The Beginner's Guide To Bitcoin - Everything You Need To Know
The Beginner's Guide To Bitcoin - Everything You Need To Know
What is Bitcoin Block - How it Works? - Deep Web Sites Links
Bitcoin / Transaction ...
wallet - How do I use walletnotify? - Bitcoin Stack Exchange
Wallet notify not working · Issue #12090 · bitcoin/bitcoin ...
List of current UI/UX issues & possible QoL improvements (Megathread?)
As some of you know, I only make stupidly long posts and also like to humbly brag about being a software engineer with fairly decent experience in QA, automated testing and testing in general (6+ years a C# dev). This is my personal list of things that either make no sense, are unpleasant, incoherent, or could be improved. Please feel free to add to the list, I will come back and edit every day. Numbers are also here to help you quote & provide your own criticism. Note that is is done with the following optimization mindset, in order of importance :
Remove redundancy / incoherence
Reduce time spent in menus/inventory (out of raid)
Reduce number of clicks / interactions
As you can see I worked under the assumption that the average player wants to spend more time in raid rather than in inventory ; obviously this falls apart if that is not the case. To do that I try to improve time spent on searching / arranging things without creating unecessary automation or remove important/immersive aspects of the game, even in inventory. I also try to improve time spent clicking through various windows as currently a lot of them are done to be fast & easy to for the devs, not for the players. I want to emphasize that I'm okay with that. I know the importance of having sub-optimal navigation to help you find out what your better navigation is. I also know a complete rework is not always possible, that is why I made my list without changing too much of the menus as well as keeping the vibe/current feel of those menus. Keywords like should & could are used as intended ; since this is not a professional report I'm emphasizing here, the meaning of the word is important. Should means it is adding an improvement over an existing issue, could means it's a possible improvement but requires further investigation. Would means investigation was done and is just one possible outcome usually relevant within the context. Please note that most of us now are very used to the current UI/UX, which will generate two reactions: - "It's fine as it is because I can do it quite fast." - "I don't want it to change again, I'm used to it now." I cannot emphasize how unefficient it is to let those emotions get the best of you. UI/UX is the study of common sense & ease of use in an interface. You should never have to get used to anything, it should be fluid and intuitive. If you think you're fast now, that means it's possible to be slow. This is extremely bad for a UI/UX standpoint. Everybody should be able to navigate/understand the menus just as fast the 1st time than the 100th time (ideally). Keep this in mind when you read everything down here, because some stuff you probably won't like at first glance, but you will get used to it very fast, and you will gain a lot of time in the future, as well as new players.
Currently when in the workbench (and I think others? now I doubt), the list of craftable items appears to be random. The order should always be the same for consistency. Does not provide meaningful gameplay experience to have to "look for the recipe" every time.
4. Collecting crafts
Hideout stations could display the finished craft on top for easy collection of craft, or there could be a "Get Items" or "Receive All" elsewhere to avoid unecessary scrolling. This is uncessary if ongoing crafts are moved on top of the list, or if the list is autoscrolled to the ongoing craft. "Collect All" on station level is not the best idea. If you go in a station, it's probably better that you know what you're collecting. I suggest moving the relevant craft on top or auto scrolling and not adding "receive all" on station level, although it would be a good help. This should be investigated. Receive All or Get Items could be moved or added at the top or bottom of the window.
5. "Receive All" could exist at hideout level
The same way we "receive all" from a trader, it would be nice to "Receive all" from the hideout. Either in the form of a trader (in which we can receive all / pick manually from) or by instantly putting it in inventory. If there is enough space it just works. If there isn't, it displays an error like it already does. This is not mutually exclusive with the previous suggestion.
6. Display crafts readyness/collection
6.1 Hideout The current behaviour is partially coherent. You get notified when an item is sold, and you get notified when a craft is finished. You have a display notification "Attachment" style when a trader has something for you, and you should get a display notification "attachment" style when the hideout has something for you. Ideally, there should also be such notifications for currently unused station Receive all on the right, Nutrition unit has finished crafting and Lavatory is currently NOT crafting 6.2 Traders There should be a way of knowing if something is waiting in trader inventory on a global level (quest rewards, money, insurance, unsold market items returns), like the nofication. The "new item" notification could be always visible as long as items are in the trader inventories, compared to now where it disappears as soon as you either click it or visit the messenger. In this hypothesis, there could be a change of color in the notification to show that there are still item waiting including some that haven't been seen yet (to still fulfill the current role of the notification)
Note : CTA = Call to Action, it's the button your user will press 99.3% of the time. Example, in the launcher, it's the "Start Game". Clearly visible, easily accessible, highlighted, much bigger, and at a very common CTA spot. That one is great. Some others are not. 7.1. "Receive All" should not be displayed when there is nothing to receive. 7.2 "Get" in single transaction messages from Ragman could be removed. There is no reason to take single items from the window when you can receive it all at once. 7.3 A "group collect" Receive all action could be added when you click on the attachment notification, or as an extra action next to the notification (just like shown on the Hideout in figure 6.0) that would specifically collect all. it would loop through all conversations and collect all and dump at the top of stash, either until its finished or there is not enough room, in which case it displays an error. It could also work like the scav case and not pick up anything until you have room, and in that case you would go in the window manually and/or make room (like we do now). 7.3 The "Receive all" is at the bottom when most CTAs in the game is at the top (dealer tabs, market tabs, character sheet tabs, settings...). Save in the settings is at the bottom too. It is incoherent. It would make more sense to have all CTAs at the bottom and options/tabs/menus at the top. 7.4 The "DEAL" button in trader view is much smaller and less visible than the "Fill Item" checkbox. The CTA should be getting more attention than a setting. New players pretty much *never* see it first and look around the "Fill Item" with eyes & mouse. DEAL should be at the bottom in the current \"Fill Item\" box. Fill Items should be removed entirely. 7.5 Quests could be automatically accepted (no need for CTA). I don't see a reason why someone would not accept a quest. The only reason we're Accepting them now is to let the user know he has a new quest. There are other means of notifying players of new stuff : usually notifications. If not, that button should at least be more visible/highlighted. Every new player ( 100%! ) I coach does not see it at first and never looks at the right spot the first time. 7.6 "Insure All" is the most commonly used button in the insurance screen and could be emphasized more. Example 7.5
8. Remove "Fill Items"
The Fill Items to automatically fill the trader's requirements should be removed and set as the default behaviour. There is no need to fill items manually nor tell the game to do so.
9. Expire / Delete pending requests
Friend requests should be cancellable and could expire. Requests should not be stuck until another user acts on them. Right clicking the request could display a "Cancel" or "Delete" request button. Ideally, the cell should include a CTA on the right, as the only action I would ever do in a cell in this context is cancel. Opening a submenu with only 1 item means youshould notbe opening a submenu, but displaying a button where the user right clicked instead. I can only re-send a friend request to someone that already denied me. This is incoherent.
10. Market Rows
From my somewhat small sample (about 60 players), nobody uses the expand button on the top right of a cell (see below). I think everybody uses the right click on item instead. An expanded cell with context menu opened, and a collapsed cell The extra information available on the right is the exact same as a right click, but is hidden behind a left click. This is incoherent. The only difference is the profile picture that I only get from expanding, but currently we all have the same one. This would need to be investigated. This could be an improvement, displaying the CTA's immediately (although BUY is definitely way too small). Notice profile picture on the left 10.1 The expandable cell feature should be removed altogether, as the other options are available on right click. 10.2 The whole row should provide the same context menu (right click). 10.3 The "Send friend request" could be included in the row's context menu, or could be removed entirely, as right now most requests are missclicks. Adding the Send Friend Request at the bottom of the context menu on the row would reduce the amount of missclicks. 10.4 Left clicking should not open the context menu. This is mostly the reason behind missclick friend requests, people double clicking slightly off the item icon sending a friend request by mistake. Now I have 4 just because I was trying to make a screenshot. F's in the chat. This would be resolved with 10.2 and 10.3. 10.5 Barter items have a "Barter" icon that is redundant, the first and second column are completely irrelevant to the player. Example 10.5
11. Filtering search
11.1 "Filter by Item" should not filter the browse list. If you're writing a valid keyword in the search field it should display the correct suggestions. Filtering content is good, filtering suggestions is incoherent. 11.2 Filters could be cleared as soon as you type text in the search field. This would resolve 11.1 Example 11 11.3 "My Offers" could not be affected by filters, or could reset filters. It is more trouble to remove the filter manually every time rather than browsing through the offer list. Currently we never have more than ~10 offers at the same time for most players, which is okay to display without filter. 11.4 Filters should not overlap with other UI elements, they could be resized to fit or the expandable filter list could include more elements so the visible ones fit. Example 11.4 11.5 The Remember Selected Filter / Reset Filter is unclear. Looks great, feels weird, and should be investigated to be more useful.
