Die 5 größten Bitcoin Mining Pools, sortiert nach Hash Rate

[Discord Conv] Dynamic IOTA


Disclaimer: This is my editing, so there could be some misunderstandings.
For the general view of 'what's going on?' of this dynamic ride...

2/16
dom어제 오전 5:44
Just FYI: the team is now working on a plan on how to recover from this and get the network back into operations while also allowing anyone who might have been affected to safely transition. there are no guarantees just yet, but we will do our best to get this through ASAP. Hopefully we will have a concrete action plan tomorrow and will then communicate it.
On the vulnerability side, all parties are notified and they are working with law enforcement and external auditors to fully understand how this happened. We will keep you guys posted.

dom어제 오전 5:47
needless to say, that the vulnerability itself was rather sophisticated and required access on multiple levels to be able to execute it on this scale. Hopefully we will be able to share more soon.
[Did the vulnerability existed after or before the audit on trinity?]
after the audit

dom어제 오전 5:51
Currently it looks like this will only be for recent Trinity Desktop users

dom어제 오전 5:56
the entire Trinity team did an amazing job and there is not a single person to blame. The attack itself was very sophisticated and targeted at IOTA and Trinity itself. We are already working on v2 where none of this would be possible. We will share our learnings from this publicly and also share what kind of precautionary measures we are taking.

dom어제 오전 5:58
The community also did an amazing job in helping to guide us through and give assistance to other community members.

dom어제 오전 5:58
we actually were having discussions a few weeks ago to rename Trinity (because of the religious connotation)

Jelle Millenaar [IF]어제 오전 6:37
We didn't really have panic and chaos. We actually worked really well together.

Jelle Millenaar [IF]어제 오전 6:38
[IF members, do you get paid Over Time for all the awesome work or PURE DEDICATION?]
nobody considers this overtime or anything. We just contribute because we know it is needed.

dom어제 오전 7:45
[If dependencies carry this risk, maybe they should've done an official CORE wallet and saved all the fluffy stuff for a third party app.]
that's how the new Trinity will work. Sucks that it happened now especially after we wanted to put it into maintenance mode anyways

dom어제 오전 7:49
[How do we know if the hacker has our seeds?]
this is related to a third party, unrelated to IF or IOTA

dom어제 오전 7:50
we know that this could have only been done through intrusion / collusion of an external source.
[Dom are you fully confident to solve all those problems especially regarding the possibility of even more people getting scammed instantly after coo is back again?]
yes, relatively sure. That is why we are taking the necessary time to plan accordingly.

dom어제 오전 7:55
We will provide more information on how this exploit was done soon. All the involved parties are aware of the situation

dom어제 오전 7:58
[Please give us some time before you start the coo information that we can move to new seed instantly]
don't worry, we will get it all sorted out.

dom어제 오전 8:22
once life is a bit less "tumultuos" I still want to work on that Autonomous Bar concept powered by IOTA (access control, id verification, payment and a bunch of robots)

Eric Hop [IF]어제 오후 2:44
Pretty good. I'd be surprised if we find more theft bundles. Only found one more today, while building a timeline of the theft.

Eric Hop [IF]어제 오후 2:50
We have several separate teams. One is looking at how to resume. One is looking at how to be able to rescue the funds. Others are interacting with law enforcement and third parties. I'm part of DAFT. The Data Analysis Forensics Team. Haha

Eric Hop [IF]어제 오후 3:01
Some if the people in Coordicide team like Hans have been helping out. It was an all hands on deck situation. I actually loved it. We haven't had this much of a team spirit in quite a while. Usually everyone plays in their own sand box. But this time we all played together on the beach.
It's such a joy working with so many extremely smart people. With so many eyes on the ball we did not miss much opportunities to figure things out.

Eric Hop [IF]어제 오후 3:07
And for me personally this was a great time. I am all about puzzle solving. And this was the greatest puzzle of all. With a built-in time limit. Haha

Eric Hop [IF]어제 오후 3:12
I'm not doing official statements. But we have a good overview of what happened and the extent of it. Right now we want to hammer down how to resume without risks and how to safeguard the stuck funds if possible. What is especially funny to me is that the coordinator that everyone was bitching about for years did exactly the thing it was meant to do. It allowed us to halt an exploit that otherwise would have cost everyone dearly.

Eric Hop [IF]어제 오후 3:15
It was meant as safeguard, training wheels, while we mature. And while we need to remove it due to it being a single point of failure and a bottle neck to scaling, I will be kind of sad to see it go.
Yes, IF would have done the same to safeguard funds, if a third party wallet would have been the cause. Just because we can.

Eric Hop [IF]어제 오후 3:37
Yes it was a manual attack. The sophistication was in the exploit. But he seemed to be not too sophisticated iota-wise. Everyone has their specialties I guess.

Eric Hop [IF]어제 오후 3:41
And as an aside I wish people would fuck off about the whole iota not being decentralized because of coordinator, when every block chain token is centralized around a few mining pools that seriously disrupt any possibility for positive software development. They fucking hold back everything that influences their bottom line. Which is why Bitcoin and the rest have pretty much been stagnant for years while we move forward constantly.

dom오늘 오전 7:08
We will release a new Trinity version tomorrow with the fixes implemented. It's not yet the full transition tool, but it's the first step towards fully going back to operations.

dom오늘 오전 7:09
Just wait for the rest. It is important that we get this 100% right and we are still further investigating, so there is a lot of behind the scenes work happening right now.

David Sønstebø오늘 오전 8:52
So... Tangle EE
Quite cool eh?
It's so unfortunate that this asshole managed to distract everything away from one of the biggest steps towards global adoption
Let's not give this fuckface further attention. The cause has been identified, law enforcement is involved and mitigation strategy is being worked on. There will be further official updates, but let's not halt the whole IOTA project due to one idiot.

David Sønstebø오늘 오전 8:56
[Is he identified?]
Let's just say that there's a lot of traces. The attacker does not seem to have been too sophisticated. Official update on Monday will provide details.

David Sønstebø오늘 오전 9:03
[How will this situation affect iotas partners?]
My best guess: further increasing our reputation as an organization that solves hard problems efficiently and doesn't shy away from difficulties. Every company in the world has had issues similar to this. Keep in mind that this does not at all affect the protocol/Tangle/IOTA.

David Sønstebø오늘 오전 9:08
We do have a bounty program. This/these individual/s were not interested in the greater good, pure greed and incompetence

David Sønstebø오늘 오전 9:10
[Any examples of use cases for DID on the tangle?]
Virtually all use cases on Tangle requires a secure identifier and verifiable credentials. What I think will happen is that once Tangle EE ships the first version, all other companies using IOTA will start to implement it
[One more question: How transparent will tangle EE be for the community?]
100%. This is why I/we consider Tangle EE to be such a significant milestone, it's not "just" IF, this is a coalition of major companies, start-ups and leading academic institutions building the solutions

David Sønstebø오늘 오전 9:11
[any ETA for the 1st Version?]
That's another good thing, IF won't issue the ETAs, Tangle EE will :

David Sønstebø오늘 오전 9:12
[What does T(angle)EE do exactly?]
It's a partnership and collaboration between several entities to develop and ship code and blueprints that are relevant for product developers and service providers
That blog post is a good read to get better comprehension

David Sønstebø오늘 오전 9:13
It's incredibly important that IF's role slowly but surely decreases in importance. IOTA has to succeed independent of IF post-Coordicide and multiversial-slicing (advanced sharding equivalent)

David Sønstebø오늘 오전 9:14
I would say that it's an incredible important piece of the puzzle. Naturally Object Management Group (OMG) in Tangle EE will be key here as well, but IOTA is not married to "just" Eclipse. We also work closely with Linux Foundation. However, Tangle EE is very focused

David Sønstebø오늘 오전 9:22
I don't think IF will disappear, however, it will hopefully be purely R&D-driven in 10 years, whereas the other efforts are taken over by the ecosystem (companies, academia, start-ups and enthusiasts). Even post-Coordicide, we already now have theories on how to go way beyond even that. If we achieve our goal of IOTA being equivalent to TCP/IP, there will naturally be continuous development and research in the foreseeable future. I doubt we will reach complete satisfaction, especially now that smart contracts and oracles enter the equation: there's certainly more work to be done for IF, but my goal is for IF to "simply" be R&D

David Sønstebø오늘 오전 9:27
Definitely. This is why I coined the requirement for a "grandma on crack"; this is truly how simply using IOTA should be in 2-5 years. Just like very few even know wtf TCP/IP is

David Sønstebø오늘 오전 9:57
I agree 100% with your assessment, though as would Netflix do with Blockbuster's assessment when they declined to acquire Netflix. At the end of the day it's all about basic economic and human behavioural principles.
Human nature does not change, but our environment does. Disruption will continue forever. Darwinian principles will forever remain true.
A better option = adoption. It doesn't matter how hard the incumbents fight against it, they either adapt or go Kodak/Nokia/AOL
submitted by btlkhs to Iota [link] [comments]

Frequently Asked Questions

NOTICE

This post is a temporary resting place for FAQs while we wait for the release of VertDocs.

What is Vertcoin?

Vertcoin is a digital peer to peer currency focused on decentralization and ASIC resistance. Vertcoin is aiming to be easily accessible to the everyday user without extensive technical knowledge. Vertcoin has started to lower the barrier of entry with lots of video guides and the development of the One Click Miner (OCM).

Why does ASIC Resistance Matter?

ASICs (Application Specific Integrated Circuits) are dedicated mining devices that can only mine one algorithm. Coins like Bitcoin and Litecoin both made GPU mining obsolete when SHA-256 and Scrypt ASICs were created.
ASIC Resistance and How it Makes Vertcoin Decentralized
Vertcoin believes that ASIC resistance goes hand in hand with decentralization.
ASICs are made by companies like Bitmain and almost all the original sellers of ASICs sell on a preorder basis. When pre ordering an ASIC you are buying from a limited batch that the ASIC company has produced. Often times the batch will not be fully filled and the ASIC company will often have left over ASICs. When the ASIC company has left over ASICs they will put them to work mining. Soon enough the ASIC company will have a very large amount of unsold ASICs that are mining and slowly the ASIC company starts to own a large part of the network’s hashrate. When an ASIC company(s) starts to own a large majority of the hashrate the network can become very centralized after a while.
Having your network consist of a few large companies can be very dangerous as they could eventually get 51% hashing power and 51% attack your network, destabilizing the network. When your network is made out of a lot of smaller miners, like Vertcoin, it is much harder for your network to be 51% attacked, therefore increasing network security. By having centralized hashing power your coin effectively centralizing the network as the centralized hashing power can deny transactions and stop any activity they don’t want.

What Ways is Vertcoin Superior to Litecoin and Bitcoin?

Network Difficulty Adjustments with Kimoto Gravity Well
Vertcoin uses a difficulty adjustment called Kimoto Gravity Well which adjusts the difficulty every block, whereas Bitcoin and Litecoin’s difficulty changes every 2016 blocks. By adjusting the difficulty every block Vertcoin’s block time can stay consistent by adjusting for the fluctuation in network hash rate from hash rate renting and part time miners. If a large miner switches off Bitcoin or Litecoin mining the network could be slowed to a crawl until 2016 blocks are mined and the difficulty can change to adjust for the new network hash rate. We observed this happen to Bitcoin when Bitcoin Cash became more profitable than Bitcoin and Bitcoin’s network hash rate saw a steep fall off, slowing the network to a crawl. If this was to happen with Vertcoin the difficulty would adjust after 1 block was mined, allowing Vertcoin to always be profitable to mine.
Anyone can Meaningfully help Verify Transactions
In Proof-of-Work crypto currencies miners help secure the blockchain and get rewarded with the block reward. In ASIC mineable coins like Bitcoin and Litecoin you can’t meaningfully verify transactions unless you pay 1000-2000$ for a ASIC miner. When you mine with a CPU or GPU in a ASIC mineable coin you make no meaningful impact on the network. It is like trying to break concrete with a shovel while everyone else has a jackhammer.
Simple Upgrades Aren’t Held back by 1-2 Large Miners
In ASIC market people buy ASICs in batches in a preorder. With Bitcoin ASICs there is not enough demand for ASICs so the batch often doesn’t get sold out so now the manufacturer has spare ASICs. Now that the manufacturer has spare ASICs they will often start mining with them and eventually the ASIC company has one of the highest hash rates. If the ASIC company doesn’t want a certain upgrade to go through, for example SegWit, they can vote with their hash rate to hold back the upgrade forever or at least until people who want SegWit get more hash rate.
You Have a Say in Protocol Rules and Consensus
In Bitcoin you are a passive observer because you can only issue transactions and you have no part in the process after that. In Vertcoin you can be apart of the process for deciding the ordering of transactions and deciding what transactions get into blocks.
Block Rewards and Transaction Fees are Distributed Evenly
In Bitcoin and Litecoin the block rewards and transaction fees are often given to the large miners in China due to mining centralization created by ASICs. Vertcoin distributes its mining rewards to people all around the world thanks to the mining decentralization.

When will Atomic Swaps Be Ready?

Atomic Swaps can be done in two flavors: On-chain and Off-chain (via Lightning Network). On-chain swaps were actually done already using Blocknet, you can see it in use on Youtube. We're looking into doing it again using Interledger.
However our main focus is to do off-chain Atomic Swaps using Lightning Network technology. Because it has the same benefits as Lightning transactions: No network fees and instant transactions.
For off-chain swaps we need Lightning Network to be fully operational. It's difficult to give an ETA on that since we aren't the ones developing it. U/gertjaap posted a video on the current state of the Lightning Network for Vertcoin a while ago, which you can see here.
This was actually the "bleeding edge" of Lightning Network at the time. was able to use it on VTC's main net, meaning that our blockchain is ready for the good stuff. As you can see however, it can't yet be considered production ready (most users would want a little better UX than a command line app).
Now off-chain Atomic Swaps is a technique based on the same principles as Lightning Network, but adds an extra complexity for it being across chains. So it's basically the same as a "multi hop" Lightning payment, which is not yet built by any of the implementations. They're still working hard on making the single-hop payments robust. So in order for AS to be possible, LN has to be fully operational.
A timeline cannot be given at this time, because frankly we don't know. The implementation of Lightning Network we feel has the most potential is LIT, because it supports multiple currencies in its protocol (where LND is bitcoin-only at the time and requires significant work to support other currencies, which is an essential part of being able to work across multiple blockchains).
LIT is open source and there's nothing secretive about its progress, you can see the development on Github. We even have our lead dev James Lovejoy (u/jamesl22) close to the action and contributing to it where possible (and our team as well through testing it on the Vertcoin chain).
So we're not developing LN or AS ourselves, we're just ready with our blockchain technology whenever it becomes available.
If we have any real progress that has some substance, you can expect us to let the world know. We're not interested in fluffy marketing - we post something when we achieve real progress. And we are not keeping that secret.

