3 Examples of Bitcoin Cloud Mining in 2020 - Legit or a Scam?

Technical: Taproot: Why Activate?

This is a follow-up on https://old.reddit.com/Bitcoin/comments/hqzp14/technical_the_path_to_taproot_activation/
Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners?
And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess.
First, let's consider some principles of Bitcoin.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so).
So, how does Taproot affect those principles?

Taproot and Your /Coins

Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash).
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input).
However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits!
Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh?
With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save!
And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well!
(P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1)
Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service!
So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win!
(even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot)
And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!

Taproot and Your Contracts

No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade.
So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust.
Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade.
However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade.
In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address.
Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants).
But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer).
Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos).
(technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).

Taproot and Your Contracts, Part 2: Cryptographic Boogaloo

Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code.
This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded.
And you can do that, with HTLCs, today.
Of course, HTLCs do have problems:
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar".
Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given public key to you.
Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige).
(Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key).
So:
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script.
(technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)

Quantum Quibbles!

Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable??
Well, in theory yes. In practice, they probably are not.
It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash.
When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key.
So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key.
(public keys should be public, that's why they're called public keys, LOL)
And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions.
So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort.
Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers.
For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
So:
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).

Summary

I Wanna Be The Taprooter!

So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!

But I Hate Taproot!!

That's fine!

Discussions About Taproot Activation

submitted by almkglor to Bitcoin [link] [comments]

Decentr ($DEC) - foundational cross-chain and cross-platform DeFi protocol

  1. SUMMARY
Decentr is a protocol designed to make blockchain/DLT mainstream by allowing DeFi applications built on various blockchains to “talk to each other”. Decentr is a 100% secure and decentralised Web 3.0 protocol where users can apply PDV (personal data value) to increase APR on $DEC that users loan out as part of of our DeFi dLoan features, as well as it being applied at PoS when paying for stuff online. Decentr is also building a BAT competitor browser and Chrome/Firefox extension that acts as a gateway to 100% decentralised Web 3.0
Allows DeFi Dapps to access all Decentr’s dFintech features, including dLoan, dPay. Key innovation is that the protocols is based on a user’s ability to leverage the value of their data as exchangeable “currency”.
  1. KEY CONCEPTS

  1. REVENUE MODEL
A fee is charged for every transaction using dPay whereby an exchange takes place between money (fiat and digital) and data, and vice versa, either as part of DeFi features or via a dApp built on Decentr. They are launching pilot programmes in the following industries:
  1. Banking/PSP Industry: On Product launch, due to Decentr’s powerful PSP connections (including the worlds #2 PSP by volume), a medium-scale pilot program will be launched, which will seed the network with 150,000 PSP customers in primarily the Spanish/LAC markets, generating revenue from day one.
  2. “Bricks and Mortar” Supermarket/Grocery Industry: Decentr aims to ensure the long-term competitiveness of “bricks and mortar” supermarkets against online-only grocery retailers, such as Amazon, by a) building secure tech that allows supermarkets to digitise every aspect of their supply chains and operational functions, while b) allowing supermarkets to leverage this incredibly valuable data as a liquid asset class. Expected revenue by Year 5: $114Mn per year.
  3. Online Advertising Industry: Decentr’s 100% decentralised platform credits users secure data with payable value, in the form of PDV, for engaging with ads. The Brave browser was launched in 2012 and in 8 years has reached over 12 million monthly active users, accented by as many as 4.3 million daily active users.
  4. TOKEN $DEC AND SALE
Decentr recently complete their token sale on a purchase portal powered by Dolomite where they raised $974,000 in 10 minutes for a total sale hardcap of 1.25M. The $DEC token is actively trading on multiple exchanges including Uniswap and IDEX. Listed for free on IDEX, Hotbit, Hoo, Coinw, Tidex, BKex. Listed on CoinGecko and Coinmarketcap. Listed on Delta and Blockfolio apps.
➡️ Circulating supply: 61m $DEC.
➡️ Release schedule and token distribution LINK -> NO RELEASE UNTIL 2021.
➡️Contract Address - 0x30f271C9E86D2B7d00a6376Cd96A1cFBD5F0b9b3
➡️Decimals - 18, Ticker - DEC
➡️Uniswap link: https://uniswap.info/pai0x3AEEE5bA053eF8406420DbC5801fC95eC57b0E0A
⭐️ HOW TO BUY VIDEO: https://www.youtube.com/watch?v=iloAiv2oCRc&feature=youtu.be
$DEC Token utility:
A tradeable unit of value that is both internal and external to the Decentr platform.A unit of conversion between fiat entering and exiting the Decentr ecosystem.A way to capture the value of user data and combines the activity of every participant of the platform performing payment (dPay), or lending and borrowing (dLend), i.e a way to peg PDV to tangible/actionable value.Method of payment in the Decentr ecosystem.A method to internally underwrite the “Deconomy.
  1. NOTABLE SUPPORTERS
Simon Dedic - chief of Blockfyre: https://twitter.com/scoinaldo/status/1283787644221218817?s=20https://twitter.com/scoinaldo/status/1283719917657894912?s=21
Spectre Group Pick : https://twitter.com/SPECTREGRP/status/1284761576873041920https://twitter.com/llluckyl/status/1283765481716015111?s=21
Patrons of the Moon/Lil Uzi: https://t.me/patronsofthemoon/6764
CryptoGems: https://twitter.com/cryptogems_com/status/1283719318379925506?s=09t
tehMoonwalker pick who is a TOP 5 influencer per Binance:https://twitter.com/tehMoonwalkestatus/1284123961996050432?s=20https://twitter.com/binance/status/1279049822113198080
Holochain was one of their earliest supporters and they share a deep connection (recently an AMA was conducted in their TG group): https://medium.com/@DecentrNet/decentr-holochain-ama-29d662caed03
  1. UPCOMING NEWS
--------------------------------------------
  1. RESOURCES:
Website: https://decentr.net
Telegram: https://t.me/DecentrNet
Medium: https://medium.com/@DecentrNet
Twitter: https://twitter.com/DecentrNet
Whitepaper: https://decentr.net/files/Decentr_Whitepaper_V1.4.pdf
Technical Whitepaper: https://decentr.net/files/Decentr_Technical_Whitepaper_Data_As_Economic_Currency.pdf
Recent Articles:
⚡️- https://medium.com/@DecentrNet/decentr-token-sale-metrics-and-distribution-483bb3c58d05
⚡️- https://medium.com/@DecentrNet/how-decentrs-defi-dloan-function-benefits-dec-holders-97ff64a0c105
⚡️- https://medium.com/@DecentrNet/3-vertical-revenue-streams-decentr-is-targeting-4fa1f3dd62de
⚡️- https://medium.com/@DecentrNet/brave-browser-the-good-the-bad-and-the-fundamentally-misguided-8a8593b0ff5b
⚡️- https://medium.com/@DecentrNet/how-decentrs-dfintech-replaces-swift-sct-inst-clearing-house-and-other-payment-solutions-78acacbb4c3f
Chad Gang STRONG Community: https://t.me/decentrtrading
Community News Channel: https://t.me/chadnews
Recent Uniswap trades: https://t.me/dectrades
Wallet holder tracker: https://t.me/DEC_WALLETS_COUNT
submitted by ldd999 to CryptoMoonShots [link] [comments]

[ Bitcoin ] Technical: Taproot: Why Activate?

Topic originally posted in Bitcoin by almkglor [link]
This is a follow-up on https://old.reddit.com/Bitcoin/comments/hqzp14/technical_the_path_to_taproot_activation/
Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners?
And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess.
First, let's consider some principles of Bitcoin.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so).
So, how does Taproot affect those principles?

Taproot and Your /Coins

Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash).
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input).
However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits!
Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh?
With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save!
And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well!
(P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1)
Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service!
So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win!
(even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot)
And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!

Taproot and Your Contracts

No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade.
So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust.
Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade.
However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade.
In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address.
Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants).
But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer).
Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos).
(technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).

Taproot and Your Contracts, Part 2: Cryptographic Boogaloo

Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code.
This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded.
And you can do that, with HTLCs, today.
Of course, HTLCs do have problems:
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar".
Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given private key to you.
Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige).
(Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key).
So:
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script.
(technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)

Quantum Quibbles!

Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable??
Well, in theory yes. In practice, they probably are not.
It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash.
When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key.
So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key.
(public keys should be public, that's why they're called public keys, LOL)
And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions.
So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort.
Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers.
For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
So:
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).

Summary

I Wanna Be The Taprooter!

So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!

But I Hate Taproot!!

That's fine!