12. Context Menu in player lobby
The current lobby with context menu open All players in this list are looking for a group, there is no need to write a status "Looking for group", it's redundant. The exception is friends, which 99.633...% of the time is the group i'm about to play with. Those are displayed on top. The only action we do on the list on this screen is the "Invite to group" context menu action. It's a CTA and should not be hidden in a context menu, especially if the context menu only has one option. Since recently it has two, but we'll come to that in a minute. 12.1 The invite CTA should be on the player cell itself. 12.2 The report action should not be the default one from the context menu 12.3 Since there could be only one item in the context menu according to 12.1, the report action could be on the cell as well. A low quality suggestion for 12.x
13. Trader Buy/Sell
Trader screen needs to be reworked. I won't provide a solution that doesn't completely change how everything looks/works as I stated at the start of the post. That being said this should be improved. Example 13.1 13.1 Buying UI should be reworked. When buying, the price of the item is already displayed on the item itself in the trader view. The price is also displayed a second time in the tooltip of the item if you mouse-over. The price is also displayed a third time in the barter area on the right of the image (middle of the screen in game). This is redundant. I understand the item on the right is the physical item "Roubles" in a stack that is paid, like a barter, but it does not need to be displayed a third time. 13.2 Quantity limit (red box in the image) could be shown in the tooltip ; most of the time people will hit "DEAL" until they get an error insted of actually reading the red box. 13.3 The red box looks like an error even when at 0/x, this is not intuitive. Limited items can be listed in different ways that are not so invasive. We could add "out of X" at the right side of the quantity box. 13.4 Barter item prices (if we assume 13.1) would need to also displayed differently. This needs to be investigated 13.5 Selling UI should be reworked Example 13.5 Currently selling an item still displays the full available items to BUY, this is incoherent. Especially from the "Sell" tab. The whole left side of the screen is wasted, and cannot be used. 13.6 Items on the left are not greyed out (even though I can't buy them), but items on the right are greyed out (because I can't sell them). This is incoherent. 13.7 Trader sell space should be infinite 13.8 Buy/Sell could be done in a single tab if the whole screen is reworked. There are different levels to this. An easy one I could think : "Trade" Tab instead of "Buy". Displays the same as the current "BUY" tab. If you ctrl+click an item from your stash, it instantly sells without confirmation. The second tab would be a "Buyback" where you can see what you sold in the current trade session. If you leave the screen your buyback is reset and items cannot be recovered. Another way would be to keep buybacks for the last X items. You would need to pay what you received to get back. The item would not lose it's FiR status. This preleminary and simplistic rework has issues, notably that you have to know to right click to sell. One way to fix that would be to make right click sell to trader instead of control click, but that would definitely make missclicks the first few days (and buyback would be mandatory). This could be investigated. 13.9 Currency exchange rates should be easily available in relevant areas (Peacekeeper, Therapist and flea market) for all currencies (Rouble, Euro, Dollar, Bitcoin)
Items should be boxables and moved around. At least to be dropped in boxes, ideally to be moved around freely. There is a limit of 20 images. 🤷♂ Example 14
15. Quest inventory
If you loot too many quest items in a raid, you can end up not being able to loot it. I assume this is by design and it is why you have limited quest item space. The quest inventory could be infinite if it's not by design to be limited. The quest inventory should be manageable. In my case i had a 1 slot item blocking me from taking the suitcase, I should have been allowed to move that 1 slot item to the top or to the right of my inventory, clearing a whole line and letting me take the case. Quest items could be stored in backpack (and resized) ; since you lose them on death it's not relevant to the players looting you or you dying and that issue would be gone. Storing it in your stash would also prevent you from losing it by going in raid with it by mistake. Taking it in raid or giving it to trader would be a volontary action. It also makes much more sense that way as other quest items (that are also usable items) work that way. Alright this ended up taking more time than my lunchbreak, and there is *much* more to write but for the time being I'll leave it at that and come tomorrow to add your suggestions or mine. See you in 24 hours.
STUDENTS DONT FUCK UP AND READ THIS. Especially newcomers.
STUDENTS. the reason u dont see many posts exposing scammers is the fact tht most students end up deleting their posts within a few hours after they get threatened to be exposed to their colleges. i have witnessed it first hand n it only takes a google search to see the evidence/ a day to observe the same pattern real time. Well, YOU might be next. so u better fucking pay attention to what u are about to read newbie. 1) payment. whatever u do, make sure ur payment is anonymous. - paypal is not anonymous unless u make a new account. even then, use something else. - use abine.com for a masked card. - use bitcoin. - dont click on any links anyone sends. - use vpn. - NEVER EVER communicate through email. discord is better. 2) school. don’t reveal ur college name. - whn u send a question, rephrase them n change the words. this means tht not only can they not google answers easily within the time limit u give, but they wont be sure which college u r from and it will be harder to threaten. this filters more scammers for ur own good. 3) questions - good English does not mean they r legit. many scammers have flawless grammar n even American slangs. - u MUST send them at LEAST 1 question to solve which solutions cant be googled. - some scammers who approach u will send u a solution for a question u havent asked. to u, u may think when u see his solution ("hey this solution looks legit, he must be legit") NO. - Just bc he sends u a solution he chooses to solve, does NOT mean in ANY WAY SHAPE OR FORM tht he is not a scammer. NO. u dont know. - be aware tht at this stage whn u r searching for help, ur judgement is clouded n u WANT to believe tht they r going 2 help u. be aware of ur clouded mind so tht u can be thorough n objective. - make sure YOU ask YOUR OWN questions which cant be googled elsewhere. - ONLY THEN should u continue the conversation. but still with vigilance n precaution. 4) pay as you go - in ur post, I suggest to always offer pay as u go. - only scammers will not be enthusiastic about ur offer. - a red fucking flag. real tutors are fine with pay as u go. - the second a tutor says “i wont do pay as u go bc I have gotten scammed before” they r a scam. tell me how does one get scammed with a pay-as-u-go system? do enlighten me. pay as u go serves both the payers n buyers best. logic. - so, the very second they attempt to oppose 'pay as you go' while discussing arrangements, leave the chat. u have spotted a filthy scammer in the wild my fellow friend. - Classic excuse “i need to study ur syllabus so u need to pay me half”NO. - YOU ladies n gents look for tutors WHO ALREADY KNOW ur syllabus. - altho be wary. many will still try to make u trust them by agreeing to 'pay as you go', only to threaten u to pay on the day of the exam“if u dont send in the money, i will not i wont send the paper” - when tht happens, delete ur chat receipts on discord n block the user. - bc i guarantee tht this scumbag not only does NOT HAVE UR PAPER but he is NOT ABLE to solve ur paper. the animal probably has not even graduated high school. - time is running out when tht happens on the day of the test. - ur best bet is urself, a smart friend, n post 'pay as u go' offer here on the subreddit. 5) ok. You have been scammed. What next? - DONT PAY.vanish completely. dont give them a chance to scare u. - but before u leave, remind them this, u paid them to do the paper n ucaneasily pay someone else find their real identities if they try to lay a finger on u. - there are many good people online who are willing to scam scammers for free. - this is a video of a hacker scamming a scammer. it brings me utmost joy i must say: youtube title: scammer FLIPS when i know his exact location. - if u already know ur scammers' identities, WARN them before they try to notify ur school. tht u will also be reporting their names to the national police, ur country n theirs, reddit, interpol, every ngo cybercrime units internationally. literally everywhereif they try something. - use vpn - dont be afraid my brothers n sisters. THEY WANT U to be afraid. DONT BE. - put up a fight. THEY DONT WANT YOU to fight back. SO FIGHT BACK. Like i said, DONT START a fight but warn them about what u will do. they should know tht if they throw a punch, they will have a bruised eye n a fractured hip the next second. FIGHT n dont hold back. - these scammers do not want any attention from any cybercrime units n hackers online who hack scammers who scam. they cannot report u to the school fully without exposing themselves, n they cant expose themselves as they are illegal. they will need to show evidence of your chats but at the same time relinquish all of their information as well. not ideal for a scamming team if u ask for my humble opinion. LASTLY, if u still have time to study, LEAVE. u can find urself a smart friend to help. tht is ur best bet. this place is a GAMBLE with ODDS NOT IN UR FAVOUR. trust urself n ALWAYS DOUBT these people NO MATTER WHAT. As for the good tutors: consider this, tutors, u lose only money when you get scammed. students not only lose money during a scam but are threatened to lose a place in their colleges in addition to failing the exam as scammers dont do the papers well, if at all. so dont comment about 'hard work' n how this will make ur job more difficult. students are being scammed here everyday and as decent human beings aware of what is going on, u should tell them "throw me a question now ill solve it within 10 minutes" or offer 'pay as u go'. build a business relationship from there. prove urself to win their trust. ALL U NEED TO UNDERSTAND IS THIS, students n tutors alike, tht the discrepancy between the risk a student is taking compared to tutor is vastly significant. the system is broken. by staying silent, u r allowing these monsters to plague and prey. students, tread lightly. u have lots to lose if u make 1 wrong move. Demand more proof, be more careful n dont be stupid for Christ's sake. tutors, simply just prove tht u are able to solve n accommodate. If u have been in this space for long and u know what is going on, u could always raise awareness. We are our brothers' keepers. note: i will not be replying comments or private messages.aint nobody got time fo dat. yall hold ur own discussion. my job in raising awareness is done. i will repost this from time to time so if u r not a scammer student/tutor, upvote to save potential students who have too much faith in humanity. to students like me, u have everything u need up there. like i said, this place is dangerous n everything can go south in a sec, its best if u focus on doing the paper urself nfind a smart friendwhom uknowntrust*. u can still score high tht way. maybe even higher.* if u still choose to find a stranger here to help- which istill insistfor you tonot*- make sure read everything above carefully.* As a last reminder to you students, check forreddit vouches*. check the* accounts behind those vouches*.* many of them are fake*. even with* perfect grammar*.* ALWAYS DOUBT.better safe than sorry. in regards to my previous post: i thought abt it. i understand how it was racist of me to point out tht the scammer is indian. i apologise. u r right. "so what if he is indian?" as if there r no scammers who r not indian. i apologise. i see u. at the same time. can someone enlighten those of us who cant grasp an understanding of y the indian gov is not doing anything abt the burgeoning scamming industry. look it up. its the capital of scams. surely, someone needs to take responsibility. wht can we do as a collective whole? indian citizens and non-indian citizens. is there anything we can do at all?