How do I Choose the Right Vertcoin Wallet?

Deciding what Vertcoin wallet you should choose can be a difficult process. You can choose between three different wallets: Core, Electrum and Paper. Once you decide you can use the "How to Setup Your Vertcoin Wallets" video guide to assist you.

Core

The Core wallet is the wallet that most people should use. It will store the entire blockchain (~2GB) on your computer. The Core wallet is the only wallet that fully supports P2Pool mining. You will also have to use the Core wallet if you plan to run a P2Pool node or any Vertcoin related server.

Electrum

The Electrum wallet is a light wallet for Vertcoin. You do not have to download the blockchain on your computer, but you will still have your own private keys on your computer. This is recommended for people who don't need to store Vertcoins for very long and just need a quick but secure place to store them.

Paper

The Paper wallet is as the name implies, a physical paper wallet. When generating a paper wallet you will get a pdf that will need to print out. A paper wallet is normally used for long term storage since it is the safest way to store Vertcoins. A paper wallet can also be called "cold storage." Cold storage references the storage of your coins offline, preventing you from getting hacked over the internet.

Ledger Nano S

The Ledger Nano S is a hardware wallet designed by Ledger. A hardware wallet is similar to a paper wallet since it is normally used for cold storage. The hardware wallet is on par with the security of a paper wallet while being easy to use and setup. Note: You should never mine directly to a Ledger hardware wallet.

How do I start mining Vertcoin?

We have many guides available for you to use depending on your computer specifications.
Nvidia GPUs on Windows
Nvidia GPUs on Linux
AMD GPUs on Windows WARNING: Very unprofitable, AMD optimized miner is coming very soon.

Where can I get the One Click Miner (OCM)

You can get the latest version of the One Click Miner in the Vertcoin Discord. The download is pinned to the top of the #oneclick channel.

What do all the Numbers Mean on P2Pool’s Web Interface

I've seen a lot of confusion from new miners on public p2pool nodes, so here's a primer for the most common static node page style, for first time miners: https://imgur.com/K48GmMw

Active Miners on this Node

Address - This is the list of addresses currently mining on this node. If your address does not show up here, you are not mining on this node.
Hashrate
This is a snapshot of your hashrate as seen by the node. It will fluctuate up to 15% from the hashrate you are seeing on your mining software, but will average out to match the output in your mining software.
Rejected Hashrate
This is the amount of your hashing contribution that is rejected, both in hashrate and as a percentage of your total contribution. Running your own p2pool node minimizes this number. Mining on a node that is geographically close to reduce lag also minimizes this number. Ideally you would like it to be less than 1%, but most people seem happy keeping it under 3%.
Share Difficulty
This speaks for itself, it is the difficulty of the share being currently worked on. Bigger numbers are more difficult.
Time to Share
This is how long you need to mine before you will receive any payouts, or any "predicted payout." The lower your hashrate, the higher your time to share.
Predicted Payout
This is the reward you would receive if a block was found by p2pool right now. If it reads "no shares yet" then you have not yet been mining the requisite amount of time as seen in the previous "time to share" column.

Status

Network Hashrate
This is the total hashrate of all the miners mining vertcoin everywhere, regardless of where or how.
Global Pool Hashrate
This is the total hashrate of all the miners mining vertcoin on this p2pool network, be it the first network or the second network.
Local Pool Hashrate
This is the total hashrate of all the miners mining Vertcoin on this node.
Current Block Value
This is the reward that will be given for mining the current block. The base mining reward is currently 50 VTC per block, so any small decimal over that amount is transaction fees being paid by people using the network.
Network Block Difficulty
This is the difficulty of the block being mined. The higher the number, the higher the difficulty. This number rises as the "Network Hashrate" rises, so that blocks will always be found every 2.5 minutes. Inversely, this number falls when the "Network Hashrate" lowers as well.
Expected Time to Block
This is a guess at how much time will elapse between blocks being found by this p2pool network. This guess is accurate on average, but very inaccurate in the short term. Since you only receive a payout when the network finds a block, you can think of this as "Estimated Time to Payout."

Why is P2Pool Recommended Over Traditional Pools?

Decentralisation

P2Pool is peer to peer allowing a decentralized pool mining system. There are many nodes setup around the world that connect to each other too mine together. Many other coins have 1 very large pool that many miners connect to and sometimes the largest pool can have 51% or more of the network hash rate which makes the network vulnerable to a 51% attack. If P2Pool is the largest network then that prevents the Vertcoin network to be susceptible to a 51% attack as P2Pool is decentralized.

PPLNS Payout System

P2Pool uses a PPLNS (Pay Per Last N Shares) payout system which awards miners more the longer they mine, sort of like a loyalty system. A drawback to this system is that part time miners that aren't 24/7 won't be able to earn that much.

2 Networks

While Network 1 is catered towards 24/7 miners and people who have dedicated mining rigs, Vertcoin has a second P2Pool network where part time miners and miners under 100 MH/s can go to mine.

Mines Directly to Your Wallet

P2Pool mines directly to your wallet and cuts out the middleman. This reduces the likely hood that the pool will run away with your coins.

No Downtime

Since P2Pool is decentralized and has different nodes for you to choose from there will be no downtime because the P2Pool network does not die if one node goes down. You can setup a backup server in your miner so that you will have no downtime when mining.

Anonymity and Security

When using P2Pool you use a wallet address making your real identity anonymous, you are simply known by a random 34 letter string. Along with using a wallet address instead of a username there is no password involved P2Pool preventing the possibility of cracking your pool account (If you were on a traditional pool,) and stealing all your coins.

How do I Find a Nearby P2Pool Node

You can find the public p2pool nodes the the P2Pool Node Scanners. If you want to find a network 1 node go here. If you want to find a network 2 node go here.

How do I setup a P2Pool Node?

Linux P2Pool Setup
Windows P2Pool Setup (Text)
Windows P2Pool Setup (Video) This guide setups a network 2 node. When downloading Python download the 32bit version, not the 64bit. Downloading the 64bit version causes problems with the twisted install.
How do I setup a change my node to network 1 or network 2?
In the P2Pool startup script when you type the --network flag add vertcoin1 for network 1 and vertcoin2 for network 2 right after.

How do I Buy Vertcoin?

You can see a video guide on Youtube, "How to Buy Vertcoin with Fiat Using Bittrex and Coinbase"

How can I get help with "X problem?"

The quickest way for you to get help is for you to join the Vertcoin Discord Group. We almost always have knowledgable Vertans, whether that be developers or experienced Vertans, online to help you with whatever problems you may have.

How can I donate to the Developers?

You can donate to the dev fund at https://vertcoin.org/donate/. You can select what you want your funds to go to by donating to the corresponding address. You can also see how much funding is required and how much we have donated.

Where can I see what exchanges Vertcoin is on?

You can see what exchanges Vertcoin is listed on at CoinMarketCap. You can see what exchanges Vertcoin has applied to be on at this google docs spreadsheet.

Where can I see Vertcoin's Roadmap?

The Vertcoin developers currently have a trello board where you can see the goals and what the status of said goal is. You can also vote on what you want the Vertcoin developers to focus on next.

What is the Status of the AMD Optimized Miner?

The AMD Optimized Miner internal beta is aiming to be ready by the end of September. The AMD Optimized Miner is currently being developed by @turekaj on the Vertcoin Discord. He currently does not have a Reddit account and Discord is the only way you can contact him.

What Does Halving Mean?

Halving means that the block reward for miners will be split in half. Halving happens around every 4 years for Vertcoin or 840,000 blocks. This means around December miners will only receive 25 VTC per block instead of the current 50 VTC per block.
If you would like to add another question to this list please comment it and I will get around to adding it ASAP.
submitted by asianboygames to vertcoin [link] [comments]

Lisk Highlights Weekly roundup March 9th 2019. The week in which a Lisk Sidechain Project became a Founding Member of a Brussels-based Blockchain Organization.

Hello everybody. The LISK project and it's enthusiasts are always busy, and this week past has certainly been no exception.
Seeing is believing, so here is a recap of the highlights and interesting items from the past week on the LISK subreddit and beyond.....
 

Lisk, Hong Kong Future and Costa Rica Past.

Asia Crypto Week is fast approaching (11-17th March) and blockchain/crypto enthusiasts and industry veterans are preparing to gather together, share their knowledge and nurture mass crypto adoption. Among the events taking place on March 15th will be a meetup at the University of Hong Kong catering to the University's Blockchain Club and anyone else that might be in the area and interested in all things blockchain. Lisk is co-hosting the event in collaboration with 9up.io, who are a group of blockchain enthusiasts based in Hong Kong and who also are a prospective Lisk delegate. Max Kordek, Lisk's Co-Founder and CEO, will be the main speaker at this event on the 15th March, as he will be in town from the 10th to 15th for Asia Crypto Week and Token 2049.
Tickets for the event can be secured HERE. Hong Kong has been a strategic position in the blooming Blockchain industry in recent years, so I will be interested to see what emerges from this meetup and indeed Asia Crypto Week as a whole.
 
Now from the future to the past, and the TicoBlockChain 2019 conference in Costa Rica this past month. Lisk Central America have linked us up with a Stylish Montage Video of the event with interview snippets interspersed within. Software Architect, Jake Simmons, represented LISK Central America with his presentation on 'Scaling blockchain horizontally with Lisk'. Jake's presentation took part in the midst of the conference's speaker collection of lawyers, developers, educators, banking executives, investment professionals, their keynotes, panel talks and fireside chats.
For those of us who could not make the trip we have Lisk community member illuciferium to thank for filming Jake's presentation and uploading it to Youtube HERE. You can also see Jake being interviewed at the conference by Ricardo Barquero, Nimiq Community Manager in this VIDEO. Well done all!
 

Lisk Support Adds a Meetup Map.

LISK support and TonyT908 are back with a new way for Liskers to visualise all the upcoming meetups and events related to the project. The Events Map is a more visually exciting way to discover all the upcoming events around the globe rather than reading through reams and reams of text. When you are ready to delve more into the details of a particular meetup then you can visit the official Lisk Events page to read further details.
Special thanks should be given to Global Delegate Team (GDT) for their guidance to TonyT908 and for providing the funds necessary to license to mapping software. Edward Trosclair AKA StellarDynamic came up with the original concept, so he should take a lot of praise also. Great work all round, folks.
 

Lisk Sidechain Project Knows the Key is to Stand Out from the Crowd.

Chief R&D Officer and Co-founder of GNY (bringing Machine Learning to Lisk), Richard Jarritt informed the project's followers on the GNY telegram that "only by having a platform that is the first to crack machine learning on chain is how we can differentiate ourselves from the countless projects in our space". He continued, "I look at the whole crypto space and at the moment having working code is key, that is the drive here".
So on to the coding and Machine learning integration, how is that going? Well, this week Leo Liang, Head of Blockchain for GNY will be presenting the coding solution for how information is read by the machine learning off the chain. The GNY team always has tech meetings on Tuesdays to present the work that has been done the week previously, where they update each other on progress and then set the next task. Upcoming shortly for the team will be a demo of how the read function and Machine learning are running together and moving onto the reply function.
The GNY Github is due to go live by the end of this month, following an important GNY staff conference in London. It's going to be an exciting month and I am really looking forward to it.
 

Lisk Sidechain Project becomes a Founding Member of a Brussels-based Blockchain Organization.

On the 6th of March the MADANA project were one of the 105 companies, startups and organizations that came together to found INATBA. The International Association for Trusted Blockchain Applications (INATBA) which will be a Brussels-based organization working to make blockchain more accessible, safe, and usable for everyone. This was an initiative of the EU commission and the Directorate General for Communications Networks, Content and Technology or "DG Connect", whose responsibility is managing the Digital Agenda across Europe. It is hoped that this will now allow projects in the blockchain and distributed ledger technology eco-system have access to a global forum to interact with regulators & policy makers.
 
Next up for the INATBA is its first General Assembly on 3rd April where the 105 founding members will hopfully be joined by fresh additions to the memberlist. The INATBA website is now live at http://inatba.org and they have a "Join" page which is accepting applications for new members to join Madana and the likes of Iota, Cardano, Gnosis, and the Quant Network for the April 3rd launch!
 
That's it for the recap of the weeks highlights. I hope it brought you up to speed with all the weeks good news.
These highlight posts also go out daily on the….
LISK Highlights exclusive Telegram group
LISK Highlights Twitter
The highlights are also included in my weekly roundup on the LISK Highlights Medium account and the Bitcoin talk forum's LISK thread, so keep an eye out for them on these outlets also.
 
Keep the faith Liskers! 👍
submitted by John_Muck to Lisk [link] [comments]

Check out Part 1 of our first Skycoin Official AMA with Synth!

Part 2 of the AMA posted here.
 
