his undercover spies -- and sweeping away the "digital footprints" of agents who suddenly need to vanish. "Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come," Petraeus observed. "Moreover, we have to figure out how to create the digital footprint for new identities for some officers." Source HereThe IoT should be renamed to IoTT (Internet of Tracking Things), shouldn't it. But we can't have people figure out what's really happening, can we? It's a good thing that quantum computing isn't too close, isn’t it?
December 19, 2019: New York Times • THE DATA REVIEWED BY TIMES OPINION didn’t come from a telecom or giant tech company, nor did it come from a governmental surveillance operation. It originated from a location data company, one of dozens quietly collecting precise movements using software slipped onto mobile phone apps. You’ve probably never heard of most of the companies — and yet to anyone who has access to this data, your life is an open book. They can see the places you go every moment of the day, whom you meet with or spend the night with, where you pray, whether you visit a methadone clinic, a psychiatrist’s office or a massage parlor. The Times and other news organizations have reported on smartphone tracking in the past. But never with a data set so large. Even still, this file represents just a small slice of what’s collected and sold every day by the location tracking industry — surveillance so omnipresent in our digital lives that it now seems impossible for anyone to avoid. It doesn’t take much imagination to conjure the powers such always-on surveillance can provide an authoritarian regime like China’s. Within America’s own representative democracy, citizens would surely rise up in outrage if the government attempted to mandate that every person above the age of 12 carry a tracking device that revealed their location 24 hours a day. Yet, in the decade since Apple’s App Store was created, Americans have, app by app, consented to just such a system run by private companies. Now, as the decade ends, tens of millions of Americans, including many children, find themselves carrying spies in their pockets during the day and leaving them beside their beds at night — even though the corporations that control their data are far less accountable than the government would be. Source Here
April 5, 2018: Global News • (Project Maven) Over 3,000 Google employees have a signed a petition in protest against the company’s involvement with a U.S. Department of Defense artificial intelligence (AI) project that studies imagery and could eventually be used to improve drone strikes in the battlefield. Source HereHmmm. Maybe Apple will be for the little guy? They have always valued privacy rights, right?
December 12, 2019 • Palantir took over Project Maven defense contract after Google backed out. Source Here
December 29, 2020: Input • Palantir exec says its work is on par with the Manhattan Project. Comparing AI to most lethal weapon in human history isn’t comforting. SourceHere
August 14, 2020: Venture: • Google researchers use quantum computing to help improve image classification. Source Here
October 2, 2013: Vice News • The hacktivist group Anonymous released a video statement with an accompanying Pastebin document claiming that there are definitive links between AuthenTec, the company that developed the iPhone 5S’s fingerprint scanner, and the US government. Source HereAn apple a day helps the NSA. Or Google. Or Microsoft. Or Amazon. Take your pick from the basket, because dem Apple's are all the same. But at least we have fundamental rights, right?
Controversial debates arose as the Protect America Act was published. Constitutional lawyers and civil liberties experts expressed concerns that this Act authorized massive, wide-ranging information gathering with no oversight. Whereas it placed much focus on communications, the Act allowed for information gathering of all shapes and forms. The ACLU called it the "Police America Act" – "authorized a massive surveillance dragnet", calling the blank-check oversight provisions "meaningless," and calling them a "phony court review of secret procedures."So the surveillance state doesn't have checks and balances anymore. The state is preparing for Massive Civil Breakdown. They keep warning us about environmental collapse. Got it? Good. Let's keep on keeping on.
The District of Columbia Organic Act of 1871 created a single new district corporation governing the entire federal territory, called the District of Columbia, thus dissolving the three major political subdivisions of the District (Port of Georgetown, the City of Washington, and Washington County) and their governments. Source Here)There's a reason people call lawyers snakes, it's because most of them speak with forked tounges. So the corporation isn't being held liable, but the shareholders can't be held liable either. That's too insane to even be called a Catch 22. We are literally being set up to have no recourse because there isn’t anybody who can be held responsible. Why is that important when I've been talking about the surveillance state?
The first big leap in corporate personhood from holding mere property and contract rights to possessing more expansive rights was a claim that the Equal Protection Clause applied to corporations. One of the strangest twists in American constitutional law was the moment that corporations gained personhood under the Equal Protection Clause of the Fourteenth Amendment. It occurred in a case called Santa Clara County, and what was odd was that the Supreme Court did not really even decide the matter in the actual opinion. It only appeared in a footnote to the case. What we are likely to have at the conclusion of the Supreme Court term is corporations that are empowered to spend in American elections because of Bellotti and Citizens United; corporations that can make religious objections thanks to Hobby Lobby; and if Jesner turns out as badly as I predict, corporations will be able to aid and abet human rights violations abroad with impunity. Source Here"Having a corporation would allow people to put property into a collective ownership that could be held with perpetual existence," she says. "So it wouldn't be tied to any one person's lifespan, or subject necessarily to laws regarding inheriting property." Later on, in the United States and elsewhere, the advantages of incorporation were essential to efficient and secure economic development. Unlike partnerships, the corporation continued to exist even if a partner died; there was no unanimity required to do something; shareholders could not be sued individually, only the corporation as a whole, so investors only risked as much as they put into buying shares. Source Here
The way that the Arab Bank may get away with this alleged morally troubling behavior, even though it has a New York branch, is by reasserting the basic argument that was made in Nestle USA and Kiobel II: that the federal Alien Tort Statute was not intended to apply to corporations full stop. Given other cases in this area like Mohamad v. PLO, which held the word “individual” in the Torture Victim Protection Act means a natural person and does not impose any liability against organizations, the Arab Bank’s procorporate argument may well prevail. There are multiple federal Circuit Courts which have shot down the argument that corporations are immune from suit under the Alien Tort Statute. The lone outlier is the Second Circuit, which decided in 2010 that corporations are excused from suit in Kiobel I. This is the case that was appealed to the Supreme Court and became Kiobel II. Jesner v. Arab Bank was litigated in the Second Circuit. One question in Jesner was what exactly did Kiobel II do to Kiobel I. So far in the litigation, Jesner concluded that Kiobel I and its conclusion that corporations can’t be sued in federal court using the Alien Tort Statute remained the controlling law of the Second Circuit.
July 14, 2020: The Intercept • Microsoft’s police surveillance services are often opaque because the company sells little in the way of its own policing products. It instead offers an array of “general purpose” Azure cloud services, such as machine learning and predictive analytics tools like Power BI (business intelligence) and Cognitive Services, which can be used by law enforcement agencies and surveillance vendors to build their own software or solutions. A rich array of Microsoft’s cloud-based offerings is on full display with a concept called “The Connected Officer.” Microsoft situates this concept as part of the Internet of Things, or IoT, in which gadgets are connected to online servers and thus made more useful. “The Connected Officer,” Microsoft has written, will “bring IoT to policing.” With the Internet of Things, physical objects are assigned unique identifiers and transfer data over networks in an automated fashion. If a police officer draws a gun from its holster, for example, a notification can be sent over the network to alert other officers there may be danger. Real Time Crime Centers could then locate the officer on a map and monitor the situation from a command and control center. Source HereUhm, I guess it's really is all connected, isn’t it?
