Getting Started with Bitcoin Mining & Hosting - D-Central
getblocktemplate - Bitcoin Wiki
could mining pools be charged for violating sanctions?
If those running a bitcoin mixer can be charged for violating AML, can a centralized mining pool charged for mining a transaction violating sanctions? Mining pools are relatively large organizations that control what transactions get into the block as they create the block template using the bitcoin protocol. Thus they have 'ownership' of what transactions are processed. They outsource some of the POW hashing to 'ASIC' operators ( that are not responsible for selecting transactions ) large organizations generate allot of revenue and hire multiple people and present a large target for law enforcement vs a random solo miner that mines a block every now then. They are more likely to be compliant with requests to censor transactions to protect their 'reputation/business' This is, why protocols like better-hash needs to be widely adopted because, with better hash the pool is _NOT_ responsible for selecting transactions - all it will do is pool the rewards. Individual miners in the pool can create their own block templates. Thus they are no longer ASIC operators as they need to run a full node to create the block template. I think betterhash will decentralize legal liabilities of the mining pool. Any point of centralization in bitcoin like a custodian mixing service is vulnerable to legal action.
Upcoming Major Riecoin 0.20 Upgrade A new major Riecoin upgrade is planned, and includes a hard fork. Below is a summary of the changes so far and the hard fork improvements. More details can be found on BitcoinTalk. Feel free to ask Pttn there or on Discord if you have questions regarding the update. The first step of this upgrade was to update the base code to Bitcoin’s 0.20, which is done. You can find the experimental code at the Github repository. Experimental binaries can also be downloaded here. Despite their prerelease status, they should work fine, though please backup your wallets if you plan to use 0.20, just in case. Pool operators and other advanced Riecoin users should start looking into the changes and update their software accordingly, as well as closely follow the Riecoin Core development. Here is a list of notable changes from 0.16.3.1.
There were inconsistencies regarding the nTime and nBits positions in the Block Header. This is now fixed, with nTime always coming before nBits like for Bitcoin. Note that rieMiner needs an update to Solo Mine with 0.20, which is already available;
Testnet was reset. Additionally, the constellations for Testnet are no longer sextuplets, but quadruplets, and the minimum Difficulty was raised to 600. If you want to run a public Testnet node, please use the bootstrap found here and share your node IP;
The “getnetworkhashps” command was replaced by “getnetworkminingpower” and uses a new metric, standardized such that 1 correspond to mining a minimum difficulty block (Difficulty 304 in Mainnet or 600 in Testnet) every 150 s;
The GetBlockTemplate’s “primes” field is replaced by “constellations”, which gives a list of accepted constellations for mining. The “segwit” rule is now mandatory;
The “getprimes” RPC call is replaced by “getresult” and gives directly the base prime number, instead of all the prime numbers;
Generated addresses are now Bech32 by default;
The RegTest is now properly implemented (the PoW here is simply prime numbers). Most of the test units were ported to Riecoin;
And of course, all the Bitcoin features and bug fixes since 0.17 are now included in Riecoin. Read the Bitcoin Core change logs for more information.
The next step will be the hard fork, in order to improve Riecoin in multiple ways. Here is the list of planned changes.
The constellation pattern will be changed from sextuplets to septuplets (quintuplets in Testnet). Both possible patterns will be accepted, so the blockchain will provide more diverse results. One of them will have a chance to be a 8-tuple or longer, which would help a lot to beat records and improve the Riecoin’s scientific usefulness. Moreover, longer tuples are more practical as PoW;
The SuperBlock system will be removed. While records have indeed been broken this way, it also has significant drawbacks, like freezing the network during an hour every week and a complicated implementation that also confuses a lot of people;
The Difficulty Adjustment Algorithm will be updated to improve the network’s robustness and make the adjustment more dynamic. No particular algorithm has been chosen yet and the discussion is open;
The nOffset encoding will be updated in order to allow more efficient mining.
Once the development is advanced enough, a date will be chosen for the hard fork. Testnet will be hardforked first to ensure the well functioning of the implementation. Stay tuned!
There have been many recent posts about the blackmail email scam, so I have written this post and will keep it stickied until the posts about the scam die down. If you are reading this because you have received one of these emails and you are worried, you can stop worrying. The blackmail email scam is a spam campaign that is sent out to thousands of addresses at a time. In al cases, the threats are lies and you do not have anything to worry about. In many cases, the emails will contain information about you such as your name, part or all of your phone number, and your password.The emails may also look like they were sent from your own email address. The data is gathered from data breaches, and if the email looks like it came from your account that is due to email spoofing. You can use the service Have I Been Pwned? to see if you are in any publicly known data breaches. If you receive an email that contains a password that you currently use, you should immediately change that. Current recommended password guidelines say that you should use a different, complex password for every account. You can generate and save passwords using a password manager for convenience. You should also be using two factor authentication using an app like Google Authenticator instead of receiving codes through SMS. Here are some news articles about this scam. Here is a story from Brian Krebs, and here is a story from the New York Times. Below are a few examples, but if you receive an email that is similar but not the same as the examples you see, that does not matter and does not mean that the email is real. The spammers constantly switch up their templates in order to bypass spam filters, so it's normal to receive an email that hasn't yet been posted online. Hey there So I am the hacker who cracked your email address and device a few weeks back. You typed in your pwd on one of the sites you visited, and I intercepted that. Here is your password from (redacted) upon time of compromise: (redacted) Obviously you can can change it, or even already changed it. However it won't really matter, my malware modified it every time. Do not really try to contact me personally or find me. Via your email, I uploaded harmful code to your Operation System. I saved your entire contacts together with buddies, fellow workers, loved ones along with a entire history of visits to the World wide web resources. Also I set up a Virus on your system. You aren't my only target, I generally lock computers and ask for a ransom. But I was hit by the web pages of romantic material that you normally stop by. I am in shock of your own fantasies! I have never ever noticed anything at all like this! Consequently, when you had enjoyment on piquant web-sites (you know what I am talking about!) I made screenshot with utilizing my program from your camera of yours device. There after, I put together them to the content of the currently viewed site. There will certainly be giggling when I send these pics to your connections! Nevertheless I am certain you do not need this. Therefore, I expect to have payment from you for my silence. I feel $859 is an satisfactory price for this! Pay with Bitcoin. My Bitcoin wallet is xxxxxxxxxxxxxxxxxxxxxxxxxxxxx If you do not really understand how to do this - submit in to Google 'how to transfer money to the bitcoin wallet'. It is easy. Immediately after getting the given amount, all your files will be right away destroyed automatically. My computer virus will also get rid of itself through your operating-system. My Trojan viruses have auto alert, so I know when this specific e mail is read. I give you 2 days (48 hours) to make a payment. If this does not occur - just about all your associates will get outrageous pictures from your darkish secret life and your system will be blocked as well after two days. Do not end up being foolish! Police or buddies won't support you for sure ... P.S I can provide you with recommendation for the future. Do not type in your security passwords on risky web pages. I wish for your wisdom. Bon voyage. Your computer device was attacked by the malicious app . Whats the trouble? I placed my malicious agent on a erotica portal, you clicked on this data and promptly adjusted the malware to your computer . The hostile program made your selfie-camera shooting and I enjoy the videotape with you dash your doodle. In next 5 hours this hostile program copied all your contacts. Right now, I receive your all your contact information and video with you masturbating, and now if you wish me to destroy all the data affect payment 350 $USD in BTC digital currency. Other way I want forward that this record to all your contacts . I forward you my Bitcoin wallet - XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX You possess 27 hours after reading. In a case if I possess transaction I am going to undo that this record once for all. I beg pardon for my mistakes- I live in China . P.S. this postal address, I have thieved it Good day, If you had been more careful while caressing yourself, I wouldn't worry you. I don't think that playing with yourself is very bad, but when all your colleagues, relatives and friends get a video recording of it - it is definitely bad for you. I placed malicious software on a website for adults (with porn) which was visited by you. When the target taps on a play button, your device starts recording the screen and all cameras on your device begin to work. Moreover, my program allows a remote desktop connection with keylogger function from the device, so I could collect all contacts from your e-mail, messengers and other social networks. I'm writing on this e-mail cuz it's your working address, so you must check it. I suppose that three hundred twenty usd is good enough for this little misstep. I made a split screen video (recorded from your screen (u have interesting tastes ) and camera ooooooh... its awful AF) So it's your choice. If you want me to erase this compromising evidence, use my Bitcoin wallet address: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX You have one day after opening my message; I put a special tracking pixel in it, so when you will open it I will see. If you want me to show you the proofs, reply to this message and I will send my creation to five contacts that I got from your contacts. P.S. You can try to complain to the police, but I don't think that they can help, the investigation will last for 5 month- I'm from Ukraine - so I dgf lmao Hey there So I am the hacker who cracked your email address and device a few weeks back. You typed in your pwd on one of the sites you visited, and I intercepted that. Here is your password from (redacted) upon time of compromise: (redacted) Obviously you can can change it, or even already changed it. However it won't really matter, my malware modified it every time. Do not really try to contact me personally or find me. Via your email, I uploaded harmful code to your Operation System. I saved your entire contacts together with buddies, fellow workers, loved ones along with a entire history of visits to the World wide web resources. Also I set up a Virus on your system. You aren't my only target, I generally lock computers and ask for a ransom. But I was hit by the web pages of romantic material that you normally stop by. I am in shock of your own fantasies! I have never ever noticed anything at all like this! Consequently, when you had enjoyment on piquant web-sites (you know what I am talking about!) I made screenshot with utilizing my program from your camera of yours device. There after, I put together them to the content of the currently viewed site. There will certainly be giggling when I send these pics to your connections! Nevertheless I am certain you do not need this. Therefore, I expect to have payment from you for my silence. I feel $859 is an satisfactory price for this! Pay with Bitcoin. My Bitcoin wallet is xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx If you do not really understand how to do this - submit in to Google 'how to transfer money to the bitcoin wallet'. It is easy. Immediately after getting the given amount, all your files will be right away destroyed automatically. My computer virus will also get rid of itself through your operating-system. My Trojan viruses have auto alert, so I know when this specific e mail is read. I give you 2 days (48 hours) to make a payment. If this does not occur - just about all your associates will get outrageous pictures from your darkish secret life and your system will be blocked as well after two days. Do not end up being foolish! Police or buddies won't support you for sure ... P.S I can provide you with recommendation for the future. Do not type in your security passwords on risky web pages. I wish for your wisdom. Bon voyage. I Have YOUR code. I rule phone xxxx I SENT this newsletter from YOUR ACCOUNT. I look your device. I am in daze of your sex act fantasies! I made backup your contacts and files. I made screenshots from your digital