What is Skywire? Where does it fit in with Skycoin?
Skycoin is a blockchain application platform. We have multiple coins in the platform (Metallicoin, mdl.life, solarbankers.com, etc). We let people launch their own blockchain applications (including coins).
There are two parts to Skywire. The first part is the Skywire node. The second part is the hardware.
Skywire is one of the first applications we are launching on the Skycoin platform. It is one of our flagship applications that has been in development for several years. Skywire is basically a decentralized ISP on blockchain. It is like Tor, but you are paid to run it. You forward packets for your neighbors and you receive coins You pay coins to other people for forwarding your packets.
So it is like Tor but on blockchain and you are paid for running the network. Also, while Tor is slow, Skywire was designed to be faster than the current internet, instead of slower.
Skywire is a test application for monetizing excess bandwidth. Eventually the software defined networking technology behind Skywire, will allow us to build physical networks (actual mesh nets) that can begin to replace centralized ISPs. However, the current Skywire prototype is still running over the existing internet, but later we will start building out our own hardware.
Skywire is a solution for protecting people’s privacy and is also a solution to net neutrality. If Skycoin can can decentralize the ISPs with blockchain, then we wont have to beg the FCC to protect our rights.
Skywire is just a prototype of a larger system. Eventually we will allow people to sell bandwidth, computational resources and storage.
On the hardware side, the Skywire Miner is a like a personal cloud, for blockchain applications. It has eight computers in it and you plug it in and you can run your blockchain applications on it. You can even earn coins by renting out capacities to other users on the network.
 
How would your everyday, average Joe user access the Skywire network? Let's say from their phone…
We designed Skywire and Skycoin to be as usable as possible. We think you should not have to be a software developer to use blockchain applications.
Skywire is designed to be “zeroconf”, with zero configuration. You just plug in your node and it works. Its plug and play.
Eventually you will be able to buy a Skywire Miner and delegate control of the hardware to a “pool”, who will configure it for you and do all the work, optimize the settings and the pool will just take a small fee for the service and owner of the hardware will receive the rest of the coins their miners are earning.
You will just plug in the Skyminer and start earning coins. It will be plug and play.
Most users will not know their traffic is being carried over Skywire. Just like they do not know if they are using TCP or UDP. They will just connect their computer to the network with wifi or an ethernet cable and it will work exactly like the internet does now.
 
Are you completely anonymous on Skywire, or do you need to add a VPN and go through Tor for extra protection?
Skywire is designed, to protect users privacy much better than the existing internet. Each node only knows the previous hop and the next hop for any packet. The contents of the packet are encrypted (like HTTPS), so no one can spy on the data.
Since Skywire is designed to be faster than the existing internet, you give up a little privacy for the speed. Tor makes packets harder to trace by reshuffling them and slowing them done. While Skywire is designed for pure speed and performance.
 
Will Skywire users be able to access traditional internet resources like Google and Facebook over Skywire?
Yes. Most users will not even know they are using Skywire at all. It will be completely invisible to them.
Skywire has two modes of operation. One mode looks like the normal internet to the user and the other mode is for special applications designed to run completely inside of the Skywire network. Skywire native apps will have increased privacy, speed and performance, but all existing internet apps will still work on the new network.
 
How difficult will it be for a traditional e-service to port their products and services to Skywire / Skycoin? Are there plans in place to facilitate those transitions as companies find the exceeding value in joining the free distributed internet?
We are going to make it very easy. Existing companies run their whole internal networks on MPLS and Skywire is almost identical to MPLS, so they wont have to make any changes in most cases.
 
What is the routing protocol? How are the routes found?
Skywire is source routed. This means that you choose the route your data takes. You can chose routes that offer higher privacy, more bandwidth (for video downloads) or lower latency (for gaming).
Skywire puts control of the data back to the user.
 
I have also understand that the protocols underlying in skywire will be/already are pretty different from the Internet protocols. Taking into account the years of research applied to the current Internet and the several strategies for routing it doesn't seem an easy task to rebuild everything and make it work. Where can be found the information about the routing strategies used in skywire?
The routing strategies are user defined. There is no best routing strategy that is optimal for every user or application. Instead we allow people to choose their routes and policies, based upon the application, time of day, available bandwidth, reliability and other factors.
This is actually the way the original internet worked. However, it was scrapped because of the RAM limitations of early computers which only had 4 KB of memory. So the internet was built upon stateless routing protocols because of the limitations of the available computers at the time, not because the networking protocols were the best or highest performance. Today even a cell phone has 4 GB of ram and 1 million times the memory of a computer in the 1980s, so there is no reason to accept these limitations anymore.
Our implementation is simpler and faster because we are stripping away the layers of junk that have accumulated. The internet was actually built up piecemeal, without any coherence, coordination or planning. The internet today is a mishmash of different ad-hoc protocols that have been duct taped together over decades, without any real design.
Skywire is an re-envisioning of the internet, if it was built today knowing what we know now. This means simplifying the protocols and improving the performance.
 
How will the routing work if someone from Europe wants to access a video from a node in Australia (for example)? How do the nodes know the next hop if they cant read the origin or destiny of any packet?
If you have a route with N hops, then you contact each of the nodes on the route (through a messaging service) and set the route table on each route. Then when you drop a packet in the route, it gets forwarded automatically. You could have 60 or 120 hops between Australia and Europe and its fine.
Each individual node only knows the previous hop and the next hop in the chain. That is all the node needs to know.
 
Could you estimate a timeline for when Skywire will operate independently from the current ISP infrastructure?
I think Skycoin is a very ambitious project and some parts could take ten or twenty years. Even if we started with a network of a few thousand nodes and we were growing the network over 1% per day, it will still take a decade or two to conquer the Earth.
We are going to start with small scale prototypes (neighborhoods), then try cities. I think the first demonstration networks will be working this year.
 
How will bandwidth be priced in terms of coin hours and who determines this rate?
You could have 40 PHDs each do a thesis on this. The short answer is that an auction model has to be used (similar to Google’s Ad Words auction model) and the auction has to be designed in a way so that the bandwidth prices reach a stable equilibrium.
There are parts of Skycoin that are completely open source and public, like the blockchain and consensus algorithm and Skywire. There are secrets like the auction model and pricing, that are designed to protect Skycoin from being forked and to prevent competitors from copying our work.
We estimate that if a competitor was to start today, with 2 million dollars a year in R&D, that it would take them a minimum of eight years to develop a working bandwidth pricing model. And from experience in auction models for advertising networks, 80% of the competitors will fail to develop a working model at all.
A working, fair, decentralized bandwidth pricing model that was competitive with what we have would take even longer. There are very few people (less than 4) on Earth who have the experience in mathematics, economics, game theory and cryptographic protocols to design the required auction and pricing models.
One of Google’s secrets that allows them to dominate the internet advertising industry, is their auction model for ad pricing. That is what allows Google to pay the content producers the most money for their advertising inventory, while charging the advertising buyers the least.
Google’s auction models for pricing AdSense inventory are even more secretive and important than Google’s search algorithm. This is one of the most important and secretive parts of Google’s business. Even companies like Facebook, with billion dollar war chests have been unable to replicate to close the algorithm gap in this area. Expertise in these algorithms and their auction and pricing models is one of the reasons that Google has been able to extract advertising premiums over Facebook.
Even if a competitor raises a billion dollars and hires all the PHDs in the field and they had ten years to do research, I doubt they would be able to develop anything close to what we have now.
The history of bandwidth markets is very interesting and Enron tried to do a trading desk for bandwidth and bandwidth futures and it completely failed. The mathematical stability and predictability of the pricing of bandwidth under adversarial conditions is one of the major problems.
For instance, one of our “competitors” suggests that people will be paid coins if someone accesses their content. So why don’t you just put a website and then have 2000 bots go to it, to get free coins! How are they going to stop that.
Or if they are pricing bandwidth, if the price is fixed and the price is too low, then people will not build capacity and bandwidth will be insufficient and the network will be slow.
Or if the price is variable and adjusts with demands, what will stop someone from buying up the capacity for a link (“Cornering the Market”) to drive the price up 50x on links they control and extort money out of the other people on the network with a fake bandwidth shortage?
The pricing algorithm has to be stable under adversarial conditions. It is a very difficult problem, harder than even consensus algorithm research. Even if a competitor had unlimited funding and unlimited time, it is unlikely that they would find a superior solution to what we have and that alone nearly guarantees that we are going to win this market. It gets even more difficult if you need price stability and you admit any type of bandwidth futures, that allow speculation on future prices. This is a kind of problem like Bitcoin consensus algorithm that can only be solved by an act of genius.
We have a lot of experience in this area. It is hyper specialized and a very difficult area and is one of the areas that will give Skycoin a strong sustainable advantage.
 
Will there be a DNS for Skywire to register .sky domains?
Of course. We will definitely add some kind of DNS and name system eventually.
Remembering and typing public keys is too difficult. We want to make it as easy as possible. We want people to be able to register aliases (like screen names) so that people can send coins to aliases instead of having to type in addresses every time.
This will let people send 5 Skycoin to “@bobcat” instead of sending coins to “23TeSPPJVZ9HvXh6iYiKAaLNQroKg8yCdja”. This will be a revolution in usability.
 
When operating a Skyminer, will people in my surrounding area see it as a Wifi option on their devices?
You can configure it to expose a wifi access point. It depends on what you are trying to do.
 
While I plan on running a DIY miner regardless of the payout, will one of the first 6000 DIY miners built to the same spec as the official miner receive a worthwhile payout in Sky coin? What is the requirement for a DIY miner to get whitelisted (and earning Skycoin) on the Skywire testnet?
The reason we have white-listing on the testnet, is to stop too many nodes from joining the network at once. The network can only support so many nodes until we upgrade certain infrastructure (like the messaging/inter-process communication standard).
Eventually, all DIY miners will be whitelisted, but there will probably be a queue.
 
The Sky team is developing antennas by their own instead of buying or using technology already developed, why is such an effort necessary?
You can of course, buy any commercial antenna or wifi system and use it for Skywire.
We are developing our own custom antennas, to push performance limitations and experiment with advanced technology, like FPGAs (Field Programmable Arrays) and SDR (Software Defined Radio).
Existing wifi has a huge latency (15 milliseconds per hop). We need to make several modification to get that down to 0.5 millisecond per hop.
We have several custom PCB boards in development. We have a few secret hardware projects that will be announced when they are ready.
For instance, the Skywire Miner was in development for two years before we publicly announced it. Some of our next hardware projects are focused on payments at the point of sale and improving usability, not just the meshnet.
 
So back in January Steve was asked a question in the skywire group: "Steve, I am not a tech savage, so how can I understand better the safety running a miner if people on the network do DeepWeb stuff? So i will receive and redirect data packets with crazy things and also there is around 128 GB of storage on my miner. How can i have peace of mind of that?" He replied with "If you don’t run an exit node to the open internet it won’t matter you can run relay nodes if you’re worried about it, or proxy specific content." This seems to goes counter to what you mentioned regarding end-to-end encryption with Skywire. Will some people only be relay nodes and some will be exit nodes as well?
I think the question is wrong.
You only store content for public keys that you explicitly subscribe to.
This means if you do not like particular content or do not want it on your hardware, then you can just blacklist those public keys or don’t subscribe to them. Data never goes on your machine unless you requested it.
If you are holding data for a third party such as forwarding packets, it’s always going to be encrypted, so will look like random noise. There will never be anything in the data that causes legal liability. It will look the same as the output of a random number generator.
 
If using the skyminer, how much bandwidth will be necessary to run it at its best? And what about the router? It's true it has only 100mbits output? Is a 1gigbits connection necessary to reach toprates?
Hold on!!!! Let us get the software and test net running first, lol. We will know once we know what works for the testnet.
 
What will the price be for future Skynodes (formerly called Skyminers)?
We are working on ways of reducing the cost, such as by buying our own factory, doing custom PCB boards and using different materials.
The cheapest Skywire Miner node will be about $30 for a single node miner. We will have a very cheap personal Skywire “hardware VPN” node also.
The miners we are shipping now are for powering the network backbone and have 8 computers and are about $800 each. We sold people the miners for 1 BTC each so they can support development, but gave them a Skycoin bonus equal to about 1 BTC worth of Skycoin.
Then that money, went to fund the cost for developing the newer hardware.
submitted by MuSKYteer to skycoin [link] [comments]