June 18, 2020: The Guardian • How Target, Google, Bank of America and Microsoft quietly fund police through private donations. More than 25 large corporations in the past three years have contributed funding to private police foundations, new report says. Source HereLong live the Military Industrial Techno Surveillance State. If you have nothing to hide, than you have nothing to worry about. Really? Are we still believing that line? Cause it's a load of crap. If we have nothing to worry about, then why are they worried enough to be implementing surveillance systems with corresponding units on the ground? Got your attention there, didn't I?
August 19, 2019: Big Think • Though the term "Orwellian" easily applies to such a technology, Michel's illuminating reporting touches something deeper. Numerous American cities have already been surveilled using these god-like cameras, including Gorgon Stare, a camera-enabled drone that can track individuals over a 50-square kilometer radius from 20,000 feet. Here's the real rub: the feature that allows users to pinch and zoom on Instagram is similar to what WAMI allows. Anything within those 50-square kilometers is now under the microscope. If this sounds like some futuristic tech, think again: Derivations of this camera system have been tested in numerous American cities. Say there is a big public protest. With this camera you can follow thousands of protesters back to their homes. Now you have a list of the home addresses of all the people involved in a political movement. If on their way home you witness them committing some crime—breaking a traffic regulation or frequenting a location that is known to be involved in the drug trade—you can use that surveillance data against them to essentially shut them up. That's why we have laws that prevent the use of surveillance technologies because it is human instinct to abuse them. That's why we need controls. Source HereWant to know more about the Gorgon Stare? Flatten the Curve. Part 12. Source Here
MEDUSA (Mob Excess Deterrent Using Silent Audio) is a directed-energy non-lethal weapon designed by WaveBand Corporation in 2003-2004 for temporary personnel incapacitation. The weapon is based on the microwave auditory effect resulting in a strong sound sensation in the human head when it is subject to certain kinds of pulsed/modulated microwave radiation. The developers claimed that through the combination of pulse parameters and pulse power, it is possible to raise the auditory sensation to a “discomfort” level, deterring personnel from entering a protected perimeter or, if necessary, temporarily incapacitating particular individuals. In 2005, Sierra Nevada Corporation acquired WaveBand Corporation.Ok. Get it? The Gorgon eye in the sky stares at you while the Medusa makes you immobile. Not good, but at least it'll just freeze you in your tracks.
July 6, 2008: Gizmodo • The Sierra Nevada Corporation claimed this week that it is ready to begin production on the MEDUSA, a damned scary ray gun that uses the "microwave audio effect" to implant sounds and perhaps even specific messages inside people's heads. Short for Mob Excess Deterrent Using Silent Audio, MEDUSA creates the audio effect with short microwave pulses. The pulses create a shockwave inside the skull that's detected by the ears, and basically makes you think you're going balls-to-the-wall batshit insane. Source HereUhm. And drive you insane.
July 26, 2008: Gizmodo • The MEDUSA crowd control ray gun we reported on earlier this month sounded like some pretty amazing-and downright scary-technology. Using the microwave auditory effect, the beam, in theory, would have put sounds and voice-like noises in your head, thereby driving you away from the area. Crowd control via voices in your head. Sounds cool. However, it turns out that the beam would actually kill you before any of that happy stuff started taking place, most likely by frying or cooking your brain inside your skull. Can you imagine if this thing made it out into the field? Awkward! Source HereAnnnnnnnndddddd it'll kill you.
From the earliest Chinese dynasties to the present, the jade deposits most used were not only those of Khotan in the Western Chinese province of Xinjiang but other parts of China as well, such as Lantian, Shaanxi.Remember, words matter. Look at Gorgon Stare and Medusa. They don't randomly grab names out of a hat, or pick them because they think it sounds dystopian. They pick words for a reason.
July 7, 2017: The Warzone • There only appears to be one official news story on this exercise at all and it's available on the website of Air Mobility Command’s Eighteenth Air Force, situated at Joint Base Charleston. At the time of writing, a google shows that there were more than a half dozen more copies on other Air Force pages, as well as number of photographs. For some reason, someone appears to have taken these offline or otherwise broken all the links. Using Google to search the Defense Video Imagery Distribution System, which is the main U.S. military's public affairs hub, brings up more broken links. Oh, and unless there's been some sort of mistake, JADE HELM actually stands for the amazingly obtuse Joint Assistance for Deployment Execution Homeland Eradication of Local Militants. A separate web search for this phrase does not turn up any other results. Source HereNow, using an acronym that indicates training to Eradicate Local Militants seems pretty dumb. It may be used in that manner if environmental collapse triggers riots, but i don't think they would warn everyone ahead of time, do you? So I dug a little bit more.
October 17, 2018: The Carolinan • In 2016, 75 percent of American forces were private contractors. In 2017, Erik Prince, former head of Blackwater, and Stephen Feinberg, head of Dyncorp, discussed plans for contractors completely taking over U.S. operations in Afghanistan. Although ultimately unsuccessful, it remains to be seen if the current administration will change its mind. Contractors are involved in almost every military task, such as intelligence analysis, logistics and training allied soldiers. Contractors are even involved in U.S. special ops missions. This is because contractors are essentially untraceable and unaccountable. Most are born in other countries; only 33 percent are registered U.S. citizens. Private military firms don’t have to report their actions to Congress, unlike the military or intelligence agencies. They also aren’t subject to the Freedom of Information Act, so private citizens and journalists aren’t allowed to access their internal documents. There are also no international laws to regulate private military firms. It’s been proven that many contractors are involved in illegal activities. The larger multinational companies sometimes hire local subcontractors. These contractors sometimes aren’t background-checked. A 2010 investigation by the Senate found that many subcontractors were linked to murders, kidnappings, bribery and anti-coalition activities. Some subcontractors even formed their own unlicensed mercenary groups after coalition forces leave. A 2010 House investigation showed evidence that the Department of Defense had hired local warlords for security services. In 2007, Blackwater contractors massacred 17 civilians. This eventually led Blackwater to being restructured and renamed as Academi. Source HereMilitary Exercises. Private Defense Firms. No oversight. And it's all coming soon. Read more at Flatten the Curve. Part 20. Upcoming war and catastrophes. Source Here
Sourcesubmitted by pascalbernoulli to Yield_Farming [link] [comments]
It’s effectively July 2017 in the world of decentralized finance (DeFi), and as in the heady days of the initial coin offering (ICO) boom, the numbers are only trending up.
According to DeFi Pulse, there is $1.9 billion in crypto assets locked in DeFi right now. According to the CoinDesk ICO Tracker, the ICO market started chugging past $1 billion in July 2017, just a few months before token sales started getting talked about on TV.