Hey all, I've been researching coins since 2017 and have gone through 100s of them in the last 3 years. I got introduced to blockchain via Bitcoin of course, analyzed Ethereum thereafter and from that moment I have a keen interest in smart contact platforms. I’m passionate about Ethereum but I find Zilliqa to have a better risk-reward ratio. Especially because Zilliqa has found an elegant balance between being secure, decentralized and scalable in my opinion.
Below I post my analysis of why from all the coins I went through I’m most bullish on Zilliqa (yes I went through Tezos, EOS, NEO, VeChain, Harmony, Algorand, Cardano etc.). Note that this is not investment advice and although it's a thorough analysis there is obviously some bias involved. Looking forward to what you all think!
Fun fact: the name Zilliqa is a play on ‘silica’ silicon dioxide which means “Silicon for the high-throughput consensus computer.”
This post is divided into (i) Technology, (ii) Business & Partnerships, and (iii) Marketing & Community. I’ve tried to make the technology part readable for a broad audience. If you’ve ever tried understanding the inner workings of Bitcoin and Ethereum you should be able to grasp most parts. Otherwise, just skim through and once you are zoning out head to the next part.
Technology and some more:
The technology is one of the main reasons why I’m so bullish on Zilliqa. First thing you see on their website is: “Zilliqa is a high-performance, high-security blockchain platform for enterprises and next-generation applications.” These are some bold statements.
Before we deep dive into the technology let’s take a step back in time first as they have quite the history. The initial research paper from which Zilliqa originated dates back to August 2016: Elastico: A Secure Sharding Protocol For Open Blockchains where Loi Luu (Kyber Network) is one of the co-authors. Other ideas that led to the development of what Zilliqa has become today are: Bitcoin-NG, collective signing CoSi, ByzCoin and Omniledger.
The technical white paper was made public in August 2017 and since then they have achieved everything stated in the white paper and also created their own open source intermediate level smart contract language called Scilla (functional programming language similar to OCaml) too.
Mainnet is live since the end of January 2019 with daily transaction rates growing continuously. About a week ago mainnet reached 5 million transactions, 500.000+ addresses in total along with 2400 nodes keeping the network decentralized and secure. Circulating supply is nearing 11 billion and currently only mining rewards are left. The maximum supply is 21 billion with annual inflation being 7.13% currently and will only decrease with time.
Zilliqa realized early on that the usage of public cryptocurrencies and smart contracts were increasing but decentralized, secure, and scalable alternatives were lacking in the crypto space. They proposed to apply sharding onto a public smart contract blockchain where the transaction rate increases almost linear with the increase in the amount of nodes. More nodes = higher transaction throughput and increased decentralization. Sharding comes in many forms and Zilliqa uses network-, transaction- and computational sharding. Network sharding opens up the possibility of using transaction- and computational sharding on top. Zilliqa does not use state sharding for now. We’ll come back to this later.
Before we continue dissecting how Zilliqa achieves such from a technological standpoint it’s good to keep in mind that a blockchain being decentralised and secure and scalable is still one of the main hurdles in allowing widespread usage of decentralised networks. In my opinion this needs to be solved first before blockchains can get to the point where they can create and add large scale value. So I invite you to read the next section to grasp the underlying fundamentals. Because after all these premises need to be true otherwise there isn’t a fundamental case to be bullish on Zilliqa, right?
Down the rabbit hole
How have they achieved this? Let’s define the basics first: key players on Zilliqa are the users and the miners. A user is anybody who uses the blockchain to transfer funds or run smart contracts. Miners are the (shard) nodes in the network who run the consensus protocol and get rewarded for their service in Zillings (ZIL). The mining network is divided into several smaller networks called shards, which is also referred to as ‘network sharding’. Miners subsequently are randomly assigned to a shard by another set of miners called DS (Directory Service) nodes. The regular shards process transactions and the outputs of these shards are eventually combined by the DS shard as they reach consensus on the final state. More on how these DS shards reach consensus (via pBFT) will be explained later on.
The Zilliqa network produces two types of blocks: DS blocks and Tx blocks. One DS Block consists of 100 Tx Blocks. And as previously mentioned there are two types of nodes concerned with reaching consensus: shard nodes and DS nodes. Becoming a shard node or DS node is being defined by the result of a PoW cycle (Ethash) at the beginning of the DS Block. All candidate mining nodes compete with each other and run the PoW (Proof-of-Work) cycle for 60 seconds and the submissions achieving the highest difficulty will be allowed on the network. And to put it in perspective: the average difficulty for one DS node is ~ 2 Th/s equaling 2.000.000 Mh/s or 55 thousand+ GeForce GTX 1070 / 8 GB GPUs at 35.4 Mh/s. Each DS Block 10 new DS nodes are allowed. And a shard node needs to provide around 8.53 GH/s currently (around 240 GTX 1070s). Dual mining ETH/ETC and ZIL is possible and can be done via mining software such as Phoenix and Claymore. There are pools and if you have large amounts of hashing power (Ethash) available you could mine solo.
The PoW cycle of 60 seconds is a peak performance and acts as an entry ticket to the network. The entry ticket is called a sybil resistance mechanism and makes it incredibly hard for adversaries to spawn lots of identities and manipulate the network with these identities. And after every 100 Tx Blocks which corresponds to roughly 1,5 hour this PoW process repeats. In between these 1,5 hour, no PoW needs to be done meaning Zilliqa’s energy consumption to keep the network secure is low. For more detailed information on how mining works click here. Okay, hats off to you. You have made it this far. Before we go any deeper down the rabbit hole we first must understand why Zilliqa goes through all of the above technicalities and understand a bit more what a blockchain on a more fundamental level is. Because the core of Zilliqa’s consensus protocol relies on the usage of pBFT (practical Byzantine Fault Tolerance) we need to know more about state machines and their function. Navigate to Viewblock, a Zilliqa block explorer, and just come back to this article. We will use this site to navigate through a few concepts.
We have established that Zilliqa is a public and distributed blockchain. Meaning that everyone with an internet connection can send ZILs, trigger smart contracts, etc. and there is no central authority who fully controls the network. Zilliqa and other public and distributed blockchains (like Bitcoin and Ethereum) can also be defined as state machines.
Taking the liberty of paraphrasing examples and definitions given by Samuel Brooks’ medium article, he describes the definition of a blockchain (like Zilliqa) as: “A peer-to-peer, append-only datastore that uses consensus to synchronize cryptographically-secure data”.
Next, he states that: "blockchains are fundamentally systems for managing valid state transitions”. For some more context, I recommend reading the whole medium article to get a better grasp of the definitions and understanding of state machines. Nevertheless, let’s try to simplify and compile it into a single paragraph. Take traffic lights as an example: all its states (red, amber, and green) are predefined, all possible outcomes are known and it doesn’t matter if you encounter the traffic light today or tomorrow. It will still behave the same. Managing the states of a traffic light can be done by triggering a sensor on the road or pushing a button resulting in one traffic lights’ state going from green to red (via amber) and another light from red to green.