Q&A series v. 1.0

Building Whalesburg
We are getting questions from investors and bloggers who are not professional miners. They know in common words what it means, what hardware miners use but are not so familiar with numbers of this field. We regularly get questions how much profit Whalesburg will bring to our customers. So we decided to write a post which explains the basics of mining ROI.
This article is not for skilled miners; some details are not covered here!
What is typical ROI in mining, how Whalesburg will improve it?
Mining ROI hardly depends on the hardware you use (GPU or ASICs), cryptocurrency prices, network difficulty, hashrate and other variables, which changes over time. It means that real data may hardly differ from those provided in this article.
Let’s refer to a well-known website Cryptocompare.com on the page of Antminer S9 (https://www.cryptocompare.com/mining/bitmain/antminer-s9-mine). This website is quite popular and has an API used by thousands, so the data seems to be trustworthy. It tells that the price of a single piece of S9 is $2,725, its power consumption equals 1,375W, return per year is $3560 (incl. electricity costs) and ROI equals 130%.
This way you will get $3560 — $2725 = $835 net income at the end of the first year if variables below will remain same. The second year will bring you $3560 more. Note calculations was made using price of 1 BTC = $10516, electricity price $0.12 per kW/h and network difficulty = 18,633,837 PH/s.
Now let’s take a look at whattomine.com website on SHA 256 algorithm: screenshot is in a Medium post
As you can see, there is an option to mine UNIT which more profitable than BTC by 31% (!!!). So switching some of the pool’s hashpowers to this coin and converting UNIT to BTC on the fly could increase miners profit. This is the main concept of Whalesburg smart mining pool.
There is another problem — low UNIT’s network hashrate which can prevent this coin being such a profitable one if we will switch all our powers to it.
We are developing an algorithm which will vary hash powers among new coins and split profits between all participants. So, if someone will mine COIN1 with 130% BPR (BTC Profit Rate) and other will mine Bitcoin with 100% BPR — each of them both will get 15% more profit than just mining BTC. A module which responds for payouts will convert them to BTC by intent and split rewards among participants with PPLNS method.
Same picture we can see on other algorithms. For example our MVP use Ethash: screenshot is in a Medium post
Will your partners who are mining hosting companies hold WBT or they will propose Whalesburg to their clients?
All partners will have a will to hold WBT tokens for their clients, and they agree to such terms. The fee of 0,45% is cheap; additionally, they get a monitoring tool built to fulfill their needs. It is a win-win deal. Clients of our partners are investors, not IT geeks. They don’t need to hold these tokens to see increased ROI in reports. We offer services to any size mining facilities. They will want to hold our tokens and use our software. Can you make some more concrete arguments in favor of Whalesburg regarding time-saving and increased ROI?
Time-saving:
Now miners need to set a bunch of tools like EthMiner, Autominer, Claymore, Afterburner, and others. We incorporate all this functionality in one. Miners need to analyze the profitability of dozens of coins, look for good pools, create and run a .bat or .sh file to stop/run miners. They need to understand this all! Miners need to monitor the state of their hardware manually, and if something happened (drops of hash rate), they need to become a hardware doctors and to heal their farms. Let me tell you a story. Miner has a mining rig built with 8 GPU cards. He mines ETH with X MH/s. Suddenly he finds that hash rate become 0.6X MH/s — this is a 40% drop!!! But all the cards are working, responding at the same delay and have the same hash rate which is (0.6X)/8 MH/s. So Miner takes out GPUs one by one and restarts this rig until he founds one GPU card which causes a problem. He replaces this card with another one, and his rig’s hash rate returns to X MH/s. He still doesn’t know what is wrong with his GPU card. The Whalesburg monitoring tool can prevent failures and diagnose problems automatically and notify Miner. Even try to heal it disconnecting card programmatically.
Return rate:
A long time ago we experimented with my friends who own mining rigs and who were mining ETH. We’ve chosen most popular “smart mining pools” like Nicehash, Miner gate, suprnova.cc and solo mining mode with Claymore miner. The last mode was to mine with Whalesburg proof-of-concept solution — it was EthMiner + Autominer which connects to a pool of the most profitable coin among EtHash algorithm. So we connected five mining farms of the same hash rate to each of these modes and start to gather live statistics. A week was gone, and we calculated profits, rates, metrics: Lowest was solo mode mining with Claymore (obvious reasons — low hash rate, high difficulty). And still it brought to rig owner around 80% to average experiment income; Then go Nicehash and Minergate with 90% of average income, and both more-less were looking similar. Suprnova.cc was the best among all the previous and gave 115% of average experiment income. Whalesburg.com chart was hopping from one coin to another frequently at the start, then it stabilized and showed 125% of average income.
Why we generate more profits, strong part:
The first server-side auto-witching algorithm. The one in the world — all other smart pools leave this to a clients side. Transparent fees. Blockchain-based accounting shows we are not hiding a penny and using actual exchange rates. We have more Ethash coins already, at the start. We have other architecture that other mining pools, the proprietary software we coded our own from scratch. To be confident we can promise at least +15% income to whatever they use now.
Weaknesses:
Whalesburg is in the early stage. We have just released an MVP. Our pool’s hashrate on start will be low comparing to the biggest pools on the market. This is what we need to work out, but it will be easy.
Whalesburg team
Join telegram chat: https://t.me/whalesburg
Test our MVP: http://pool.whalesburg.com
Stay tuned!
submitted by whalesburg to Whalesburg [link] [comments]

Bitcoin Mining: Everything you need to know

Bitcoin mining is a term that everyone in the cryptocurrency and even many outsiders are familiar with. This is a process performed by high-powered computers (also known as nodes), which solve complicated computational math problems.
While distinct, there are certain similarities between bitcoin mining and actual mining for precious metals such as gold, for example. Both processes are carried out with the intention to earn a reward.
Furthermore, bitcoins actually exist in the bitcoin protocol but they haven’t been brought out yet – just as gold exists in the ground but it hasn’t been mined yet.
But the aim of bitcoin mining is, however, twofold. For once, when the above-mentioned high-powered computer or any other type of mining hardware, for that matter, successfully solves the complex math problem on the network of Bitcoin, they produce a new bitcoin.
On the other hand, by solving the computational math problems, bitcoin miners are actually making the payment network a secure through the proof-of-work consensus algorithm.

WHY IS BITCOIN MINING NECESSARY?

In order to break down bitcoin mining, there are a few important considerations that need to be taken into account.
Consumers tend to trust different types of printed fiat currencies because they are backed by central banks. In the US, for instance, this is the Federal Reserve. This is even true for digital payments made with fiat currencies.
Bitcoin, however, is not regulated by any central authority. It can be said that it is ‘backed’ by the computing power, which secures the network. This vast network of computers and mining hardware records transactions and make sure that they are accurate.
Unlike central authorities, however, bitcoin miners are spread throughout the entire world and record the transactional information on a public ledger available to anyone. This ledger can be viewed using a block explorer and there are many different websites that provide this service.
In other words, bitcoin mining is necessary for two different reasons – first, it is needed to create new bitcoin and second, it’s needed to confirm the transactional information. So, in theory, if you don’t want to buy Bitcoin, you can earn it through mining. Whether or not that’s efficient for you as an individual miner, however, is a different story.

HOW DOES BITCOIN MINING WORK?

In order for a bitcoin miner to get block rewards, there are two conditions which need to be met. First, the miner needs to confirm a certain amount of transactions and second, which is the trickiest part, solve a complex computational math problem.
Put simply, if that’s at all possible, each miner is competing with all of the others to come up with a 64-digit hexadecimal number which is referred to as a “hash” which is less than or equal to the hash which is targeted. In other words, the computer will be spitting out different hashes at a certain rate per second guessing all of the possible 64-digit numbers until they reach the correct solution.
Therefore, computational power is essential – the more powerful your mining equipment, the larger hash rate per second you’d be able to achieve. This is why the Bitcoin mining hardware is particularly important. Naturally, the cost of mining would be based on a the operation costs such as electricity, internet connection, hardware maintenance, and so forth.
This is the main reason for which back in 2013 bitcoin miners started to use machines which were specifically designed for mining cryptocurrencies. These are called Application-Specific Integrated Circuits or ASIC mining, for short. ASIC mining devices can cost a serious amount of money but are more efficient than traditional computers.
There are a few important things to be considered when it comes to BTC mining. These are some of its pillar components, so to speak.
  1. Blocks
One of the things to be aware of in the world of Bitcoin mining is blocks. Transaction data is recorded in files which are called blocks. Think of it as a page from your city’s recordbook. Blocks are organized into a chain in chronological order – hence, blockchain. New transactions, as they are being confirmed by miners, go into new blocks, with each new block is being added to the end of the chain. This is why blockchain is also referred to as records of blocks.
  1. Block Rewards
Is Bitcoin mining profitable? This is probably the most commonly asked question. Unfortunately, there is no one answer. Block rewards are what miners compete for. Other cryptocurrencies such as Bitcoin Cash, for instance, also have their own block rewards which differ from those of Bitcoin.
At inception, every single bitcoin block reward was worth 50 BTC. However, the protocol works in a way where the block reward is being halved after 210,000 blocks have been discovered. This takes roughly around four years to complete. As of July 9th, 2016, the reward for discovering one block is 12.5 BTC.
So is Bitcoin mining profitable? It depends. One would have to calculate the current block reward based on the current prices and compare that to the cost of mining, which varies from miner to miner.
It’s worth noting that the reward for successful Bitcoin miners will drop once again in May 2020 and it will decrease to 6.25 BTC per block from the current 12.5.
  1. Hash Rate
To put it in the most basic terms, hash rate represents the speed at which bitcoin mining hardware can guess the correct hash. Therefore, the faster your hash rate is the higher the chances of discovering the new block you have. BTC mining has become highly competitive and, as such, you need to consider getting powerful bitcoin mining hardware. Individual miners, can, on the other hand, take advantage of cloud mining or mine a coin with lower difficulty, but more on that later.
  1. Difficulty
The difficulty of bitcoin mining is adjusted frequently in order to maintain an average time of about 10 minutes to process a block. The rate is recalculated every 2,016 blocks.
In case you wonder why ten minutes – it’s because bitcoin developers have decided that this is the time needed for a steady and diminishing flow of producing new coins.

WHAT IS A MINING POOL

When it comes to cryptocurrency mining, a mining pool is the combined resources by miners who are sharing their overall computational power over a network in order to split the reward equally based on the amount of work that they have contributed to discovering a new block.
A “share” would be awarded to each member of the mining pool who manages to present a valid partial proof of his work. Mining pools became popular as the difficulty of bitcoin mining increased over time and when it became apparent that individual miners could no longer compete with bigger pools and large-scale mining operations.

WHAT IS CLOUD MINING

Cloud mining, on the other hand, is what allows individual miners to participate in the process without having to purchase particularly expensive bitcoin mining hardware.
If you want to take part in BTC mining but you don’t want to spend the time and resources to get powerful machines, you can use shared processing power provided by remote data centers. The only thing you’d need is a home computer. Generally, there are three types of cloud mining that you can take advantage of. These include:
  1. Hosted Mining
You can lease a mining machine which is hosted by the provider.
  1. Virtual Hosted Mining
This is a method which would require you to create a virtual private server and after that install your own mining software.
  1. Lease Hash Power
Cloud mining also allows you to lease a certain amount of hash power without having the best bitcoin mining hardware. This is likely to be the most popular method of all. Most of the providers offer comprehensive calculators that you can take advantage of to determine the current profitability based on the resources you are ready to spend.
However, it’s important to pay special attention when it comes to cloud mining as there are fraudulent service providers. It’s crucial to make proper and in-depth due-diligence, especially if you intend to lease hash power. One of the largest cloud Bitcoin mining companies out there is Genesis Mining.

ENERGY CONSUMPTION: THINGS TO BE AWARE OF

Mining bitcoin is intentionally designed to be energy intensive. The computational power needed to solve the abovementioned complex math problems requires a lot of electricity to power up the specialized mining hardware.
On the flipside, it requires even more resources to attack the network than to defend it, making Bitcoin the most secure blockchain today.
In fact, there is an entire pseudo-environmentalist brigade which aims to have the regular user believe that Bitcoin mining would somehow be the death of the planet. A lot of their arguments revolve around the fact that large data centers used for carrying out the math computations use tremendous amount of electricity. However, Bitcoinist recently outlined three reasons for which this rhetoric is complete nonsense.
According to clean energy researcher Katrina Kelly-Pitou, the entire debate on the overall electricity consumption by bitcoin mining facilities is headed in the wrong direction. The research outlines that electricity consumption can increase while, at the same time, have minimal impact on the environment. This is because those facilities gradually begin to use more efficient, sources of energy which are renewable. Not only does this make mining more profitable, but it also lowers the impact on the environment. The researcher also outlined that banks use three times more electricity than Bitcoin’s network.
What is more, a brand new report concluded that 80 percent of Bitcoin mining is running on renewable energy. This is unsurprising since miners are naturally incentivized to seek the cheapest and cleanest sources of energy, many of which are renewables such as hydroelectricity (e.g. Iceland).
If you’re worried about Bitcoin consuming too much energy, you might want to think twice about lighting up the Christmas lights this year. That’s right – the lights that American consumers alone use to decorate their homes for the occasion make up a gigantic 6.63 billion kilowatt hours of electricity consumption every single year. That’s more than the entire national energy consumptions of a lot of the developing countries every year. For example, both Ethiopia and El Salvador used less electricity per year.
However, if you decide to set up a mining rig in your garage, you can most definitely expect a more expensive electricity bill next month.

BEST BITCOIN MINING HARDWARE: THINGS TO CONSIDER

There are a few key parameters to look out for when it comes to choosing the best bitcoin mining hardware. These include:
Naturally, you want to be aware of how much electricity does your miner consume. The lower this number, the better.
As we explained above, the hash rate is essential for bitcoin mining. The larger this number is, the better the machine is, generally.
This measurement accounts for the efficiency of your machine. If this particular number is low, it means that the machine will consume less power for the same amount of work done by the machine.
There is a range of different devices produced by some of the largest companies in the field such as Bitmain Technologies, Canaan Creative, Halong Mining, Innosilicon Technology, and others of the kind.

WHAT ELSE CAN YOU MINE?

Bitcoin is not the only cryptocurrency which can be mined. It’s worth noting, though, that if you are using a specialized cryptocurrency mining hardware you’d have to check the compatible digital currencies, as some of the devices would only allow you to mine selected cryptocurrencies. However, apart from Bitcoin, other popular choices include Bitcoin Cash, Monero, Dogecoin, Litecoin, and so forth.