Debate juxtaposing these numbers if you like, but what no one can question is this: Crypto users are putting more and more value to work in DeFi applications, driven largely by the introduction of a whole new yield-generating pasture, Compound’s COMP governance token.
Governance tokens enable users to vote on the future of decentralized protocols, sure, but they also present fresh ways for DeFi founders to entice assets onto their platforms.
That said, it’s the crypto liquidity providers who are the stars of the present moment. They even have a meme-worthy name: yield farmers.
Where it startedEthereum-based credit market Compound started distributing its governance token, COMP, to the protocol’s users this past June 15. Demand for the token (heightened by the way its automatic distribution was structured) kicked off the present craze and moved Compound into the leading position in DeFi.
The hot new term in crypto is “yield farming,” a shorthand for clever strategies where putting crypto temporarily at the disposal of some startup’s application earns its owner more cryptocurrency.
Another term floating about is “liquidity mining.”
The buzz around these concepts has evolved into a low rumble as more and more people get interested.
The casual crypto observer who only pops into the market when activity heats up might be starting to get faint vibes that something is happening right now. Take our word for it: Yield farming is the source of those vibes.
But if all these terms (“DeFi,” “liquidity mining,” “yield farming”) are so much Greek to you, fear not. We’re here to catch you up. We’ll get into all of them.
We’re going to go from very basic to more advanced, so feel free to skip ahead.
What are tokens?Most CoinDesk readers probably know this, but just in case: Tokens are like the money video-game players earn while fighting monsters, money they can use to buy gear or weapons in the universe of their favorite game.
But with blockchains, tokens aren’t limited to only one massively multiplayer online money game. They can be earned in one and used in lots of others. They usually represent either ownership in something (like a piece of a Uniswap liquidity pool, which we will get into later) or access to some service. For example, in the Brave browser, ads can only be bought using basic attention token (BAT).
If tokens are worth money, then you can bank with them or at least do things that look very much like banking. Thus: decentralized finance.
Tokens proved to be the big use case for Ethereum, the second-biggest blockchain in the world. The term of art here is “ERC-20 tokens,” which refers to a software standard that allows token creators to write rules for them. Tokens can be used a few ways. Often, they are used as a form of money within a set of applications. So the idea for Kin was to create a token that web users could spend with each other at such tiny amounts that it would almost feel like they weren’t spending anything; that is, money for the internet.
Governance tokens are different. They are not like a token at a video-game arcade, as so many tokens were described in the past. They work more like certificates to serve in an ever-changing legislature in that they give holders the right to vote on changes to a protocol.
So on the platform that proved DeFi could fly, MakerDAO, holders of its governance token, MKR, vote almost every week on small changes to parameters that govern how much it costs to borrow and how much savers earn, and so on.
Read more: Why DeFi’s Billion-Dollar Milestone Matters
One thing all crypto tokens have in common, though, is they are tradable and they have a price. So, if tokens are worth money, then you can bank with them or at least do things that look very much like banking. Thus: decentralized finance.
What is DeFi?Fair question. For folks who tuned out for a bit in 2018, we used to call this “open finance.” That construction seems to have faded, though, and “DeFi” is the new lingo.
In case that doesn’t jog your memory, DeFi is all the things that let you play with money, and the only identification you need is a crypto wallet.
On the normal web, you can’t buy a blender without giving the site owner enough data to learn your whole life history. In DeFi, you can borrow money without anyone even asking for your name.
I can explain this but nothing really brings it home like trying one of these applications. If you have an Ethereum wallet that has even $20 worth of crypto in it, go do something on one of these products. Pop over to Uniswap and buy yourself some FUN (a token for gambling apps) or WBTC (wrapped bitcoin). Go to MakerDAO and create $5 worth of DAI (a stablecoin that tends to be worth $1) out of the digital ether. Go to Compound and borrow $10 in USDC.
(Notice the very small amounts I’m suggesting. The old crypto saying “don’t put in more than you can afford to lose” goes double for DeFi. This stuff is uber-complex and a lot can go wrong. These may be “savings” products but they’re not for your retirement savings.)
Immature and experimental though it may be, the technology’s implications are staggering. On the normal web, you can’t buy a blender without giving the site owner enough data to learn your whole life history. In DeFi, you can borrow money without anyone even asking for your name.
DeFi applications don’t worry about trusting you because they have the collateral you put up to back your debt (on Compound, for instance, a $10 debt will require around $20 in collateral).
Read more: There Are More DAI on Compound Now Than There Are DAI in the World
If you do take this advice and try something, note that you can swap all these things back as soon as you’ve taken them out. Open the loan and close it 10 minutes later. It’s fine. Fair warning: It might cost you a tiny bit in fees, and the cost of using Ethereum itself right now is much higher than usual, in part due to this fresh new activity. But it’s nothing that should ruin a crypto user.
So what’s the point of borrowing for people who already have the money? Most people do it for some kind of trade. The most obvious example, to short a token (the act of profiting if its price falls). It’s also good for someone who wants to hold onto a token but still play the market.
Doesn’t running a bank take a lot of money up front?It does, and in DeFi that money is largely provided by strangers on the internet. That’s why the startups behind these decentralized banking applications come up with clever ways to attract HODLers with idle assets.
Liquidity is the chief concern of all these different products. That is: How much money do they have locked in their smart contracts?
“In some types of products, the product experience gets much better if you have liquidity. Instead of borrowing from VCs or debt investors, you borrow from your users,” said Electric Capital managing partner Avichal Garg.
Let’s take Uniswap as an example. Uniswap is an “automated market maker,” or AMM (another DeFi term of art). This means Uniswap is a robot on the internet that is always willing to buy and it’s also always willing to sell any cryptocurrency for which it has a market.
On Uniswap, there is at least one market pair for almost any token on Ethereum. Behind the scenes, this means Uniswap can make it look like it is making a direct trade for any two tokens, which makes it easy for users, but it’s all built around pools of two tokens. And all these market pairs work better with bigger pools.
Why do I keep hearing about ‘pools’?To illustrate why more money helps, let’s break down how Uniswap works.
Let’s say there was a market for USDC and DAI. These are two tokens (both stablecoins but with different mechanisms for retaining their value) that are meant to be worth $1 each all the time, and that generally tends to be true for both.
The price Uniswap shows for each token in any pooled market pair is based on the balance of each in the pool. So, simplifying this a lot for illustration’s sake, if someone were to set up a USDC/DAI pool, they should deposit equal amounts of both. In a pool with only 2 USDC and 2 DAI it would offer a price of 1 USDC for 1 DAI. But then imagine that someone put in 1 DAI and took out 1 USDC. Then the pool would have 1 USDC and 3 DAI. The pool would be very out of whack. A savvy investor could make an easy $0.50 profit by putting in 1 USDC and receiving 1.5 DAI. That’s a 50% arbitrage profit, and that’s the problem with limited liquidity.