camera of yours device. I want 888 $ to my (Bitcoin My )Bitcoin currency xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx If YOU don't transaction )Bitcoin. I share my quake of your golden age of porn fantasies with your contacts! If you do not know how to do this - enter into Google/ =how to transfer money to a Bitcoin& wallet- Time 30 hours. This excellent post as Subway & Dairy Queen. Hello! I'm a programmer who cracked your email account and device about half year ago. You entered a password on one of the insecure site you visited, and I catched it. Of course you can will change your password, or already made it. But it doesn't matter, my rat software update it every time. Please don't try to contact me or find me, it is impossible, since I sent you an email from your email account. Through your e-mail, I uploaded malicious code to your Operation System. I saved all of your contacts with friends, colleagues, relatives and a complete history of visits to the Internet resources. Also I installed a rat software on your device and long tome spying for you. You are not my only victim, I usually lock devices and ask for a ransom. But I was struck by the sites of intimate content that you very often visit. I am in shock of your reach fantasies! Wow! I've never seen anything like this! I did not even know that SUCH content could be so exciting! So, when you had fun on intime sites (you know what I mean!) I made screenshot with using my program from your camera of yours device. After that, I jointed them to the content of the currently viewed site. Will be funny when I send these photos to your contacts! And if your relatives see it? BUT I'm sure you don't want it. I definitely would not want to ... I will not do this if you pay me a little amount. I think $877 is a nice price for it! I accept only Bitcoins. My BTC wallet: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx If you have difficulty with this - Ask Google "how to make a payment on a bitcoin wallet". It's easy. After receiving the above amount, all your data will be immediately removed automatically. My virus will also will be destroy itself from your operating system. My Trojan have auto alert, after this email is looked, I will be know it! You have 2 days (48 hours) for make a payment. If this does not happen - all your contacts will get crazy shots with your dirty life! And so that you do not obstruct me, your device will be locked (also after 48 hours) Do not take this frivolously! This is the last warning! Various security services or antiviruses won't help you for sure (I have already collected all your data). Here are the recommendations of a professional: Antiviruses do not help against modern malicious code. Just do not enter your passwords on unsafe sites! I hope you will be prudent. Bye. Same as before but they increased the amount I got an order from someone to kill you and your family but I am far from your house if you still love your family, I ask you to transfer 0.1 BTC to me. If you report this email, I will immediately kill your family. FORWARD THIS MAIL TO WHOEVER IS IMPORTANT IN YOUR COMPANY AND CAN MAKE DECISION! We Hacked network. We Caught Communications. We Backuped DATA And DOCUMENTS. We send this mail to you in YOUR account. After analyzing documents. We found Illegal activity - HIDING TAXES. That we want? I want two (2) Bitcoin To wallet Bitcoin. 1Dz7DbQmE7SNm3C5mb9syPcctgZECcCEbL That we do if you don't pay bitcoin? We send these Documents and Proofs to your Tax Department. And in this time Your network will be DDoS. Read that in this link https://en.wikipedia.org/wiki/Denial-of-service\_attack We are locking your operation system. Our friends, WannaCry, ready start and waiting command. Read that in this link https://en.wikipedia.org/wiki/WannaCry\_ransomware\_attack This is our guarantee, that you don't clean evidence and building a protection policy. If you don't pay by in 7 days, attack will start. Attack including. 1.DDOS 2.Locking operation system 3.Sending all documents in Tax Departament Yours service going down permanently and price to stop will increase to Four (4) BTC, Price will go up one (1) BTC for every day of the attack. This is not a joke. Our attacks are extremely powerful - sometimes over 1 Tbps per second. And we pass CloudFlare and others remote protections! So, no cheap protection will help. Prevent this problem all with just Two (2) BTC Pay to our wallet Bitcoin. 1Dz7DbQmE7SNm3C5mb9syPcctgZECcCEbL AND YOU WILL NEVER AGAIN HEAR FROM US! If you read, hear fake-experts and assure yourself that this is not true. Remember that they are not responsible and your life don't important him. Their business is to speak and make money. Your business to do and make money and stay freedom. All mistakes in text we do specily. Bitcoin is anonymous, nobody will ever know you cooperated. Time started after open this mail. To track the reading of a message and the actions in it, I use the facebook pixel. Read that in this link Hello! I am a hacker who has access to your operating system. I also have full access to your account. I've been watching you for a few months now. The fact is that you were infected with malware through an adult site that you visited. If you are not familiar with this, I will explain. Trojan Virus gives me full access and control over a computer or other device. This means that I can see everything on your screen, turn on the camera and microphone, but you do not know about it. I also have access to all your contacts and all your correspondence. Why your antivirus did not detect malware? Answer: My malware uses the driver, I update its signatures every 4 hours so that your antivirus is silent. I made a video showing how you satisfy yourself in the left half of the screen, and in the right half you see the video that you watched. With one click of the mouse, I can send this video to all your emails and contacts on social networks. I can also post access to all your e-mail correspondence and messengers that you use. If you want to prevent this, transfer the amount of $500 to my bitcoin address (if you do not know how to do this, write to Google: "Buy Bitcoin"). My bitcoin address (BTC Wallet) is: x After receiving the payment, I will delete the video and you will never hear me again. I give you 50 hours (more than 2 days) to pay. I have a notice reading this letter, and the timer will work when you see this letter. Filing a complaint somewhere does not make sense because this email cannot be tracked like my bitcoin address. I do not make any mistakes. If I find that you have shared this message with someone else, the video will be immediately distributed. Best regards. Hey, I know your password is: Your computer was infected with my malware, RAT (Remote Administration Tool), your browser wasn't updated / patched, in such case it's enough to just visit some website where my iframe is placed to get automatically infected, if you want to find out more - Google: "Drive-by exploit". My malware gave me full access and control over your computer, meaning, I got access to all your accounts (see password above) and I can see everything on your screen, turn on your camera or microphone and you won't even notice about it. I collected all your private data and I was spying on you, I RECORDED (through your webcam) embarrassing moments of you, you know what I mean! After that I removed my malware to not leave any traces. I can publish all your private data everywhere and I can send the videos to all your contacts, post it on social network, publish it on the whole web, including the darknet, where the sick people are! Only you can prevent me from doing this and only I can help you out in this situation. Transfer exactly 1200$ with the current bitcoin (BTC) price to my bitcoin address. It's a very good offer, compared to all that horrible shit that will happen if I publish everything! You can easily buy bitcoin here: www.paxful.com , www.coingate.com , www.coinbase.com , or check for bitcoin ATM near you, or Google for other exchanger. You can send the bitcoin directly to my address, or create your own wallet first here: www.login.blockchain.com/en/#/signup/ , then receive and send to mine. My bitcoin address is: Copy and paste my address, it's (cAsE-sEnSEtiVE) I give you 3 days time to transfer the bitcoin! As I got access to this email account, I will know if this email has already been read. If you get this email multiple times, it's to make sure you read it and after payment you can ignore it. After receiving the payment, I will remove everything and you can life your live in peace like before. Next time update your browser before browsing the web! НЕLLО! I’m going to cut to thе chӓsе.I know ӓbout thе sеcrеt you ӓrе kееping from your wifе.Morе importӓntly,I hӓvе еvidеncе of whӓt you hӓvе bееn hiding.I won’t go into thе spеcifics hеrе in cӓsе your wifе intеrcеpts this,but you know whӓt I ӓm tӓlking ӓbout. You don’t know mе pеrsonӓlly ӓnd nobody hirеd mе to look into you.Nor did I go out looking to burn you.It’s just your bӓd luck thӓt I stumblеd ӓcross your misӓdvеnturеs whilе.I thеn put in morе timе thӓn I probӓbly should hӓvе looking into your lifе.Frӓnkly,I ӓm rеӓdy to forgеt ӓll ӓbout you ӓnd lеt you gеt on with your lifе.And I ӓm going to givе you two options thӓt will ӓccomplish thӓt vеry thing.Thosе two options ӓrе to еithеr ignorе this lеttеr,or simply pӓy mе $822.Lеt’s еxӓminе thosе two options in morе dеtӓil. Option 1 is to ignorе this lеttеr.Lеt mе tеll you whӓt will hӓppеn if you chosе this pӓth.I will tӓkе this еvidеncе ӓnd sеnd it to your wifе. And ӓs insurӓncе ӓgӓinst you intеrcеpting it bеforе your wifе gеts it,I will ӓlso sеnd copiеs to hеr friеnds ӓnd fӓmily.So,Evеn if you dеcidе to comе clеӓn with your wifе,it won’t protеct hеr from thе humiliӓtion shе will fееl whеn hеr friеnds ӓnd fӓmily find out your sordid dеtӓils from mе. Option 2 is to pӓy mе $822.Wе’ll cӓll this my ‘confidеntiӓlity fее.’Now lеt mе tеll you whӓt hӓppеns if you choosе this pӓth.Your sеcrеt rеmӓins your sеcrеt.You go on with your lifе ӓs though nonе of this еvеr hӓppеnеd.Though you mӓy wӓnt to do ӓ bеttеr job ӓt kееping your misdееds sеcrеt in thе futurе. At this point you mӓy bе thinking,‘I’ll just go to thе cops.’Which is why I hӓvе tӓkеn stеps to еnsurе this lеttеr cӓnnot bе trӓcеd bӓck to mе.So thӓt won’t hеlp,ӓnd it won’t stop thе еvidеncе from dеstroying your lifе.I’m not looking to brеӓk your bӓnk.I just wӓnt to bе compеnsӓtеd for thе timе I put into invеstigӓting you. $822 will closе thе books on thӓt. Lеt’s ӓssumе you hӓvе dеcidеd to mӓkе ӓll this go ӓwӓy ӓnd pӓy mе thе confidеntiӓlity fее.In kееping with my strӓtеgy to not go to jӓil,wе will not mееt in pеrson ӓnd thеrе will bе no physicӓl еxchӓngе of cӓsh.You will pӓy mе ӓnonymously using bitcoin.If you wӓnt to kееp your sеcrеt thеn sеnd $822 in bitcoin to thе Rеcеiving Bitcoin Addrеss listеd bеlow.Pӓymеnt must bе rеcеivеd within 1 dӓys of thе post. You should mӓkе ӓ trӓnsӓction of using bitcoins (cryptocurrеnsy): x [Bitcoin dеtӓils] Tеll no onе whӓt you will bе using thе bitcoin for or thеy mӓy not givе it to you.Thе procеdurе to obtӓin bitcoin cӓn tӓkе ӓ dӓy or two so do not put it off.Agӓin pӓymеnt must bе rеcеivеd within 1 dӓys of this lеttеr’s post mӓrkеd dӓtе.If I don’t rеcеivе thе bitcoin by thе dеӓdlinе,I will go ӓhеӓd ӓnd rеlеӓsе thе еvidеncе to еvеryonе.If you go thӓt routе,thеn thе lеӓst you could do is tеll your wifе so shе cӓn comе up with ӓn еxcusе to prеpӓrе hеr friеnds ӓnd fӓmily bеforе thеy find out.Thе clock is ticking. And here are some common keywords used in the email so that this thread can be found by people Googling the email: "Marlware, international hacker group, No person has compensated, very own video clip, software on the adult, porno sitio, one of your pass word, .br, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, instantaneously erase, actual recorded material, neglect this email, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remove your video footage, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material""Marlware, international hacker group, No person has compensated, very own video clip, software on the adult, porno sitio, one of your pass word, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, instantaneously erase, actual recorded material, neglect this email, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remove your video footage, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material"
It's Good Friday, and a millionaire is about to rise from the ashes (figuratively)! Comment to enter! [Drawing Thread #41]
TL;DR of the TL;DR:
To enter, comment only once to this post.Replies to other comments will not count. Good luck!
In Case You Missed It:
So I'm going to be unavailable for the next few hours. Quick notes, this thread will close at 0:00 UTC (8 PM ET) due to me being late by thirteen minutes. As a side effect, comment retrieval will occur, centered at 3:00 UTC (11 PM ET). Not good enough, I was not able to get online before that. 4:00 UTC (12 AM ET) it is! 5:00 UTC (1 AM). Apparently, Pydroid need a repository plug-in, whatever that means. Hope I stay up for that long.
UNDER CONSTRUCTION, though can't guarantee it'll get repaired.
TL;DR: Leave a comment on this thread, replies won't count. A random user will be chosen, and everyone donates a dollar to make a millionaire. You are welcome to spread this thread via upvoting, telling friends and family, and sharing on social media!
[If you'd like to be reminded to donate to the winner through PM via the RemindMeBot, click here!](UNAVAILABLE)
REQUIRED: Leave only one (1) top level comment in reply to this thread! Replying to other comments will not count. It is highly recommended to comment "RemindMe! 3 days Donation for /millionairemakers", which will remind you via PM to donate. That's it!