With public blockchains like Zilliqa, this isn’t so straightforward and simple. It started with block #1 almost 1,5 years ago and every 45 seconds or so a new block linked to the previous block is being added. Resulting in a chain of blocks with transactions in it that everyone can verify from block #1 to the current #647.000+ block. The state is ever changing and the states it can find itself in are infinite. And while the traffic light might work together in tandem with various other traffic lights, it’s rather insignificant comparing it to a public blockchain. Because Zilliqa consists of 2400 nodes who need to work together to achieve consensus on what the latest valid state is while some of these nodes may have latency or broadcast issues, drop offline or are deliberately trying to attack the network, etc.
Now go back to the Viewblock page take a look at the amount of transaction, addresses, block and DS height and then hit refresh. Obviously as expected you see new incremented values on one or all parameters. And how did the Zilliqa blockchain manage to transition from a previous valid state to the latest valid state? By using pBFT to reach consensus on the latest valid state.
After having obtained the entry ticket, miners execute pBFT to reach consensus on the ever-changing state of the blockchain. pBFT requires a series of network communication between nodes, and as such there is no GPU involved (but CPU). Resulting in the total energy consumed to keep the blockchain secure, decentralized and scalable being low.
pBFT stands for practical Byzantine Fault Tolerance and is an optimization on the Byzantine Fault Tolerant algorithm. To quote Blockonomi: “In the context of distributed systems, Byzantine Fault Tolerance is the ability of a distributed computer network to function as desired and correctly reach a sufficient consensus despite malicious components (nodes) of the system failing or propagating incorrect information to other peers.” Zilliqa is such a distributed computer network and depends on the honesty of the nodes (shard and DS) to reach consensus and to continuously update the state with the latest block. If pBFT is a new term for you I can highly recommend the Blockonomi article.
The idea of pBFT was introduced in 1999 - one of the authors even won a Turing award for it - and it is well researched and applied in various blockchains and distributed systems nowadays. If you want more advanced information than the Blockonomi link provides click here. And if you’re in between Blockonomi and the University of Singapore read the Zilliqa Design Story Part 2 dating from October 2017. Quoting from the Zilliqa tech whitepaper: “pBFT relies upon a correct leader (which is randomly selected) to begin each phase and proceed when the sufficient majority exists. In case the leader is byzantine it can stall the entire consensus protocol. To address this challenge, pBFT offers a view change protocol to replace the byzantine leader with another one.”
pBFT can tolerate ⅓ of the nodes being dishonest (offline counts as Byzantine = dishonest) and the consensus protocol will function without stalling or hiccups. Once there are more than ⅓ of dishonest nodes but no more than ⅔ the network will be stalled and a view change will be triggered to elect a new DS leader. Only when more than ⅔ of the nodes are dishonest (66%) double-spend attacks become possible.
If the network stalls no transactions can be processed and one has to wait until a new honest leader has been elected. When the mainnet was just launched and in its early phases, view changes happened regularly. As of today the last stalling of the network - and view change being triggered - was at the end of October 2019.
Another benefit of using pBFT for consensus besides low energy is the immediate finality it provides. Once your transaction is included in a block and the block is added to the chain it’s done. Lastly, take a look at this article where three types of finality are being defined: probabilistic, absolute and economic finality. Zilliqa falls under the absolute finality (just like Tendermint for example). Although lengthy already we skipped through some of the inner workings from Zilliqa’s consensus: read the Zilliqa Design Story Part 3 and you will be close to having a complete picture on it. Enough about PoW, sybil resistance mechanism, pBFT, etc. Another thing we haven’t looked at yet is the amount of decentralization.
Currently, there are four shards, each one of them consisting of 600 nodes. 1 shard with 600 so-called DS nodes (Directory Service - they need to achieve a higher difficulty than shard nodes) and 1800 shard nodes of which 250 are shard guards (centralized nodes controlled by the team). The amount of shard guards has been steadily declining from 1200 in January 2019 to 250 as of May 2020. On the Viewblock statistics, you can see that many of the nodes are being located in the US but those are only the (CPU parts of the) shard nodes who perform pBFT. There is no data from where the PoW sources are coming. And when the Zilliqa blockchain starts reaching its transaction capacity limit, a network upgrade needs to be executed to lift the current cap of maximum 2400 nodes to allow more nodes and formation of more shards which will allow to network to keep on scaling according to demand. Besides shard nodes there are also seed nodes. The main role of seed nodes is to serve as direct access points (for end-users and clients) to the core Zilliqa network that validates transactions. Seed nodes consolidate transaction requests and forward these to the lookup nodes (another type of nodes) for distribution to the shards in the network. Seed nodes also maintain the entire transaction history and the global state of the blockchain which is needed to provide services such as block explorers. Seed nodes in the Zilliqa network are comparable to Infura on Ethereum.
The seed nodes were first only operated by Zilliqa themselves, exchanges and Viewblock. Operators of seed nodes like exchanges had no incentive to open them for the greater public. They were centralised at first. Decentralisation at the seed nodes level has been steadily rolled out since March 2020 ( Zilliqa Improvement Proposal 3 ). Currently the amount of seed nodes is being increased, they are public-facing and at the same time PoS is applied to incentivize seed node operators and make it possible for ZIL holders to stake and earn passive yields. Important distinction: seed nodes are not involved with consensus! That is still PoW as entry ticket and pBFT for the actual consensus.
5% of the block rewards are being assigned to seed nodes (from the beginning in 2019) and those are being used to pay out ZIL stakers. The 5% block rewards with an annual yield of 10.03% translate to roughly 610 MM ZILs in total that can be staked. Exchanges use the custodial variant of staking and wallets like Moonlet will use the non-custodial version (starting in Q3 2020). Staking is being done by sending ZILs to a smart contract created by Zilliqa and audited by Quantstamp.
With a high amount of DS; shard nodes and seed nodes becoming more decentralized too, Zilliqa qualifies for the label of decentralized in my opinion.
Generalized: programming languages can be divided into being ‘object-oriented’ or ‘functional’. Here is an ELI5 given by software development academy: * “all programs have two basic components, data – what the program knows – and behavior – what the program can do with that data. So object-oriented programming states that combining data and related behaviors in one place, is called “object”, which makes it easier to understand how a particular program works. On the other hand, functional programming argues that data and behavior are different things and should be separated to ensure their clarity.” *
Scilla is on the functional side and shares similarities with OCaml: OCaml is a general-purpose programming language with an emphasis on expressiveness and safety. It has an advanced type system that helps catch your mistakes without getting in your way. It's used in environments where a single mistake can cost millions and speed matters, is supported by an active community, and has a rich set of libraries and development tools. For all its power, OCaml is also pretty simple, which is one reason it's often used as a teaching language.
Scilla is blockchain agnostic, can be implemented onto other blockchains as well, is recognized by academics and won a so-called Distinguished Artifact Award award at the end of last year.
One of the reasons why the Zilliqa team decided to create their own programming language focused on preventing smart contract vulnerabilities is that adding logic on a blockchain, programming, means that you cannot afford to make mistakes. Otherwise, it could cost you. It’s all great and fun blockchains being immutable but updating your code because you found a bug isn’t the same as with a regular web application for example. And with smart contracts, it inherently involves cryptocurrencies in some form thus value.
Another difference with programming languages on a blockchain is gas. Every transaction you do on a smart contract platform like Zilliqa or Ethereum costs gas. With gas you basically pay for computational costs. Sending a ZIL from address A to address B costs 0.001 ZIL currently. Smart contracts are more complex, often involve various functions and require more gas (if gas is a new concept click here ).
So with Scilla, similar to Solidity, you need to make sure that “every function in your smart contract will run as expected without hitting gas limits. An improper resource analysis may lead to situations where funds may get stuck simply because a part of the smart contract code cannot be executed due to gas limits. Such constraints are not present in traditional software systems”.Scilla design story part 1
Some examples of smart contract issues you’d want to avoid are: leaking funds, ‘unexpected changes to critical state variables’ (example: someone other than you setting his or her address as the owner of the smart contract after creation) or simply killing a contract.
Scilla also allows for formal verification. Wikipedia to the rescue: In the context of hardware and software systems, formal verification is the act of proving or disproving the correctness of intended algorithms underlying a system with respect to a certain formal specification or property, using formal methods of mathematics.
Formal verification can be helpful in proving the correctness of systems such as: cryptographic protocols, combinational circuits, digital circuits with internal memory, and software expressed as source code.
“Scilla is being developed hand-in-hand with formalization of its semantics and its embedding into the Coq proof assistant — a state-of-the art tool for mechanized proofs about properties of programs.”
Simply put, with Scilla and accompanying tooling developers can be mathematically sure and proof that the smart contract they’ve written does what he or she intends it to do.