(Incidentally, this is why Uniswap’s prices tend to be accurate, because traders watch it for small discrepancies from the wider market and trade them away for arbitrage profits very quickly.)
Read more: Uniswap V2 Launches With More Token-Swap Pairs, Oracle Service, Flash Loans
However, if there were 500,000 USDC and 500,000 DAI in the pool, a trade of 1 DAI for 1 USDC would have a negligible impact on the relative price. That’s why liquidity is helpful.
You can stick your assets on Compound and earn a little yield. But that’s not very creative. Users who look for angles to maximize that yield: those are the yield farmers.
Similar effects hold across DeFi, so markets want more liquidity. Uniswap solves this by charging a tiny fee on every trade. It does this by shaving off a little bit from each trade and leaving that in the pool (so one DAI would actually trade for 0.997 USDC, after the fee, growing the overall pool by 0.003 USDC). This benefits liquidity providers because when someone puts liquidity in the pool they own a share of the pool. If there has been lots of trading in that pool, it has earned a lot of fees, and the value of each share will grow.
And this brings us back to tokens.
Liquidity added to Uniswap is represented by a token, not an account. So there’s no ledger saying, “Bob owns 0.000000678% of the DAI/USDC pool.” Bob just has a token in his wallet. And Bob doesn’t have to keep that token. He could sell it. Or use it in another product. We’ll circle back to this, but it helps to explain why people like to talk about DeFi products as “money Legos.”
So how much money do people make by putting money into these products?It can be a lot more lucrative than putting money in a traditional bank, and that’s before startups started handing out governance tokens.
Compound is the current darling of this space, so let’s use it as an illustration. As of this writing, a person can put USDC into Compound and earn 2.72% on it. They can put tether (USDT) into it and earn 2.11%. Most U.S. bank accounts earn less than 0.1% these days, which is close enough to nothing.
However, there are some caveats. First, there’s a reason the interest rates are so much juicier: DeFi is a far riskier place to park your money. There’s no Federal Deposit Insurance Corporation (FDIC) protecting these funds. If there were a run on Compound, users could find themselves unable to withdraw their funds when they wanted.
Plus, the interest is quite variable. You don’t know what you’ll earn over the course of a year. USDC’s rate is high right now. It was low last week. Usually, it hovers somewhere in the 1% range.
Similarly, a user might get tempted by assets with more lucrative yields like USDT, which typically has a much higher interest rate than USDC. (Monday morning, the reverse was true, for unclear reasons; this is crypto, remember.) The trade-off here is USDT’s transparency about the real-world dollars it’s supposed to hold in a real-world bank is not nearly up to par with USDC’s. A difference in interest rates is often the market’s way of telling you the one instrument is viewed as dicier than another.
Users making big bets on these products turn to companies Opyn and Nexus Mutual to insure their positions because there’s no government protections in this nascent space – more on the ample risks later on.
So users can stick their assets in Compound or Uniswap and earn a little yield. But that’s not very creative. Users who look for angles to maximize that yield: those are the yield farmers.
OK, I already knew all of that. What is yield farming?Broadly, yield farming is any effort to put crypto assets to work and generate the most returns possible on those assets.
At the simplest level, a yield farmer might move assets around within Compound, constantly chasing whichever pool is offering the best APY from week to week. This might mean moving into riskier pools from time to time, but a yield farmer can handle risk.
“Farming opens up new price arbs [arbitrage] that can spill over to other protocols whose tokens are in the pool,” said Maya Zehavi, a blockchain consultant.
Because these positions are tokenized, though, they can go further.
This was a brand-new kind of yield on a deposit. In fact, it was a way to earn a yield on a loan. Who has ever heard of a borrower earning a return on a debt from their lender?
In a simple example, a yield farmer might put 100,000 USDT into Compound. They will get a token back for that stake, called cUSDT. Let’s say they get 100,000 cUSDT back (the formula on Compound is crazy so it’s not 1:1 like that but it doesn’t matter for our purposes here).
They can then take that cUSDT and put it into a liquidity pool that takes cUSDT on Balancer, an AMM that allows users to set up self-rebalancing crypto index funds. In normal times, this could earn a small amount more in transaction fees. This is the basic idea of yield farming. The user looks for edge cases in the system to eke out as much yield as they can across as many products as it will work on.
Right now, however, things are not normal, and they probably won’t be for a while.
Why is yield farming so hot right now?Because of liquidity mining. Liquidity mining supercharges yield farming.
Liquidity mining is when a yield farmer gets a new token as well as the usual return (that’s the “mining” part) in exchange for the farmer’s liquidity.
“The idea is that stimulating usage of the platform increases the value of the token, thereby creating a positive usage loop to attract users,” said Richard Ma of smart-contract auditor Quantstamp.
The yield farming examples above are only farming yield off the normal operations of different platforms. Supply liquidity to Compound or Uniswap and get a little cut of the business that runs over the protocols – very vanilla.
But Compound announced earlier this year it wanted to truly decentralize the product and it wanted to give a good amount of ownership to the people who made it popular by using it. That ownership would take the form of the COMP token.
Lest this sound too altruistic, keep in mind that the people who created it (the team and the investors) owned more than half of the equity. By giving away a healthy proportion to users, that was very likely to make it a much more popular place for lending. In turn, that would make everyone’s stake worth much more.
So, Compound announced this four-year period where the protocol would give out COMP tokens to users, a fixed amount every day until it was gone. These COMP tokens control the protocol, just as shareholders ultimately control publicly traded companies.
Every day, the Compound protocol looks at everyone who had lent money to the application and who had borrowed from it and gives them COMP proportional to their share of the day’s total business.
The results were very surprising, even to Compound’s biggest promoters.
COMP’s value will likely go down, and that’s why some investors are rushing to earn as much of it as they can right now.
This was a brand-new kind of yield on a deposit into Compound. In fact, it was a way to earn a yield on a loan, as well, which is very weird: Who has ever heard of a borrower earning a return on a debt from their lender?
COMP’s value has consistently been well over $200 since it started distributing on June 15. We did the math elsewhere but long story short: investors with fairly deep pockets can make a strong gain maximizing their daily returns in COMP. It is, in a way, free money.
It’s possible to lend to Compound, borrow from it, deposit what you borrowed and so on. This can be done multiple times and DeFi startup Instadapp even built a tool to make it as capital-efficient as possible.
“Yield farmers are extremely creative. They find ways to ‘stack’ yields and even earn multiple governance tokens at once,” said Spencer Noon of DTC Capital.
COMP’s value spike is a temporary situation. The COMP distribution will only last four years and then there won’t be any more. Further, most people agree that the high price now is driven by the low float (that is, how much COMP is actually free to trade on the market – it will never be this low again). So the value will probably gradually go down, and that’s why savvy investors are trying to earn as much as they can now.