CONCLUSION

If you managed to make it thus far, you should have a general understanding of the main principles behind bitcoin mining and why it is essential to its network.
At the same time, bitcoin mining represents an alternative method to acquire the digital currency. Of course, if you don’t feel like investing time and efforts into it, let alone designating specialized bitcoin mining hardware, you can always check our detailed guide on to how to buy cryptocurrencies.
We’ve gone in depth on how to buy Bitcoin with Paypal, credit card, debit card, and even with cash. We’ve also covered some of the most popular platforms where you can buy Bitcoin.
Once you’ve done that, you can hop to our comprehensive guide to Bitcoin wallets and determine whether you want a web-based one or an offline, hardware solution instead.
submitted by SwitchKanun to hashflareinfo [link] [comments]

Staying Anonymous in a High Risk Activity (xpost from /r/ShadowWar)

👀
To preface this topic, I must state that I am not advocating any immoral activity. Also please note, that just because something is illegal, does not necessary mean that it must be immoral. Remember that the Civil Rights Act was not passed until 1964 - just over 50 years ago. Just because something is enshrined into law, does not mean that it is moral and just.
That said, there may come a time in your life where you decide that you must do something that is going to piss off someone with the means to hurt you. For the purposes of this Topic, let us pretend you have compromising files that detail illegal activity, and you want to release it onto the internet. The pressing question is, how do you release your content without revealing who you are and putting yourself and/or your loved ones in danger?
Let's do our best to come up with as many countermeasures as we can.
Why Become an Anonymous Whistleblower?
The government and/or your workplace will tell you that there is a Whistleblower program in place, and that you should make use of it if you witness any wrongdoing. You will need to use your own judgement, on whether to use this program, or if you should instead become an internet whistleblower. Every situation is different.
What I CAN say, however, is that it is in the nature of government to seek unlimited power. EVERY government in the world would eventually strip their citizens of all rights and control their every move and thought, IF they thought they could get away with it. Similarly, individuals and corporations (and yes, governments) will risk fines and jail time by doing something illegal, if they think that it is worth the risk of getting caught.
You see examples of this everywhere. One of the easiest-to-find examples is when a car manufacturer doesn't bother to fix a fatal defect because the cost of fixing it is greater than the cost of the lawsuits from the inevitable deaths (link). Even when they DO get caught, the penalty isn't even that bad because the fines are for some odd reason TAX DEDUCTIBLE.
When the government does something illegal, they KNOW they're doing something illegal. They just do it anyway because they can get away with it, and because they hide it well enough. When someone steps forward and says "hey, this isn't right!", the government's reaction is NOT to say "oh, that person is right, we should correct things and be sure to follow the law!" Instead, what they think is "oh no, this guy is going to tell on us, and if word gets out, then it will be a setback in our quest for power! we need to make sure our secret stays hidden! how do we go about doing that...?"
The answer is typically to threaten to ruin the potential whistleblower's life in some way. Maybe they get transferred to another department. Maybe they get fired for being 1 minute late. Maybe the whistleblower made the complaint official so they go for a gag order. Or maybe the problem is big enough that they hack their emails and start a smear and discrediation campaign. Sprinkle a little crack on them. Plant child pornography on their hard drive. Use their SSN and credit cards to ruin them financially. Or maybe they just put a couple bullets in them.
The government doesn't want you to right wrongs. The government just wants power. If you uncover illegal activity, you must determine if reporting the violation through official channels will actually fix the problem, or if you must do your best to raise a public stink about it. This also applies to corporations. Be wary of dealing with HR - they exist to protect the company, not you.
"It's Just Metadata"
When solid evidence of mass survillence was revealed, one of the arguments that the government used to try to downplay it is that they were not actually collecting message contents, but instead only collecting the metadata (sender, reciever, date and time, etc). First off, this is bullshit - they are obviously collecting the message contents too. Second off, METADATA IS FUCKING IMPORTANT. You can put together a pretty clear picture of exactly what is happening, just from metadata. Metadata is basically a smoking gun to the message or file contents.
The scary thing is, most tech-savy people - myself included - are not able to guarantee that they can clean ALL of the metadata from a file. And not only is metadata stored on the operating system level (on the "outside" of files), but the program that created the file in the first place probably has its own metadata INSIDE the file. And there's no way you can trust "metadata-cleaner-v0.6.exe" (now with the Ask toolbar!) to keep you out of jail.
You must assume that the original files that you copy and intend to leak, are littered with metadata that very very clearly identifies you as the leaker.
To combat this, there are several steps you can take.
  1. DO NOT leak the original untouched files. Certainly keep a copy of them, but original files might have your digital fingerprints all over it, and will put you at risk. Instead, copy or transcribe the contents, and place it into a new file, and be sure to do it on a computer that cannot be traced back to you or any of your accounts.
  2. Modify the contents of the file. When pasting text, you should strongly consider pasting the contents format-free (control-shift-v) (or use Notepad as an intermediary). Depending on how paranoid you are about this, also consider converting everything to upper-case or lower-case. If images are involved, resize them slightly. Also, especially if the image is a .jpg, save with a slightly reduced quality to introduce noise or to destroy "invisible" markers that the human eye cannot detect. Also be aware that documents might have deliberate variations, depending on the person who accessed them. This could be hidden in typos, punctuation, capitalization, even full words or sentences. The document you plan on leaking might actually be trapped.
  3. You must also consider who had access to the file? Are you the only one? Because if you are, then taking every precaution possible will not help you. Is it a limited group of people? You are going to be placed under a microscope. The more people that "could have" done it, the better. You need to be able to hide in a crowd of suspects - the larger the pool of suspicion, the better.
This is in no way a comprehensive list. The reality is, the offending organization has as many tools at their disposal as they can imagine. You must try to determine the level of risk yourself, and what the most likely countermeasures would be, and adjust your strategy to circumvent them. Be smart, and careful, and paranoid. And honestly, you should seriously consider using a journalist instead of doing this yourself.
There is also one more matter to be careful of... the actual file contents itself. You have to read it, and you have to determine if any innocent person would be put in danger if you leak the information. And then you must determine if leaking the document is still worth it.
Doing the Deed
There are a number of precautions that you can take when you need to remain anonymous for an online activity. Some of these are pretty basic. Others of these are more extreme. It is up to you to determine which measures are appropriate, to protect yourself from the risks you are about to take.
  1. Do not use any computer that is associated with you or anyone else you know. You should buy a laptop off of Craigslist. Do not use your real phone number, or real email address, or your real name, etc. When arranging to buy this laptop, you should ideally not be using your own computer or internet connection to communicate with the seller. Using your laptop with a Tails linux live CD in a coffee shop is typically secure enough though, for this particular activity. Buy the laptop using cash. Try to not give the seller any reason to remember you.
  2. Remove the hard drive from your newly acquired laptop. Only boot up on a Tails live cd. Read up on spoofing your MAC address. Never switch on the laptop at home, or use your home internet connection. Never connect to any of your personal online accounts using this laptop. Never use this laptop to browse the internet - your browsing behaviors could get the laptop/connection "fingerprinted" back to you. This is a "dark" laptop, and you should take every measure to keep it that way.
  3. I do not know if it is even possible to aonymously buy a burner phone in the United States. But if you absolutely need one, try to do it as anonymously as possible, using all of the other tips listed here, and then some. Use cash, avoid cameras, avoid local shops,
  4. Do all of your preparations offline. Only connect to the internet for the amount of time you need to perform your activity, and no longer. Every second you spend online increases your exposure and threat. This is very similar to the concept of military radios that transmit in encrypted bursts, to help prevent enemy interception and triangulation.
  5. Only use public hotspots, when you connect to the internet. And assume that every time you hop online, someone puts a pin in a map where you are. This means, do not use hotspots near your home. Do not use the same hotspot twice.
  6. Use TOR. It's not perfect, and I have my suspicious about government infiltration of the network. But it's FAR better than nothing. In addition, you should also use a VPN if you can. This is far more difficult though, since VPNs are generally not free. Check /VPN, for assistance in researching this topic though, I think there might be a few, albiet with limited bandwidth. If you need to buy a VPN, use bitcoin (/bitcoin), instead of your credit card. Reasons should be obvious enough.
  7. Avoid cameras, CCTV, and traffic cameras. This is especially difficult this day in age, but try to make an effort to anyway, without appearing suspicious. Maybe call off your upload / activity, if there were too many cameras. If your adversary is strong enough, you must assume that they will pinpoint the location you used, and long after you're gone, they might arrive on the scene to confiscate security footage from the surrounding area.
  8. Consider anti-facial-recognition makeup and clothing. Note, this only fools facial recognition software, and should only be used if circumstances warrant (aka, they already know who you are, and are looking for you). This type of behavior will INSTANTLY cause everyone around you to pay attention to you. A realistic silicon mask and makeup is probably a superior alternative, if you have access to that sort of thing, to make an old-fashioned disguise, but takes a bit more effort.
  9. In extreme cases, consider performing a surreptitious upload. For example, maybe you can leave your laptop in a bag, and have it automatically connect to a coffee shop's WiFi and perform a task and then disconnect, while you pretend to work on a paper, or chat up the cute girl with the glasses. If you are this worried though, you might be better off not even entering the building with the hotspot in the first place. If you need to put even more distance between you and your internet access, consider using a directional WiFi antenna. Naturally, you might want to build it yourself, as opposed to buying one on Amazon.
As you can see, possible methods for avoiding detection start to become increasingly ridiculous. Every measure has a countermeasure. You must determine the likely measures that will be used to find you, and focus on countering those. If you have the spare time, then take it a few steps further. But at some point, a budget for time, alabi windows, and resources avaialble to perform countermeasures start to become stretched thin.
Hitting The Fan
Despite being more careful than you thought humanly possible, there is always the possibility that will get caught. Maybe you leave your fingerprint on a spoon. Maybe a random camera catches your face. Maybe you brag about it on Facebook. Maybe your moment of doing the right thing was witnessed by a 192 megapixel camera with a wide angle lense, mounted on the bottom of a Cessna and flown in lazy circles around the city at an altitude of 8000 feet while recording everything within 30 miles, allowing law enforcement to rewind the footage to locate you at the scene, and then fast forward while tracking your movements to find out where you live.
I guess that last one was oddly specific... (link)
The point is, you need a plan for when things go south. Edward Snowden's plan was to fly to a country that doesn't have an extradition treaty with the United States. Most of us aren't going to need that extreme of a getaway plan, but picking a country you would flee to in such a hypothetical sitaution is amusing by itself. (Relavant Wikipedia Article)
Depending on the severity of your actions, it might be wise to leave the country BEFORE you publish your dirt. Make sure your passport is up-to-date, withdraw as much cash as you can comfortably / legally travel with, and transfer your remaining assets to a safe international bank. I'm not an expert on international finance, if you have enough assets you would likely want to speak to a lawyer to make sure your funds don't get frozen or confiscated.
For the rest of us who are not on the top of the international most wanted list, you may want to pre-plan a legal defense.
Or you could just take up a hobby. I hear handcuffing yourself in a duffel bag in your bath tub and padlocking it from the outside so you can practice escaping is a pretty fun and safe solo activity. (link)
submitted by primo_pastafarian to conspiracy [link] [comments]

BlockChain Enable a Quadrillion-Dollar Derivatives Market?

BlockChain Enable a Quadrillion-Dollar Derivatives Market?
https://preview.redd.it/iwewapkg8mz11.png?width=1024&format=png&auto=webp&s=9b52f51960172844af71917aec191dcfd6031bf9
CAN BLOCKCHAIN ENABLE A QUADRILLION-DOLLAR DERIVATIVES MARKET? IT’S A REAL POSSIBILITY. By 2028, the world economy has exploded with exponential economic growth. BlockChain is now the heart of commerce and trade. Investopedia’s valuation on the Derivatives Market now stands true at $1.2 quadrillion. And you are now very rich with your array of futures, derivatives and cryptocurrencies on hand. Isn’t this a nice possibility?
Now, imagine travelling back to 2018.
You are scrolling your news feed. The headlines show in 2017 alone, BlockChain startups have raised $1.2 billion worth initial coin offering (ICOs). ICOs enable startups, to raise money from the general public by allowing them to buy a stake in their business; which comes in a form of a token or digital currency. It looks like the public are beginning to understand the potential of cryptocurrencies and blockchain technology.
A Facebook notification pops up on your mobile phone. Your friend has posted an article on your Facebook wall. The article is about Ethereum, the hot new BlockChain technology that is creating even bigger ripples in the finance world than its predecessor BitCoin. It seems that Ethereum is now the birthplace of many decentralized platforms, which raise funds via ICOs. As more funds are raised, these platforms get better and this drives up the value of Ethereum. The top platforms are Golem, Augur, Basic Attention Tokens and Gnosis, which collectively ring in $1.27 billion in market value. The amount of money that has been invested into Ethereum based BlockChain technology shows that people see Blockchain as the future of commerce and finance.
This all sounds good and you’re ready to participate in a hot ICO. But as a possible new investor in an ICO based on the Ethereum blockchain, how do you get started? Which platform and ICO should you consider investing in?
  1. YOU WILL NEED TO GET A WALLET. Wallets are like digital bank accounts, they hold your tokens and other cryptocurrencies you plan to buy and hold. Most ICOs are built on Ethereum smart contracts and your Wallet has to support receiving tokens. In an ICO, you send currency (typically ETH or BTC) to the company issuing a new token and receive the amount of tokens based on the given exchange rate by the company. MyEtherWallet is one of the most popular Ethereum Wallets because it is linked to the BlockChain, has excellent security features, and best of all it gives you full control of your Wallet (unlike other online wallets that are controlled by third party companies). You can get MyEtherWallet here.
  2. RESEARCH EXTENSIVELY ON AVAILABLE ICOS As with any form of investment, you need to do your research and due diligence. Unlike the research on conventional investments that look at statistics, company performance, average daily volume and annual yield, ICOs require a different kind of analysis. Often times, millions of dollars are raised in ICOs with no product or company track record. Most traditional investors would not invest as the risk outweigh the gains from the investment. It feels like a gamble.
How then would you know if an ICO is worth investing into?
First of all, you would need to study its platform concept, market potential and sustainability for long-term growth.
Is it easy for users to adopt and understand?
Do the Founders and Developers of the platform have sound knowledge of economics, inflation, block size, fees, administration, security and human behavior?
Does the crypto-economic system have what it takes to be sustainable?
Who is the team behind the platform? Are they knowledgeable and experienced?
Is this a revolutionary or game-changing product that has massive market potential?
Take Level01 as an example. It is the World’s First Brokerless Derivatives Exchange in Partnership with Thomson Reuters. The concept is innovative, more importantly; it has an enticing proposition because it addresses gaps, issues and problems faced by traditional trading markets. This facilitates a stable, robust and potentially profitable investment eco-system. How so?
Remember Investopedia’s valuation of the derivatives market at a thrilling $1.2 quadrillion? This estimate is debatable because it needed to consider, “notional value”, versus actual market value. The lack of certainty on pricing and not having accurate market data can be frustrating. Brokers also charge a fee for both ends; buying and selling, which makes it expensive to participate in trade. In addition, not everyone relishes in the prospect of understanding financial data, terms and conditions. These factors are barriers to entry that reduces the pool of investors in the derivatives market.
The Founders of Level01 saw all these and sought to develop solutions that can make investing easy, transparent, secure and fair, by using the Blockchain and partnership with financial market leader, Thomson Reuters.
AN APP THAT MAKES ANYONE A BETTER INVESTOR Whether you are a first time investor or an experienced investor, the Level01 App will help you make better investment decisions, save time and get better at investing in the Derivatives Market. Its sleek interface, smart data feed and intuitive features are designed to fit all investor types to make the trading experience as easy as 1, 2, 3.
CHANGING THE GAME WITH ARTIFICIAL INTELLIGENCE When you log on, the Level01 platform, you will have FairSenseTM Artificial Intelligence on hand to analyze trade intent patterns of all users on the platform to find the best matches for you. Once a match is found, it employs its proprietary dynamic fair price-balancing algorithm to show fair pricing for both sides of the trade contract. This saves investors time, speeds up trade, and keeps inflation in check with fair pricing.
CREDIBLE AND RELIABLE DATA FEED FROM THOMSON REUTERS Level01 raised the bar further by collaborating with Thomson Reuters. They integrated and enabled live streaming real-time market prices for Forex, Index, Cryptocurrency, Commodities and Stocks directly from Thomson Reuters, a global leader for information and data sources for professional markets. Having a 150-year-old brand name like Thomson Reuters lends tremendous credibility to the data and keeps investors informed of actual value prior to the commencement of the trade.
AUTOMATED SMART CONTRACTS As if that was not enough, the Level01 is designed as an exchange and trading platform with a system of smart contracts that resolves trust, emotion and irresponsibility in an efficient, transparent, automated manner. These automated digital contracts saves time and money for investors so that they can concentrate on analyzing data and deciding on investments.
SUSTAINABLE GROWTH DRIVEN BY USERS You may be thinking by now, that is all well and good, but what are they doing to make this unique Derivatives Exchange sustainable and primed for growth? The designers of Level01 looked towards attracting quality investors by incorporating a fair rating system based on statistics and empowering them with the ability to add value to the network, and derive value for themselves. Level01 rewards users when they participate in the ecosystem. To make it even more enticing, the Level01 platform enables Trade Room Hosting, which allows users to earn commission. These lucrative set points are attractive to users who will jump on board and increase the liquidity base, which of course, benefits everyone.
BETTER FINANCIAL LIQUIDITY Sometimes being able to sell is as important as being able to buy. This means your assets and investments can be easily converted to cash. Level01 gives you full control over your own funds by allowing your deposits and withdrawals to be done instantly. You can also change the native platform LVX tokens between BitCoin and Ethereum for better financial liquidity.
WIDER FINANCIAL PORTFOLIO Level01 allows you to trade both traditional and cryptocurrency market assets to give you greater ease and freedom to plan a diverse portfolio to suit your needs whether you like to play it safe or take profitable risks.
DIVERSE AND EXPERIENCED TEAM An international team with accolades, achievements and awards helms Level01 Derivatives Exchange. There is a mathematician and data analyst, a software engineer and system architect, a highly ranked digital marketing specialist, an expert in corporate operations, a consultant in banking and finance, a key quantitative analyst consultant who over saw $25B AUM, a corporate strategist and brand planning expert and an inventor-CEO with a string of successes under his belt, including founding a successful public listed company in Australia.
GROWING INTEREST Level01 just begun but it is already making waves in the cryptocurrency and investment world. Forums and chat groups are buzzing with conversations as seasoned cryptocurrency investors hop on the bandwagon, eager to sweep up ICOs before the rest of the world notices. Coin Telegraph, which is the top news portal on cryptocurrency, described Level01 partnership with Thomson Reuters as a great game-changer that will allow general public to trade derivatives like a pro using big data previously only available to institutional traders.
Could this be your ticket to making your 2028 the best year ever? As if you invested in Google back in 2004. You can check out more about this upcoming platform here.
submitted by Level01Exchange to u/Level01Exchange [link] [comments]