Smart contract on a sharded environment and state sharding
There is one more topic I’d like to touch on: smart contract execution in a sharded environment (and what is the effect of state sharding). This is a complex topic. I’m not able to explain it any easier than what is posted here. But I will try to compress the post into something easy to digest.
Earlier on we have established that Zilliqa can process transactions in parallel due to network sharding. This is where the linear scalability comes from. We can define simple transactions: a transaction from address A to B (Category 1), a transaction where a user interacts with one smart contract (Category 2) and the most complex ones where triggering a transaction results in multiple smart contracts being involved (Category 3). The shards are able to process transactions on their own without interference of the other shards. With Category 1 transactions that is doable, with Category 2 transactions sometimes if that address is in the same shard as the smart contract but with Category 3 you definitely need communication between the shards. Solving that requires to make a set of communication rules the protocol needs to follow in order to process all transactions in a generalised fashion.
There is no strict defined roadmap but here are topics being worked on. And via the Zilliqa website there is also more information on the projects they are working on.
Business & Partnerships
It’s not only technology in which Zilliqa seems to be excelling as their ecosystem has been expanding and starting to grow rapidly. The project is on a mission to provide OpenFinance (OpFi) to the world and Singapore is the right place to be due to its progressive regulations and futuristic thinking. Singapore has taken a proactive approach towards cryptocurrencies by introducing the Payment Services Act 2019 (PS Act). Among other things, the PS Act will regulate intermediaries dealing with certain cryptocurrencies, with a particular focus on consumer protection and anti-money laundering. It will also provide a stable regulatory licensing and operating framework for cryptocurrency entities, effectively covering all crypto businesses and exchanges based in Singapore. According to PWC 82% of the surveyed executives in Singapore reported blockchain initiatives underway and 13% of them have already brought the initiatives live to the market. There is also an increasing list of organizations that are starting to provide digital payment services. Moreover, Singaporean blockchain developers Building Cities Beyond has recently created an innovation $15 million grant to encourage development on its ecosystem. This all suggests that Singapore tries to position itself as (one of) the leading blockchain hubs in the world.
Zilliqa seems to already take advantage of this and recently helped launch Hg Exchange on their platform, together with financial institutions PhillipCapital, PrimePartners and Fundnel. Hg Exchange, which is now approved by the Monetary Authority of Singapore (MAS), uses smart contracts to represent digital assets. Through Hg Exchange financial institutions worldwide can use Zilliqa's safe-by-design smart contracts to enable the trading of private equities. For example, think of companies such as Grab, Airbnb, SpaceX that are not available for public trading right now. Hg Exchange will allow investors to buy shares of private companies & unicorns and capture their value before an IPO. Anquan, the main company behind Zilliqa, has also recently announced that they became a partner and shareholder in TEN31 Bank, which is a fully regulated bank allowing for tokenization of assets and is aiming to bridge the gap between conventional banking and the blockchain world. If STOs, the tokenization of assets, and equity trading will continue to increase, then Zilliqa’s public blockchain would be the ideal candidate due to its strategic positioning, partnerships, regulatory compliance and the technology that is being built on top of it.
What is also very encouraging is their focus on banking the un(der)banked. They are launching a stablecoin basket starting with XSGD. As many of you know, stablecoins are currently mostly used for trading. However, Zilliqa is actively trying to broaden the use case of stablecoins. I recommend everybody to read this text that Amrit Kumar wrote (one of the co-founders). These stablecoins will be integrated in the traditional markets and bridge the gap between the crypto world and the traditional world. This could potentially revolutionize and legitimise the crypto space if retailers and companies will for example start to use stablecoins for payments or remittances, instead of it solely being used for trading.
Zilliqa also released their DeFi strategic roadmap (dating November 2019) which seems to be aligning well with their OpFi strategy. A non-custodial DEX is coming to Zilliqa made by Switcheo which allows cross-chain trading (atomic swaps) between ETH, EOS and ZIL based tokens. They also signed a Memorandum of Understanding for a (soon to be announced) USD stablecoin. And as Zilliqa is all about regulations and being compliant, I’m speculating on it to be a regulated USD stablecoin. Furthermore, XSGD is already created and visible on block explorer and XIDR (Indonesian Stablecoin) is also coming soon via StraitsX. Here also an overview of the Tech Stack for Financial Applications from September 2019. Further quoting Amrit Kumar on this:
There are two basic building blocks in DeFi/OpFi though: 1) stablecoins as you need a non-volatile currency to get access to this market and 2) a dex to be able to trade all these financial assets. The rest are built on top of these blocks.
So far, together with our partners and community, we have worked on developing these building blocks with XSGD as a stablecoin. We are working on bringing a USD-backed stablecoin as well. We will soon have a decentralised exchange developed by Switcheo. And with HGX going live, we are also venturing into the tokenization space. More to come in the future.”
Additionally, they also have this ZILHive initiative that injects capital into projects. There have been already 6 waves of various teams working on infrastructure, innovation and research, and they are not from ASEAN or Singapore only but global: see Grantees breakdown by country. Over 60 project teams from over 20 countries have contributed to Zilliqa's ecosystem. This includes individuals and teams developing wallets, explorers, developer toolkits, smart contract testing frameworks, dapps, etc. As some of you may know, Unstoppable Domains (UD) blew up when they launched on Zilliqa. UD aims to replace cryptocurrency addresses with a human-readable name and allows for uncensorable websites. Zilliqa will probably be the only one able to handle all these transactions onchain due to ability to scale and its resulting low fees which is why the UD team launched this on Zilliqa in the first place. Furthermore, Zilliqa also has a strong emphasis on security, compliance, and privacy, which is why they partnered with companies like Elliptic, ChainSecurity (part of PwC Switzerland), and Incognito. Their sister company Aqilliz (Zilliqa spelled backwards) focuses on revolutionizing the digital advertising space and is doing interesting things like using Zilliqa to track outdoor digital ads with companies like Foodpanda.
Zilliqa is listed on nearly all major exchanges, having several different fiat-gateways and recently have been added to Binance’s margin trading and futures trading with really good volume. They also have a very impressive team with good credentials and experience. They don't just have “tech people”. They have a mix of tech people, business people, marketeers, scientists, and more. Naturally, it's good to have a mix of people with different skill sets if you work in the crypto space.
Marketing & Community
Zilliqa has a very strong community. If you just follow their Twitter their engagement is much higher for a coin that has approximately 80k followers. They also have been ‘coin of the day’ by LunarCrush many times. LunarCrush tracks real-time cryptocurrency value and social data. According to their data, it seems Zilliqa has a more fundamental and deeper understanding of marketing and community engagement than almost all other coins. While almost all coins have been a bit frozen in the last months, Zilliqa seems to be on its own bull run. It was somewhere in the 100s a few months ago and is currently ranked #46 on CoinGecko. Their official Telegram also has over 20k people and is very active, and their community channel which is over 7k now is more active and larger than many other official channels. Their local communities also seem to be growing.
Moreover, their community started ‘Zillacracy’ together with the Zilliqa core team ( see www.zillacracy.com ). It’s a community-run initiative where people from all over the world are now helping with marketing and development on Zilliqa. Since its launch in February 2020 they have been doing a lot and will also run their own non-custodial seed node for staking. This seed node will also allow them to start generating revenue for them to become a self sustaining entity that could potentially scale up to become a decentralized company working in parallel with the Zilliqa core team. Comparing it to all the other smart contract platforms (e.g. Cardano, EOS, Tezos etc.) they don't seem to have started a similar initiative (correct me if I’m wrong though). This suggests in my opinion that these other smart contract platforms do not fully understand how to utilize the ‘power of the community’. This is something you cannot ‘buy with money’ and gives many projects in the space a disadvantage.
Zilliqa also released two social products called SocialPay and Zeeves. SocialPay allows users to earn ZILs while tweeting with a specific hashtag. They have recently used it in partnership with the Singapore Red Cross for a marketing campaign after their initial pilot program. It seems like a very valuable social product with a good use case. I can see a lot of traditional companies entering the space through this product, which they seem to suggest will happen. Tokenizing hashtags with smart contracts to get network effect is a very smart and innovative idea.
Regarding Zeeves, this is a tipping bot for Telegram. They already have 1000s of signups and they plan to keep upgrading it for more and more people to use it (e.g. they recently have added a quiz features). They also use it during AMAs to reward people in real-time. It’s a very smart approach to grow their communities and get familiar with ZIL. I can see this becoming very big on Telegram. This tool suggests, again, that the Zilliqa team has a deeper understanding of what the crypto space and community needs and is good at finding the right innovative tools to grow and scale.