Appealing to the speculative instincts of diehard crypto traders has proven to be a great way to increase liquidity on Compound. This fattens some pockets but also improves the user experience for all kinds of Compound users, including those who would use it whether they were going to earn COMP or not.
As usual in crypto, when entrepreneurs see something successful, they imitate it. Balancer was the next protocol to start distributing a governance token, BAL, to liquidity providers. Flash loan provider bZx has announced a plan. Ren, Curve and Synthetix also teamed up to promote a liquidity pool on Curve.
It is a fair bet many of the more well-known DeFi projects will announce some kind of coin that can be mined by providing liquidity.
The case to watch here is Uniswap versus Balancer. Balancer can do the same thing Uniswap does, but most users who want to do a quick token trade through their wallet use Uniswap. It will be interesting to see if Balancer’s BAL token convinces Uniswap’s liquidity providers to defect.
So far, though, more liquidity has gone into Uniswap since the BAL announcement, according to its data site. That said, even more has gone into Balancer.
Did liquidity mining start with COMP?No, but it was the most-used protocol with the most carefully designed liquidity mining scheme.
This point is debated but the origins of liquidity mining probably date back to Fcoin, a Chinese exchange that created a token in 2018 that rewarded people for making trades. You won’t believe what happened next! Just kidding, you will: People just started running bots to do pointless trades with themselves to earn the token.
Similarly, EOS is a blockchain where transactions are basically free, but since nothing is really free the absence of friction was an invitation for spam. Some malicious hacker who didn’t like EOS created a token called EIDOS on the network in late 2019. It rewarded people for tons of pointless transactions and somehow got an exchange listing.
These initiatives illustrated how quickly crypto users respond to incentives.
Read more: Compound Changes COMP Distribution Rules Following ‘Yield Farming’ Frenzy
Fcoin aside, liquidity mining as we now know it first showed up on Ethereum when the marketplace for synthetic tokens, Synthetix, announced in July 2019 an award in its SNX token for users who helped add liquidity to the sETH/ETH pool on Uniswap. By October, that was one of Uniswap’s biggest pools.
When Compound Labs, the company that launched the Compound protocol, decided to create COMP, the governance token, the firm took months designing just what kind of behavior it wanted and how to incentivize it. Even still, Compound Labs was surprised by the response. It led to unintended consequences such as crowding into a previously unpopular market (lending and borrowing BAT) in order to mine as much COMP as possible.
Just last week, 115 different COMP wallet addresses – senators in Compound’s ever-changing legislature – voted to change the distribution mechanism in hopes of spreading liquidity out across the markets again.
Is there DeFi for bitcoin?Yes, on Ethereum.
Nothing has beaten bitcoin over time for returns, but there’s one thing bitcoin can’t do on its own: create more bitcoin.
A smart trader can get in and out of bitcoin and dollars in a way that will earn them more bitcoin, but this is tedious and risky. It takes a certain kind of person.
DeFi, however, offers ways to grow one’s bitcoin holdings – though somewhat indirectly.
A long HODLer is happy to gain fresh BTC off their counterparty’s short-term win. That’s the game.
For example, a user can create a simulated bitcoin on Ethereum using BitGo’s WBTC system. They put BTC in and get the same amount back out in freshly minted WBTC. WBTC can be traded back for BTC at any time, so it tends to be worth the same as BTC.
Then the user can take that WBTC, stake it on Compound and earn a few percent each year in yield on their BTC. Odds are, the people who borrow that WBTC are probably doing it to short BTC (that is, they will sell it immediately, buy it back when the price goes down, close the loan and keep the difference).
A long HODLer is happy to gain fresh BTC off their counterparty’s short-term win. That’s the game.
How risky is it?Enough.
“DeFi, with the combination of an assortment of digital funds, automation of key processes, and more complex incentive structures that work across protocols – each with their own rapidly changing tech and governance practices – make for new types of security risks,” said Liz Steininger of Least Authority, a crypto security auditor. “Yet, despite these risks, the high yields are undeniably attractive to draw more users.”
We’ve seen big failures in DeFi products. MakerDAO had one so bad this year it’s called “Black Thursday.” There was also the exploit against flash loan provider bZx. These things do break and when they do money gets taken.
As this sector gets more robust, we could see token holders greenlighting more ways for investors to profit from DeFi niches.
Right now, the deal is too good for certain funds to resist, so they are moving a lot of money into these protocols to liquidity mine all the new governance tokens they can. But the funds – entities that pool the resources of typically well-to-do crypto investors – are also hedging. Nexus Mutual, a DeFi insurance provider of sorts, told CoinDesk it has maxed out its available coverage on these liquidity applications. Opyn, the trustless derivatives maker, created a way to short COMP, just in case this game comes to naught.
And weird things have arisen. For example, there’s currently more DAI on Compound than have been minted in the world. This makes sense once unpacked but it still feels dicey to everyone.
That said, distributing governance tokens might make things a lot less risky for startups, at least with regard to the money cops.
“Protocols distributing their tokens to the public, meaning that there’s a new secondary listing for SAFT tokens, [gives] plausible deniability from any security accusation,” Zehavi wrote. (The Simple Agreement for Future Tokens was a legal structure favored by many token issuers during the ICO craze.)
Whether a cryptocurrency is adequately decentralized has been a key feature of ICO settlements with the U.S. Securities and Exchange Commission (SEC).
What’s next for yield farming? (A prediction)COMP turned out to be a bit of a surprise to the DeFi world, in technical ways and others. It has inspired a wave of new thinking.
“Other projects are working on similar things,” said Nexus Mutual founder Hugh Karp. In fact, informed sources tell CoinDesk brand-new projects will launch with these models.
We might soon see more prosaic yield farming applications. For example, forms of profit-sharing that reward certain kinds of behavior.
Imagine if COMP holders decided, for example, that the protocol needed more people to put money in and leave it there longer. The community could create a proposal that shaved off a little of each token’s yield and paid that portion out only to the tokens that were older than six months. It probably wouldn’t be much, but an investor with the right time horizon and risk profile might take it into consideration before making a withdrawal.
(There are precedents for this in traditional finance: A 10-year Treasury bond normally yields more than a one-month T-bill even though they’re both backed by the full faith and credit of Uncle Sam, a 12-month certificate of deposit pays higher interest than a checking account at the same bank, and so on.)
As this sector gets more robust, its architects will come up with ever more robust ways to optimize liquidity incentives in increasingly refined ways. We could see token holders greenlighting more ways for investors to profit from DeFi niches.
Questions abound for this nascent industry: What will MakerDAO do to restore its spot as the king of DeFi? Will Uniswap join the liquidity mining trend? Will anyone stick all these governance tokens into a decentralized autonomous organization (DAO)? Or would that be a yield farmers co-op?
Whatever happens, crypto’s yield farmers will keep moving fast. Some fresh fields may open and some may soon bear much less luscious fruit.