Only ONE top level comment per person (replies and subsequent-level comments aren't included), but feel free to reply to other comments. Making duplicate top level comments may result in exclusion from entering. Go to me to ensure you don't accidentally double comment.
If, by any chance, you do double comment, delete any extra duplicates ASAP, ideally before the thread is locked, as any chosen draws found to violate this will not be eligible to win, and will be banned from the subreddit.
Your account must be older than 30 days with some amount of activity. Throwaway accounts with very minimal activity will also not be eligible. This is to prevent multiple entries from the same person.
How will the winner be picked and how can you donate?
After 24 hours, this thread will close, and the method of selection will begin.
While attempts to make the selection method similar to 2017’s have been performed, it still varies from the original. For an example from a prior drawing, see [Draw #36]. For archival purposes, please click here for the original selection method.
Method's TL;DR: Your number is assigned by sorting the comments by old, resulting in the first commenter being 1. The list of comments will be publicly released for the community to verify per their own accord. The subreddit then waits for a randomly generated block (a string of numbers) from Bitcoin's blockchain, after a preselected date and time, and calculates the winner using a formula described in the posts mentioned above.
Comment IDs are downloaded at 2:00 UTC, three hours following the thread being locked. There will be an official run at the time listed. If it is shown that there are any technical difficulties, the retrieval of the comments will be delayed by an hour, following the same procedures.
While not necessary, to determine if you are on the list, please go to your comment and save it. The comment ID is what gets recorded and selected, which looks like this: e3yxpj4.
The Draw is held at 16:00 UTC the Sunday after comments have been downloaded, unless stated otherwise. Using the Bitcoin blockchain, the third block yet to be mined will be used to select a winner.
The user who created the winning comment will be informed of their luck and will provide any information necessary for their chosen payment methods (mods will help set this up if needed).
The generous Reddit community donates to this lucky person, hopefully making some worthy soul a millionaire! A donation table will be stickied to the winner’s post, giving users the freedom in how they donate.
The lucky Redditor follows up with a thank you within the next days, revealing to the community exactly how much was raised and thanking their generosity.
Take the time you have available now to setup your PayPal, Square Cash, and Google Wallet account, and/or cryptocurrency wallets. (Note: Some services may not be available depending on where you reside.)
To buy any cryptocurrencies, you may use Coinbase for purchases using your bank account.
To store cryptocurrencies, there are many accessible wallets, and if you win, you will be guided on which ones to download. For Bitcoin and Bitcoin Cash, it’s recommended to use the Electrum and Electron Cash wallet for Mac, Linux, and PC.
Please try your best to donate a $1, no matter who wins. Every single dollar, cent, anything really counts, so please take the effort to remember and go through with it.
If you want to be reminded to donate, please comment "RemindMe! 3 days Donation for /millionairemakers".
Spread the word! The more people who participate, the better this gets for everyone! There has been a correlation between this subreddit making it in /all and an increase in donations.
Try to cross-post to relevant subs, and upvote. There is a correlation between reaching /all and the amount of donations for the winner. (Please don't spam other subs though. We're not trying to make any enemies here.)
If you are under 18, please talk to your parents to get their consent to participate and use their help to setup a PayPal account.
MOST IMPORTANTLY Remember, this is about generosity, making history, and coming together to make someone's life better. It takes three minutes to donate a bit to the winner, whether you're well off and want to donate a couple bucks, or going through tough times and can only donate a few pennies. Every cent counts. Note about legality: This is NOT a lottery. You don't have to pay to enter. No prizes are given away directly by the moderators of this subreddit (the moderators will never even touch your donations; this is done voluntarily). As for gift taxes, according to the IRS, they're paid by the donor, and any donations under $15,000 is not taxable. If a lone $1 can get you stuff, imagine the possibilities with $1,000,000. You can get stuff, stuff, and stuff! One million dollars can help do things. Spread the word: have your friends and family comment, post the link to your friendly-neighborhood social media network, and share it to anyone interested. Let's make an egg-cellent millionaire! haiku (This is an altered generic template thread.)
Re-Launching The Borderless, Unkillable Crypto-Fiat Gateway, DAIHard. Enter or Exit Crypto via Any Fiat and Any Payment Method, Anywhere in the World, Without KYC. All you need is a little Dai.
Some of you might recall recall our initial facepalm failed launch about 3 months ago (post-mortem here). Well, we're back--this time with an audit and some new features. This version of DAIHard should should die a little harder this time ;)
After shopping around a bit in the auditor space, we decided to go with Adam Dossa--the very same Adam Dossa that actually found our launch vulnerability and responsibly disclosed it to us! You can see his report here. By the way, Adam has been a gem: friendly, professional, timely, and flexible. Definitely keep him in mind if you need an audit!
Following is an updated version of our original launch post. If you've already read that, you might want to skip to the heading What's New in v0.9.2. Or you can go straight to the app or go to our info site for more info! Here is a legitimate concern most of us are familiar with:
To enter or exit the crypto economy, we rely on centralized exchanges such as Coinbase, which track their users, impose limits, and are tightly coupled to their jurisdiction and its banking system. And for all we know, any day now regulations could start tightening these controls further (*we've actually seen some of this play out in the two months since our first launch post). In light of this, can we say in any meaningful sense that crypto is anonymous, limtiless, borderless, immune to regulation, and (most importantly) unstoppable?
To really address this concern, we need a completely decentralized gateway between fiat and crypto: something that extends the benefits of crypto to the very act of moving between the old and new economies. But the design of such a platform is far from obvious. (Localethereum comes close, but as discussed under Unkillable, it doesn't quite cut it. And Bisq is decentralized, but has significant UX hurdles.) We believe we've found a solution. We are proud to present:
DAIHard v0.9.2 - Almost Definitely Not Broken This Time
If you want to jump right in, we recommend first watching our latest usage demo (7 min), then diving in and giving it a shot with a small amount of Dai. (Try it on Kovan first if mainnet is too scary!) DAIHard extends many of the promises of crypto (borderless, anonymous, limitless, unstoppable) into the exchange mechanism itself, allowing anyone, anywhere to bypass centralized exchanges and the control they impose. More concretely, DAIHard is a platform, run on smart contracts, for forming one-off crypto/fiat exchanges with other users, in which:
The method of fiat transfer is open-ended, but agreed upon up-front (for example: bank transfer, cash handoff, transfer of online credit, cash drop...).
You and the counterparty can communicate via end-to-end encrypted chat to coordinate the fiat transfer (i.e. communicate bank account number or reveal a cash drop location).
Crucially, in the last phase, the Seller can choose to burn the Dai instead of releasing it to the Buyer (but he can't get it back). This credible threat of burn is what makes the platform reliable in the absence of a centralized group of arbitrators or moderators. For more on this see the DAIHard Game Theory medium article (10 min read).
You Need either xDai, or both Dai and Ether, to Use The Tool (At Least For Now)
If you want to buy Dai on DAIHard, you must already have Dai--1/3 of the amount you want to purchase--to put up as a burnable deposit. For example, if you only have 10 Dai now, you can only commit to buying 30 Dai, and must complete that trade before using the newly bought Dai to open up a bigger offer (for up to 120 Dai that time). Most tragically of course, this means that if you don't already have some crypto, you can't use this tool to get crypto--this is why we avoid calling DAIHard an onramp specifically. This comes from the fact that both parties must have "skin in the game" for the game theory to work, and a smart contract can only threaten to burn crypto. We have some ideas on how to address this drawback in the not-too-distant future, which we'll write about soon. For now it's time to launch this thing and get some users!
Dangerous and Scary To Use
In rare cases, a user may have to burn Dai and face a loss on the entire trade amount. The necessity of this ever-present risk is explained in detail in DAIHard Game Theory. However, a cautious, rational user can gather information (possibly via our [subreddit](daihard)!) about how people have used the tool, successfully and unsuccessfully. They can then create a buy or sell offer with wisely chosen settings based on what has worked for others. Other cautious, rational users can find this offer and commit to the trade if they dare. We expect the vast majority of committed trades should involve rational, cautious users, and should therefore resolve happily. Still, inevitably there will be sloppy trades that result in burns. As the tool is used, we'll be keeping a close eye on the frequency of burns and keeping you guys updated (perhaps via a "System Status" utility similar to the one found on MakerDao's explorer). In the end, though, we expect the risk in using DAIHard to be comparable to the risk of using any exchange or DNM: ever-present but low enough for the platform to be useful as whole. So, while DAIHard will never shut down and can't perform an exit scam, the bad news is it's not risk-free. Users will have to approach DAIhard with the same level of caution they would with any new exchange (albeit for different reasons and with a different approach). So what's the good news?
The Good News
While these drawbacks are significant, they enable some remarkable features that no other crypto/fiat exchange mechanism can boast.
(Correction: Bisq seems to have a decentralized arbitration system) We are aware of no other crypto/fiat exchange platform that is truly unkillable. Bisq and localethereum comes close, but both localethereum relies on centralized processes of arbitration. This means their fraud-and-scam-prevention system can be sued, jailed, or otherwise harrassed--and if that part stops working, it doesn't matter how decentralized the rest of the system was. DAIHard, in contrast, gives the users the power to police and punish each other, via the aforementioned credible threat of burn. This is simple game theory, and the rules of this game are etched permanently into the DAIHard Factory and Trade contract code: impervious to litigation, regulation, and political pressure. This Factory contract has no owner and no suicide or pause code. It cannot be stopped by us or anyone else. Like Toastycoin, this thing was immortal the moment it was deployed (even more immortal than RadarRelay, for example, which does rely on an ownership role). Both DAIHard and Toastycoin (and probably whatever we build next) will last for as long as a single Ethereum node continues mining, and it will remain easy to use as long as someone can find the HTML/JS front-end and a web3 wallet. (The HTML/JS front-end (built in Elm, by the way, with the lovely elm-ethereum!) is currently hosted on Github pages, which is centralized--but even if Github takes down the page and deletes the code, it's a minor step to get the page hosted on IPFS, something that is on our near-term roadmap in any case)
No KYC, No Limits
It's smart contracts all the way down, so DAIHard never asks any nosy questions--if you have Metamask or some other web3 wallet installed and set up, with some ETH and Dai (or just xDai), you can immediately open or commit to a trade. You don't even need a username! (In fact, we're so inclusive, even machines are allowed--no CAPTCHA here!) You're limited only by the collateral you put up, so if you have 10,000 Dai you could open up a buy offer for 30,000 Dai (or a sell offer for 10,000 Dai) right now. We do reccommend trying the tool out first with a small amount of Dai... But we're not your mom! Do what you want!
It simply doesn't matter where you are, because DAIHard doesn't need to interface with any particular jurisdiction or payment system to work. DIAHard works by incentivizing people (or robots?) to navigate the particular real-world hurdles of bank transfers, cash drops, or other fiat transfer methods. These incentives work whether you're in America, Zimbabwe, or the Atlantic; they work whether the fiat is USD, EUR, ZAR, seashells, or Rai Stones; and they work whether your counterparty is a human, an organization, a script, or a particularly intelligent dog with Internet access.
Any Fiat Type, and Highly Customizeable
Here are some examples of the types of trades you might create or find on DAIHard.
Sell 5 xDai for $5 USD, sent via TransferWise.
Sell 200 Dai for $180 USD, granted they bring the cash to you by tomorrow afternoon in Central Park, NYC.
Buy 20 Dai with a $30 gift card for Amazon AWS that you were never going to use.
Sell 20 Dai in exchange for a $20 Steam game.