Discussions About Taproot Activation

almkglor your post has been copied because one or more comments in this topic have been removed. This copy will preserve unmoderated topic. If you would like to opt-out, please send a message using [this link].
[deleted comment]
[deleted comment]
[deleted comment]
submitted by anticensor_bot to u/anticensor_bot [link] [comments]

The Unofficial Cardano FAQ - V3

(if you would like to add information or see mistakes, just comment below and I will credit you)
What is Cardano? Cardano is an open source and permissionless "Third Generation" blockchain project being developed by IOHK. Development and research started in 2015, with the 1.0 mainnet launching in 2017. Cardano blockchain is currently being developed into two layers. The first one is the ledger of account values, and the second one is the reason why values are transferred from one account to the other.
  1. Cardano Settlement Layer (CSL) - The CSL acts as the ledger of account or balance ledger. This is an idea created as an improvement of bitcoin blockchain. It uses a proof-of-stake consensus algorithm known as Ouroboros to generate new blocks and confirm transactions.
  2. Cardano Computation Layer (CCL) - The CCL contains the data how values are transferred. Since the computation layer is not connected to balance ledger, users of the CCL can create customized rules (smart contracts) when evaluating transactions. (https://support.bitkub.com/hc/en-us/articles/360006678892-What-are-the-two-layers-of-Cardano-)
IOHK has the contract with an undisclosed party to develop the project until the end of 2020, at which point the community may elect another development team - on the assumption that the voting infrastructure has been completed. However CEO Charles Hoskinson has stated that they will develop the project until it is completed, and they are simply financed until the end of 2020.
Cardano was the first project built on a peer-reviewed scientific development method, resulting in dozens of research papers produced by IOHK. Among these papers is Ouroboros Genesis, proving that a Proof of Stake protocol can be just as secure as Proof of Work - which was originally developed for Bitcoin, and refined for Ethereum. This PoS protocol considerably lowers the resources cost to maintain network while still maintaining security and network speed.
Cardano as a financial infrastructure is not yet completed, With significant development to be rolled out.
What were the other two generations of blockchain? Gen 1 was Bitcoin. It exists by itself and talks to nobody but Bitcoin. It is capable of peer to peer transactions without a third party in such a way that you cannot cheat the system. This was a major step forward for the E-cash concept that people have been working on for the 20 years prior.
Gen 2 was Ethereum and other smart-contract platforms that allow other coins and platforms to be built on top of their infrastructure. These coins can interact with others on the platform, but cannot interact with other platforms. Meaning it is still not truly interoperable. Most Gen 2 blockchains are also using Proof of Work likes Bitcoin, which effects scaling. Also missing is a built-in method to pay for upgrades and voting mechanics for decision making.
Gen 3 blockchains are a complete package designed to replace the current financial infrastructure of the world. Cardano is using Proof of Stake to ensure security and decentralisation(Shelley). Scaling through parallel computation (Hydra in Basho), Sidechains to allow the platform to interact with other platforms (Basho), and also include mechanisms for voting for project funding, changes to the protocol and improvement proposals (Voltaire). Finally smart contracts platform for new and established projects that are developer friendly (Goguen).
Who is the team behind Cardano? There are three organisations that are contributing to the development of Cardano. The first is the Cardano Foundation, an objective, non-profit organisation based in Switzerland. Its core responsibilities are to nurture, grow and educate Cardano users and commercial communities, to engage with authorities on regulatory and commercial matters and to act as a blockchain and cryptocurrency standards body. The second entity is IOHK, a leading cryptocurrency research and development company, which holds the contract to develop the platform until 2020. The final business partner is Emurgo, which invests in start-ups and assists commercial ventures to build on the Cardano blockchain.
www.Cardano.org www.emurgo.io https://cardanofoundation.org/en/
What is the difference between Proof of Work and Proof of stake? Both these protocols are known as “consensus protocols” that confirm whether a transaction is valid or invalid without a middleman like Visa or your bank. Every node (active and updated copy of the blockchain) can agree that the transaction did take place legitimately. If more than half validators agree, then the ledger is updated and the transaction is now secured. Proof-of-Work (PoW) happens when a miner is elected to solve an exceptionally difficult math problem and gets credit for adding a verified block to the blockchain. Finding a solution is an arduous guessing game that takes a considerable amount of computing power to compete for the correct answer. It is like “pick a number between 1 and one trillion” and when you get it right, you get $30,000 in Bitcoin, so the more computers you have working on it, the faster you can solve it. Also the more people who are trying to solve the same block, the harder the algorithm, so it may become 1 in 20 trillion. The downside is the massive amounts of power required to run the computers that run the network, and the slow pace that blocks are solved. To “Hack” a PoW system, you need 51% of the computing power, which would allow you to deny transactions, or spend the same coin twice. At the moment there are 8 main mining operations for bitcoin, and 4 of them make up more that 51% of the mining power.
PoS instead selects a coin at random that already exists, and the person who owns that coin is elected to put the work in to validate the block. This means there is no contest and no guessing game. Some computer power is required, but only a fraction of a PoW system. The complex nature of selecting a coin that exists on the correct and longest chain and is owned by someone who can complete the block, AND in such a way that it is secure AND that computer currently running AND that person also having an incentive to complete the work, has made the development of PoS very slow. However only a few years ago it wasn’t even possible. In this method, the more of the coin (ADA) you stake, the more likely you are to be selected to close a block. Cardano also allows you to delegate your stake to someone else to validate the block so they do the work, and you share in the reward for doing so.
To “hack” a PoS blockchain you need to own 51% of the tokens, which is significantly harder than owning 51% of the computing power.
What is ADA and how is it different to Cardano? Cardano is the name of the network infrastructure, and can be thought of like a rail network. ADA is the native token that has been developed alongside Cardano to facilitate the network operation. This helps confusion and maintains distinction, compared to Ethereum being the native token of Ethereum. Similar to bitcoin or any other token, ADA can be sent peer to peer as payment, but is also the reward for running the network, and what is taken as transaction fees.
In this metaphor “Cardano” is the train tracks, that everything runs on. A stake pool would be the locomotive, facilitating transactions on the network while ADA is the coal that powers the locomotive. The train carriages are Decentralised applications (Dapps) that are also running on cardano tracks, but are not actively powering the network.
What is staking Cardano is a Proof of Stake protocol, and uses already existing coins like a marker to ensure security. The protocol chooses a coin at random and the owner of that coin is elected to validate a block of transactions. Staking is the process of adding your ADA coins to a Pool that has the resources to run the network. If the pool you have chosen to "delegate" your stake to is chosen to close/validate a block, then you get a portion of the rewards. The ADA never leaves your wallet, and you can "undelegate" whenever you like. this increases stability of the network and also gives an incentive to pool operators to invest the time and hardware required to run a pool.
What is a stake-pool and how does it work? Cardano.org FAQ on the issue goes into much more detail
A stake pool is where the computing power of the network takes place. During ITN there was 1200 registered stake pools while 300 were creating blocks. You can manage your own stake-pool or delegate your ADA to an already registered pool. Rewards are determined by the protocol, however the pool may elect to charge fee Percentages, or flat rate fee to upkeep their pool.
Can I Stake my ADA right now? The staking testnet has closed, If you participated in the Incentivised Test Net and earned rewards, instructions to check the balance are here.
However if you have just purchased some or it was held on an exchange, then you will need to wait until the Shelley mainnet launch happening at the end of July 2020.
Where do I stake my ADA? Daedalus Flight wallet, and Yoroi Wallet (as a chrome extension) are the current best options. Adalite and several other third-party wallets also exist. Coinbase will also allow staking as a custodial service, and many exchanges may offer “staking as a service” so you can leave your coins on the exchange and still earn rewards if you enjoy trading. I do not recommend leaving coins on an exchange unless you are actively trading.
What are the staking rewards now and what can I expect on a return in the future? The Incentivised Test Net (ITN) Delivered 10%-15%pa returns on average. The future of staking will most likely be lower, but will depend on the amount of ADA staked across the network and the amount of network traffic.
Check https://staking.cardano.org/en/calculato for a clearer picture.
what is a Pledge? To stop one person operating many pools, the rewards that a pool earns will vary depending on the amount of personal ADA they “pledge” to open the pool. This means that 50 pools with a 1,00ADA pledge each will be overall less profitable than 1-2 pool with the max ADA pledge (unknown but likely around 300k). Even if the 50 pools have the same over stake delegated by other users and have a better chance of being selected to close a block, the 50 pools may receive lower rewards.. (at least that is the theory)
Who is IOHK? IOHK is a for-profit software engineering company founded by CEO Charles Hoskinson and Jeremy Wood in 2015 that has taken a scientific approach to the development of blockchain. IOHK started with “first principles” and looked at questions like “what is a blockchain” and “what should a blockchain be able to do” rather than accepting the established paradigm of Bitcoin and Ethereum. IOHK was originally Input Output Hong Kong, but is now Input Output Global and is based in Wyoming USA employing over 230 staff. IOHK has established research labs in several universities in order to complete the Cardano project, and is also developing Ethereum Classic, Atala, Mantis and possibly other Blockchain related programs and infrastructure.
Who is Charles? Charles Hoskinson is an early adopter of cryptocurrencies, American entrepreneur and cryptocurrency specialist. Charles Co-founded Ethereum with Vitalik Buterin and 5-8 others, However he only worked on that project for approximately six-months. Charles is now the CEO of IOHK and the director of The Bitcoin Education Project.
Why isn’t ADA on coinbase? Cardano and coinbase have recently connected in a big way. With IOHK turning over all their ADA to the custodial services of Coinbase. This means that Cardano and Coinbase have been working together for some time and there is a strong partnership forming. Staking and cold storage will be available and trading on Coinbase will most likely become available after the release of Shelley (although no official word yet)
Why Doesn’t Cardano have a Wikipedia Page? Wikipedia has strict guidelines on what can be turned into an article. As there has been no coverage of Cardano from mainstream media or “noteworthy” sources, there is no article yet. Wikipedia will also not accept sources from IOHK as they are not considered “reliable” and must come from a third party. This will most likely change soon.
Cardano does have a dedicated community driven wiki
https://cardanowiki.info/wiki/Home
What is Atala and why do I care?*
Atala is a suite of services being developed on top of the cardano blockchain by IOHK that focusses on credential certification, for things like education, work history and degrees (Atala Prism). Product counterfeiting protection through registering products on a blockchain and create taper-proof provenance. This does not only apply to Gucci handbags, but also medication, art, and anything that can be counterfeited (Atala Scan). As well as supply chain tracking to see issues and inefficiencies with greater transparency(Atala Trace).
Im new, how much is a good investment?
Cardano is still a speculative market and although there is amazing potential here, it is still only potential. When investing in any High risk market like Crypto, only every invest what you are willing to lose. Cardano may be testing the 10c barrier now. But in March it dumped to 1.7c. And if you suddenly need your money back during the dump then you are out of luck. Do your research before you FOMO in. Start with a small amount and send it between wallets and exchanges to understand how the system works. Store your private keys offline (or online cloud service but encrypted) with a method that is unlikely to be damaged AND have multiple copies. So in the case of a house fire or a blow to the head, or the cloud service being shutdown/destroyed, you do not lose your money.
Timelines
https://roadmap.cardano.org/en/
Shelley Decentralisation rollout and news
Goguen smart contract rollout
Voltaire Voting mechanics – no official roll out timeline (though promised for 2020)
Basho scaling and sidechains – no official roll out time line (most likely 2021)
submitted by YourBestMateRobbo to cardano [link] [comments]