But that’s the nice thing about farming in DeFi: It is very easy to switch fields.
submitted by tkeycoin to Tkeycoin_Official [link] [comments]
Today we will briefly review the main points that will clarify the upcoming changes in the TKEY project.
If you missed previous publications about TkeyNet, be sure to read them:
Future changes to the TKEY project
TKEY AssetJust like the first Protocol (Core 1.0), the TKEY asset used in the TkeyNet network — there are no changes in this plan. After launching TkeyNet, you can transfer TKEY to any user on the TKEY network without any restrictions.
Quick transactionsTransactions in TkeyNet will be much faster than it was before. You can check it in practice.
TkeyConnect ModuleThe Protocol has a built-in TkeyConnect module, which allows you to connect various blockchains to our network to conduct transactions directly in the TkeyNet blockchain. Besides, TkeyConnect meets the international ISO and ISIN standards, which also allows you to conduct transactions with Fiat currencies and shares in the TkeyNet blockchain.
TkeyConnect creates a flexible system, giving users the ability to store and conduct transactions in any assets, be it Bitcoin, Ethereum, Litecoin or dollars, euros, etc.
New softwareIf the previous software based on the Core 1.0 Protocol, after switching to TkeyNet, wallets, a blockchain search engine, and other software related to the project will be adapted to the new Protocol.
Contact information and support serviceEmail addresses of the support service and other departments will be transferred to other service providers and will structure in the following areas: B2B and B2C. The list of email addresses will publish after updates are complete.
B2B (business-to-business) a term that means that a company or a division of a company sells its goods/services to corporate clients, that is, to other companies. B2C (business-to-consumer) is a term that refers to the commercial relationship between an organization (Business) and a private, so-called “end” consumer.
WebsitesInformation about the project, the company, and its products will subdivide into two websites: tkeycoin.com and tkey.org. The purpose of this division is to simplify product navigation, improve the appearance of pages for each product and solution, and update content.
The solution is modular. The information will be structured according to sections and sites, dividing the corporate and user segments. As the products develop, the information will be updated.
Technical specifications, documentation, and a description of the Protocol and its features will appear on the official website: tkey.org. Sections will fill in gradually.
Testing and launching TkeyNetBetween July 22 and July 24, Telnet was successfully launched in testnet mode. Our team is actively testing the entire TkeyNet network and its functions. The system is tested with different scenarios, its effectiveness is checked when working with high loads, and the security of the entire system is audited. Testing of TkeyNet is an important stage of production aimed at detailed research of the program code and identification of errors in the system operation. Comprehensive testing, which is carried out by our team, is necessary to determine the level of readiness of the system for subsequent operation. Testing is based on a set of test scenarios that cover the main business operations.
The testing process contains all the life cycle activities: dynamic and static indicators. The testing process involves planning, preparing, and evaluating a software product. The purpose of testing is to determine that all meet the requirements described, as well as to show that they are suitable for the stated purposes and for detecting errors.
The Digital Asset ExchangeAfter launching TkeyNet — we will publish the start date of trading on the exchange. Information is available in the official notification: https://tkeycoin.com/en/news/.
Buying and selling TKEYYou can buy or sell TKEY only on the exchange and not in any other source. Private transactions are subject to high risks. Once again, we remind you that at the time of updates, any transactions with TKEY will be invalid.
Safety of fundsIf you use a local wallet on your computer, make a backup copy of the wallet.dat file. If you use a TkeySpace mobile wallet, make a backup copy of the private key (backup phrase).
Transactions before updates are completedDuring updates-no transactions can be made on the network, which means that any private dealing made at the time of updates will be invalid. Additionally, we ask you to refrain from any actions related to TKEY until the end of updates protocol, including starting mining, local wallets, and reinstalling them.
EpilogueTesting of the system and its functions takes place in a stable mode without days off. The test results that will receive at the end of this week will reflect the current state of Affairs. We will get up-to-date information about the end date of updates and the planned release date of TkeyNet.
An announcement of interim test results, as well as future updates, will be published at the end of this week or early next.
On our website, you can find the original article: https://block.co/webcastqa-blockchain-in-healthcare/submitted by BlockDotCo to u/BlockDotCo [link] [comments]
Block.co third webcast ” Blockchain in Healthcare: Bridging Trust in response to COVID-19“ received amazing feedback! We gathered some of the best experts in the field, Georgina Kyriakoudes, Ahmed Abdulla, Dimitri Neocleous, Dr. Alice Loveys to share their experience in the industry and discuss with us the latest updates in the sphere of Healthcare! In its third series of webcasts, Block.co gathered 253 people watching the event from 59 different countries, for a 90-minute webcast where guests answered participants’ questions.
Below is a list of the questions that were made and were not answered due to time constraints during the Blockchain in Healthcare webcast. Please note that the below information is only for educational purposes!
Question 1: I like what Dimitrios was saying regarding ownership and transfer. Health and social care have invested much in Information Management systems and processes. Transfer between NHS and social care is a typical block. Can you elaborate on how the blockchain sits across that – leapfrogs yet goes with the grain of what is already there in terms of shared records protocols, the exponentially growing types of professionals, pharmacists, careers, etc. that need early access to these records for better decision making.
Block.co Team Answer: Blockchain technology has the potential to improve healthcare, placing the patient at the center of the health care ecosystem, while providing security, privacy, and interoperability of health data. Blockchain could provide a new model for health information exchanges and transform electronic medical records to be more efficient, disintermediated, and secure. While it is not a cure, this new, Blockchain in Healthcare rapidly evolving field provides a sandbox for experimentation, investment, and proof-of-concept testing.
Healthcare systems around the world are preparing road maps that define critical policy and technical components needed for nationwide interoperability, including:
Blockchain technology creates distinctive opportunities to scale back complexity, improve trustless collaboration, and create secure and immutable data. National Healthcare Systems need to track this rapidly evolving field to identify trends and sense the areas where government support may be needed for the technology to realize its full potential in health care. To form blockchain’s future, they ought to take into account mapping and gathering the blockchain ecosystem, establishing a blockchain framework to coordinate early-adopters, and supporting a pool for dialogue and discovery.
Question 2: What about the “compatibility” of blockchain solutions in healthcare with GDPR and/or other regulations about personal data protection.
Block.co Team Answer: The General Data Protection Regulation (GDPR), Europe’s new framework for data protection laws, has a vital impact on healthcare organizations. During this more and more patient-centric world where global healthcare organizations collect a large set of data on patients to produce improved health outcomes, this increased regulation has an even larger impact.