While in Vietnam, sell 200 Dai to someone for €180 anytime in the next two weeks, provided they deposit it into your German bank account.
While in Germany, sell 20 Dai to someone in exchange for them refilling your pre-paid Vietnamese phone plan.
Buy 500 Dai for $550 via PayPal, but wait 3 weeks for before the Dai is released (so the paypal transaction can't be reversed).
As the DAIHard community grows, users will doubtless find much more creative ways to use the system, and we will discover together which types of trades are reliable and which are more risky. Because users can set their own prices and phase timeout settings, we expect the risky trades to charge a premium or have longer time windows, while the reliable ones rapidly multiply at close to a 1:1 price ratio, with quick turnaround times.
Extensible (with profit) by Third Parties
Not satisfied with our interface? Do you have some nifty idea for how to display and organize user reputation? Or maybe some idea for how trades could be chained togeher? Maybe you'd like to design a notification system for DAIHard? Maybe you just want a different color scheme! Well, you won't need our permission to do any of this. Any tool that watches the same Factory contract will share the pool of trades, regardless of which tool actually creates the trade. This means we don't even have to fight over network effects! And if you look closely at our fee structure, you might notice that only half of the 1% DAIHard fee is "hardcoded" into the Factory contract. The other half is set and charged by our interface. What does this mean for you? If you go out and make a better interface, you can essentially replace half of our 1% fee with your own fee--it's up to you whether it's smaller or larger than the replaced 0.5%. The reason for this is to explicitly welcome other developers to extend what we've built. For as long as our team is the only one improving the platform, a threat to us is a threat to future upgrades. But if others begin extending the DAIHard platform too, then DAIHard will not only be unstoppable as it is today, but also grow unstoppably.
(For Real This Time) This Is a Big Fucking Deal
DAIHard is a turning point in crypto and a breakthrough in decentralized markets, and is an irreversible augmentation of the Ethereum platform. What we've built is a gateway to crypto completely devoid of centralized components--rendering entry and exit to crypto unkillable, flexible, borderless, and private. Centralized exchanges, and the control they impose, can now be bypassed by anyone with Dai and a web3 wallet.
What's New in v0.9.2
There have been many changes made since our first failed launch, but there are two rather important ones: xDai support and reputation tools.
DAIHard is now operational on xDai, a sidechain whose native token (xDai) is pegged to the Dai (and therefore $1). Add the xDai network to your Metamask (or just install Nifty Wallet), then switch to the xDai network in your wallet, to try it out. xDai has some pretty incredible benefits, compared to vanilla Ethereum:
Price: On xDai, a single DAIHard trade costs on the order of $0.01 to run start-to-finish, rather than the accumulated $2.40 (with the best-case-scenario 1gwei gas price) you'll spend on vanilla Ethereum.
Speed: Trade actions mine much faster, and don't require ERC20 'approve' transactions, making the whole process way snappier.
Gas priced in xDai: the main benefit here is that you only need one token (xDai) rather than two (Dai and Eth). Also, it's just nice having the gas cost expressed in (essentially) USD!
We now have a few reputation tools. First, on any open trade, there is a widget showing the number of releases, aborts, and burns the given address has been involved in as that role (buyer or seller). Clicking on this expands the widget to show more detailed information, and also provides a link to a page that lists each trade this user has been or is involved in.
We have tons of ideas on how to improve the product--too many, in fact, to commit to any before we get a good chunk of user feedback. Here are some of our favorite ideas:
A "QuickTrade" page, offering Trade Templates as an alternative to the current Create Offer page.
Big Exciting Features
Bootstrapping people with no DAI via other mechanisms and community outreach.
Partial commits to trades. eg. Place a 10,000 DAI trade and allow it to be picked up in blocks larger than 500 DAI at a time.
More chains, get this thing working on Bitcoin via Rootstock, on Ethereum Classic and Binance Chain.
A lot of the above features will be prioritized more clearly as we get user feedback, and we will be posting fairly frequent updates and articles on our info site. If you don't want to miss anything, note the subscribe widget and sign up!
I am speaking on behalf of myself, Hudson Jameson, and not on behalf of the Ethereum Foundation or any other entity. However, I am a lawyedoctor and this post is both medical and legal advice. Just kidding, it isn't. Hey all! I've been closely following the debate that has been happening across social media and chat channels the past 2 weeks regarding the possibility of designing and implementing a new ASIC resistant proof-of-work algorithm. The debate is over whether or not we should hard fork the Ethereum network in order to prevent ASIC miners from operating. I am in the unique position of organizing and running the bi-weekly core developer meetings and have been active in the ecosystem for a while. I want to make sure both sides feel like they are heard. This post is meant to provide context and offer next steps for both sides of the argument.
About 2 weeks an EIP was created by Piper Merriam called "EIP 958: Modify block mining to be ASIC resistant.". Piper opened the EIP intending for it to be a starting point for both technical and non-technical discussion about ASIC resistant algorithm changes. His role in the EIP is to act as a neutral facilitator and not as an expert. The EIP is now closed at the request of the author. Discussion has continued in other forums such as Reddit.
About a week ago, AirSquirrels created "EIP 969: Early ASIC Mitigation Hardfork.". This EIP is focused on technical discussion around an ASIC resistant hard fork. It has been merged in the EIP respository in Draft status in accordance with EIP 1. This does not indicate that the EIP is agreed upon or accepted, but that it meets the minimum technical requirements based on the EIP X template to be merged as a file into the repository.
veox has been working on cleaning up EIP 969 from a grammatical and technical standpoint. The status of that EIP PR can be found here.
PAR 1: It is a security risk that ASICs are allowed to exist on the Ethereum network. With one entity having a majority of the hashing power, 51% attacks are a real possibility.
PAR 2: The Ethereum White Paper declared that Ethereum was built to be "ASIC resistant", at least from the perspective of being resistant to economic incentives to produce ASICs. If this wasn't a false narrative it needs to be upheld.
PAR 3: Bitmain being allowed to mine using ASICs on the network would cause increased centralization in Ethereum.
PAR 4: Bitmain may have a better ASIC that they have not revealed that they are using to mine the network currently. This amplifies the other risks and eliminates some of the uncertainties around how much of an improvement Ethash ASICs are compared to GPU mining if true.
PAR 5: Bitmain has been proven to be hostile to cryptocurrency groups. This can be shown by their hostility to Bitcoin when they got involved in Bitcoin Cash. Their business practices are not altruistic in any way.
PAR 6: After Monero forked to prevent ASICs their hash power dropped 70%+ which proves that ASICs were secretly mining on their network. The same could be happening to Ethereum today which is why we need to act quickly.
PAR 7: ASICs would eliminate hobbyist miners and make it difficult for the Average Jane to mine Ethereum.
Pro Doing Nothing (PDN)
There are 2 great resources that provide more detail to these bullet points.
PDN 1: The efficiency gains accomplished by the ASIC is relatively limited. At the time this comment was made on the code devs call, Batch 1 of the Bitmain ASIC's sold for $800 for 180MH/s which is a 2.5x factor improvement over GPUs. Batch 2 now sells for $1,800, but the argument can still technically be made, albeit with a different improvement level. (35:38)
PDN 2: We are unsure what protocol changes would make a difference. Even if we switch to a PoW algorithm that is entirely different and not I/O bound at all, such as SHA3, it may only buy us 6-12 months. (37:37)
PDN 3: The development effort to change the PoW algorithm and getting everyone to upgrade would be chaotic and risky. Developing, testing, planning, and enacting a hard fork and related code is not a simple process. (38:47)
PDN 4: Focusing on changing the PoW algorithm would detract from more important things, such as Casper, sharding, and other protocol level work. (38:47)
PDN 5: The Ethereum network is switching to proof-of-stake (Casper) soon™ so changing the PoW algorithm detracts from the research and development. Changing the PoW algorithm would serves as a band-aid while Casper is both an eventuality and a permanent solution.
PDN 6: The worst case scenario is that Bitmain controls a large portion of the Ethereum network for some time. If they try to use it for malicious purposes, Casper development can be sped up, launched in a week (albeit with potentially more bugs and skipping formal verification/academic review), and mining rewards would go down by 90%. If geth and Parity start making it a higher priority to implement Casper it would provide us with some insurance in the case of a 51% attack.(39:05)
PDN 7: It is impossible to prevent anti-competitive economies of scale from forming around mining. Large corporations and entities will achieve economies of scale in any mining model, including general purpose hardware / GPU-dominated mining (see Phil's blog I previously referenced).
PDN 8: Anti-ASIC forks reduce the cost to attack a cryptocurrency substantially and are a good thing for the security of a cryptocurrency system (see Phil's blog I previously referenced).
How long until Casper is launched?
This seems to be a sticking point in many of the arguments. Here is the latest: Researchers are in the process of finalizing the code for the 2nd stage of the testnet with the goal of completing and freezing the full specification of the Casper PoS algorithm. geth and Parity could start implementing parts of the Casper today. Casper is currently being formally verified by Runtime Verification which should take another 4-5 months to complete. Multiple academic groups are also looking at Casper. A formal EIP on Casper is being worked on and will be released for review in the next 2 weeks. The plan is to have Runtime Verification formally verify Casper, relaunch a custom Casper testnet with specs from the EIP, relaunch the contract on an Ethereum testnet, and finally launch Casper on the mainnet. There is no official timeline and there is unlikely to be one, in my opinion, until we get much closer to Casper being formally verified. (40:23)
So what now?
Well I for one am going to make myself a whiskey. Not because this was stressful, but because I enjoy whiskey. I actually find this pretty fun. Anyways, if you are in the PAR group I suggest you act on your convictions and help with some of the EIPs being produced. If you are in the PDN group you can provide counter-arguments to the PAR group in forums/chat rooms. Currently the rough consensus of Ethereum core developers is that of the PDN group. However, my experience is that they are open to whatever the community wants as long as community consensus, or something close to it, can be demonstrated. There are many ways to determine this, including voting and discussions and EIPs. I encourage everyone to participate in this process.
You said a thing wrong!
If you feel like I left off an argument or made a mistake in this post let me know in the comments. I'll track edits at the bottom of this post. Later!
Running an bitcoin asic and pointing it to a pool does not make you a miner. It does not add significantly to decentralization and is basically equivalent to the difference between SPV ( light node ) and a full node. Furthermore when most people do this they get complacent - set and forget. In this setup the pool admin is the miner, they are creating the block template using software in their control - using some of their own asics to mine on that block and outsourcing some of the hashing to ASIC operators. Therefore in order to be a real miner, you need to at minimum verify the block template you are working on using software you control and if its invalid you should be able to revert to mining somewhere else ( another pool or solo mining) By the above definition the current bitcoin network is quite centralized ( obviously not as bad as bcash). However a network can be centralized and continue to 'woRk' until their is a political issue or incentive ( outside bitcoins incentive model ) for an individual to do dishonest things. This exact thing happened in the bcash network, when three mining pools fought over the ability to claim unlocked segit coins - two pools performed a reorg against another pool and a small pool. The two pool admins obviously had some communication channel with each other or are controlled by the same entity. With centralization the organizational cost of doing attacks is reduced so far that the incentive model that is fundamental to bitcoin no longer works. At this point you are no longer bitcoin - and the bcash dev realized this and implemented reorg protection making it a quasi proof of stake - proof of work coin. We must address the effects of the stratum protocol it has done more harm to bitcoin that large blocks. An innovation in this area will help other POW projects like monero that actually care about decentralization.