To be honest, I haven’t covered everything (i’m also reaching the character limited haha). So many updates happening lately that it's hard to keep up, such as the International Monetary Fund mentioning Zilliqa in their report, custodial and non-custodial Staking, Binance Margin, Futures, Widget, entering the Indian market, and more. The Head of Marketing Colin Miles has also released this as an overview of what is coming next. And last but not least, Vitalik Buterin has been mentioning Zilliqa lately acknowledging Zilliqa and mentioning that both projects have a lot of room to grow. There is much more info of course and a good part of it has been served to you on a silver platter. I invite you to continue researching by yourself :-) And if you have any comments or questions please post here!
Topic originally posted in Bitcoin by almkglor [link]
This is a follow-up on https://old.reddit.com/Bitcoin/comments/hqzp14/technical_the_path_to_taproot_activation/ Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners? And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess. First, let's consider some principles of Bitcoin.
You the HODLer should be the one who controls where your money goes. Your keys, your coins.
You the HODLer should be able to coordinate and make contracts with other people regarding your funds.
You the HODLer should be able to do the above without anyone watching over your shoulder and judging you.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so). So, how does Taproot affect those principles?
Taproot and Your /Coins
Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash). (technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input). However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits! Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh? With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save! And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well! (P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1) Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service! So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win! (even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot) And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!
Taproot and Your Contracts
No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade. So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust. Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade. However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade. In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address. Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants). But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer). Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos). (technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).
Taproot and Your Contracts, Part 2: Cryptographic Boogaloo
Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code. This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded. And you can do that, with HTLCs, today. Of course, HTLCs do have problems:
Privacy. Everyone scraping the Bitcoin blockchain can see any HTLCs, and preimages used to claim them.
This can be mitigated by using offchain techniques so HTLCs are never published onchain in the happy case. Lightning would probably in practice be the easiest way to do this offchain. Of course, there are practical limits to what you can pay on Lightning. If you are buying something expensive, then Lightning might not be practical. For example, the "software" you are activating is really the firmware of a car, and what you are buying is not the software really but the car itself (with the activation of the car firmware being equivalent to getting the car keys).
Even offchain techniques need an onchain escape hatch in case of unresponsiveness! This means that, if something bad happens during payment, the HTLC might end up being published onchain anyway, revealing the fact that some special contract occurred.
And an HTLC that is claimed with a preimage onchain will also publicly reveal the preimage onchain. If that preimage is really the activation key of a software than it can now be pirated. If that preimage is really the activation key for your newly-bought cryptographic car --- well, not your keys, not your car!
Trust requirement. You are trusting the developer that it gives you the hash of an actual valid activation key, without any way to validate that the activation key hidden by the hash is actually valid.
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar". Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given private key to you. Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige). (Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key). So:
Privacy: PTLCs are private even if done onchain. Nobody else can learn what the private key behind the public key is, except you who knows the adaptor signature that when combined with the complete onchain signature lets you know what the private key of the activation key is. Somebody scraping the blockchain will not learn the same information even if all PTLCs are done onchain!
Lightning is still useful for reducing onchain use, and will also get PTLCs soon after Taproot is activated, but even if something bad happens and a PTLC has to go onchain, it doesn't reveal anything!
Trust issues can be proven more easily with a public-private keypair than with a hash-preimage pair.
For example, the developer of the software you are buying could provide a signature signing a message saying "unlock access to the full version for 1 day". You can check if feeding this message and signature to the program will indeed unlock full-version access for 1 day. Then you can check if the signature is valid for the purported pubkey whose private key you will pay for. If so, you can now believe that getting the private key (by paying for it in a PTLC) would let you generate any number of "unlock access to the full version for 1 day" message+signatures, which is equivalent to getting full access to the software indefinitely.
For the car, the manufacturer can show that signing a message "start the engine" and feeding the signature to the car's fimrware will indeed start the engine, and maybe even let you have a small test drive. You can then check if the signature is valid for the purported pubkey whose privkey you will pay for. If so, you can now believe that gaining knowledge of the privkey will let you start the car engine at any time you want.
(pedantry: the signatures need to be unique else they could be replayed, this can be done with a challenge-response sequence for the car, where the car gathers entropy somehow (it's a car, it probably has a bunch of sensors nowadays so it can get entropy for free) and uses the gathered entropy to challenge you to sign a random number and only start if you are able to sign the random number; for the software, it could record previous signatures somewhere in the developer's cloud server and refuse to run if you try to replay a previously-seen signature.)
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script. (technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)
Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable?? Well, in theory yes. In practice, they probably are not. It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash. When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key. So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key. (public keys should be public, that's why they're called public keys, LOL) And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions. So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort. Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers. For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
Current quantum computers can barely crack prime factorization problem for primes of 5 bits.
The 256-bit elliptic curve use by Bitcoin is, by my (possibly wrong) understanding, equivalent to 4096-bit primes, so you can see a pretty big gap between now (5 bit primes) and what is needed (4096 bit primes).
A lot of financial non-Bitcoin systems use the equivalent of 3072-bit primes or less, and are probably easier targets to crack than the equivalent-to-4096-bit-primes Bitcoin.
Quantum computers capable of cracking Bitcoin are still far off.
Pay-to-public-key-hash is not as protective as you might think.
We will probably see banks get cracked before Bitcoin, so the banking system is a useful canary-in-a-coal-mine to see whether we should panic about being quantum vulnerable.
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).
If you are a singlesig HODL-only Bitcoin user, Taproot will not affect you positively or negatively. Importantly: Taproot does no harm!
If you use or intend to use multisig, Taproot will be a positive for you.
If you transact onchain regularly using typical P2PKH/P2WPKH addresses, you get a minor reduction in feerates since multisig users will likely switch to Taproot to get smaller tx sizes, freeing up blockspace for yours.
If you are using multiparticipant setups for special systems of trade, Taproot will be a positive for you.
Remember: Lightning channels are multipartiicpiant setups for special systems of lightning-fast offchain trades!
I Wanna Be The Taprooter!
So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!
If you have developer experience especially in C, C++, or related languages
Review the Taproot code! There is one pull request in Bitcoin Core, and one in libsecp256k1. I deliberately am not putting links here, to avoid brigades of nontechnical but enthusiastic people leaving pointless reviews, but if you are qualified you know how to find them!
But I am not a cryptographeBitcoin Core contributomathematician/someone as awesome as Pieter Wuille
That's perfectly fine! The cryptographers have been over the code already and agree the math is right and the implementation is right. What is wanted is the dreary dreary dreary software engineering: are the comments comprehensive and understandable? no misspellings in the comments? variable names understandable? reasonable function naming convention? misleading coding style? off-by-one errors in loops? conditions not covered by tests? accidental mixups of variables with the same types? missing frees? read-before-init? better test coverage of suspicious-looking code? missing or mismatching header guards? portability issues? consistent coding style? you know, stuff any coder with a few years of experience in coding anything might be able to catch. With enough eyes all bugs are shallow!
If you are running a mining pool/mining operation/exchange/custodial service/SPV server
Be prepared to upgrade!
One of the typical issues with upgrading software is that subtle incompatibilities with your current custom programs tend to arise, disrupting operations and potentially losing income due to downtime. If so, consider moving to the two-node setup suggested by gmax, which is in the last section of my previous post. With this, you have an up-to-date "public" node and a fixed-version "private" node, with the public node protecting the private node from any invalid chainsplits or invalid transactions. Moving to this setup from a typical one-node setup should be smooth and should not disrupt operations (too much).
If you are running your own fullnode for fun or for your own wallet
Be prepared to upgrade! The more nodes validating the new rules (even if you are a non-mining node!), the safer every softfork will be!
If you are using an SPV wallet or custodial wallet/service (including hardware wallets using the software of the wallet provider)
Contact your wallet provider / SPV server and ask for a statement on whether they support Taproot, and whether they are prepared to upgrade for Taproot! Make it known to them that Taproot is something you want!
But I Hate Taproot!!
Raise your objections to Taproot now, or forever hold your peace! Maybe you can raise them here and some of the devs (probably nullc, he goes everywhere, even in rbtc!) might be able to see your objections! Or if your objections are very technical, head over to the appropriate pull request and object away!
Maybe you simply misunderstand something, and we can clarify it here!
Or maybe you do have a good objection, and we can make Taproot better by finding a solution for it!
almkglor your post has been copied because one or more comments in this topic have been removed. This copy will preserve unmoderated topic. If you would like to opt-out, please send a message using [this link].