My 2-month experience with bitport.io (recommended provider)

(Edit- check comments. It seems there are far better options out there)
Howdy all. I didn't find much in the way of reviews for bitport when I was looking at seedboxes. I wanted to share the experience I've had with them in the last 2 months. I started off on their free plan (1GB cloud storage) and slowly progressed up to the highest paid tier (250GB cloud storage). I do not work for bitport and am in no way affiliated with them, it's just an honest review on what I received for my money.
Available Plans:
Free - 1GB cloud storage, 1 download slot, 1 torrent/day, non-guaranteed speed, no AV, only HTTP downloads
$5/mo - 5GB cloud storage, 5 download slots, unlimited torrents/day, unlimited download speed, https downloads, antivirus check, rss downloader
$10/month - 100GB cloud storage, 10 download slots, unlimited torrents/day, unlimited download speed, https downloads, antivirus check, rss downloader, google drive sync (can download directly to your google drive storage)
$15/month - same as above, except 20 download slots instead of 10 and 250GB cloud storage instead of 100GB
They also support FTP/SFTP access, which I have found extremely handy for grabbing my files. I use filezilla to create an SFTP connection and sync what I need. Once I have it locally I can remove it from my cloud storage and add more torrents. I get email alerts when a download is finished. I've found the speeds to be great. The seeding is worded weirdly on the website, but it appears that seeding is set to stop once the ratio hits 1.0 by default, or after 24 hours, whichever comes first. If you are a premium user you can contact the technical support team and request the ratio to be increased. I asked for the days seeded to be increased to 2 weeks, but the most they could/would do is 5 days.
Downloads can also be handled by a sync client they've developed. This is a windows only application which I haven't used, so I cannot comment on it. You can also use a variety of third party download clients to automatically download files when done.
Adding torrents can be done by uploading a torrent file or by pasting a torrent or magnet file link in the homepage. This has been very handy. You can also queue more downloads than you have slots for, again, pretty handy. It will automatically check torrent health and persistently try to download the files. There is a time limit on how long it will try to download (72 hours I think) and if it hasn't downloaded by then the site assumes the torrent health is bad and will abort trying to download it. You can always try again, but it won't sit in the queue indefinitely.
Payment can be via card, paypal, bitcoin, or other payment methods. I was pleased to be able to use bitcoin.
All in all my experience was good. The one thing I would like to change is have seeding set to seed until my ratio hits 1.0, instead it will time out if 1.0 isn't hit within 24 hours, and I can only extend that to 5 days. Bitport's site was easy to use, synced directly to my google drive, SFTP worked great, and isn't real expensive. The customer service is pretty decent, you can submit tickets and get responses within a day or so. They have a lot of documentation in the help center if you into issues or aren't sure how to do something.
I don't have much experience with other boxes, so I can't comment if they are a better value or preferrable to other providers, but I can vouch for them being a quality product and I feel like I have gotten pretty good bang for my buck.
If you have any questions I can try to answer. Again - not affiliated with them in any way, just trying to give back some to the community especially since I couldn't find much info on them before using them.
submitted by themaicero to seedboxes [link] [comments]

Official ColossusXT Q2 2020 AMA!

Official ColossusXT Q2 2020 AMA!
Welcome to the 10th official ColossusXT AMA! As we move into the 2nd half of 2020 we can look back and see how blockchain as a whole is moving forward, and we've seen how COVID-19 has affected the world globally. It's been interesting to hear from the community how it has affected everyone all over the world. Certainly ColossusXT has been affected along with many other blockchain projects, but since the entire team has been working remotely from all of the world from the start, the affect directly to us has been minimal.
Moving forward into 2020 we will be updating the roadmap, providing more social activities for the community to participate in, as many have participated in the Armis beta, and helping us resolve some bugs within the mobile wallet which is back up and running thanks to many of the dedicated community members. We will be listed on tokens.net, and will continue to bring alternative trading opportunities to the community, if there are certain exchanges you're interested in please don't hesitate to shout them at us here, and shout ColossusXT #COLX $COLX on social media. 2020 is sure to be an exciting year and we look forward to your questions. This is your opportunity to publicly gripe at us, or ask us any direct question about development, business, and/or financial progress of ColossusXT and the Colossus Grid.

-----------------------------------------------------------------------------------------------------------------------------------------------------
This AMA will start on 10 June and end on 30 June.
The team will review and answer your questions no later than 10 July.
Before the AMA begins, everyone from the community can ask questions on this page and upvote/downvote according to your interest.
Rules:
Please do not reply to other user's questions until the team has answered. Try to be precise with your questions and be polite.
Contest: One person who asks a question will be chosen to receive 100,000 ColossusXT (COLX) and a ColossusXT T-Shirt!

ColossusXT (COLX) Ask Me Anything

ColossusXT AMA Shirt
-----------------------------------------------------------------------------------------------------------------------------------------------------
About ColossusXT (COLX):
ColossusXT is an open source, community-driven, environmentally conscious cryptocurrency and an alternative to bitcoin that features better anonymity. It allows people to store and invest their wealth in a non-government controlled currency and make almost instantaneous and completely anonymous transfers with close to zero fees. Colossuscoin V1 was founded as an long-standing, energy-efficient and environmentally friendly digital cryptocurrency and this concept is being continued.
Question format can be seen below:
-----------------------------------------------------------
Q: What is the Colossus Grid?
-----------------------------------------------------------
A: ColossusXT is an anonymous blockchain through obfuscation, along with utilization of Armis (I2P). These features will protect end user privacy as ColossusXT evolves into the Colossus Grid. The Colossus Grid will connect devices in a peer-to-peer network enabling users and applications to rent the cycles and storage of other users’ machines. This marketplace of computing power and storage will exclusively run on COLX currency. These resources will be used to complete tasks requiring any amount of computation time and capacity, or allow end users to store data anonymously across the COLX decentralized network. Today, such resources are supplied by entities such as centralized cloud providers which are constrained by closed networks, proprietary payment systems, and hard-coded provisioning operations. Any user ranging from a single PC owner to a large data center can share resources through Colossus Grid and get paid in COLX for their contributions. Renters of computing power or storage space, on the other hand, may do so at low prices compared to the usual market prices because they are only using resources that already exist.
-----------------------------------------------------------------------------------------------------------
Q: Why does your blockchain exist and what makes it unique?
-----------------------------------------------------------------------------------------------------------
A: ColossusXT exists to provide an energy efficient method of supercomputing. ColossusXT is unique in many ways. Some coins have 1 layer of privacy. ColossusXT and the Colossus Grid will utilize 2 layers of privacy through obfuscation, and Armis (I2P) these will protect users of the Colossus Grid as they utilize grid resources. There are also Masternodes and Proof of Stake which both can contribute to reducing 51% attacks, along with instant transactions and zero-fee transactions. This protection is paramount as ColossusXT evolves into the Colossus Grid. Grid Computing will have a pivotal role throughout the world, and what this means is that users will begin to experience the Internet as a seamless computational universe. Software applications, databases, sensors, video and audio streams-all will be reborn as services that live in cyberspace, assembling and reassembling themselves on the fly to meet the tasks at hand. Once plugged into the grid, a desktop machine will draw computational horsepower from all the other computers on the grid.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Important Information:
Website
Whitepaper
Roadmap
Business Plan
Wiki
Governance
Partners
GitHub
What is ColossusXT? (YouTube)
---------------------------------------------------------------------------------
Follow ColossusXT on:
Twitter
Facebook
Telegram
Discord
Forums
---------------------------------------------------------------------------------
Interested in joining the ColossusXT team?
Contribute an Idea!
---------------------------------------------------------------------------------
AMA History:
2018 Q1 2018 Q2 2018 Q3 2018 Q4
2019 Q1 2019 Q2 2019 Q3 2019 Q4
2020 Q1
submitted by PioyPioyPioy to ColossuscoinX [link] [comments]

Hire A Certified Hacker Online in 2020 Without Getting Ripped off.