Log of AMA with Skycoin

boldninja Let's all give a warm welcome to @synth from SkyCoin.net and for taking the time to do this AMA
synth *hello
mike Hi Synth
jakethepanda Hey @synth
thrice.pi Hey synth
dr10 Hi
boldninja I think we can start - you guys know the drill. Give him some time to respond (no more than 2-3 questions on backlog so he can catch up)
dr10 How would you - shortly & in easy words - sum-up the advantages of SkyCoin to magazines and non-crypto people?
mgaruccio Can you explain a bit about the mesh net? Is it just an mpls network between nodes or is there something deeper going on?
michaelthecryptoguy Whassup @synth
tranzer hi synth. I have a question - are those coins that are not in circulation in any cold wallets since only a portion is currently available according to CMC? What would you say is the 1 unique feature that Skycoin has?
synth It is very difficult, because Skycoin is a very large project and already has +6 years of development. Different parts of the project have different objectives.
The cryto, coin part is about solving the problems with the existing consensus algorithms. Being able to do +300 transactions a second, transactions in seconds instead of minutes (faster than credit cards), eliminating miners, eliminating block rewards (eliminating inflation) and eliminating 51% attack and the other problems with mining.
then there are other repos and experimental projects under github.com/skycoin such as a meshnet and distributed VPN prototype, where people will be paid coins for forwarding traffic. Also prototypes of distributed social media application, with peer to peer data replication and different experimental projects. Research into immutable data structures for next generation internet. Some of them are very radical.
dr10 How does the Network consensus algorithm Obelisk work and differ from widely known algorithms like Proof of Work and Proof of Stake?
mgaruccio So how much exists today? Could I build an app on the platform if I wanted to?
mike In terms of the rate of progress, what is currently your greatest limiting factor - like funding, manpower, currently available technology?
synth
Can you explain a bit about the mesh net? Is it just an mpls network between nodes or is there something deeper going on?
It is not actually a meshnet. It is software defined networking, it is much more powerful than just meshnet. Its a new type of networking and new completely new protocol and networking namespace, independent of the existing internet.
It supports source routing, while the existing internet does hot potato routing, so never achieves optimal latencies.
It supports multi-homing, which IPv6 does not (Which is critical for when we have gigabit or terabit networking and multi-redundant bandwidth paths)
It has default oppurunistic crypto, both link layer and end to end; so everything is encrypted by default, unlike the current internet.
It has store and forward networking and will operate in Africa or even under conditions where latencies are in the minutes or hours and packet loss is excessive. Where existing protocols cannot operate reliability. It is much more robust than IPv4/IPv6 or TCP/ip
It has improved privacy. If a packet takes a route that is 10 hops, each hop only knows the previous node in the route and the next node in the route. It is not like IPv4 where each packet gives the source and destination. The privacy level is something that does not exist on the current internet.
IP addresses are replaced by public key and no one can read traffic to a destination, without knowing the private key of the public key that identifies the destination. The system does not need 3rd parties or certificate authorities. The design is a revolution.
are those coins that are not in circulation in any cold wallets since only a portion is currently available according to CMC?
The coins are locked into 100 addresses, each with 1 million coins each. And they are released sequentially.
There is a complicated locking procedure and releasing new coins requires unamious consent and a shared secret among a group of developers. Anyone in the shared secret group can block distribution of more coins (to stop the problem that killed NXT). So by design the coins were supposed to be difficult to distribut, there had to be a good reason or justification before a distribution would be approved.
mike What are the hardware requirements to operate a wireless Skywire (the name for the protocol described above) Node?
arc-over-water nxt i think is doing ok..
synth
How does the Network consensus algorithm Obelisk work and differ from widely known algorithms like Proof of Work and Proof of Stake?
PoS and PoW use miners. Miners receive new coins every block as a block reward. So miners are making money and will fight to control the network. An everyone will suffer because the newly created coins represent inflation.
Skycoin was designed to eliminate mining and eliminate the inflation. No block rewards, no new coins. And we needed to develop a new consensus algorithm to do that and there are only a few methods that work, for these constraints. The consensus algorithm is based upon Ben-Or's randomization procedure for achieving consensus in a distributed system, with some improvements for detecting adversarial or malicious nodes who are trying to prevent the consensus process.
There are white papers on skycoin.net about the specifics. I would call it "network consensus" and it uses a sort of Web of Trust (WoT), where if the people creating blocks are doing a bad job or attacking the network, then the community can get rid of them. At the same time, the people who control the network, do not have any real power to attack the network except by slowing down transactions and being annoying, so even if they become malicious the only issue is how to get rid of them and select new people.
mike Any idea when Skywire will be released and ready to test on hardware nodes (testnet or mainnet)?
mgaruccio So if there is no block reward what is the incentive to run a node?
vega What will be the actual function of Skycoin (the coin itself)? Will the coin be used as currency, as transfer of value in and between all these various developing functionalities, semi-separate projects to tie them all together or it's function will be more limited?
michaelthecryptoguy Do you have an idea on the specs of a node that would be required? In the beginning? What about with 10,000 users? (edited)
synth
nxt i think is doing ok..
There were three people that each owned 30% of the coin. One decided he wanted out and began dumping. NXT was over 150 million I think. When he started dumping, it basicly killed NXT.
Skycoin's distribution was designed to stop dumping by the founders and early people.
After Skycoin gets to 30% of the total coins distributed, there will probably a hard time lock on the remaining coins, so that a maximum of 5% of the remaining coins can be released per year. So the distribution for the other 70% of the coins will take a minimum of 14 years (and could be longer).
We cannot even sell the rest of the coins, because if we sold 10% of the total now at $5 per coin, it would be 50 million or something and we cannot spend or even use that amount of money. Not at this stage.
Ethereum spent 30 million or 70 million in their first year or two after the ICO and then nearly went bankrupt. Silicon Valley wages and offices etc. We have been very conservative and have kept costs down and kept them responsible. Now we have coins like EOS and they want to raise a billion dollars and have not produced anything yet, do not hav a blockchain and I have no idea what they would spend that money on, but they are throwing $350,000 parties in time square for marketing/PR etc...
arc-over-water what prevents you from selling? anybody can spend that amount of money?
nxt is a newer platform than sky, market value is $220 million plus $166 million, I get what you are saying but the evidence is wrong. Community is huge and active in Nxt. But you say it is killed, i dont get it?
synth
What will be the actual function of Skycoin (the coin itself)? Will the coin be used as currency, as transfer of value in and between all these various developing functionalities, semi-separate projects to tie them all together or it's function will be more limited?
Yes. Bitcoin has no purpose. An altcoin does two things - check your balance - send money to other people
Two features - check balance - send
For a coin to have value, people need to be forced to buy it to consume specific services. There has to be stuff for people to spend the coin on, that there is demand for.
So Bitcoin is really just a purely speculative asset. It generates no cashflow and its value is determined by perception or social convention.
Ideally, Skycoin would start off as a "better Bitcoin" (faster, more secure, new algorithm, simplier, etc), then over time we would build up an ecosystem and have some type of backing and tie the coin's value into the network and usebase.
The mesh netork (skywire) is good, because it gives something for people to do to get coins and it allows people to consume the coins. You can run your internet traffic through a VPN that tunnels over Skywire and maybe it will be a nominal amount (actually absurdly small amount of money), but there would be real economic activity and a real userbase and community using the coin. Not just speculation.
Later on the scope is much wider.
arc-over-water So the skycoin wallet will be a VPN for our internet usage?
synth
nxt is a newer platform than sky, market value is $220 million plus $166 million, I get what you are saying but the evidence is wrong. Community is huge and active in Nxt. But you say it is killed, i dont get it?
What I am saying, is that NXT would be a lot further along than it is now and probably around where Ethereum is, except for that mistake in the distribution and keeping it too concentrated. It set them back by years. They did not consider what the impact on the price would be, over the long term, when one of the early whales started selling off or decided he wanted out.
arc-over-water But they did the same again with IOTA, same lead dev.. Its over a $Billion
they released and let the market price distribute
synth
So the skycoin wallet will be a VPN for our internet usage?
The VPN is just one application, that uses bandwidth over Skywire. There are several things in development.
This is a BBS like 4chan, that is completely distributed, with CXO. https://github.com/skycoin/bbs
It will run over Skywire also, This is like building a whole new internet from scratch. The apps that run on it are going to specialized and privacy focused, etc GitHub skycoin/bbs Contribute to bbs development by creating an account on GitHub.
mike So Skycoin is a Proof of Resource coin where its value is actually backed by provision of a useful service, in this case private and secure networking? Are there plans to add decentralized storage and even distributed processing to it?
arc-over-water so these 100 separate million coin accounts will be 100 ICOs or how is the distribution patterned? is it written into the code or up to the devs?
rockyj !calculate
slackbot Custom Response https://docs.google.com/spreadsheets/d/1FGo3FkC3uSWXGHatPQyny2brMWjAIJsHFCR-Lhkl_m0/edit#gid=0
synth
So if there is no block reward what is the incentive to run a node?
running a consensus node does not cost anything. You can run it on a raspberry pi.
The important thing is that if the people doing consensus are doing a bad job, that the community can get rid of them and replace them. The other important thing, is that they can be audited and determined automatically if they are obeying the protocol.
the miners in skycoin are not very powerful and cannot do anything except slow down transactions. They are unable to spend other people's money without their private keys, so the consensus/mining nodes are almost irrelevent. It is not like Bitcoin where the miners can hold the network hostage or act selfishly (driving up the transactions fees for their own personal benefit and delaying any innovations that would improve bitcoin for everyone, etc).
So Skycoin is a Proof of Resource coin where its value is actually backed by provision of a useful service, in this case private and secure networking? Are there plans to add decentralized storage and even distributed processing to it?
We have decentralized storage, which is called CXO. But only the bandwidth is monetized by Skywire. We do not nickle and dime and try to attach a coin cost to every API call. Everything that should be free is free. So its a different philosphy.
On top of CXO we also have distributed social media applications (simmilar to Steemit)
CXO is very similar to IFPS, but simplier and designed for our internal infrastructure and with our crypto standards, instead of being a mismash.
mike Is it possible for Skycoin to choose the best paths and route around bad or slow nodes as damage to the network, in effect reducing their impact on consensus?
looks like you answered the question above while I was typing...
tranzer How many tx/s can skycoin handle? What are block times?
thrice.pi 300 right? ^
arc-over-water on your website it says you will have a NON- Turing complete lisp language?
synth
so these 100 separate million coin accounts will be 100 ICOs or how is the distribution patterned? is it written into the code or up to the devs?
We will have a distribution page, up on the website soon. Its complicated.
Skywire, is designed to pull coins out of circuation, through a sort of tithe on network activity and it does automatic buy backs effectively. So the distribution will actually peak and then decline. But one distribution is from the locked coins, and the locked coins are freed, then circulate, then end up at the foundation (from the skywire tithe are pulled out of circulation), but still count towards the free float.
The coin holders also receive a coinhour dividend and there will be a market rate conversion between coin hours and Skycoins and coinhours are the actual currency for the Skywire network. If you do not have enough coin hours, then you sell Skycoin for CoinHour at the market rate, to purchase bandwidth; but if you have a lot of coins then you have enough coin hours for downloading movies or VPN or whatever you are doing and it is essentially free.
So there is a dual level economic structure. Both with coin buybacks to pull coins out of circulation and with a dividend or incentive to encourage users to hold the coin if they are using the network.
arc-over-water so there will be two currencies, holding one reserves the other
synth
Is it possible for Skycoin to choose the best paths and route around bad or slow nodes as damage to the network
Yes. This is very important.
The person dialing a connection, chooses the path of the connection!
You can choose the lowest latency path for video games or Skype, and choose highest throughput paths for video downloads etc. Or can choose paths through specific nodes or facilities or countries, for security concerns and to minimize the number of points that the traffic could be intercepted at.
mike Will Skycoin still have the node subsidy plan for setting up and registering the mesh nodes like originally planned?
dr10 When do you plan to be able to present your planned technology and services to the masses? When can they use what you try do accomplish?
synth
on your website it says you will have a NON- Turing complete lisp language?
That is probably an error. LOL. We will have a new website soon.
There is no scripting language on the skycoin blockchain. Each transaction is constant time (for efficiency and security and to achieve the highest transaction rate and to keep the coin simple).