I plan on destroying this laptop after posting this and will soon be untraceable. I am reaching out because something is not right. I feel as if something just is not lining up right in the universe. I feel like I am out of place. I come to post because I am not sure how much longer I have. I was taking the trash out last week and I think I saw something I should not have. It was a full moon that night and I was doing my regular chores. Feed the dogs, clean the dishes, take the trash out. Easy stuff like any other night. When I got to the dumpster I saw a cassette player on the ground looking like it was to be thrown out. I thought to myself it was just trash but something caught my eye. There was a piece of tape on it with a sharpie written across it. It stated "LISTEN URGENT" so I put it in my pocket and took it home. If I knew what was on that tape I would have not brought it home that night. I didn't have a pair of headphones to listen to it with or at least didn't care to look for one at the time. I had put the tape down on my desk and went to play some video games without thinking much of it at the time. You see I didn't have much going for me. My mother was a single mom and I was the man of the house. I liked to play video games because that is what made me happy. It was getting late so I turned off my monitor and went to bed. I woke up the next morning thinking about the tape because I had a dream about it the night before. The dream consists of me going to the trash and finding the cassette tape then someone getting out of their car when I was walking home pushing me down and taking the tape from me. It was a man with a black overcoat but couldn't see much of his face since it was dark out. And as soon as he took it I woke up. I thought to myself that having a dream of it already had to mean something so I found some headphones and plugged them into the aux input and pressed play. "What did you see that night" A man asked "I was super drunk and all I remember was seeing some guy beat the shit out of some other guy outside the bar." A women said "Where did this take place? The man asked "In the alley besides the bar.... Can I please go now?" The women proclaimed. "No, not yet we have some more questions for you..." The man said "What was that?" The man asked You could hear a crash or something and the tape cut out. What the fuck was I listening to? An interrogation with the police? All I know is there is more on the tape and I definitely shouldn't be listening to this. I clicked skip and play again and it started back up. "Where were we... Sorry about the inconvenience miss." The man smirked "Who are you guys anyways? The cops?" The women asked. "Ahaha very funny... she thinks were the feds..." The man talking to his partner. "You guys aren't the police???" "Then who are you guys?" The women starting to panic "We are the guys they call when shit gets bad." The man said "I think we are finished here... just state your name and age and your good to go." "OK... Carly Johnson, 23" Tape Ends Who the fuck were they? Who is this girl Carly... I thought to myself what this tape was doing with me. I looked up this girl's name and I didn't believe my eyes. Here I am looking at her obituary. She died weeks ago. Cause of death: Suicide. Where do I begin. I just heard a tape of seems to be the police interrogating Carly and she all of sudden kills herself what the actual fuck. I guess these are the guys they call when shit gets bad. It says she jumped over a bridge in the town over from me at midnight. Why would a girl just do this out of nowhere and sounded decently happy on the tape. But then I saw one last thing on her obituary... it said "There was no body found. She had left a note." So she went missing huh and they ruled it off as a suicide. I went back to the tape and to my surprise it had corrupted and I couldn't play anything back. Just great. I wanted to know who these guys were? Why did they want to talk to Carly? Why did Carly all of sudden disappear? This was all so hard to wrap my head around. None of this should be my business but somehow I feel like it is. I never even knew Carly but some way I feel like I did. Weird right. Maybe you can tell me if I'm nuts or if it's humane to feel this way. I had another dream last night and to my surprise it had to do with the tape again. But this time it was very strange. I was on the bridge where Carly apparently did what she did and there was something on the ground in the middle of the bridge and I couldn't really make out what it was so I walked over and it was the same tape except the writing on it this time was "They did this." I then rubbed my eyes and woke up in a ton of sweat. So is this supposed to be a sign or something? Like what are these nightmares supposed to mean? I still am wondering who the men were that were talking with Carly. I started looking up cases of bar fights or anything to do with fights relevant to a bar. To my surprise I found the case. Case # 06-123 Bar stabbing leaving man dead. Looks like it was big in the local news. I do not watch the news much but now I know what they were talking to Carly about. This was much bigger than I thought. This is still an open investigation. I was skimming over the reports and one of the officers said that a private sector of the FBI would be taking over the case and no more was to be discussed publicly until the case is closed. A private sector of the FBI is now involved what the fuck. In this tiny ass town the FBI is getting involved. This is all so much to take in. Seems like there is more to it though. The FBI got involved with some little stabbing at a bar. The news article said if there is any information to help the case to contact the link that was shared underneath the article. I clicked the link and it brought me to some government website to report tips or some bullshit. I started to read and it said "If there is any information on this case please contact this phone number [DISCLOSED INFORMATION]. I then read it said if anyone knew of a missing cassette tape that it is crucial to the investigation and no more information was shared after that. So wonderful, I now know that I am holding a crucial part of evidence of a case for the FBI and the contents were corrupted. I don't know what to do at this point... I still am going to be doing my research and I plan on getting rid of this cassette tape. I will be updating this post as soon as more information is shared or I find something. In the meanwhile I need to stay on the low because there could be and will be people looking for me and what I have acquired. Ill post an update in 24 hours. Until then, Goodbye. Update 2 I only got a few hours of sleep last night... thoughts running through my head constantly. I promised an update and here it is. I have been thinking of what to do with this tape. I think the best option would be to get rid of it but I think that would be a felony or something so that options off the list. The second option I have is to give it to them. Yes, I know it sounds crazy absolute delusional you might say. OK let me stop you right there. The plan is to drop it off at a discrete location and call in an anonymous tip. Seems easy right. I hope. I have wiped off all my prints on it and ripped off the tape on the front of it. I am going to go to a gas station about 45 minutes away from here. There should be a payphone and the angle the cameras are at should not see me if I pull my car up to the left of the building. I will wear gloves for prints and wear a hoodie. I should be fine, no evidence that I was there with the tape. I will get back to you after the job is done. Wish me luck. Update 3 So it went exactly like planned. I parked my car where there was no surveillance and got out with my black hoodie and called the number that I saw online. I said "The cassette tape is in the bathroom of the gas station for case # 06-123 and hung up. I got out of there as fast as possible. I am now home and well. I am still curious and looking into Carly. I think I came upon something. It is very unusual. Her mother wrote a Facebook post saying "I know those cops are fucking corrupt... they never even looked into her case!" I thought to myself how weird this is. Her own mother must have known something was up too. No body found, A bridge that no one was on that night. I know no one was on it because there was a detour for maintenance on the bridge that afternoon. The last thing that doesn't add up is someone had to write on that tape stating LISTEN URGENT. If they were police wouldn't that tape be in evidence or something. Correct me if I'm wrong but this shit doesn't just go missing and wind up at my dumpster. I have a feeling that the bridge is one of the places that I will find something leading me to what happened to Carly and why the FBI are involved. I am going to take a drive to that bridge and see if I can find anything. I'll update you when I get back. Update 4 I think I came upon something I wasn't supposed to once again... I found a necklace underneath the bridge. Here is a picture of what I found. necklace You see I don't think the police actually investigated or they would have already found this. Still we aren't even dealing with the local police anymore we are dealing with some special sector of the FBI. I also found one other thing and I feel as if posting a picture would compromise this second tape I found. I have not brought my headphones with me but have a feeling whatever is on this second tape that it will be great. I am very concerned about Carly and what happened to her. Maybe she is on this tape again, maybe it will lead me somewhere. If I post this on reddit I have a feeling the FBI will be notified or something like that. So for precautionary reasons I will not give the name of the bridge or any locations further that could potentially fuck this up. I plan on digging deep and will share it all with you. Why does the FBI want something to do with some girls suicide?? Who were those men on the tape???? Moments ago I just got a call from a blocked caller... I declined the call because I never normally accept blocked caller ids. They left a message. He said "Turn your eyes away from this or else... You have been warned." ENDS CALL I am very frustrated right now because they somehow found my phone number. I thought I took all the precautionary measures. I guess the government is always watching though. My feeling is that I will have to get rid of everything that ties me to this case. I have looked up how to destroy a hard drive and it is as easy as swiping a strong magnet over it. I want to mention to whoever is reading this that if you know who Carly Johnson is and or have any clues on what happened to her please indulge me. Do not share anything with anyone else except my account. You see you may not realize the full extent of this situation but, no need to worry. I will encrypt everything that is sent and no information will get out to the Federal Bureau of Investigation. Should I be scared? Because I am terrified. I need to know these answers because I am so devoted already. I was just warned to stop looking into this. I have no idea how they got my phone number. I believe we are dealing with not just a suicide but, possibly a government cover up or something worse. If anyone has any tips on what I could possibly do that would help please comment, I can take all the help I can get. They will probably see this post and what I have discussed with you all. I am going to upload all my research onto a USB and slide a magnet over my computer's hard drive now. I will reach back with more news after I have found a secure location to proceed with my updates. Until then.... -Colin. Update 5 So I am currently posting this on a burner phone that I recently bought. I have booked a motel room with cash and I will use their wifi