Hire A Certified Hacker Online in 2020 Without Getting Ripped off.
Trustworthy. Certified. Ethical. Hackers. Hire a Hacker in 2020.

Hire a Hacker
We are committed to excellence. There are situations when you just think about hiring a hacker but you just hesitate to contact a hacker because of multiple reasons. Feel free to get in touch with us and maybe we might offer you the exact service you are looking for. Here are a few of most widely used hacker for hire services.

https://preview.redd.it/uzeaa6cpjo851.jpg?width=4088&format=pjpg&auto=webp&s=4b39cc37bc2909a1be8fb57f270bb7baa242c9bf
Lost E-Mail Password Retrieval
Monitoring Services for Smartphones (iPhone and Android)
Track Live GPS Location
Cheating Partner / Cheating Spouse Monitoring
Social Messaging apps WhatsApp, iMessages, SMS, iCloud
Lost Social Media Password Retrieval
Facebook, Instagram & Snapchat Related Services
Cryptocurrency Fraud Investigation
Hire a Hacker Today!
About Hire A Hacker Pro:
Who We Are?
Hire a Hacker Pro is always ready to serve you — 24/7 and are a cloud based agency offering professional hackers for hire. As a leading Ethical Hacker for Hire agency in the world we offer Hacker for Hire services that are unmatched by anyone. We have a Global team of certified hackers who are experts in different fields. We assess our hackers by conducting multiple level online tests before they can join our team.
Connect With us on Telegram
A Few Reasons to Choose Hire A Hacker Pro
Quick Service Delivery
Wide range of Services
Our team is dedicated to offer wide range of ethical hacking services and we have an excellent on-time delivery record.
Assured Results
There are many websites which promise to deliver guaranteed results but very few of them really do.
Rapid Response
Android Smart Phones
iOS Smart Phones
Blackberry Smart Phones
Windows Smart Phones
Linux Computers
Windows Computer
Mac OSX
Cent OS
Windows Computers
Android Cell Phones
iOS Cell Phones
Mac OS Computers
Linux Devices
Our professional hackers offer hacker for hire services that are unmatched. Our team of highly skilled hackers can help with hacked email, Facebook, websites, social media, mobile devices and more.
Social Media Hacked? Hire a Hacker.
Has your Facebook, Twitter or Google+ account been attacked by a hacker? Do you need to get back into a social media account? A Professional Hacker Can Help!

Lost a Password? Hire a Hacker.
Everyone loses a password at some point. Hire a Hacker Pro will crack/recover passwords from computers, mobile & wireless devices, E-mail accounts, Facebook and more! Hire a hacker!

Being Cyber stalked? Hire a Hacker!
Hire a hacker to help protect your children from cyber predators. Our professional hackers can find the source and help close the case on any investigation. Hire a Hacker!
How can I find out if my husband or wife, boyfriend or girlfriend is cheating on me? It can be very difficult to catch a cheating spouse. Hire a Hacker.
Hire a Hacker Pro is a team of professional hackers from all over the world, our main motive is to provide you safe and secure professional hacking services. We might have what you are looking for, let us know your requirements. Unthinkable? Impossible? Beyond imagination? We might just surprise you with what we are capable of!

Cryptocurrency Fraud Investigation/Retrieval
Our expert team is also skilled at assessing potential warning signs of investment fraud and theft of Bitcoin and other cryptocurrencies.
If you are concerned you may be entering into a fraudulent scheme, get in touch with our team. Our cryptocurrency experts can investigate and advise you on your future transactions, giving you peace of mind your investments will be safe from criminal activity.
Request Quote


Cheating Partner Investigation
In our extensive experience when you think something is wrong then you are generally right!
The catch to that statement is that the secret being kept from you is not always what you think it is. Do you know what your partner or loved one is keeping from you?. You can use our Smartphone monitoring service to clarify your doubts.
Website or Web Server Security Analysis
We’ll test your website or blog to see if it is vulnerable to being hacked.
Each page will be tested for security weaknesses. We’ll then provide you with a report that you can use to correct any problems. Our experts can also hack or anti-hack any website so, you can use their knowledge to get your hacked website back.
Smartphone Monitoring
There are situations when your smartphone is lost or stolen or even sometimes parents wants to get their child’s smartphone Monitored.
There are situations when your smartphone is lost or stolen or even sometimes parents wants to get their child’s smartphone Monitored, You can hire a hacker from our certified team of hackers to get your child’s smartphone to review their activities.
Hacked Website or Web Server Retrieval
If your website has been hacked, the most important thing is that you stay calm and systematically take the appropriate measures.
Network Security Analysis
Network Security Analysts design, implement and maintain computer and information security systems.
We can monitor networks to detect any suspicious or hostile activities, and take measures, such as installing firewalls, to defend against malicious attacks on the systems. You can hire an ethical hacker from our team to get your Network Security Analyzed.
Having your Computer hacked can be troublesome for both you and your family.
We often tend to panic in these kinds of situations and because of that, we are unable to see the obvious solutions to our problem. So if your computer got hacked, relax and contact us to hire a hacker from our team to get your computer system secured.
Bank Fraud Investigation
Bank fraud is the use of potentially illegal means to obtain money, assets, or other property owned or held by a financial institution
to obtain money from depositors by fraudulently posing as a bank or other financial institution. In many instances, bank fraud is a criminal offence. If you are a victim of bank fraud, Hire a hacker from our team to get this investigated & collect all legal evidences.
Computer System Monitoring
There are Parents who want to know what their child is doing on their computer system or employers sometimes wants to keep an eye on their employees workstation.
You can see what applications they use, who they talk to, what websites they visit, their social network activity, and much more. Virtually every activity performed on the computer and Internet is recorded in real-time for you to view whenever you wish. You will essentially have a chronological log book of everything they do, including searching and sorting abilities, at your disposal at all times.
Employee Monitoring
Employee monitoring allows a business to track employee activities and monitor worker engagement with workplace related tasks.
A business using employee monitoring on a computer can measure productivity, track attendance, ensure security and collect proof of hours worked. You can hire a hacker from our team to get this done.
Email Account Retrieval
We will get back your email’s password which you’ve forgot, All your backups or data like your personal email, documents, attached accounts, pictures & other media.
Hacked Social Media Account Retrieval

#Instagram Hacking
Hire a professional hacker to hack an Instagram account for you.

#Gmail Hacking
Hire a professional hacker to hack a gmail account for you.

#SnapChat Hacking
Hire a professional hacker to hack a Snapchat account for you.

Facebook Hacking
You present us with the Facebook username and we will get you the original password!