Hello, I feel I should introduce myself first. I got into Bitcoin back mid-2017. I bought in at about 1.8k if I remember correctly. I was also invested in Ethereum at this time, and got in between 60-120 (my friend sent me some at 60, but I continued to buy around 120). As many of you know. Bitcoin has been in a bear market for the past several months. And over these past several months concerns have popped into my mind in regards to the overall health and future of Bitcoin:
Bitcoin Futures were introduced into the market on December 17th, 2017. The first futures contracts expired relatively shortly after. This correlates almost exactly with the beginning of the bear-market we are in now. BTC Daily Chart
Institutions are now allowed to invest in Bitcoin. Institutions for the most part, have every reason to short Bitcoin rather than go Long. And that seems to be the case, as the money in most institutions far out-weights the money in the retail market. Making it harder for retail bulls to overpower the bears. This seems to be the case today as well.
Bitcoin has become centralized. As of today, the top 5 Bitcoin mining pools account for 67.2% of the hash power in the Bitcoin network. If you look at the top 10 mining pools, this number gets even larger at 86.6%. Meaning, Bitcoin as a network is effectively centralized. I understand that mining pools contain hundreds or thousands of miners, often independent of one another mining as a group. But correct me if I'm wrong, the workers in a pool you do NOT need to have a copy of the block chain on your miner to be apart of the pool. And if I understand more of this correctly, this means a compromise of a large network such as AntPool would lead to a large amount of the Bitcoin's hash power to be taken advantage of. Thus, leading to the very same vulnerabilities Bitcoin set out to prevent by being decentralized. Bitcoin Mining Pools Visualized
Enterprise Blockchains such as Hyperledger and Quorum have stolen away Bitcoin's potential "enterprise marketshare". Hyperledger is sponsored by The Linux Foundation and is open source. Quorum is also open source, and based directly off of Ethereum. These Blockchains do not have any sort of value or price attached to them like Bitcoin or Ethereum, and have been shown to scale much better and simpler than both Bitcoin and Ethereum. JP Morgan has used Quorum to settle bond transactions over Quorum, and further testing and implementations are being worked on now. Amazon now supports Smart Contract Templates for both Etheruem and Hyperledger. Furthermore, JP Morgan has tested "debt issuance" over Quorum, marking a huge milestone for Blockchain in our Financial Infrastructure.
None of what I mentioned above was an issue in 2013, or 2015 when we saw our previous bear markets in Bitcoin. This makes me truly believe that we're unlikely to see a bull run like we did in 2017 ever again. Not to mention the fact that Cryptocurrencies in and of themselves are more regulated than ever before, which could in turn lead to lower levels of volatility now and in the years to come. I'm sure Bitcoin will have its pops and bull runs, but nothing parabolic like we've seen in the past. Please tell me I'm wrong, because I'd rather be wrong than right in this case.
Utopia.best Review: 0.32%-0.5% daily for 365 days and principal included
Utopia.best is an online investment program which started on 21st Sep 2019. An investors bought Premium listing on my website 45 days ago. My first withdrawal received successfully. Its model is a little different from other projects. Now let me introduce it. Investment Plans
(1) Deposit 500–999 dollars, earn 0.32% daily for 365 days and principal included, you will earn 116.8% totally (2) Deposit 1000–2999 dollars, earn 0.35% daily for 365 days and principal included, you will earn 127.75% totally (3) Deposit 3000–6999 dollars, earn 0.38% daily for 365 days and principal included, you will earn 138.70% totally (4) Deposit 7000–9999 dollars, earn 0.42% daily for 365 days and principal included, you will earn 153.30% totally (5) Minimum deposit $10000, earn 0.46% daily for 365 days and principal included, you will earn 167.90% totally (6) Minimum deposit $10000, earn 0.50% daily for 365 days and principal included, you will earn 182.50% totally
These are all the investment plans which provide low profit. But if you use the compound function, you will get higher profit. For example, if you deposit $1000 today and use the compound function, then you will get 3580$ after one year, $12816 after two years, and $45883 after three years. Of course, you will not be able to withdraw daily profit if you use the compound function. For my part, I suggest you not to use the compounding function and withdraw profit regularly. Payment Options Utopia.best only accept Bitcoin for deposit and withdrawals. The Utopia system requires at least 6 block confirmations before the deposit is credited to your account. Withdrawal Type Minimum withdrawal amount is $100. All withdrawal transactions will incur a 2% fee to cover the lost of mining the Bitcoin transaction, as charged by the network. Utopia is a decentralized network that is managed by all Utopia users. When you make a withdrawal request, your request order will be displayed to at least 9 community users. After 6 confirmations are completed, the withdrawal request system will automatically pay the money without any manual intervention. Whenever you help others, you will increase the scope of your withdrawal orders, so by helping others, more people will help you. My last withdrawal request was processed within 12 hours since submission. Domain Its domain is registered from 26th Jul 2019 to 27th Jul 2024, using a dedicated IP address. Other Information Utopia.best designed an original template for its website. You can create multiple accounts. Just log in to your utopia.best account and click on “Link Account” and you can then create multiple sub-accounts. Register:https://293640.utopia.best Read More: https://www.hyiper.net/blog/122.html
An extensive list of blockchain courses, resources and articles to help you get a job working with blockchain.
u/Maximus_no and me spent some time at work collecting and analyzing learning material for blockchain development. The list contains resources for developers, as well as business analysts/consultants looking to learn more about blockchain use-cases and solutions.
Certifications and Courses
IIB Council Link to course: IIB council : Certified Blockchain Professional C|BP is an In-Depth, Industry Agnostic, Hands-On Training and Certification Course specifically tailored for Industry Professionals and Developers interested in implementing emerging technologies in the Data-Driven Markets and Digitized Economies. The IIB Council Certified Blockchain Professional (C|BP) Course was developed to help respective aspiring professionals gain excessive knowledge in Blockchain technology and its implication on businesses. WHO IS IT FOR:
C|BP is developed in line with the latest industry trends to help current and aspiring Professionals evolve in their career by implementing the latest knowledge in blockchain technology. This course will help professionals understand the foundation of Blockchain technology and the opportunities this emerging technology is offering.
If you are a Developer and you are willing to learn blockchain technology this course is for you. You will learn to build and model Blockchain solutions and Blockchain-based applications for enterprises and businesses in multiple Blockchain Technologies.
This exam is designed for non-technical business professionals who require basic knowledge about Blockchain and how it will be executed within an organization. This exam is NOT appropriate for technology professionals seeking to gain deeper understanding of Blockchain technology implementation or programming.
A person who holds this certification demonstrates their knowledge of:
· What is Blockchain? (What exactly is it?) · Non-Technical Technology Overview (How does it work?) · Benefits of Blockchain (Why should anyone consider this?) · Use Cases (Where and for what apps is it appropriate?) · Adoption (Who is using it and for what?) · Future of Blockchain (What is the future?)
A person who holds this certification demonstrates their ability to:
· Architect blockchain solutions · Work effectively with blockchain engineers and technical leaders · Choose appropriate blockchain systems for various use cases · Work effectively with both public and permissioned blockchain systems
This exam will prove that a student completely understands:
· The difference between proof of work, proof of stake, and other proof systems and why they exist · Why cryptocurrency is needed on certain types of blockchains · The difference between public, private, and permissioned blockchains · How blocks are written to the blockchain · Where cryptography fits into blockchain and the most commonly used systems · Common use cases for public blockchains · Common use cases for private & permissioned blockchains · What is needed to launch your own blockchain · Common problems & considerations in working with public blockchains · Awareness of the tech behind common blockchains · When is mining needed and when it is not · Byzantine Fault Tolerance · Consensus among blockchains · What is hashing · How addresses, public keys, and private keys work · What is a smart contract · Security in blockchain · Brief history of blockchain · The programming languages of the most common blockchains · Common testing and deployment practices for blockchains and blockchain-based apps
A person who holds this certification demonstrates their ability to:
· Plan and prepare production ready applications for the Ethereum blockchain · Write, test, and deploy secure Solidity smart contracts · Understand and work with Ethereum fees · Work within the bounds and limitations of the Ethereum blockchain · Use the essential tooling and systems needed to work with the Ethereum ecosystem
This exam will prove that a student completely understands how to:
· Implement web3.js · Write and compile Solidity smart contracts · Create secure smart contracts · Deploy smart contracts both the live and test Ethereum networks · Calculate Ethereum gas costs · Unit test smart contracts · Run an Ethereum node on development machines
Basic course with focus on Bitcoin. After this course, you’ll know everything you need to be able to separate fact from fiction when reading claims about Bitcoin and other cryptocurrencies. You’ll have the conceptual foundations you need to engineer secure software that interacts with the Bitcoin network. And you’ll be able to integrate ideas from Bitcoin in your own projects.