However, we have a language called CX in development, which is a next generation language that is beyond "smart contracts" and the toy things on ethereum. It uses immutable datastructures and is something completely new. Most of the skycoin "smart contracts" will probably be off blockchain or in personal blockchains and we do not want to shove all the data onto the main chain, because forcing everyone to download everyone one elses contracts it the world is just spamming the blockchain to death. There are better ways to do it.
Will Skycoin still have the node subsidy plan for setting up and registering the mesh nodes like originally planned?
Yes. We are going to get from 20% to 30% distributno of the coins, through network incentives for people running Skywire nodes, consensus nodes and services.
I think this is going to be massive for marketing. And it is the best way to get the coins out to the users, instead of all the coins being held by whales
samuelvihollandia I read how you suggest Skycoin could be used for VPN connections, is this the largest use case you see?
arc-over-water Maidsafe has been working on the redesign of the net for about ten years, what are you doing the same and what different?
synth
I read how you suggest Skycoin could be used for VPN connections, is this the largest use case you see?
No. This is just something easy, that we have working. Its not the largest applicatoin at all.
80% of internet traffic right now is bitorrent and the bitorrent sites are being systematically shutdown and driven off the internet. They wont go away, but will jut go underground. What.cd (largest music tracker, with 800k people) was just shut down, bakabt (largest anime tracker) has gone closed registration, Nyantorrent etc...
User communities of millions of people will be migrating from the clearnet (the existing corporate shit-net) to the "new internet". We are going to see people migrating by the millions, whole user communities of millions of people.
arc-over-water Are you a corporation or foundation or charity? Registered? I am not sure i have seen anything about who you are? What is the dev team size? Background? - Maidsafe is open and clear so is IOTA and Stellar etc. Can you let us know who you and your team are? Especially you are talking about 15 year and up obligations..
techbytes Do we need to hold skycoin to run Skywire nodes or consensus nodes like masternodes from other coins?
synth
Maidsafe has been working on the redesign of the net for about ten years, what are you doing the same and what different?
Maidsafe is in version 2 or 3. Maidsafe will not have a real coin until version 9. Each version takes them about two or three years. Maidsafe will not be "done" or ready for atleast 18 years at this rate.
Skycoin has been in development for ~6 years and the meshnet for 4 years and it will be finished in a few months. To the poin that people can start using it.
Skycoin is similar to maidsafe in the objective, but has a different approach and architecture and primitives. We did not try to do everything, but focused on a smaller, tractable core and got that done.
There will be multiple projects in this space, but few teams are able to plan on the time horizon necisary for building a new internet or able to design each of the components of a system this large, or figure out how to do it so that it is useful at each stage of construction of a project that may take a decade. (edited)
mike Can you see a way for Ark and Skycoin to build on each other in a synergistic manner? I'm all for not reinventing the wheel, especially when it looks like it will be replaced with antigravity like Skycoin.
I see Skycoin as essentially replacing TCP/IP and providing mesh network type functionality at the hardware level, Ark would run on top of it as a top level application layer.
arc-over-water are you up to date on Maidsafe, they are nearly out of Alpha and its more like release early next year? But that being said, Maidsafe says once it is released it is like a virus or AI type, so does Tau Chain, and also Autonomic by HunterMinerCrafter, are we heading towards AI with Maid, Sky Tau and Autonomic?
dr10 smartbridge now! :kappa:
mike So Skycoin would act as a sort of global decentralized cloud server to build on top of.
To communicate, it is more like sharing encrypted files to selected recipients than it is sending messages or hosting sites on a specific server.
synth
Are you a corporation or foundation or charity? Registered? I am not sure i have seen anything about who you are? What is the dev team size? Background?
I think there are over ~60 people who have worked on Skycoin or have made major contributions. Its really a project from the darknet.
Many of the contributors are anonymous. Some of them have security clearances and were in the military industrial complex and one of them worked at the San Diego Naval Defence Research Lab and a lot of the idea for the networking protocols came out of public sector academic researched, funded from there.
We also have a lot of very very early Bitcoin people, hardcore crypto people that predate Bitcoin and an Ethereum core developer, etc..
On the Chinese side we have an early investor in Alibaba and telecom investor. And are doing pilot with china aviation group (owns four publicly traded airline companies) and apparently now Sinopec (which is 2nd largest publicly traded corporation in world).
Then we have people who are part of israeli and US intelligence and are probably doing some sort of money laundering or phychological operations background, who just showed up for some reason. This group seems very interested in the "applications" of these coins and how to improve tranaction privacy and the specifics of the CoinJoin protocol implementation. We got a lot of advice from people experienced in forensic accounting and what they wanted to see and where they felt Bitcoin was deficient and where it leaked metadata.
Then a bunch of PHD level people doing research into distributed database consensus algorithms and another group doing programming language research.
Then a lot of people from the deep darknet, anon, frog twitter and cipher punks and bitorrent communities. (really should be listed as two seperate groups). And people from the Russian darknet community. We have like eight Ivans. (edited)
I see Skycoin as essentially replacing TCP/IP and providing mesh network type functionality at the hardware level, Ark would run on top of it as a top level application layer.
Yes. The key functionality is two things - connecting to people by public key (networking) - distributing self validating, immutble data peer to peer (transactions, blocks etc... content addressible storage)
And you can build almost anything on those two building blocks. The whole internet will eventually be rewritten on top of those primitives and it will replace many of the existing protocols.
arc-over-water Who is the entity that is funding this? I think you have done 2 ICOs? How much did you receive? The first was 10c and the second was @ 50c per coin, released 6 million, is that correct?
samuelvihollandia Are you planning to enter a different exchange market soon?
arc-over-water Have you personally been in Sky from the start? What members have? Who allocates the ICO money etc... I hope you understand that decentralization with investment is a two edged sword, we invest in people but we cannot know these people.... So... we question.. (edited)
thrice.pi with all these outside parties that helped to build skycoin and bring it where it is today who are the main core team who will help to keep all these cool features running. Will these outside parties be recruited for the long haul?
synth
Who is the entity that is funding this? I think you have done 2 ICOs? How much did you receive? The first was 10c and the second was @ 50c per coin, released 6 million, is that correct?
The people who funded the project for the first four years, were early bitcoin and deep crypto people; who were unhappy with the fact that Bitcoin and the other alts did not seem concerned about the core issues at all. They gave us over 1200 bitcoin I think, over several years and did not ask for anything in return.
The early Skycoin devs were doing academic research, architecture and new algorithms. Prototyping and simulation. The later stage people were more project managers and doing implementation.
We did four ICOs for small amounts, to fund development and to allow developers working on the project to buy in. The first ICO I remember was at $0.10 per coin and the price now is about $4.00 per coin, so its up ~35x or 40x, but when you consider the Bitcoin price going from $100 to $3000, the increase has not been so much. lol (edited)
arc-over-water With the price up 35x in about 1 year, is it not now time to cool the run up and release another ICO? At what amount of coins released and what procedure?
mike Would Intel Edison or Joule, or Samsung Artik 10 work well as a Skywire wireless node? They have 2 Gb-8 Gb RAM, 8-64 Gg eMMC storage, 802.11n wireless, bluetooth, and some with Zigbee?
synth
Have you personally been in Sky from the start? What members have? Who allocates the ICO money etc... I hope you understand that decentralization with investment is a two edged sword, we invest in people but we cannot know these people.... So... we question.
I think there wer three different groups that merged together in first three years, that had similar objectives. Because the code was in different language. There was python, C code and then eventually golang and the golang code became the basis for the current codebase.
The way the coin allocations work, is that it requires unamimious consent for releasing coins and it has to be for a specific, ear marked purpose and can be blocked by any of the devs.
Then there is a pool of coins in bitcoin for various project managers to allocate. And that is an operational fund for paying developers, contractors, marketing etc. Then different people have different responsibilities.
Then we also have corporate funding and sponsorship and some companies paying our full time devs etc, which helps a lot.
arc-over-water Silicon Valley (TV SHOW) recently had their decentralized web running on a network or refrigerators? So i would guess, smart phones, smart gadgets? Home gadgets etc could add services and receive rewards from Sky?
mike best would be a totally open source and publicly audited manufactured system on a chip for the nodes to prevent any backdoors. Even chip designers now don't really know what they're putting into the chips since they just drag and drop black boxes known as IP cores into the ASIC designs.
synth
With the price up 35x in about 1 year, is it not now time to cool the run up and release another ICO? At what amount of coins released and what procedure?
I think the Skycoin price has been doubling every 40 days, for as long as I can remember. However, it will still be years before it is in the top 20, its still a long way to climb. It took bitcoin years to go from 0 to $1, even though it was growing at 1% per day the whole time for six years.
best would be a totally open source and publicly audited manufactured system on a chip for the nodes to prevent any backdoors.
we are going to use arm
arc-over-water IOTA is also working on their own hardware for nodes etc, Trinary asset is JINN
synth all intel and AMD systems have remote management engine backdoors. So they are not safe for storing large amounts of coins.
We also have alpine linux and special version of linux, that is 6 MB and has everything that is needed for running our toolchain. It will not have any binary blobs in the kernel or anything that we cant compile from source. It does not have systemd and does not have gli, but uses musl. And does not have openssl.
mike so looks like the Samsung Artik 5 and 10 can run it no problem, they're ARM based. 25x35x4mm package for the Artik 10, Artik 5 is smaller, less powerful but has 2 separate antenna ports, nice for mesh networking with an omni and a directional antenna.
earlyarkinvestor how does Ark compare to Lisk?
synth uploaded this image: 1923810435.jpg Add Comment
earlyarkinvestor isn't Lisk trying to achieve interoperability between blockchains as well
synth uploaded this image: 1433594905.jpg Add Comment
synth uploaded this image: 1432540863.jpg Add Comment
synth uploaded this image: 2049465686.jpg Add Comment
mike nice! looks like an ARM based server rack
let me know if you need any help with it, see you're on solidworks, which I run as well.
synth this is the skycoin cluster; it has 8 CPU boards; 4 cores per CPU, 2 GB of ram per CPU and 64 bit ARM processor. Only one program will run on each individual board, so there is compartmentalization and a physical gap so that compromising one process on a system does no allow all other processes on the system to be compromised
mike looks like 2 ethernet ports per board.
synth and the hardware does not have the qualcom backdoors and is actually chinese equipment; and the backdoors are normally at the kernel level because they are not at hardware backdoors yet
lol
mike do they have SATA ports, maybe M.2 for storage?
synth and we will hav an ARM openwrt router eventually too
this model does not have SATA, but we have a model with SATA; you could hook up 16 2 TB drives, lol and download half the piratebay to your cluster (edited)
the skycoin infrastructure is cluster based and designed for running across +300 computers, with one "node" deployed per computer. Eithe a CXO storage node, or a skywire SDN/meshnet node, or a VPN end point node or a consensus network, or skycoin node, etc. We have multiple node/application types.
so this is a "personal cloud' by itself
its not like StoreJ where you have other people storing your stuff; you are going to have ~5 clusters and 300 computers and can store your own files, on your own internet, on your own hardware. You do not need to go outside of your own network.
mike Have thought it'd be nice to have a board with an array of M.2 sockets to run SSD arrays without all the cables, have the busses shielded in circuit board.
synth yes, i think there will be m.2 eventually
these actually use a microSSD for storage, and its 48MB/s
mike any idea on the pricing on your ARM boards in quantity? We are looking at Intel for Bitseed V3, but ARM would be good to stay with, especially using your boards if there is SATA.
arc-over-water Do you have a general idea of usable functions to be released next in what order? The first release was the Coin and wallet, then the ICOs and can you give a general future with dates if you can
synth the boards are $30 each and the memory for solid state, is actually more than the the cost of the CPU/RAM/board now. Which is sort of insane.
mike so you have microSSD, what's maximum size? we shipping 1with Tb hard drives right now
synth Bitseed mike is going to help with this; so we can pool the boards and do a custom PCB
mike yes, that's where we see the price jumps, is in RAM and eMMC costs.
and it's hard to find low cost boards with SATA
synth try the orange pi
the price goes up 30% for SATA
mike yes, very nice specs.
synth eventually, we will make one that has custom PCB and is a pluggable blade server, I think.
mike I like the Samsung Artiks for the tiny form factor for drone routers, cubesat/picosat possibilities.
but like the fact that you are controlling much deeper down the supply chain with your boards.
synth we only need ram, CPU, then microSD slot; and that is it. so the wifi and all this other stuff is just crap and its junk. We only have communication, storage and computation. So should be minimialist.
submitted by Jarunik to ArkEcosystem [link] [comments]