Youtube Hacking
Hire a professional hacker to hack YouTube account to retrieve YouTube channel

WhatsApp Hacking
WhatsApp has serious flaws in their security. One of the reasons we only use Telegram is because of these flaws.
Spy And Monitor
Hire a Hacker Pro is a team of highly skilled and certified hackers who are assigned cases by their expertise. If you are looking for a confidential cyber investigation of a loved one or someone you need to find out information about them or if you want to retrieve access to your compromised accounts, you are at the right place!
Cyber Investigations
Penetration Testing
Phone Hackers
Computer Hackers
iPad Hackers
Laptop Hackers
Track Lost Devices
Computer Hackers
E-mail Hacking
Password Hacking
Cell Phone Hacking
WhatsApp Hacking
Website Hacking
Social Media Hacking
Hashtag Power and Internet Dominance
Here are some hashtags that are often used to enhance dominance on Google and other major browsers. #hireahackerpro #hack #hacking #cybersecurity #pentest #security #root #kali #admin #exploit #linux #metasploit #ethicalhacker #infosec #pwned #vulnerability #hacker #code #whitehat #greyhat #pythonhack #indiehacker #coder #softwaredeveloper #coding #python #cybercrip #indielife #ubuntu #FreeFire #hacker #garenabrasil #freefirehack #freefireboyah #freefireproplayer #squad #freefiremobile #garenafreefirebrasil #freefireleague #freefiresquad#shodan
#hacking #hackers #hacker #ethicalhacker #ethicalhacking #kalilinux #linux #cyberpunk #cybersecurity #programmer #programmerlife #programming #coding #coder #javascript #python #tech #technology #malware #webdesign #webdeveloper #development #developer #100daysofcode #datavisualization #datascience#programmer #programming #coding #coderlife #code #coder #developer #development #webdeveloper #programminghumour #programmingmemes #softwaredeveloper #softwareengineer #software #hardware #computer #technology #hacker #hacking #c #html #javascript #java #webdeveloper #webdesign #geek #nerd #funny #bug #algorithm #u/malin_root #codepen #malin_root #Javascript #developer #java #php #instagood #i❤python #python #vscode #node #code #proramming #github #bash #var #git #django #rubyonrails #gitlab #webdev #webdevelopment #programmer #coding #pythoncode #design #hacker #html5 #css3 #grodno #programmerlife #codeblack #hacksquat #design
#hackerspace #hacked #webapp #html #codelife #hackintosh #programmer #hacker #programmerrepublic #javascript #programmerslife
#ai #hacktivist #coding #webdeveloper #codependency #hackney #tech #hacklife #programmerjokes #code #geek #webdesigner #hackaton #hackathon #hacker #hacking #cybersecurity #hackers #hack #linux #ethicalhacking #programming #coding #kalilinux #programmer #security #technology #python #anonymous #ethicalhacker #hacked #cyber #tech #infosec #pentesting #computer #cybercrime #code #coder #java #computerscience #hackerman #hackerindonesia #cybersecurity
#security #technology #hacking #hacker #tech #programming #coding #hack #linux #cyber #developer #anonymous #python #infosec #hacks #computerscience #computer #code #android #cybercrime #hacked #kalilinux #ethicalhacking #geekpentest #pentesting #ransomware
Contact us fast on Telegram.
submitted by hireahackerpro to u/hireahackerpro [link] [comments]

Crypto-Powered: Understanding Bitcoin, Ethereum, and DeFi

Crypto-Powered: Understanding Bitcoin, Ethereum, and DeFi
Until one understands the basics of this tech, they won’t be able to grasp or appreciate the impact it has on our digital bank, Genesis Block.
https://reddit.com/link/ho4bif/video/n0euarkifu951/player
This is the second post of Crypto-Powered — a new series that examines what it means for Genesis Block to be a digital bank that’s powered by crypto, blockchain, and decentralized protocols.
---
Our previous post set the stage for this series. We discussed the state of consumer finance and how the success of today’s high-flying fintech unicorns will be short-lived as long as they’re building on legacy finance — a weak foundation that is ripe for massive disruption.
Instead, the future of consumer finance belongs to those who are deeply familiar with blockchain tech & decentralized protocols, build on it as the foundation, and know how to take it to the world. Like Genesis Block.
Today we begin our journey down the crypto rabbit hole. This post will be an important introduction for those still learning about Bitcoin, Ethereum, or DeFi (Decentralized Finance). This post (and the next few) will go into greater detail about how this technology gives Genesis Block an edge, a superpower, and an unfair advantage. Let’s dive in…
https://preview.redd.it/1ugdxoqjfu951.jpg?width=650&format=pjpg&auto=webp&s=36edde1079c3cff5f6b15b8cd30e6c436626d5d8

Bitcoin: The First Cryptocurrency

There are plenty of online resources to learn about Bitcoin (Coinbase, Binance, Gemini, Naval, Alex Gladstein, Marc Andreessen, Chris Dixon). I don’t wanna spend a lot of time on that here, but let’s do a quick overview for those still getting ramped up.
Cryptocurrency is the most popular use-case of blockchain technology today. And Bitcoin was the first cryptocurrency to be invented.
Bitcoin is the most decentralized of all crypto assets today — no government, company, or third party can control or censor it.
Bitcoin has two primary features (as do most other cryptocurrencies):
  1. Send Value You can send value to anyone, anywhere in the world. Nobody can intercept, delay or stop it — not even governments or financial institutions. Unlike with traditional money transfers or bank wires, there are no layers of middlemen. This results in a process that is much more cost-efficient. Some popular use-cases include remittances and cross-border payments.
  2. Store Value With nothing but a smartphone, you can become your own bank and store your own funds. Nobody can seize your assets. The funds are digital and stored on a blockchain. Your money no longer needs to be stored at a bank, in a vault, or under your mattress. I covered a few inspiring use-cases in a previous post. They include banking the unbanked, protecting assets from government seizure, mitigating the risk of a bank run, and protection against hyperinflation (like what recently happened in Venezuela).
The fact that there are so few things one can do with Bitcoin is one of its greatest strengths.
Its design is simple, elegant, and focused. It has been 10+ years since Satoshi’s white paper and no one has been able to crack or hack the Bitcoin network. With a market cap of $170B, there is plenty of incentive to try.
https://preview.redd.it/bizndfpkfu951.png?width=800&format=png&auto=webp&s=456c53b798248e60456a65835a33c69b2fe8daf0

Public Awareness

A few negative moments in Bitcoin’s history include the collapse of Mt. Gox — which resulted in hundreds of millions of customer funds being stolen — as well as Bitcoin’s role in dark markets like Silk Road — where Bitcoin arguably found its initial userbase.
However, like most breakthrough technology, Bitcoin is neither good nor bad. It’s neutral. People can use it for good or they can use it for evil. Thankfully, it’s being used less and less for illicit activity. Criminals are starting to understand that transactions on a blockchain are public and traceable — it’s exactly the type of system they usually try to avoid. And it’s true, at this point “a lot more” crimes are actually committed with fiat than crypto.
As a result, the perception of bitcoin and cryptocurrency has been changing over the years to a more positive light.
Bitcoin has even started to enter the world of media & entertainment. It’s been mentioned in Hollywood films like Spiderman: Into the Spider-Verse and in songs from major artists like Eminem. It’s been mentioned in countless TV shows like Billions, The Simpsons, Big Bang Theory, Gray’s Anatomy, Family Guy, and more.
As covid19 has ravaged economies and central banks have been printing money, Bitcoin has caught the attention of many legendary Wall Street investors like Paul Tudor Jones, saying that Bitcoin is a great bet against inflation (reminding him of Gold in the 1970s).
Cash App already lets their 25M users buy Bitcoin. It’s rumored that PayPal and Venmo will soon let their 325M users start buying Bitcoin. Bitcoin is by far the most dominant cryptocurrency and is showing no signs of slowing down. For more than a decade it has delivered on its core use-cases — being able to send or store value.
At this point, Bitcoin has very much entered the zeitgeist of modern pop culture — at least in the West.
https://preview.redd.it/dnuwbw8mfu951.png?width=800&format=png&auto=webp&s=6f1f135e3effee4574b5167901b80ced2c972bda

Ethereum: Programmable Money

When Ethereum launched in 2015, it opened up a world of new possibilities and use-cases for crypto. With Ethereum Smart Contracts (i.e. applications), this exciting new digital money (cryptocurrency) became a lot less dumb. Developers could now build applications that go beyond the simple use-cases of “send value” & “store value.” They could program cryptocurrency to have rules, behavior, and logic to respond to different inputs. And always enforced by code. Additional reading on Ethereum from Linda Xie or Vitalik Buterin.
Because these applications are built on blockchain technology (Ethereum), they preserve many of the same characteristics as Bitcoin: no one can stop, censor or shut down these apps because they are decentralized.
One of the first major use-cases on Ethereum was the ability to mint and create your own token, your own cryptocurrency. Many companies used this as a way to fundraise from the public. This led to the 2017 ICO bubble (Initial Coin Offerings). Some tokens — and the apps/networks they powered — were fascinating and innovative. Most tokens were pointless. And many tokens were outright scams. Additional token reading from Fred Ehrsam, Balaji, and Naval.
https://reddit.com/link/ho4bif/video/b5b1jh9ofu951/player

Digital Gold Rush

Just as tokens grew in popularity in 2017–2018, so did online marketplaces where these tokens could be bought, sold, and traded. This was a fledgling asset class — the merchants selling picks, axes, and shovels were finally starting to emerge.
I had a front-row seat — both as an investor and token creator. This was the Wild West with all the frontier drama & scandal that you’d expect.
Binance — now the world’s largest crypto exchange —was launched during this time. They along with many others (especially from Asia) made it really easy for speculators, traders, and degenerate gamblers to participate in these markets. Similar to other financial markets, the goal was straightforward: buy low and sell high.
https://preview.redd.it/tytsu5jnfu951.jpg?width=600&format=pjpg&auto=webp&s=fe3425b7e4a71fa953b953f0c7f6eaff6504a0d1
That period left an embarrassing stain on our industry that we’ve still been trying to recover from. It was a period rampant with market manipulation, pump-and-dumps, and scams. To some extent, the crypto industry still suffers from that today, but it’s nothing compared to what it was then.
While the potential of getting filthy rich brought a lot of fly-by-nighters and charlatans into the industry, it also brought a lot of innovators, entrepreneurs, and builders.
The launch and growth of Ethereum has been an incredible technological breakthrough. As with past tech breakthroughs, it has led to a wave of innovation, experimentation, and development. The creativity around tokens, smart contracts, and decentralized applications has been fascinating to witness. Now a few years later, the fruits of those labors are starting to be realized.