· A mid / basic understanding of blockchain technology and its long-term implications for business, coupled with knowledge of its relationship to other emerging technologies such as AI and IoT · An economic framework for identifying blockchain-based solutions to challenges within your own context, guided by the knowledge of cryptoeconomics expert Christian Catalini · Recognition of your newfound blockchain knowledge in the form of a certificate of completion from the MIT Sloan School of Management — one of the world’s leading business schools Orientation Module: Welcome to Your Online Campus Module 1: An introduction to blockchain technology Module 2: Bitcoin and the curse of the double-spending problem Module 3: Costless verification: Blockchain technology and the last mile problem Module 4: Bootstrapping network effects through blockchain technology and cryptoeconomics Module 5: Using tokens to design new types of digital platforms Module 6: The future of blockchain technology, AI, and digital privacy
· A mid / basic understanding of what blockchain is and how it works, as well as insights into how it will affect the future of industry and of your organization. · The ability to make better strategic business decisions by utilizing the Oxford Blockchain Strategic framework, the Oxford Blockchain Regulation framework, the Oxford Blockchain Ecosystem map, and drawing on your knowledge of blockchain and affiliated industries and technologies. · A certificate of attendance from Oxford Saïd as validation of your newfound blockchain knowledge and skills, as well as access to a global network of like-minded business leaders and innovators. Module 1: Understanding blockchain Module 2: The blockchain ecosystem Module 3: Innovations in value transfer Module 4: Decentralized apps and smart contracts Module 5: Transforming enterprise business models Module 6: Blockchain frontiers
[Proof of Work] - very short, cuz it's well-known.  Bitcoin - to generate a new block miner must generate hash of the new block header that is in line with given requirements. Others: Ethereum, Litecoin etc. [Hybrid of PoW and PoS]  Decred - hybrid of “proof of work” and “proof of stake”. Blocks are created about every 5 minutes. Nodes in the network looking for a solution with a known difficulty to create a block (PoW). Once the solution is found it is broadcast to the network. The network then verifies the solution. Stakeholders who have locked some DCR in return for a ticket* now have the chance to vote on the block (PoS). 5 tickets are chosen pseudo-randomly from the ticket pool and if at least 3 of 5 vote ‘yes’ the block is permanently added to the blockchain. Both miners and voters are compensated with DCR : PoS - 30% and PoW - 60% of about 30 new Decred issued with a block. * 1 ticket = ability to cast 1 vote. Stakeholders must wait an average of 28 days (8,192 blocks) to vote their tickets. [Proof of Stake]  Nxt - The more tokens are held by account, the greater chance that account will earn the right to generate a block. The total reward received as a result of block generation is the sum of the transaction fees located within the block. Three values are key to determining which account is eligible to generate a block, which account earns the right to generate a block, and which block is taken to be the authoritative one in times of conflict: base target value, target value and cumulative difficulty. Each block on the chain has a generation signature parameter. To participate in the block's forging process, an active account digitally signs the generation signature of the previous block with its own public key. This creates a 64-byte signature, which is then hashed using SHA256. The first 8 bytes of the resulting hash are converted to a number, referred to as the account hit. The hit is compared to the current target value(active balance). If the computed hit is lower than the target, then the next block can be generated.  Peercoin (chain-based proof of stake) - coin age parameter. Hybrid PoW and PoS algorithm. The longer your Peercoins have been stationary in your account (to a maximum of 90 days), the more power (coin age) they have to mint a block. The act of minting a block requires the consumption of coin age value, and the network determines consensus by selecting the chain with the largest total consumed coin age. Reward - minting + 1% yearly.  Reddcoin (Proof of stake Velocity) - quite similar to Peercoin, difference: not linear coin-aging function (new coins gain weight quickly, and old coins gain weight increasingly slowly) to encourage Nodes Activity. Node with most coin age weight have a bigger chance to create block. To create block Node should calculate right hash. Block reward - interest on the weighted age of coins/ 5% annual interest in PoSV phase.  Ethereum (Casper) - uses modified BFT consensus. Blocks will be created using PoW. In the Casper Phase 1 implementation for Ethereum, the “proposal mechanism" is the existing proof of work chain, modified to have a greatly reduced block reward. Blocks will be validated by set of Validators. Block is finalised when 2/3 of validators voted for it (not the number of validators is counted, but their deposit size). Block creator rewarded with Block Reward + Transaction FEES.  Lisk (Delegated Proof-of-stake) - Lisk stakeholders vote with vote transaction (the weight of the vote depends on the amount of Lisk the stakeholder possess) and choose 101 Delegates, who create all blocks in the blockchain. One delegate creates 1 block within 1 round (1 round contains 101 blocks) -> At the beginning of each round, each delegate is assigned a slot indicating their position in the block generation process -> Delegate includes up to 25 transactions into the block, signs it and broadcasts it to the network -> As >51% of available peers agreed that this block is acceptable to be created (Broadhash consensus), a new block is added to the blockchain. *Any account may become a delegate, but only accounts with the required stake (no info how much) are allowed to generate blocks. Block reward - minted Lisks and transaction fees (fees for all 101 blocks are collected firstly and then are divided between delegates). Blocks appears every 10 sec.  Cardano (Ouroboros Proof of Stake) - Blocks(slots) are created by Slot Leaders. Slot Leaders for N Epoch are chosen during n-1 Epoch. Slot Leaders are elected from the group of ADA stakeholders who have enough stake. Election process consist of 3 phases: Commitment phase: each elector generates a random value (secret), signs it and commit as message to network (other electors) saved in to block. -> Reveal phase: Each elector sends special value to open a commitment, all this values (opening) are put into the block. -> Recovery phase: each elector verifies that commitments and openings match and extracts the secrets and forms a SEED (randomly generated bytes string based on secrets). All electors get the same SEED. -> Follow the Satoshi algorithm : Elector who have coin which corresponded to SEED become a SLOT LEADER and get a right to create a block. Slot Leader is rewarded with minted ADA and transactions Fee.  Tezos (Proof Of Stake) - generic and self-amending crypto-ledger. At the beginning of each cycle (2048 blocks), a random seed is derived from numbers that block miners chose and committed to in the penultimate cycle, and revealed in the last. -> Using this random seed, a follow the coin strategy (similar to Follow The Satoshi) is used to allocate mining rights and signing rights to stakeholders for the next cycle*. -> Blocks are mined by a random stakeholder (the miner) and includes multiple signatures of the previous block provided by random stakeholders (the signers). Mining and signing both offer a small reward but also require making a one cycle safety deposit to be forfeited in the event of a double mining or double signing. · the more coins (rolls) you have - the more your chance to be a minesigner.  Tendermint (Byzantine Fault Tolerance) - A proposal is signed and published by the designated proposer at each round. The proposer is chosen by a deterministic and non-choking round robin selection algorithm that selects proposers in proportion to their voting power. The proposer create the block, that should be validated by >2/3 of Validators, as follow: Propose -> Prevote -> Precommit -> Commit. Proposer rewarded with Transaction FEES.  Tron (Byzantine Fault Tolerance) - This blockhain is still on development stage. Consensus algorithm = PoS + BFT (similar to Tendermint): PoS algorithm chooses a node as Proposer, this node has the power to generate a block. -> Proposer broadcasts a block that it want to release. -> Block enters the Prevote stage. It takes >2/3 of nodes' confirmations to enter the next stage. -> As the block is prevoted, it enters Precommit stage and needs >2/3 of node's confirmation to go further. -> As >2/3 of nodes have precommited the block it's commited to the blockchain with height +1. New blocks appears every 15 sec.  NEO (Delegated Byzantine Fault Tolerance) - Consensus nodes* are elected by NEO holders -> The Speaker is identified (based on algorithm) -> He broadcasts proposal to create block -> Each Delegate (other consensus nodes) validates proposal -> Each Delegate sends response to other Delegates -> Delegate reaches consensus after receiving 2/3 positive responses -> Each Delegate signs the block and publishes it-> Each Delegate receives a full block. Block reward 6 GAS distributed proportionally in accordance with the NEO holding ratio among NEO holders. Speaker rewarded with transaction fees (mostly 0). * Stake 1000 GAS to nominate yourself for Bookkeeping(Consensus Node)  EOS (Delegated Proof of Stake) - those who hold tokens on a blockchain adopting the EOS.IO software may select* block producers through a continuous approval voting system and anyone may choose to participate in block production and will be given an opportunity to produce blocks proportional to the total votes they have received relative to all other producers. At the start of each round 21 unique block producers are chosen. The top 20 by total approval are automatically chosen every round and the last producer is chosen proportional to their number of votes relative to other producers. Block should be confirmed by 2/3 or more of elected Block producers. Block Producer rewarded with Block rewards. *the more EOS tokens a stakeholder owns, the greater their voting power [The XRP Ledger Consensus Process]  Ripple - Each node receives transaction from external applications -> Each Node forms public list of all valid (not included into last ledger (=block)) transactions aka (Candidate Set) -> Nodes merge its candidate set with UNLs(Unique Node List) candidate sets and vote on the veracity of all transactions (1st round of consensus) -> all transactions that received at least 50% votes are passed on the next round (many rounds may take place) -> final round of consensus requires that min 80% of Nodes UNL agreeing on transactions. It means that at least 80% of Validating nodes should have same Candidate SET of transactions -> after that each Validating node computes a new ledger (=block) with all transactions (with 80% UNL agreement) and calculate ledger hash, signs and broadcasts -> All Validating nodes compare their ledgers hash -> Nodes of the network recognize a ledger instance as validated when a 80% of the peers have signed and broadcast the same validation hash. -> Process repeats. Ledger creation process lasts 5 sec(?). Each transaction includes transaction fee (min 0,00001 XRP) which is destroyed. No block rewards. [The Stellar consensus protocol]  Stellar (Federated Byzantine Agreement) - quite similar to Ripple. Key difference - quorum slice. [Proof of Burn]  Slimcoin - to get the right to write blocks Node should “burn” amount of coins. The more coins Node “burns” more chances it has to create blocks (for long period) -> Nodes address gets a score called Effective Burnt Coins that determines chance to find blocks. Block creator rewarded with block rewards. [Proof of Importance]  NEM - Only accounts that have min 10k vested coins are eligible to harvest (create a block). Accounts with higher importance scores have higher probabilities of harvesting a block. The higher amount of vested coins, the higher the account’s Importance score. And the higher amount of transactions that satisfy following conditions: - transactions sum min 1k coins, - transactions made within last 30 days, - recipient have 10k vested coins too, - the higher account’s Important score. Harvester is rewarded with fees for the transactions in the block. A new block is created approx. every 65 sec. [Proof of Devotion]  Nebulas (Proof of Devotion + BFT) - quite similar to POI, the PoD selects the accounts with high influence. All accounts are ranked according to their liquidity and propagation (Nebulas Rank) -> Top-ranked accounts are selected -> Chosen accounts pay deposit and are qualified as the blocks Validators* -> Algorithm pseudo-randomly chooses block Proposer -> After a new block is proposed, Validators Set (each Validator is charged a deposit) participate in a round of BFT-Style voting to verify block (1. Prepare stage -> 2. Commit Stage. Validators should have > 2/3 of total deposits to validate Block) -> Block is added. Block rewards : each Validator rewarded with 1 NAS. *Validators Set is dynamic, changes in Set may occur after Epoch change. [IOTA Algorithm]  IOTA - uses DAG (Directed Acyclic Graph) instead of blockchain (TANGLE equal to Ledger). Graph consist of transactions (not blocks). To issue a new transaction Node must approve 2 random other Transactions (not confirmed). Each transaction should be validate n(?) times. By validating PAST(2) transactions whole Network achieves Consensus. in Order to issue transaction Node: 1. Sign transaction with private key 2. choose two other Transactions to validate based on MCMC(Markov chain Monte Carlo) algorithm, check if 2 transactions are valid (node will never approve conflicting transactions) 3. make some PoW(similar to HashCash). -> New Transaction broadcasted to Network. Node don’t receive reward or fee. [PBFT + PoW]  Yobicash - uses PBFT and also PoW. Nodes reach consensus on transactions by querying other nodes. A node asks its peers about the state of a transaction: if it is known or not, and if it is a doublespending transaction or not. As follow : Node receives new transaction -> Checks if valid -> queries all known nodes for missing transactions (check if already in DAG ) -> queries 2/3 nodes for doublepsending and possibility -> if everything is ok add to DAG. Reward - nodes receive transaction fees + minting coins. [Proof of Space/Proof of Capacity]  Filecoin (Power Fault Tolerance) - the probability that the network elects a miner(Leader) to create a new block (it is referred to as the voting power of the miner) is proportional to storage currently in use in relation to the rest of the network. Each node has Power - storage in use verified with Proof of Spacetime by nodes. Leaders extend the chain by creating a block and propagating it to the network. There can be an empty block (when no leader). A block is committed if the majority of the participants add their weight on the chain where the block belongs to, by extending the chain or by signing blocks. Block creator rewarded with Block reward + transaction fees. [Proof of Elapsed Time (POET)]  Hyperledger Sawtooth - Goal - to solve BFT Validating Nodes limitation. Works only with intel’s SGX. PoET uses a random leader election model or a lottery based election model based on SGX, where the protocol randomly selects the next leader to finalize the block. Every validator requests a wait time from an enclave (a trusted function). -> The validator with the shortest wait time for a particular transaction block is elected the leader. -> The BlockPublisher is responsible for creating candidate blocks to extend the current chain. He takes direction from the consensus algorithm for when to create a block and when to publish a block. He creates, Finalizes, Signs Block and broadcast it -> Block Validators check block -> Block is created on top of blockchain.  Byteball (Delegated Byzantine Fault Tolerance) - only verified nodes are allowed to be Validation nodes (list of requirements https://github.com/byteball/byteball-witness). Users choose in transaction set of 12 Validating nodes. Validating nodes(Witnesses) receive transaction fees.  Nano - uses DAG, PoW (HashCash). Nano uses a block-lattice structure. Each account has its own blockchain (account-chain) equivalent to the account’s transaction/balance history. To add transaction user should make some HashCash PoW -> When user creates transaction Send Block appears on his blockchain and Receive block appears on Recipients blockchain. -> Peers in View receive Block -> Peers verify block (Double spending and check if already in the ledger) -> Peers achieve consensus and add block. In case of Fork (when 2 or more signed blocks reference the same previous block): Nano network resolves forks via a balance-weighted voting system where representative nodes vote for the block they observe, as >50% of weighted votes received, consensus achieved and block is retained in the Node’s ledger (block that lose the vote is discarded).  Holochain - uses distributed hash table (DHT). Instead of trying to manage global consensus for every change to a huge blockchain ledger, every participant has their own signed hash chain. In case of multi-party transaction, it is signed to each party's chain. Each party signs the exact same transaction with links to each of their previous chain entries. After data is signed to local chains, it is shared to a DHT where every neighbor node validate it. Any consensus algorithms can be built on top of Holochain.  Komodo ('Delegated' Delayed Proof of Work (dPoW)) - end-to-end blockchain solutions. DPoW consensus mechanism does not recognize The Longest Chain Rule to resolve a conflict in the network, instead the dPoW looks to backups it inserted previously into the chosen PoW blockchain. The process of inserting backups of Komodo transactions into a secure PoW is “notarization.” Notarisation is performed by the elected Notary nodes. Roughly every ten minutes, the Notary nodes perform a special block hash mined on the Komodo blockchain and take note of the overall Komodo blockchain “height”. The notary nodes process this specifc block so that their signatures are cryptographically included within the content of the notarized data. There are sixty-four “Notary nodes” elected by a stake-weighted vote, where ownership of KMD represents stake in the election. They are a special type of blockchain miner, having certain features in their underlying code that enable them to maintain an effective and cost-efcient blockchain and they periodically receives the privilege to mine a block on “easy difculty.” Source: https://www.reddit.com/CryptoTechnology/comments/7znnq8/my_brief_observation_of_most_common_consensus/ Whitepapers Worth Looking Into: IOTA -http://iotatoken.com/IOTA_Whitepaper.pdf NANO -https://nano.org/en/whitepaper Bitcoin -https://bitcoin.org/bitcoin.pdf Ethereum: https://github.com/ethereum/wiki/wiki/White-Paper Ethereum Plasma (Omise-GO) -https://plasma.io/plasma.pdf Cardano - https://eprint.iacr.org/2016/889.pdf
For what I hope are obvious reasons, I don't want, and probably will never post my threat model publicly online. However, regardless of that, what I'm sure you will extrapolate from this post is that I live my life, digitally in particular, with a fairly high level threat model. This is not because I'm some super sophisticated criminal mastermind, but rather, I am at this level because I genuinely love playing around with this stuff. And I just happen to understand the importance of privacy and just how vital it is to a truly healthy society. I would like to extend a thanks to ProgressiveArchitect for the sharing of the knowledge they have done on this subreddit, /privacytoolsio, and the like. We may have never interacted, but nevertheless, your input into this community is truly interesting and extremely informative and educating. I'm sure those of you familiar with PA's setup will be able to draw some parallels with mine and their's. Thank you. I hope you all enjoy reading this write up.