GDPR presents challenges across all industries and includes language that has a special impact on healthcare. The regulation defines “personal” data as “any information relating to an identified or identifiable natural person (data subject); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.” On top of this definition, GDPR contains three extra, important definitions that pertain to health data:
However, healthcare organizations that usually manage health data, have an added responsibility to take care of “data concerning health,” “genetic data,” and “biometric data” to a higher standard of protection than personal data, in general. GDPR prohibits the processing of these forms of health data unless one of the three conditions below would apply as per Article 9.
a. The data subject must have given “explicit consent.”
b. “Processing is necessary for the purposes of preventive or occupational medicine, for the assessment of the working capacity of the employee, medical diagnosis, the provision of health or social care or treatment or the management of health or social care systems and services …”
c. “Processing is necessary for reasons of public interest in the area of public health, such as protecting against serious cross-border threats to health or ensuring high standards of quality and safety of health care and of medicinal products or medical devices …”
Consent VS Explicit Consent – If one pays attention, there’s a difference in the GDPR’s health data use conditions (calls for “explicit consent”) and the general definition (calls for “consent”). Thus, there’s an ongoing debate as to what constitutes the difference between “unambiguous” and “explicit” consent. Despite the debate and the final legal clarifications, there is no doubt that in the purposes of the healthcare the “explicit consent” must have the strongest agreement form listing in detail the use(s) of data and covering the cases of data transfers and storage.
Question 3: How can we use blockchain technology by the government in Africanflavored government, say by Ministry of health to have patient autonomy of medical records that can be accessed by any government hospital irrespective of the ailment and record printed by the previous hospital and doctor, such as referral cases without having to open a new file in the referred hospital.
Block.co Team Answer: Perhaps that would be an ideal implementation of the Block.co solution issuing a digital certificate of medical examination on an Open Public Blockchain such as the Bitcoin blockchain, that would be decentralized in nature, easy to validate online without any special wallets, and would be provided by the patient on-demand, to refer to treatments received in other hospitals or areas. But this would require that the practitioner is aware and can use the open-source code or use Block.co services to issue these certificates. Alternatively, there could be the use of a wallet to store these medical credentials to be submitted on demand to health practitioners. Moreover, there would need to be an alignment of regulation in the matter as decentralized repositories are not recognized at the moment.
Question 4: Is there any data breach threat in the blockchain using a poorly protected private key at communication?
Block.co Team Answer: Millions of health care records have already been breached, and in attempts to combat this issue, solutions often result in the inaccessibility of health records. Health providers often send information to other providers, and this often ends up in mishandling of data, losing records, or passing on inaccurate and old data. In some cases, only one copy of an updated health record exists, and this may result in the loss of information. Health records often contain personal information such as names, social security numbers, and home addresses. When it comes to Blockchain in Healthcare, a poorly protected private key is always a factor to consider. A private key allows us to sign a transaction and spend funds residing in an address (public key) by providing ownership with the signature. It is a unique string of information that represents proof of identification inside the blockchain, which includes the right to access and control the participant’s wallet. It must be kept secret, as it is effectively a personal password. In the case that that private key is poorly protected, there is always a data breach threat.
Question 5: The medical record of a patient is owned by the patient. What happens if a doctor accesses the record without the consent of the patient? Using the smart contract, could there be a governing body, say a legal system that can call the doctor to order?
Block.co Team Answer: Rather than having each physical and electronic copies of records, blockchains may enable the shift to electronic health records (EHR). When looking at Blockchain in Healthcare, medical records on the blockchain would be within the management of the patient rather than a third party, through the patients’ private and public keys. Patients may then control access to their health records, making transferring information less cumbersome. Because blockchain ledgers are immutable, health information may not be deleted or tampered with. Blockchain transactions would be accompanied by a timestamp, permitting those with access to maintain updated information. The doctor would not be able to access the record without the consent of the patient. A patient would need to sign the transaction in a smart contract in order to transfer patient details to the doctor.
Question 6: So, how are private data protected when the patient is simply notified that unauthorized access just took place on her medical record? and, how are the negative results of this breach rectified towards the patient?
Block.co Team Answer: The patient would be notified to sign a transaction enabling access to the party requesting access to the specific medical record. In other cases, there could be a multi-signature wallet requiring multiple transactions in the cases where the patient may need assistance, for example, when underage or when not in a healthy state of mind, or being non-responsive or in critical condition. The patient needs to be responsible for his own data and be empowered through awareness and know-how of this technology. With great power, comes also great responsibility, although it is yet a challenge to enable computer illiterate people to interact with this technology.
Question 7: Can the same record of a patient still be shared with private hospitals and say another government/private hospital abroad on the same blockchain?
Block.co Team Answer: Depending on whether the information is on a public blockchain or a private blockchain. When on a private blockchain, they will need to be granted permission to access the blockchain accordingly.
Question 8: No one has directly spoken about ownership where a large research institution/ consortium is working with the data – it is not solely the person who has said so…
Block.co Team Answer: Indeed, it is solely not the person who has a say so. Technology may be used in both evil and good ways and it is still the obligation and responsibility of people within governments to ensure human liberties and rights are preserved when utilizing such powerful technologies such as blockchain and sometimes the combination of blockchain with AI, IoT, and biometrics. Blockchain in Healthcare, in the same way, that it can empower individuals and increase their standard of living and prosperity, at the same time, it can also empower corrupt governments with alternative agendas and totalitarian states. Block.co believes it is most important for people to be educated around the matter and be able to form a voice and movement to safeguard their human liberties and rights, hence our continuous effort on discussing these matters with our community and providing education, powered by the pioneers in the space, the University of Nicosia.
We would like to thank everyone for attending our webcast and hoping to interact with you in future webinars. If you would like to watch the webinar again, then click here!
For more info, contact Block.co directly or email at [email protected].
Tel +357 70007828
Get the latest from Block.co, like and follow us on social media:
Author: Ma Haobosubmitted by Floris-Jan to aelfofficial [link] [comments]
Recently, the Standard for Blockchain-based Digital Asset Identification, submitted by aelf, was approved by the IEEE SA Standards Board New Standards Committee (NesCom). The standard specifies methods and practices of crypto asset identification. The standard also addresses attributes of the blockchain system digit asset identification including but not limited to data structure, data format, and related asset management operation specifications.
The purpose of this standard is to improve digital asset management with an asset identification specification in blockchain systems. The standard aims to provide a data format and structure references for organizations designing digital asset identification solutions — providing digital asset services and setting up operational specifications for organizations.
Current Situation and Problems of Assets Management on the chain.
In the blockchain system, the unspecified participants usually work together under set contract rules to complete a social production and management activity on the blockchain. Some of these activities are closely related to assets, such as payments, loans, asset transactions, games and entertainment, etc. .
There are various ways to define assets within a blockchain as well as when compared to other blockchains. For example, in Ethereum, ETH is an asset that is directly constrained by the underlying code of the block chain, while a Fungible token is defined by the contract interface ERC20, and a Non-Fungible token is defined by ERC721. There are also emerging asset agreements such as ERC998 and ERC1155.