DeFi: Decentralized Finance

So as a reminder, tokens are cryptocurrencies. Cryptocurrencies can carry value. And value is a lot like money. Because tokens are natively integrated with Ethereum, it’s been natural for developers to build applications related to financial services — things like lending, borrowing, saving, investing, payments, and insurance. In the last few years, there has been a groundswell of developer momentum building in this area of financial protocols. This segment of the industry is known as DeFi (Decentralized Finance).
https://preview.redd.it/f0sjzqspfu951.png?width=461&format=png&auto=webp&s=8e0a31bf29250fc624918fbd8514b008762f379e
In Q2 of 2020, 97% of all Ethereum activity was DeFi-related. Total DeFi transaction volume has reached $11.5B. The current value locked inside DeFi protocols is approaching $2 Billion (double from a month ago). DeFi’s meteoric growth cannot be ignored.
Most of that growth can be attributed to exciting protocols like Compound, Maker, Synthetix, Balancer, Aave, dYdX, and Uniswap. These DeFi protocols and the financial services they offer are quickly becoming some of the most popular use-cases for blockchain technology today.
https://preview.redd.it/wn3phnkqfu951.png?width=800&format=png&auto=webp&s=02f56caa6b94aa59eadd6e368ef9346ba10c7611
This impressive growth in DeFi certainly hasn’t come without growing pains. Unlike with Bitcoin, there are near-infinite applications one can develop on Ethereum. Sometimes bugs (or typos) can slip through code reviews, testing, and audits — resulting in loss of funds.
Our next post will go much deeper on DeFi.

Wrap Up

I know that for the hardcore crypto people, what we covered today is nothing new. But for those who are still getting up to speed, welcome! I hope this was helpful and that it fuels your interest to learn more.
Until you understand the basics of this technology, you won’t be able to fully appreciate the impact that it has on our new digital bank, Genesis Block. You won’t be able to understand the implications, how it relates, or how it helps.
After today’s post, some of you probably have a lot more questions. What are specific examples or use-cases of DeFi? Why does it need to be on a blockchain? What benefits does it bring to Genesis Block and our users?
In upcoming posts, we answer these questions. Today’s post was just Level 1. It set the foundation for where we’re headed next: even deeper down the crypto rabbit hole.
---
Other Ways to Consume Today's Episode:
We have a lot more content coming. Be sure to follow our channels: https://genesisblock.com/follow/
Have you already downloaded the app? We're Genesis Block, a new digital bank that's powered by crypto & decentralized protocols. The app is live in the App Store (iOS & Android). Get the link to download at https://genesisblock.com/download
submitted by mickhagen to genesisblockhq [link] [comments]

Anyone still under the illusion of Microsoft having been transformed into a kinder, more mutually beneficial partner, please read this patent.