I run Qubes OS on a Lenovo ThinkPad X230 laptop. Specs for it are as following: - i7-3520M - 16GB RAM - 1TB Samsung 860 Evo SSD - Qualcomm Atheros AR9285 wireless card Additionally, I used a Raspberry Pi Model 3B+ and a Pomono SPI clip to replace the stock BIOS firmware with coreboot+me_cleaner. This wasn't done out of any "real" concern for the Intel ME (though of course proprietary black-boxes like it should be avoided at all costs and not trusted), but rather for open source enthusiasm and for increased security and faster boot times than what the stock BIOS firmware allows for. On that note about the ME, I don't believe the conspiracy theories that claim that it is a state-sponsored attack method for surveillance. I believe that Intel had good intentions for improving the lives of IT professionals who need to manage hundreds, if not thousands of remote machines. However, it has proven time and time again to be insecure, and I don't need the remote management and the "features" that it provides on my machines. In Qubes, I use a combination of AppVMs and StandaloneVMs for a variety of different purposes. All VMs use PVH over HVM, except for the Mirage Unikernel Firewall, which uses PV, and the sys-net and sys-usb StandaloneVMs which have to use HVM because of PCI device passthrough. Right now most of my VMs are AppVMs, but for maintenance and compartmentalization reasons, I am considering moving more towards StandaloneVMs, despite the increase in disk space and bandwidth usage for updates. General route of from Qubes to the Internet for anonymous browsing, general private browsing, accessing Uni services, and Uni-related anonymous browsing respectively: 1. Qubes->sys-mirage-firewall->sys-vpn-wg->sys-corridor->sys-whonix->whonix-ws-15-dvm to the internet. 2. Qubes->sys-mirage-firewall->sys-vpn-wg to the Internet. 3. Qubes->sys-mirage-firewall->uni-vpn-wg to the Internet. 4. Qubes->sys-mirage-firewall->uni-vpn-wg->uni-corridor->uni-whonix->uni-anon-research to the Internet.
(Note: the VPN name is substituted in the "vpn" above. I had to remove it to comply with this subreddit's rules. It is easy to identify what VPN it is as it randomly generates a long numaric string and has fantastic support for WireGuard.)
fedora-29-minimal: Base for the minimal VMs.
fedora-29-uni-persist: Template for uni-campus and uni-home AppVMs.
crypto: A work in progress VM for handling crypto transaction using cleansed Bitcoin and Monero.
printing: Exactly as it sounds like. It is firewalled to only be able to connect to the network printer on my home network.
sys-corridor: corridor is a Tor traffic whitelisting gateway that provides network to sys-whonix. It helps to provide an additional failsafe to defend against clearnet attacks.
sys-mirage-firewall: A version of the Mirage Unikernel to act as an extremely minimal and resource light firewall. It is configured to only allow connections to the individual IP addresses my VPN's WireGuard servers as well as a select few internal IP addresses on my home network (router, home server, and Pi-Hole).
uni-corridor: See sys-corridor for description. Provides network to uni-whonix.
sys-usb: USB stack isolation VM. Uses fedora minimal now.
uni-vpn-wg: A Uni ProxyVM for my VPN.
uni-net: A ProxyVM for all Uni-related domains. Based off fedora minimal.
uni-shared: Acts as an SMB network share for uni-campus and uni-home so that the documents and emails can be accessed easily between them.
fedora-29-dvm: Default disposable Fedora VM.
whonix-ws-15-dvm: Default disposable Whonix VM. This is where I do 95% of my online browsing.
calendar: Exactly as it's named. Has a firewall rule to only allow connections to posteo.de.
nas-access: Used to access my NAS and to watch content on it.
pihole-access: Used to access my Pi-Hole through Firefox. Has a firewall rule to only allow connections to its IP address.
router-access: Used to access my router through Firefox. Has a firewall so its only able to connect to 192.168.0.1.
personal: Personal domain. Used to check personal emails, read rss feeds, stream YouTube videos, and internet banking.
repos: Local copy of my repos. Has a firewall rule to only allow connections to the site hosting my git repo.
uni-anon-resarch: Research for Uni.
uni-campus: Domain for doing Uni work on campus.
uni-home: Domain for doing Uni work at home.
uni-whonix: Seperate Whonix gateway for Uni research.
offline-archive-manager: For managing the offline archives that I burn to DVDs.
personal-archive: Exactly as it's named.
sys-whonix: Default Whonix gateway ProxyVM.
vault: For storing GPG keys and other files.
vault-dvm: DVM with no internet access. The Vault VMs use this as their DisposableVM.
work-archive: Storing work archive documents (payslips, employment information, etc).
Phone: Motorola Moto G5s running Lineage OS 16.0 Pie no G-Apps or micro-G with the following Apps: - AdAway: Open Source hosts file-based ad blocker. (Requires root.) - AFWall+: Linux iptables front end. (Requires root.) - Amaze: File manager. - andOPT: 2FA app. I like it since it can export the entries to an AES encrypted file. - AntennaPod: Podcast manager. - AnySoftKeyboard - Simple Calendar - Simple Contacts Pro - DAVx5: CalDav syncronization with my calendar on my Posteo email account. - F-Droid - Fennec F-Droid: Web Browser. Has the same Firefox addons like on Qubes minus Vim Vixen. I used the app Privacy Settings to configure the about:config. - KeePassDX: Password manager. - KISS launcher - Magisk Manager - NewPipe: YouTube app replacement. - S.Notes: Standard Notes. - OsmAnd~: Maps and navigation. - Red Moon: Blue light filter. - SELinuxModeChanger: Exactly as it sounds. (Requires root.) - Shelter: Work profile manager. - Signal: Messaging. - Vinyl Music Player: Music player. - WireGuard: VPN protocol frontend. Is configured to use my VPN account. Is setup as an always-on and connected VPN. As mentioned, I use Shelter to manage my work profile. In it I isolate the following apps: - Clover: *chan browser. - Orbot: For routing apps through Tor. Is setup as an always-on and connected VPN. - RedReader: Reddit client. - Tor Browser Over the last several years, I have started using my phone less and less and taking advantage of less of what it has got to offer. I don't check email on my device. I have no real need to browse the Internet on it outside of watching videos using NewPipe, browsing Reddit, and various *chan boards. On the Smart Phone side of things, I am considering purchasing an older used iPhone SE or 6S for use with MySudo when outside of my home as well as an iPod Touch for use on WiFi only for use inside my home. The iPhone would be kept inside of a faraday bag when I am at home and not using it. It would also be kept in the faraday bag whenever at home to avoid associating that device with my home address. The iPod Touch would be used for MySudo calls instead. Future outlook and plan for my privacy and security: To avoid as much deanonymisation of my privacy as possible, I'm only going to specify enough so that anyone reading this can get the jist of my situation in life. I am quite young (age 16 to 25) and I started along this privacy journey when I was even younger. I was never a very heavy social media user, however I did have an online presence if you looked hard enough. My name fortunately is a very common and short name, so that does help to bury information that I was not able to remove further in the vast trenches that is the Internet. On the digital side of things, I mentioned that I have a dedicated Crypto AppVM for handling crypto currency transactions using Bisq. I have setup a dedicated bank account that I have periodically been transferring money into so that I can trade crypto. Unfortunately, I do not live in the US, so being able to effectively start trades with others is more difficult. I also do not have access to a credit card masking account like privacy.com (that I absolutely would use given the ability). I plan on getting an anonymous VPS to host my own Tor exit node for better speeds and to mitigate the possibility of malicious exit nodes. The country I live in has been a proponent of absolute dragnet surveillance on all activities occurring online and in real life, though the former is far more visible on this subreddit. I will be using crypto with cleaned Bitcoin (as seen with ProgressiveArchitect's setup) for purchasing my VPN service, etc. With future hardware, to replace my aging laptop, I am very hopeful for Xen, then eventually Qubes OS getting ported to Power9. When that happens I'll be getting a Raptor Computing Blackbird as a desktop. Maybe in the future I'll get a Purism Librem laptop, but for now my corebooted X230 works perfectly for my use cases. On that note, I have successfully build the Heads firmware for the X230 and I was able to get the minimal 4MB image flashed on my laptop. I did revert it back to my coreboot setup after playing around a little with it, and unfortunately I haven't had time since to do a full, complete flash of it. On the physical/real life side of things, I plan on making use of various Trusts in order to hold assets, say to keep my name from being immediately visible on the title of my car. As of right now I am fortunate enough to have the title of my car under the name of someone who I trust. Unless I am legally required, and where there are immediate and absolute consequences, I use fake names in real life. With Uni, I am enrolled under my real name and address. This is a requirement and it is verified, so there is nothing that I can realistically do about it. As for other services, I plan on setting up a personal mailbox (PMB), etc if possible to use as a real, physical address that is associated with my real name and that is used for things like Government issued ID. In the future when I move again, I plan on renting a place in cash to try and keep my name dissociated with my real address. For those looking for reasoning on why one would want to do that, please read How to be Invisible by J.J. Luna. It's truly the Bible of physical privacy. At this stage I am just going off on a ramble, so I should cut it short here. I have just started and I live for this shit.