Most users utilize a blockchain through specific terminals, which usually includes a blockchain browser, wallet, decentralized applications (DAPP), etc. By defining standards through contract interfaces, these users’ terminals can handle various assets in a standardized way. These DApps usually need to adapt to different contract interfaces, but also deal with non-contract defined assets like ETH. When these terminals need to support different blockchains, they require extra work to adapt.
The number of interfaces that user terminals need to deal with is increasing with the emergence of more blockchain systems. But most functions are equivalent in the assets definition. At the same time, there is a growing need to move assets from one chain to another chain. For example, there are some BTC value anchored assets in Ethereum, USDT is issued on bitcoin network and Ethereum network at the same time, and the assets on the aelf main-chain and side-chain can be transferred directly. But there is not a unified standard to solve the cross-chain data communication problem in the whole blockchain industry.
What a common asset standard might do to an industry
The birth of wETH is a great place to talk about “industry change” . wETH, which is Wrapped Ether, is an ETH asset Wrapped under ERC20. As mentioned above, ETH is a non-contractual asset, but why redefine it under ERC20? Some decentralised exchanges in Ethereum, which typically deal with ERC20 assets. But ETH, as one of the key assets in Ethereum, also needed to be backed by these decentralised exchanges, so wETH was born. Users can get the same amount wETH after locking ETH in the contract. Accordingly, users will be able to get the same amount ETH by destroying the wETH in the contract, so users can exchange any ERC20 Token including the ETH in these decentralized exchanges. This seems to be a good solution. However the transformation operation on the chain may bring permanent system complexity.
Users’ needs will always be different. After solving the problems of Eth and wETH, people hope to adapt the transaction to BTC. Due to the isomeric chain, there is no good atomic transfer scheme so far. Most BTC assets anchored in Ethereum are anchored by mortgages. The risk of the centralized BTC mortgage scheme lies in the safe custody of the mortgaged BTC. Systematic risks associated with the Ethereum on-chain mortgaged asset revolves around price fluctuations. Moreover, each scheme is neither simple nor elegant. When simple requirements face complex solutions, we need a simple solution.
Challenges may also arise when conducting Defi activities on a single chain as Ethereum transaction volume increases. When the trading volume increased in March 2020, the Maker’s data source could not keep up with outside real prices, and some mortgage orders went awry. When a single chain is not big enough to handle a high number of data transactions, it may be better to process these assets on higher performance cross chains, such as EOS. But we can’t deal with the ERC20 assets on EOS. Of course, aelf can not currently deal with ERC20 assets.
Current blockchain systems, on-chain assets, and especially fungible tokens, have special commonalities. Some cryptocurrency wallets have achieved compatibility with multiple blockchain systems. A unified blockchain asset standard is not specific to a certain kind of blockchain system and can drastically reduce the systemic costs of the entire industry.
IEEE Digital Asset Standard Proposals OverviewThe IEEE digital asset proposal, submitted by aelf, defines the digital asset standard in terms of data structure, data format specification and management operation specifications related to asset identification.
Combined with the digital assets demand of blockchain systems, such as public and alliance chains, a flexible asset standard with strong versatility and multiple options is necessary.
In this standard, some assets’ properties will be defined, such as name, supply, decimal places, etc. Some basic operations are also defined, such as distribution, destruction, migration, and so on.
At the same time, we will define the standard form of cross-chain transfers on the premise that cross-chain data can be synchronized normally. In this regard, the aelf team members are continuing to invest in research and development. The aelf team also launched the Cross-Chain Transfer Protocol (CCTP), and held cross-chain transfer testing and a hacker bounty between the Ethereum and aelf testnet.
Expectations and perspectives on digital asset standards
If such a standard can be implemented, users can use a client to process various digital assets without difference. For example, if a user got a rare item in the EOS blockchain game, he can also sell the item to get USDT in an NFT exchange on Ethereum, and then sell the USDT to buy the BTC on the unique side-chain of aelf’s decentralized exchange (BTC/USDT), where only transactions for the conversion of BTC to USDT are processed.
Based on existing mainstream blockchain systems, it is difficult to achieve pre-compatibility. The first decade of blockchain is a decade of high-speed development in which new ideas and methods are constantly emerging. Therefore, it may be difficult to implement all the functions defined in the digital assets standard when the existing blockchain is not compatible with the standard protocols.
It is hoped that the digital assets standard can be easily implemented by each blockchain system. If a function is unique to a specific blockchain system, it should not be included in the standard.
After establishing this standard, it is expected to receive increasing support from multiple chains. When blockchain technology is a common feature utilized in mainstream applications, it can speed up assets’ liquidity.
Identification. Identification is the act of confirming that the person who registers to use a service is, in fact, that person. In most cases, it is confirmed by checking that the name, birth date, and address match those on a driver's license or passport. BitFlyer uses multiple methods to authenticate individuals. By using multiple methods of ... Eine mobile App für Bitcoin Future ist derzeit nicht verfügbar. Im Wesentlichen verkaufte die Website gefälschte Bitcoin. Ich denke, es hat viel damit zu tun, dass mein Konto schwedisch ist. Ich weiß nicht, ob für jeden Benutzer die gleichen Regeln gelten. Diese Website hat einen geschätzten Wert von 8 US-Dollar. Zum einen ist das vermeintliche Interesse auf dem spekulativen Markt ... Summary: Buying Bitcoin with Credit Card No Verification. Go to the Coin ATM Map website.; Search out the ATM location near you. Head over to the machine location to buy bitcoins with cash.; Bitcoin ATMs generate a paper wallet – or offline wallet with a public key (your bitcoin wallet address) and a private/secret key (allowing bitcoins to be spent). Bitcoin ECDSA public keys represent a point on a particular Elliptic Curve (EC) defined in secp256k1. In their traditional uncompressed form, public keys contain an identification byte, a 32-byte X coordinate, and a 32-byte Y coordinate. The extremely simplified illustration below shows such a point on the elliptic curve used by Bitcoin, y2 ... A new identification and reference standard for the decentralized economy . Acknowledging the market‘s need for more standardization in order to grow and mature, the International Token ...
[index]          
Video by our Ambassador Dhel REGISTER ON COINEX: https://www.coinex.com/register?refer... Website: https://www.coinex.com/ Twitter: https://twitter.com/coine... https://rollerbit.net/affiliate?refer=RB22565 bitcoin giveaway site paying up to 1btc in free roll without any investment needed,all you need to do is wake u... Crypto Investing #58 - How To Invest In Bitcoin & Cryptocurrencies For Beginners - By Tai Zen - Duration: 27:40. Cryptocurrency Market 31,219 views. 27:40. How to Avoid Scam Coins - Duration: 3:38 R.k Mukesh Join Telegram giveaway https://t.me/RkMukesh Bitcoin website link https://freeb.tc/?r=112609 signup up bonus Rs.50 1 Refer Rs.50 Redeem Rs.100 App... Mine Bitcoin on the go Mining on mobile devices has been just a faraway dream for a long time—but now it’s a thing! Use CryptoTab on your smartphone or table...