WO2020060606 - CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA
https://patentscope.wipo.int/search/en/detail.jsf?docId=WO2020060606&tab=PCTDESCRIPTION
Before reading the following excerpts, keep this sequence of events in mind:
Master Slave (and we're not referring to HDDs here)
Step one: patent technology
Step two: sell slave IoT devices to consumers who readily purchase them especially after being promised that they'll be rewarded in cryotocurrency for their data.
Step three: collect data via Azure on unsuspecting human subjects' fMRI, EEG, body temperatures, EKG, sleep data, digitized health care information, consumer purchasing habits, reading and viewing preferences, social media activity and correlate with activities performed (tasks).
Step four: Use data to refine AI to profile human behavior, predict behavior and refine mind reading capabilities.
This article is actually incorporated in the patent!
https://news.berkeley.edu/2011/09/22/brain-movies/ Scientists use brain imaging to reveal the movies in our mind
Step five: Institute centralized global cryptocurrency financial system with no other alternatives in which to transact legally.
https://www.reddit.com/Bitcoin/comments/4nag4b/1988_economist_cover_predicting_a_world_currency/
https://www.economist.com/finance-and-economics/1998/09/24/one-world-one-money
Step six: To understand step six, Read George Orwell's "1984" or review the concept of an individual's freedoms being based not on the concept of natural rights but on their social credit scores.
Thank you Microsoft, Google, Apple, Amazon, Facebook.
Now the patent excerpts:
CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA
BACKGROUND [0001] A virtual currency (also known as a digital currency) is a medium of exchange implemented through the Internet generally, not tied to a specific government-backed “flat” (printed) currency such as the U.S. dollar or the Euro, and typically designed to allow instantaneous transactions and borderless transfer of ownership. One example of virtual currency is cryptocurrency, wherein cryptography is used to secure transactions and to control the creation of new units. [0002] Several cryptocurrencies exist. Among these, the most well known is a blockchain-based cryptocurrency. Most blockchain-based cryptocurrency is decentralized in the sense that it has no central point of control.
However, blockchain-based cryptocurrency can also be implemented in a centralized system having a central point of control over the cryptocurrency.
Bitcoin is one of the examples of blockchain-based cryptocurrency. It is described in a 2008 article by Satoshi Nakamoto, named“Bitcoin: A peer-to-Peer Electronic Cash System”.
[0003] A blockchain is a data structure that stores a list of transactions and can be thought of as a distributed electronic ledger that records transactions between source identifier(s) and destination identifier(s). The transactions are bundled into blocks and every block (except for the first block) refers back to or is linked to a prior block in the blockchain. Computer resources (or nodes, etc.) maintain the blockchain and cryptographically validate each new block and the transactions contained in the corresponding block. This validation process includes computationally solving a difficult problem that is also easy to verify and is sometimes called a“proof-of-work”. This process is referred to as“mining”. The mining may be a random process with low probability so that a lot of trial and error is required to solve a computationally difficult problem. Accordingly, the mining may require enormous amounts of computational energy. [0004] It is with respect to these and other general considerations that the following embodiments have been described. Also, although relatively specific problems have been discussed, it should be understood that the embodiments should not be limited to solving the specific problems identified in the background.
SUMMARY
[0005] Some exemplary embodiments of the present disclosure may use human body activity associated with a task provided to a user as a solution to“mining” challenges in cryptocurrency systems. For example, a brain wave or body heat emitted from the user when the user performs the task provided by an information or service provider, such as viewing advertisement or using certain internet services, can be used in the mining process. Instead of massive computation work required by some conventional cryptocurrency systems, data generated based on the body activity of the user can be a proof-of-work, and therefore, a user can solve the computationally difficult problem unconsciously. Accordingly, certain exemplary embodiments of the present disclosure may reduce computational energy for the mining process as well as make the mining process faster.
[0006] Systems, methods, and hardware aspects of computer readable storage media are provided herein for a cryptocurrency system using human body activity data. According to various embodiments of the present disclosure, a server may provide a task to a device of a user which is communicatively coupled to the server. A sensor communicatively coupled to or comprised in the device of the user may sense body activity of the user. Body activity data may be generated based on the sensed body activity of the user. A cryptocurrency system communicatively coupled to the device of the user may verify whether or not the body activity data satisfies one or more conditions set by the cryptocurrency system, and award cryptocurrency to the user whose body activity data is verified.
[0007] Examples are implemented as a computer process, a computing system, or as an article of manufacture such as a device, computer program product, or computer readable medium. According to one aspect, the computer program product is a computer storage medium readable by a computer system and encoding a computer program comprising instructions for executing a computer process. [0008] This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
decentralized cryptocurrency networks or databases.
[0021] FIG. 1 illustrates an example environment 100 in which some exemplary embodiments of the present disclosure may be practiced. The example environment 100 includes, but is not limited to, at least one of task server 110, communication network 120, user device 130, sensor 140, and cryptocurrency system 150. [0022] Task server 110 may provide one or more tasks to user device 130 over communication network 120. For example, task server 110 may be at least one of a web server delivering or serving up web pages, an application server handling application operations between users and applications or databases, a cloud server, a database server, a file server, a service server, a game server implementing games or services for a game, and a media server delivering media such as streaming video or audio. The tasks provided by task server 110 will be discussed in more detail below.
[0023] Alternatively, cryptocurrency system 150 may provide one or more tasks to user device 130. For example, in a decentralized cryptocurrency network, the tasks may be proposed to user device 130 by miners (e.g. compute resources or nodes 210 of FIG. 2). In another example, in a centralized cryptocurrency system, a cryptocurrency server may send the tasks to user device 130.
[0024] Communication network 120 may include any wired or wireless connection, the internet, or any other form of communication. Although one network 120 is identified in FIG. 1, communication network 120 may include any number of different communication networks between any of the server, devices, resource and system shown in FIGS. 1 and 2 and/or other servers, devices, resources and systems described herein. Communication network 120 may enable communication between various computing resources or devices, servers, and systems. Various implementations of communication network 120 may employ different types of networks, for example, but not limited to, computer networks, telecommunications networks (e.g., cellular), mobile wireless data networks, and any combination of these and/or other networks. [0025] User device 130 may include any device capable of processing and storing data/information and communicating over communication network 120. For example, user device 130 may include personal computers, servers, cell phones, tablets, laptops, smart devices (e.g. smart watches or smart televisions). An exemplary embodiment of user device 130 is illustrated in FIG. 6.
[0026] Sensor 140 may be configured to sense the body activity of user 145. As illustrated in FIG. 1, sensor 140 may be a separate component from user device 130 and be operably and/or communicatively connected to user device 130. Alternatively, sensor 140 may be included and integrated in user device 130. For example, user device 130 may be a wearable device having sensor 140 therein. The sensor 140 may transmit information/data to user device 130. Sensor 140 may include, for example, but not limited to, functional magnetic resonance imaging (fMRI) scanners or sensors, electroencephalography (EEG) sensors, near infrared spectroscopy (NIRS) sensors, heart rate monitors, thermal sensors, optical sensors, radio frequency (RF) sensors, ultrasonic sensors, cameras, or any other sensor or scanner that can measure or sense body activity or scan human body. For instance, the fMRI may measure body activity by detecting changes associated with blood flow. The fMRI may use a magnetic field and radio waves to create detailed images of the body (e.g. blood flow in the brain to detect areas of activity). The material (http://news.berkely.edu/20l l/09/22/brain-movies/) shows one example of how the fMRI can measure brain activity associated with visual information and generate image data.
[0027] Cryptocurrency system 150 may include one or more processors for processing commands and one or more memories storing information in one or more cryptocurrency data structures. In some embodiments, cryptocurrency system 150 may be a centralized cryptocurrency system or network, for example, but not limited to, a server which may be privately run by a third party entity or the same entity that is running the task server 110. In other embodiments, cryptocurrency system 150 may be a publically accessible network system (e.g., a distributed decentralized computing system).
https://news.berkeley.edu/2011/09/22/brain-movies/ Scientists use brain imaging to reveal the movies in our mind
WO2020060606 - CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA
https://patentscope.wipo.int/search/en/detail.jsf?docId=WO2020060606&tab=PCTDESCRIPTION
Applicants * MICROSOFT TECHNOLOGY LICENSING, LLC[US/US]; One Microsoft Way Redmond, Washington 98052-6399, US
CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA
BACKGROUND [0001] A virtual currency (also known as a digital currency) is a medium of exchange implemented through the Internet generally, not tied to a specific government-backed “flat” (printed) currency such as the U.S. dollar or the Euro, and typically designed to allow instantaneous transactions and borderless transfer of ownership. One example of virtual currency is cryptocurrency, wherein cryptography is used to secure transactions and to control the creation of new units. [0002] Several cryptocurrencies exist. Among these, the most well known is a blockchain-based cryptocurrency. Most blockchain-based cryptocurrency is decentralized in the sense that it has no central point of control.
However, blockchain-based cryptocurrency can also be implemented in a centralized system having a central point of control over the cryptocurrency.
Bitcoin is one of the examples of blockchain-based cryptocurrency. It is described in a 2008 article by Satoshi Nakamoto, named“Bitcoin: A peer-to-Peer Electronic Cash System”.
[0003] A blockchain is a data structure that stores a list of transactions and can be thought of as a distributed electronic ledger that records transactions between source identifier(s) and destination identifier(s). The transactions are bundled into blocks and every block (except for the first block) refers back to or is linked to a prior block in the blockchain. Computer resources (or nodes, etc.) maintain the blockchain and cryptographically validate each new block and the transactions contained in the corresponding block. This validation process includes computationally solving a difficult problem that is also easy to verify and is sometimes called a“proof-of-work”. This process is referred to as“mining”. The mining may be a random process with low probability so that a lot of trial and error is required to solve a computationally difficult problem. Accordingly, the mining may require enormous amounts of computational energy.
[0004] It is with respect to these and other general considerations that the following embodiments have been described. Also, although relatively specific problems have been discussed, it should be understood that the embodiments should not be limited to solving the specific problems identified in the background.
SUMMARY
[0005] Some exemplary embodiments of the present disclosure may use human body activity associated with a task provided to a user as a solution to“mining” challenges in cryptocurrency systems. For example, a brain wave or body heat emitted from the user when the user performs the task provided by an information or service provider, such as viewing advertisement or using certain internet services, can be used in the mining process. Instead of massive computation work required by some conventional cryptocurrency systems, data generated based on the body activity of the user can be a proof-of-work, and therefore, a user can solve the computationally difficult problem unconsciously. Accordingly, certain exemplary embodiments of the present disclosure may reduce computational energy for the mining process as well as make the mining process faster.
[0006] Systems, methods, and hardware aspects of computer readable storage media are provided herein for a cryptocurrency system using human body activity data. According to various embodiments of the present disclosure, a server may provide a task to a device of a user which is communicatively coupled to the server. A sensor communicatively coupled to or comprised in the device of the user may sense body activity of the user. Body activity data may be generated based on the sensed body activity of the user. A cryptocurrency system communicatively coupled to the device of the user may verify whether or not the body activity data satisfies one or more conditions set by the cryptocurrency system, and award cryptocurrency to the user whose body activity data is verified.
[0007] Examples are implemented as a computer process, a computing system, or as an article of manufacture such as a device, computer program product, or computer readable medium. According to one aspect, the computer program product is a computer storage medium readable by a computer system and encoding a computer program comprising instructions for executing a computer process.
[0008] This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
decentralized cryptocurrency networks or databases. [0021] FIG. 1 illustrates an example environment 100 in which some exemplary embodiments of the present disclosure may be practiced. The example environment 100 includes, but is not limited to, at least one of task server 110, communication network 120, user device 130, sensor 140, and cryptocurrency system 150.
[0022] Task server 110 may provide one or more tasks to user device 130 over communication network 120. For example, task server 110 may be at least one of a web server delivering or serving up web pages, an application server handling application operations between users and applications or databases, a cloud server, a database server, a file server, a service server, a game server implementing games or services for a game, and a media server delivering media such as streaming video or audio. The tasks provided by task server 110 will be discussed in more detail below.
[0023] Alternatively, cryptocurrency system 150 may provide one or more tasks to user device 130. For example, in a decentralized cryptocurrency network, the tasks may be proposed to user device 130 by miners (e.g. compute resources or nodes 210 of FIG. 2). In another example, in a centralized cryptocurrency system, a cryptocurrency server may send the tasks to user device 130.
[0024] Communication network 120 may include any wired or wireless connection, the internet, or any other form of communication. Although one network 120 is identified in FIG. 1, communication network 120 may include any number of different communication networks between any of the server, devices, resource and system shown in FIGS. 1 and 2 and/or other servers, devices, resources and systems described herein. Communication network 120 may enable communication between various computing resources or devices, servers, and systems. Various implementations of communication network 120 may employ different types of networks, for example, but not limited to, computer networks, telecommunications networks (e.g., cellular), mobile wireless data networks, and any combination of these and/or other networks.
[0025] User device 130 may include any device capable of processing and storing data/information and communicating over communication network 120. For example, user device 130 may include personal computers, servers, cell phones, tablets, laptops, smart devices (e.g. smart watches or smart televisions).
An exemplary embodiment of user device 130 is illustrated in FIG. 6.
[0026] Sensor 140 may be configured to sense the body activity of user 145. As illustrated in FIG. 1, sensor 140 may be a separate component from user device 130 and be operably and/or communicatively connected to user device 130. Alternatively, sensor 140 may be included and integrated in user device 130. For example, user device 130 may be a wearable device having sensor 140 therein. The sensor 140 may transmit information/data to user device 130. Sensor 140 may include, for example, but not limited to, functional magnetic resonance imaging (fMRI) scanners or sensors, electroencephalography (EEG) sensors, near infrared spectroscopy (NIRS) sensors, heart rate monitors, thermal sensors, optical sensors, radio frequency (RF) sensors, ultrasonic sensors, cameras, or any other sensor or scanner that can measure or sense body activity or scan human body. For instance, the fMRI may measure body activity by detecting changes associated with blood flow. The fMRI may use a magnetic field and radio waves to create detailed images of the body (e.g. blood flow in the brain to detect areas of activity). The material (http://news.berkely.edu/20l l/09/22/brain-movies/) shows one example of how the fMRI can measure brain activity associated with visual information and generate image data.
[0027] Cryptocurrency system 150 may include one or more processors for processing commands and one or more memories storing information in one or more cryptocurrency data structures. In some embodiments, cryptocurrency system 150 may be a centralized cryptocurrency system or network, for example, but not limited to, a server which may be privately run by a third party entity or the same entity that is running the task server 110. In other embodiments, cryptocurrency system 150 may be a publically accessible network system (e.g., a distributed decentralized computing system).
https://news.berkeley.edu/2011/09/22/brain-movies/ Scientists use brain imaging to reveal the movies in our mind
submitted by snowboardnirvana to MVIS [link] [comments]

The Best Cryptocurrency Mining Pools in 2020

This review is not sponsored! Neither it is an ad.
How to choose a mining pool? How to avoid stale shares? The pros and cons of different services.