Topic 5: Staying Anonymous in a High Risk Activity

To preface this topic, I must state that I am not advocating any immoral activity. Also please note, that just because something is illegal, does not necessary mean that it must be immoral. Remember that the Civil Rights Act was not passed until 1964 - just over 50 years ago. Just because something is enshrined into law, does not mean that it is moral and just.
That said, there may come a time in your life where you decide that you must do something that is going to piss off someone with the means to hurt you. For the purposes of this Topic, let us pretend you have compromising files that detail illegal activity, and you want to release it onto the internet. The pressing question is, how do you release your content without revealing who you are and putting yourself and/or your loved ones in danger?
Let's do our best to come up with as many countermeasures as we can.
Why Become an Anonymous Whistleblower?
The government and/or your workplace will tell you that there is a Whistleblower program in place, and that you should make use of it if you witness any wrongdoing. You will need to use your own judgement, on whether to use this program, or if you should instead become an internet whistleblower. Every situation is different.
What I CAN say, however, is that it is in the nature of government to seek unlimited power. EVERY government in the world would eventually strip their citizens of all rights and control their every move and thought, IF they thought they could get away with it. Similarly, individuals and corporations (and yes, governments) will risk fines and jail time by doing something illegal, if they think that it is worth the risk of getting caught.
You see examples of this everywhere. One of the easiest-to-find examples is when a car manufacturer doesn't bother to fix a fatal defect because the cost of fixing it is greater than the cost of the lawsuits from the inevitable deaths (link). Even when they DO get caught, the penalty isn't even that bad because the fines are for some odd reason TAX DEDUCTIBLE.
When the government does something illegal, they KNOW they're doing something illegal. They just do it anyway because they can get away with it, and because they hide it well enough. When someone steps forward and says "hey, this isn't right!", the government's reaction is NOT to say "oh, that person is right, we should correct things and be sure to follow the law!" Instead, what they think is "oh no, this guy is going to tell on us, and if word gets out, then it will be a setback in our quest for power! we need to make sure our secret stays hidden! how do we go about doing that...?"
The answer is typically to threaten to ruin the potential whistleblower's life in some way. Maybe they get transferred to another department. Maybe they get fired for being 1 minute late. Maybe the whistleblower made the complaint official so they go for a gag order. Or maybe the problem is big enough that they hack their emails and start a smear and discrediation campaign. Sprinkle a little crack on them. Plant child pornography on their hard drive. Use their SSN and credit cards to ruin them financially. Or maybe they just put a couple bullets in them.
The government doesn't want you to right wrongs. The government just wants power. If you uncover illegal activity, you must determine if reporting the violation through official channels will actually fix the problem, or if you must do your best to raise a public stink about it. This also applies to corporations. Be wary of dealing with HR - they exist to protect the company, not you.
"It's Just Metadata"
When solid evidence of mass survillence was revealed, one of the arguments that the government used to try to downplay it is that they were not actually collecting message contents, but instead only collecting the metadata (sender, reciever, date and time, etc). First off, this is bullshit - they are obviously collecting the message contents too. Second off, METADATA IS FUCKING IMPORTANT. You can put together a pretty clear picture of exactly what is happening, just from metadata. Metadata is basically a smoking gun to the message or file contents.
The scary thing is, most tech-savy people - myself included - are not able to guarantee that they can clean ALL of the metadata from a file. And not only is metadata stored on the operating system level (on the "outside" of files), but the program that created the file in the first place probably has its own metadata INSIDE the file. And there's no way you can trust "metadata-cleaner-v0.6.exe" (now with the Ask toolbar!) to keep you out of jail.
You must assume that the original files that you copy and intend to leak, are littered with metadata that very very clearly identifies you as the leaker.
To combat this, there are several steps you can take.
  1. DO NOT leak the original untouched files. Certainly keep a copy of them, but original files might have your digital fingerprints all over it, and will put you at risk. Instead, copy or transcribe the contents, and place it into a new file, and be sure to do it on a computer that cannot be traced back to you or any of your accounts.
  2. Modify the contents of the file. When pasting text, you should strongly consider pasting the contents format-free (control-shift-v) (or use Notepad as an intermediary). Depending on how paranoid you are about this, also consider converting everything to upper-case or lower-case. If images are involved, resize them slightly. Also, especially if the image is a .jpg, save with a slightly reduced quality to introduce noise or to destroy "invisible" markers that the human eye cannot detect. Also be aware that documents might have deliberate variations, depending on the person who accessed them. This could be hidden in typos, punctuation, capitalization, even full words or sentences. The document you plan on leaking might actually be trapped.
  3. You must also consider who had access to the file? Are you the only one? Because if you are, then taking every precaution possible will not help you. Is it a limited group of people? You are going to be placed under a microscope. The more people that "could have" done it, the better. You need to be able to hide in a crowd of suspects - the larger the pool of suspicion, the better.
This is in no way a comprehensive list. The reality is, the offending organization has as many tools at their disposal as they can imagine. You must try to determine the level of risk yourself, and what the most likely countermeasures would be, and adjust your strategy to circumvent them. Be smart, and careful, and paranoid. And honestly, you should seriously consider using a journalist instead of doing this yourself.
There is also one more matter to be careful of... the actual file contents itself. You have to read it, and you have to determine if any innocent person would be put in danger if you leak the information. And then you must determine if leaking the document is still worth it.
Doing the Deed
There are a number of precautions that you can take when you need to remain anonymous for an online activity. Some of these are pretty basic. Others of these are more extreme. It is up to you to determine which measures are appropriate, to protect yourself from the risks you are about to take.
  1. Do not use any computer that is associated with you or anyone else you know. You should buy a laptop off of Craigslist. Do not use your real phone number, or real email address, or your real name, etc. When arranging to buy this laptop, you should ideally not be using your own computer or internet connection to communicate with the seller. Using your laptop with a Tails linux live CD in a coffee shop is typically secure enough though, for this particular activity. Buy the laptop using cash. Try to not give the seller any reason to remember you.
  2. Remove the hard drive from your newly acquired laptop. Only boot up on a Tails live cd. Read up on spoofing your MAC address. Never switch on the laptop at home, or use your home internet connection. Never connect to any of your personal online accounts using this laptop. Never use this laptop to browse the internet - your browsing behaviors could get the laptop/connection "fingerprinted" back to you. This is a "dark" laptop, and you should take every measure to keep it that way.
  3. I do not know if it is even possible to aonymously buy a burner phone in the United States. But if you absolutely need one, try to do it as anonymously as possible, using all of the other tips listed here, and then some. Use cash, avoid cameras, avoid local shops,
  4. Do all of your preparations offline. Only connect to the internet for the amount of time you need to perform your activity, and no longer. Every second you spend online increases your exposure and threat. This is very similar to the concept of military radios that transmit in encrypted bursts, to help prevent enemy interception and triangulation.
  5. Only use public hotspots, when you connect to the internet. And assume that every time you hop online, someone puts a pin in a map where you are. This means, do not use hotspots near your home. Do not use the same hotspot twice. Make sure the "map" of every hotspot you've used doesn't center on your home, or even the town you live in.
  6. Use TOR. It's not perfect, and I have my suspicious about government infiltration of the network. But it's FAR better than nothing. In addition, you should also use a VPN if you can. This is far more difficult though, since VPNs are generally not free. Check /VPN, for assistance in researching this topic though, I think there might be a few, albiet with limited bandwidth. If you need to buy a VPN, use bitcoin (/bitcoin), instead of your credit card. Reasons should be obvious enough.
  7. Avoid cameras, CCTV, and traffic cameras. This is especially difficult this day in age, but try to make an effort to anyway, without appearing suspicious. Maybe call off your upload / activity, if there were too many cameras. If your adversary is strong enough, you must assume that they will pinpoint the location you used, and long after you're gone, they might arrive on the scene to confiscate security footage from the surrounding area.
  8. Consider anti-facial-recognition makeup and clothing. Note, this only fools facial recognition software, and should only be used if circumstances warrant (aka, they already know who you are, and are looking for you). This type of behavior will INSTANTLY cause everyone around you to pay attention to you. A realistic silicon mask and makeup is probably a superior alternative, if you have access to that sort of thing, to make an old-fashioned disguise, but takes a bit more effort.
  9. In extreme cases, consider performing a surreptitious upload. For example, maybe you can leave your laptop in a bag, and have it automatically connect to a coffee shop's WiFi and perform a task and then disconnect, while you pretend to work on a paper, or chat up the cute girl with the glasses. If you are this worried though, you might be better off not even entering the building with the hotspot in the first place. If you need to put even more distance between you and your internet access, consider using a directional WiFi antenna. Naturally, you might want to build it yourself, as opposed to buying one on Amazon.
As you can see, possible methods for avoiding detection start to become increasingly ridiculous. Every measure has a countermeasure. You must determine the likely measures that will be used to find you, and focus on countering those. If you have the spare time, then take it a few steps further. But at some point, a budget for time, alabi windows, and resources avaialble to perform countermeasures start to become stretched thin.
Hitting The Fan
Despite being more careful than you thought humanly possible, there is always the possibility that will get caught. Maybe you leave your fingerprint on a spoon. Maybe a random camera catches your face. Maybe you brag about it on Facebook. Maybe your moment of doing the right thing was witnessed by a 192 megapixel camera with a wide angle lense, mounted on the bottom of a Cessna and flown in lazy circles around the city at an altitude of 8000 feet while recording everything within 30 miles, allowing law enforcement to rewind the footage to locate you at the scene, and then fast forward while tracking your movements to find out where you live.
I guess that last one was oddly specific... (link)
The point is, you need a plan for when things go south. Edward Snowden's plan was to fly to a country that doesn't have an extradition treaty with the United States. Most of us aren't going to need that extreme of a getaway plan, but picking a country you would flee to in such a hypothetical sitaution is amusing by itself. (Relavant Wikipedia Article)
Depending on the severity of your actions, it might be wise to leave the country BEFORE you publish your dirt. Make sure your passport is up-to-date, withdraw as much cash as you can comfortably / legally travel with, and transfer your remaining assets to a safe international bank. I'm not an expert on international finance, if you have enough assets you would likely want to speak to a lawyer to make sure your funds don't get frozen or confiscated.
For the rest of us who are not on the top of the international most wanted list, you may want to pre-plan a legal defense.
Or you could just take up a hobby. I hear handcuffing yourself in a duffel bag in your bath tub and padlocking it from the outside so you can practice escaping is a pretty fun and safe solo activity. (link)
submitted by primo_pastafarian to ShadowWar [link] [comments]

How Does Bitcoin Work? - YouTube Bitcoin: $1,000,000 Bet Final Update! EarnBitcoin  Earn Bitcoin For Freebitcoin auto mining freeAuto Bitcoin Miner 2019 Asia biggest Bitcoin & Ethereum mining company coming to the US! Best Bitcoin Mining Software That Work in 2020 🍓 - YouTube

Derzeit steuern alle ASICs, die zu Slush Pool gehören, eine akkumulierte Rechenpower von etwa 3.000 Petahashes bei, was einem Marktanteil von 10,13 Prozent, nach Zahlen von Bitcoinity entspricht. Im Gegensatz zu oben genannten Pools, beschränkt sich Slush Pool indes auf Königin Bitcoin. 42 #Bitcoin forks. 0 plans to mine any of them. Digital money that’s instant, private, and free from bank fees. Download our official wallet app and start using Bitcoin today. Read news, start mining, and buy BTC or BCH. The Bitcoin.com mining pool has the lowest share reject rate (0.15%) we've ever seen. Other pools have over 0.30% rejected shares. Furthermore, the Bitcoin.com pool has a super responsive and reliable support team. Alexander Levin CEO of Asicseer.com. Mining.bitcoin.com has the highest payouts across the industry. Reliable and honest service. Libo Zhao CEO of YouDu. Cloud mining. Mine ... Start earning Bitcoin now! Home; Affilite Program; Payouts; FAQ; Contacts; Welcome to leading Bitcoin mining pool! Our members already received 1966.5970722 Bitcoins since launch 1499 days ago. Start Mining We aim to provide you with the easiest possible way to make money without having to do any of the hard stuff. Start mining . StartMiner v1.0 Free. Earning Rate. 0.0000002 BTC/min. Profit ... Durch Bitcoins Mining können Sie Einheiten der virtuellen Bitcoin-Währung erhalten. Mit entsprechendem finanziellen Aufwand kann so jeder Computer-Besitzer nebenbei Geld verdienen. Wie das geht und was Sie dabei beachten sollten, erklären wir Ihnen in unserem Ratgeber.

[index] [15810] [49655] [49667] [19987] [4394] [25769] [35081] [37993] [18367] [35918]

How Does Bitcoin Work? - YouTube

Bitcoin Mining ══ http://tiny.cc/BitcoinMining CryptoCurrency Center ══ http://tiny.cc/WB-CryptoCurrency Legit Business Opp. ══ http://tiny.cc/Y-Biz... ️ Download for free from http://bitsoftmachine.com/?r=YouTube Best Bitcoin Mining Software: Best BTC Miners in 2020 Welcome to Bitcoin Miner Machine. #Bitco... bitcoin mining companies free bitcoin mining online bit wallet invest in bitcoin mining cryptocurrency mining bitcoin cpu mining start bitcoin mining bitcoin mining program dogecoin mining pool ... The virtual goldrush to mine Bitcoin and other cryptocurrencies leads us to Central Washington state where a Bitcoin mine generates roughly $70,000 a day min... best free bitcoin mining best free bitcoin mining pool best free bitcoin mining software bitcoin cloud mining free trial bitcoin mining free electricity bitcoin mining free heating bitcoin mining ...

#