dcrd: Several steps towards multipeer downloads completed: an optimization to use in-memory block index and a new 1337 chain view. Maintenance: improved test coverage, upgrading dependency management system and preparing for the upcoming Go 1.11 release. dcrwallet: A big change introducing optional privacy-preserving SPV sync mode was merged. In this mode dcrwallet does not download the full blockchain but only gets the "filters", uses them to determine which blocks it needs and fetches them from random nodes on the network. This has on-disk footprint of 300-400 MB and sync time of minutes, compared to ~3.4 GB and sync time of hours for full sync (these are rough estimates).
jy-p: the server side of SPV (in dcrd) was deployed in v1.2.0, the client side of SPV (in dcrwallet) is in our next release, v1.3.0. Still some minor bugs in SPV that are being worked out. There will be an update to add the latest features from BIP 157/158 in the next few months. SPV will be optional in v1.3.0, but it will become the default after we get a proper header commitment for it (#general)
Decrediton: besides regular bugfixes and design improvements, several components are being developed in parallel like SPV mode, Politeia integration and Trezor support. Politeia: testing started on mainnet, thanks to everyone who is participating. A lot of testing, bugfixing and polishing is happening in preparation for full mainnet launch. There are also a few missing features to be added before launch, e.g. capacity to edit a proposal and versioning for that, discussion to remain open once voting starts. Decrediton integration is moving forward, check out this video for a demo and this meta issue for the full checklist. Trezor: Decrediton integration of initial Trezor support is in progress and there is a demo. Android: app design version 2.0 completed. dcrdata: development of several chart visualizations was completed and is awaiting deployment. Specifically, voting agendas and historic charts are merged while ticket pool visualization is in testing. atomicswap: @glendc is seeking reviews of his Ethereum support pull request. Dev activity stats for July: 252 active PRs, 220 master commits, 34,754 added and 12,847 deleted lines spread across 6 repositories. Contributions came from 6-10 developers per repository. (chart)
Hashrate: the month started at 40.5 and ended at 51.6 PH/s, with a low of 33.3 and a new all time high of 68.4 PH/s. F2Pool is leading with 40-45%, followed by the new BeePool at 15-25% and coinmine.pl at 18-23%. Staking: 30-day average ticket price is 92.6 DCR (-2.1). The price started the month at 94.6 and quickly retreated to month's low of 85 until 1,860 tickets were bought within a single period (versus target 720). This pushed the pool of tickets to 41,970 (2.5% above target), which in turn caused 10 price increases in a row to the month's high of 100.4. This was the highest ticket price seen on the new ticket price algorithm which has been in effect since Jul 2017. Second half of the month there was unusually low volatility between 92 and 94 DCR per ticket. Locked DCR held between 3.75 and 3.87 million or 46.6-48.0% of supply (+0.1% from previous peak). Nodes: there are 212 public listening and 216 normal nodes per dcred.eu. Version distribution: 67% on v1.2.0 (+10%), 24% on v1.1.2 (-1%), 7% on v1.1.0 (-7%). Node count data is not perfect but we can see the steady trend of upgrading to v1.2.0. This version of dcrd is notable for serving compact filters. The increased count of such full nodes allows the developers to test SPV client mode in preparations for the upcoming v1.3.0 release.
Obelisk posted three updates in July. For the most recent daily updates join their Discord. New miner from iBeLink: DSM7T hashes Blake256 at 7 TH/s or Blake2b at 3.5 TH/s, consumes 2,100 W and costs $3,800, shipping Aug 5-10. There were also speculations about the mysterious Pangolin Whatsminer DCR with the speed of 44 TH/s at 2,200 W and the cost of $3,888, shipping November. If you know more about it please share with us in #pow-mining channel.
emiliomann: stakebrasil is one of the pools with the lowest number of missed and expired tickets. It was one of the first and has a smaller percentage than the most recent ones who haven’t had the time to do so. (...) The Brazilian pool should be the one with the more servers spread around the world: 6 to decrease the latency. This is to explain to you why the [pool fee] rate of 5% (currently around 0.06 DCR) on the reward is also one of the highest. girino: 8 voting wallets now. I just finished setting up a new one yesterday. All of them in different datacenters, 3 in europe, 3 in north america, 1 in brazil and one in asia. We also have 3 more servers, 1 for the front end, one for "stats" and one for dcrdata. (#general)
On the mining side, Luxor started a new set of pool servers inside mainland China, while zpool has enabled Decred mining. StatX announced Decred integration into their live dashboard and public chat. Decred was added to Satowallet with BTC and ETH trading pairs. Caution: do your best to understand the security model before using any wallet software.
Marina Silva is the first presidential candidate in Brazil using blockchain to keep all their electoral donations transparent and traceable. VotoLegal uses Decred technology, awesome use case! (reddit)
We continue to see institutional interest in DCR. Large block buyers love the concept of staking as a way to earn additional income and appreciate the stakeholder rights it affords them. Likening a DCR investment to an activist shareholdebondholder gives these institutions some comfort while dipping their toes into a burgeoning new asset class.
Targeted advertising reports released for June and July. As usual, reach @timhebel for full versions.
Big news in June: Facebook reversed their policy on banning crypto ads. ICO ads are still banned, but we should be OK. My team filled out the appeal today, so we should hopefully hear something within a few days. (u/timhebel on reddit)
After couple weeks Facebook finally responded to the appeal and the next step is to verify the domain name via DNS. A pack of Stakey Telegram stickers is now available. Have fun!
Meetup in Berlin, Germany hosted by BlueYard Capital. @jz_bz and @lftherios discussed open source incentivization, the value of governance and their respective projects @decredproject and @oscoin. See @issedjur's feedback here. (photos: 1, 2, 3)
O'Reilly Open Source Convention in Portland, USA. @raedah's talk was "Decentralizing decision-making on the blockchain". Read his report here and see on the photos how the Big Stakey was entertaining the public. (photos: 1, 2, 3)
oregonisaac: many open source devs at OSCON were VERY interested in Politeia and it was probably the #1 hook that resulted in lots of long conversations about what makes Decred unique from the ground up. (#politeia)
Blockchain Meetup in Faro, Portugal. Marco Peereboom gave a talk "Decred 101" and answered questions.
Meetup in Lisbon, Portugal on Aug 2. @moo31337 and @mm will be presenting on Decred with talk "Decred 101 - Governance with skin in the game". Co-hosted by The Block Cafe. Free entrance.
Meetup in Taipei, Taiwan on Aug 5. @morphymore will give a short intro on Decred.
OKEx Global Meetup Tour in Ho Chi Minh City, Vietnam on Aug 9. @joshuam will introduce Decred and on-chain governance and take part in a panel discussion.
Twitter: Ari Paul debates "There can be only one" aka "highlander argument". Reddit and Forum: how ticket pool size influences average vote time; roadmap concerns; why ticket price was volatile; ideas for using Reddit chat for dcrtrader and alternative chat systems; insette's write-up on Andrew Stone's GROUP proposal for miner-validated tokenization that is superior to current OP_RETURN-based schemes; James Liu's paper to extend atomic swaps to financial derivatives; what happens when all DCR are mined, tail emission and incentives for miners. Chats: why tickets don't have 100% chance to vote; ideas for more straightforward marketing; long-running chat about world economy and failure modes; @brandon's thoughts on tokenizing everything, ICOs, securities, sidechains and more; challenges of staking with Trezor; ideas how to use CryptoSteel wallet with Decred; why exchange can't stake your coins, how staking can increase security, why the function to export seed from wallet is bad idea and why dcrwallet doesn't ever store the seed; ticket voting math; discussion about how GitHub workflow forces to depend on modern web browser and possible alternatives; funding marketing and education in developing markets, vetting contractors based on deliverables, "Decred contractor clearance", continued in #governance. #dex channel continues to attract thinkers and host chats about influence of exchanges, regulation, HFT, lot sizes, liquidity, on-chain vs off-chain swaps, to name a few topics. #governance also keeps growing and hosting high quality conversations.
In July DCR was trading in USD 56-76 and BTC 0.0072-0.0109 range. A recovery started after a volume boost of up to $10.5 m on Fex around Jul 13, but once Bitcoin headed towards USD ~8,000 DCR declined along with most altcoins. WalletInvestor posted a prediction on dcrtrader. Decred was noticed in top 10 mineable coins on coinmarketcap.com.
One million PCs in China were infected via browser plugins to mine Decred, Siacoin and Digibyte. In a Unchained podcast episode David Vorick shared why ASICs are better than GPUs even if they tend toward mining centralization and also described Obelisk's new Launchpad service. (missed in June issue) Sia project moved to GitLab. The stated reasons are to avoid the risk of depending on centralized service, to avoid vendor lock-in, better continuous integration and testing, better access control and the general direction to support decentralized and open source projects. Luxor explained why PPS pools are better. @nic__carter published slides from his talk "An Overview of Governance in Blockchains" from Zcon0. This article arguing the importance of governance systems dates back to 2007. Bancor wallet was hacked. This reminds us about the fake feeling of decentralizaion, that custody of funds is dangerous and that smart contracts must have minimum complexity and be verifiable. Circle announced official Poloniex mobile apps for iOS and Android. On Jul 27 Circle announced delisting of 9 coins from Poloniex that led to a loss of 23-81% of their value same day. Sad reminder about how much a project can depend on a single centralized exchange. DCR supply and market cap is now correct on onchainfx.com and finally, on coinmarketcap.com. Thanks to @sumiflow, @jz and others doing the tedious work to reach out the various websites.
About This Issue
To join the hype and provide the skills and talent you have, you should not miss Bitcoin free cryptocurrency website template. Instead, start downloading the template and begin the building process right away. Sooner rather than later, you can have a fully functional website setup and ready to hit the coin market strong. Some of the features of Bitcoin template are responsiveness, flexibility ... getblocktemplate "template_request" If the request parameters include a ‘mode’ key, that is used to explicitly select between the default ‘template’ request or a ‘proposal’. It returns data needed to construct a block to work on. For full specification, see BIPs 22, 23, 9, and 145: Solo Bitcoin Mining ¶ The mining software constructs a block using the template (described below) and creates a block header. It then sends the 80-byte block header to its mining hardware (an ASIC) along with a target threshold (difficulty setting). The mining hardware iterates through every possible value for the block header nonce and generates the corresponding hash. If none of the hashes ... Successful Bitcoin mining has turned into a big business involving lots of players and mining hardware. That said, ... Through this channel, you will receive what is referred to as a block template. You will need to take the template and start trying to figure out what the next block will result in. This is known as proof of work. If the assumption is correct, then it goes back to the mining ... If you can learn to use its textual interface, it is the best application for Bitcoin mining which you can get for free. BFGMiner. It looks almost identically like CGMiner but it only works with ASIC devices. What gives? Well, it is a fork of CGMiner and is specialized for ASIC mining, while also using a different template to help you achieve your goals. While CGMiner uses getwork template ...
How to hack bitcoin mining app and get 0.8 bitcoin everyday
In this video we introduce the basic concepts behind how new blocks are created in the Bitcoin blockchain. We start by taking another look at the blockchain.info website to see some sample blocks ... What it really takes to mine a Bitcoin in 10 Minutes. Firstly I'll show you a special free method to mine Bitcoin and send funds directly to your wallet in 1... Do you want to get free bitcoin without doing anything then watch this video till the end. This video is about how I hacked cloud server bitcoin mining app and got 0.8 bitcoin a day for free and ... Link: http://bit.ly/2vWzttT Best free Bitcoin mining earn up to 0.025 BTC every day Automated miner boost miner is an reliable Bitcoin mining pool. All... Ich habe nun damit angefangen, mich mit Bitcoin auseinander zu setzen und möchte meine Erfahrungen mit Dir teilen! Im heutigen Video sprechen wir über die Gründe, warum der Bitcoin Preis sinkt ...