What is a cryptocurrency mining pool?

A “mining pool" is a server that distributes the task of calculating the block signature between all connected participants. The contribution of each of them is evaluated using the so-called “shares”, which are potential candidates for receiving a signature. As soon as one of the “shares” hits the target, the pool announces the readiness of the block and distributes the reward.
However, if you participate in the pool, then you will have to share the profit with all the participants in the pool, but for the majority, this usually is the most profitable option.

Which pool is better for mining?

The best mining pools should meet the following criteria:

Key selection criteria

To select a good pool for each specific cryptocurrency, you need to carefully study all the information available about it on its website and on the forums.
To reduce the number of stale shares, it is better to mine on the pool closest to the miner. You can choose the fastest mining pool by studying the information about the processing speed of the share in the mining program or by pinging the time it takes for the signal to pass from the miner's computer to the servers of the pool.

10 most popular and powerful pools: Description

ViaBTC

Coins: BTC, BCH, BSV, LTC, ETH, ETC, ZEC, DASH, XMR, CKB
Commission: 3%, lifetime discount: 1%

EMCD

Coins: BTC, BSV, BCH, LTC, ETC, ETH, DASH
Commission: 0%. There is a donation option: 0.5% of the income

Ethermine

Coins: ETH, ETC, ZEC
Commission: 1%

F2pool

Coins: BTC, LTC, and many other coins
Commission: 3-5%

NanoPool

Coins: XMR, ETH, ETC, SiaCoin, ZEC, PASC, ETN
Commission:1%

Mining Pool Hub

Coins: BTC, BSV, BCH, LTC
Commission: 0.9%

NiceHash

Coins: BTC, ETH, XRP, BCH, LTC, ZEC, DASH, XLM, EOS, USDT, LINK, BAT, ZRX, HOT, OMG, REP, BTG, NEXO, MATIC, ENJ, SNT, ELF, BNT, KNC, POLY, MTL + 20 more.
Commission: 2-5%

Coinotron

Coins: ETH, ETC, PASC, LTC, Zcash, BTG, DASH, FTC, VTC
Commission: 1-1.5%

Monero Mining Pool

Coins: XMR
Commission: 2%

Baikalmine

Coins: ETH, ETC, MOAC, CLO
Commission: 0.5-1%

Independent Pool Statistics

To make sure that the pools work and really exist, check independent sources. These are:
Keep up with the news of the crypto world at CoinJoy.io Follow us on Twitter and Medium. Subscribe to our YouTube channel. Join our Telegram channel. For any inquiries mail us at [[email protected]](mailto:[email protected]).
submitted by CoinjoyAssistant to dogemining [link] [comments]

The Best Cryptocurrency Mining Pools in 2020

This review is not sponsored! Neither it is an ad.
How to choose a mining pool? How to avoid stale shares? The pros and cons of different services.

What is a cryptocurrency mining pool?

A “mining pool" is a server that distributes the task of calculating the block signature between all connected participants. The contribution of each of them is evaluated using the so-called “shares”, which are potential candidates for receiving a signature. As soon as one of the “shares” hits the target, the pool announces the readiness of the block and distributes the reward.
However, if you participate in the pool, then you will have to share the profit with all the participants in the pool, but for the majority, this usually is the most profitable option.

Which pool is better for mining?

The best mining pools should meet the following criteria:

Key selection criteria

To select a good pool for each specific cryptocurrency, you need to carefully study all the information available about it on its website and on the forums.
To reduce the number of stale shares, it is better to mine on the pool closest to the miner. You can choose the fastest mining pool by studying the information about the processing speed of the share in the mining program or by pinging the time it takes for the signal to pass from the miner's computer to the servers of the pool.

10 most popular and powerful pools: Description

ViaBTC

Coins: BTC, BCH, BSV, LTC, ETH, ETC, ZEC, DASH, XMR, CKB
Commission: 3%, lifetime discount: 1%

EMCD

Coins: BTC, BSV, BCH, LTC, ETC, ETH, DASH
Commission: 0%. There is a donation option: 0.5% of the income

Ethermine

Coins: ETH, ETC, ZEC
Commission: 1%

F2pool

Coins: BTC, LTC, and many other coins
Commission: 3-5%

NanoPool

Coins: XMR, ETH, ETC, SiaCoin, ZEC, PASC, ETN
Commission:1%

Mining Pool Hub

Coins: BTC, BSV, BCH, LTC
Commission: 0.9%

NiceHash

Coins: BTC, ETH, XRP, BCH, LTC, ZEC, DASH, XLM, EOS, USDT, LINK, BAT, ZRX, HOT, OMG, REP, BTG, NEXO, MATIC, ENJ, SNT, ELF, BNT, KNC, POLY, MTL + 20 more.
Commission: 2-5%

Coinotron

Coins: ETH, ETC, PASC, LTC, Zcash, BTG, DASH, FTC, VTC
Commission: 1-1.5%

Monero Mining Pool

Coins: XMR
Commission: 2%

Baikalmine

Coins: ETH, ETC, MOAC, CLO
Commission: 0.5-1%

Independent Pool Statistics

To make sure that the pools work and really exist, check independent sources. These are:
Keep up with the news of the crypto world at CoinJoy.io Follow us on Twitter and Medium. Subscribe to our YouTube channel. Join our Telegram channel. For any inquiries mail us at [[email protected]](mailto:[email protected]).
submitted by CoinjoyAssistant to MiningPoolHub [link] [comments]

Get 100 Ghs Bonus Free  Letit.Cloud New Free Bitcoin Cloud Mining Website Review By Mining Hyip Mining Bitcoin Cloud Mining Best Bitcoin Cloud Service - Start Mining Bitcoins BitProfitsMining - New Free Bitcoin Cloud Mining Site 2020 I Earn 0.002 Bitcoin without investment New Free Bitcoin Cloud Mining Website 2020 Zero Investment  BoostCryptoCapital Review 2020 Most Profitable Cloud Mining Website By Uniexcompany

A Beginner’s Guide to Bitcoin Cloud Mining. By: Ofir Beigel | Last updated: 5/2/20. Cloud mining is a general term given for sites that charge a monthly fee in exchange for mining cryptocurrency for you. In this post I’ll cover what cloud mining is in detail and expose the truth about its profitability. Cloud Mining Summary Best Bitcoin Cloud Hashing Services. Being listed in this section is NOT an endorsement of these services and is to serve merely as a Bitcoin cloud mining comparison. There have been a tremendous amount of Bitcoin cloud mining scams. Two big cases of cloud mining scams are HashOcean and Bitcoin Cloud Services, which got accused of running a $500,000 Bitcoin Mining Ponzi-scheme and have since shut down. Cloud Mining Viruses. There are quite a bit of virus going around that infect computers and mines Bitcoin from that device. Cons: Bitcoin-only. No multi-factor authentication. Bottom Line: While it's Bitcoin-only, Copay Bitcoin Wallet has a lot going for it. This cryptocurrency wallet is easy to use, supports multi Cloud Mining Sales by Country (TokenInsight 2019) Concerns about Cloud Mining. There are a few main concerns with cloud mining; (1) the platform could be a straight up scam and Ponzi scheme (2

[index] [12265] [17085] [24438] [23406] [26116] [3701] [30740] [28412] [10386] [15994]

Get 100 Ghs Bonus Free Letit.Cloud New Free Bitcoin Cloud Mining Website Review By Mining Hyip

New Free Bitcoin Mining Sites 2020 New Free BTC Cloud Mining Sites Apexhash Review Best Mining Welcome To Our YouTube Channel. We Upload Everyday Online Earning Related Videos You Can Earn ... New launching bitcoin cloud mining site updates 12. Latest updates earning video ... #best_timing_for_investment Get 100 Ghs Bonus Free Letit.Cloud New Free Bitcoin Cloud Mining Website Review ... WOW 😍 100% FREE REAL LEGIT Bitcoin Mining Site 2020 + Payment Proof _ Earn Free Bitcoins Daily - Duration: 11:29. 99 studio 7,010 views Hi, Friends Welcome To Nayem TecH ___ OMG::FREE BITCOIN ! Earn Every Day 0.01 Bitcoin Free With Free Bitcoin Cloud Mining + Payment Proof How to Create Faucetpay Account Video Link:https://youtu ... This is a Review Channel. Where I Daily Review New Earning Websites. ... Hashflare Vs Minergate Cloud Bitcoin Mining Which One Is The Best? - Duration: 9:03. cryptonoob 16,021 views.

Flag Counter