with a VPN. I would like to first express that whoever called me yesterday that I will not stop until I get the answers I need. I am sure with whoever has been reading my recent posts that they wouldn’t like me to stop looking either. I will bring justice for Carly and her grieving mother. I know that the government has something to do with this. I have got some feedback saying that the bridge might have another tape possibly. To my surprise there was and I just listened to it. I’ll replay it for you. [Play] “Hello… I don’t have much time to say what I need to say. I recently found something and it needs to be shared with the world. My name is Carly Johnson…” “They are really close right now… I can see their flashlights through the trees. I am under some type of bridge.” “I have recently come upon a file that was on a USB which was sent to my house…. Its title is Project Sight and the public needs to be aware of what I found.” “It has many many documents containing all sorts of stuff including Area 51, The Roswell Incident, and various pictures of these very tall what seems to be creatures. So many classified documents on this file. “I have made a backup of the file and it is located in my g--- [Cuts out] Well shit, we finally know what we are dealing with. They brought out the FBI because it is a national threat which is out there on that USB. What was she about to say… she cut out saying something that started with a g but I have no clue. I am going to need help with this one. Please give me your thoughts on where she may have hid the backup. I have a feeling that they will find it before I do. I need to find that USB before it gets destroyed. I am not staying another night at this motel. I am going to switch it up so it is hard to track my footprints. I will be ok with my funds for now because I transferred what I had left in my savings and converted it into bitcoin. Hopefully I don’t have to explain why I did that. Once I am done packing up here and on the road I will proceed with another update. Update 6 I stopped at a local convenience store near me and got myself some snacks and water for the road. This blue raspberry Slurpee is pretty good right now. I wanted to go to a local library to proceed with my updates but none of them are open because of this whole quarantine thing. I am probably better off in the motels though. I backed up the tape to my USB and set a password on it so no one can access it. I most likely am a current threat to the FBI so I don’t know how long I will have to stay moving. My plan is eventually to bunker down somewhere but until then I need to keep moving. I also have this cheap laptop I brought to access files that I cant on my phone. I was looking more into Carly's assets through some public info websites and such, you can use Whitepages plus to get a lot on someone. You can access background checks and look into someone's past, It is pretty crazy what you can get on someone. I also was looking through her Facebook and found an older post with her dad working on a project car. Looks like one of those storage garages that you can rent. She doesn’t post much. All family related stuff and a couple friends. Guess she kept more to herself. I am curious about when she said it was called Project Sight. Why would they call this file that in specific? Who knows. Do you think it would be a good idea to talk to her mom? Probably not, now that I am thinking of it. The FBI is probably all over her house. Hmm wait a minute, I remember that her mother had a Facebook page. Maybe I’ll send her a message where we could maybe meet up or something in private. She probably would give insight on what Carly said on the tape. I pulled into a parking lot that seems to be pretty empty. I want to try and take a nap and maybe wake up with a new idea or something. Update 7 Fuck me. A cop just woke me up by knocking on my window… “Hello officer, is there a problem?” “I don’t think there has to be one, are you a little tired?” “Yeah, I pulled over in this parking lot to clear my head and take a little nap.” “Gotcha, you got any Identification on you?” “Yes sir, can I grab it out of my glove box?” “Yes, just no sudden movements.” “OK, here is my registration and proof of insurance as well as my I.D.” “Thanks for being so cooperative, let me run your stuff and you’ll be on your way shortly.” He went back to his vehicle and I don’t know what he is going to find. What if the FBI put a warrant out for me or something?! I am probably just super anxious because of this situation. They want to keep everything top secret so they won't involve the police. He just got out and is walking back now. “Here you are *hands back documents*.... You're a little ways from home aren’t you? “Yeah, my Aunt lives out here and I came out to visit her.” “Alrighty, I don’t see a need to cite you or anything so I’ll leave you with a verbal warning so just try to sleep somewhere else next time … OK? “Thank you again… have a good one.” Well that could have gone a lot worse. I looked up the mother's address and it is only an hour from me. I am going to call her by the name Catie from now on. I made a Facebook account with this burner and messaged Catie on messenger saying “I know what happened to your daughter Carly… they faked it.” [SENT] Hopefully she sees this soon and we can chat a little bit and hopefully it helps to find that backup. Update 8 So she read my message a moment ago and responded with “Who are you?” I responded with “Meet me at the Franksville park in 20 minutes, I am here to help not hurt. Please do not bring the police… they covered this up.” I am already parked here where I can see the parking lot but no one will be able to clearly see me staking it out. If the police roll up to the park I will exit through the back. If she comes and she is in a black jeep then I will text her again telling her to go to the bench across from her and wait for me. Hopefully all goes to plan. [20 minutes later] Great, she just pulled up and no cops. I messaged her the message and am waiting for her to do as directed. I talked to her for a while, probably a good half hour. I wrote down what I thought were the most important things she said. “Father was a military officer” “Dropped out of college” “Top of her class” “Public storage garage” “Police searched Carly's house without proper consent” “Computer and journal missing” This was the farthest I have been in this case. Now that whoever is watching just know that I am currently one step ahead of you in every way now. I have developed different plans based on what might happen and every possible outcome and how to counter the bureau. I may not have the man power the FBI does, but I do have more knowledge now. So just know I am coming for you … I will ruin you. I am now taking the cellphone battery out and disposing of it. Until the next update…. Goodbye. -Colin Update 9 A lot happened yesterday, first of all it was mothers day. I was debating if I should go back to my moms house because someone could be posted out front waiting for me to return. I was wrong and the night went well. I left around 9 pm to find this USB. Someone that wants to remain anonymous direct messaged me and said they thought that the storage unit might be where she put the backup. I looked into it. I knew the number which I will not say for my own protection but Catie gave me the number of the storage garage. She said that she never had the key but she helped enough and that wouldn't be a problem for me. I went to the main office of the storage rentals and bought myself one near Carly's garage. This way I can have access to the property without suspicion. One thing that is really beneficial to having a pass code to the main gate now is that I can come whenever I choose. This place is 24 hour service. OK so now that I have developed a plan on how to get in now, I need to pick her lock. It should be pretty easy if there are no cameras and if no one is working. I haven't really scoped anything out for assurances but hopefully it all goes to plan. On a side note I have been contacted again by that number, they sent me a picture of my car ... my actual car ... Shit. OK so they most definitely are watching me but that was from last night so I don't know if they are currently. If I do post this post just know that I am safe and have acquired the USB hopefully. I am going to take bolt cutters and a hammer to see if I can just break the tiny lock to get in. I will update you when I am back. Update 10 OK I am going to choose my next choice of words very carefully. I found what I needed ... what I was looking for, for the last couple of days. I broke into the garage and there was this nice 1976 mustang cobra, what a beautiful car. I turned my phone's flashlight on and looked in the back of the garage. There was this tool box and I looked all through it, but didn't find anything in that. Next, I went to the car and it was open how fortunate ... I looked in the glove box and I found something. It was in this tiny envelope with the envelope saying "Insurance". OK I got what I came for and shut the door to the garage and left. I plugged the USB into my tiny laptop and it came up. First file "Project Sight", I clicked on it and 4 more files came up. 1st "Access point 51 [Classified]", 2nd file "Roswell, New Mexico [Classified]", 3rd file "JPEG File [Classified]. What was on these files I can't really describe. I need a little more time to wrap my head around all this information and figure out what to do with it. The weirdest of them all was the JPEG files, there were at least dozens of pictures that were all super blurry but mostly they all had one similar trait. At least 7 foot tall and a very large round head. They appeared to be a darker gray color and that's about all, The pictures were all in black and white though so that was not helpful. I need to know what to do with this USB. I think I am going to make a back up somewhere and place it somewhere where no one will find it. If these men do come for me I do not want them to win. So I set up some posts that will eventually post automatically within 48 hours of no account activity. I am still posting on a burner phone at the moment. All I ask if I go missing please don't let me end up like Carly. She said that this information needed to be shared with the world. I want to avenge her. The FBI will not get away with this. If these posts get deleted I have set up logs to be saved and they will all be backed up and reposted automatically as well. Nobody can stop that process too. They know what type of car I drive and where I live. They know I have this classified information and will not stop until they get what they want. I don't want to die. I am scared for my own life and safety of my family at this point in time. At this time I am writing this on my phone, I can see a black SUV parked 4 cars to my left in the Walmart parking lot. It may just be my anxiety but there are two men sitting in the front. I may be dead within the next day or taken. Who put that fucking tape at my dumpster in the beginning? Was it them? Did they watch what I did everyday and find my daily routine and match that to when I would take the trash out? Could they have placed the tape at a spot I could visibly see all on purpose, knowing that I would pick it up and listen to it. All for what though? Why me? What is the point of going after a teenage kid? I might just be going crazy because of all this. I would like to express.... Whatever does happen to me, just know if you do find a cassette tape at the dumpster, don't play it. Until next update, -Colin Note - My automatic posts I have set up go off in the next 48 hours of inactivity of the account. I have hid the USB and a GPS coordinate of where it is hidden will go out to someone that I trust very well.
Attempt at an unbiased summary of the IOTA attack by a non-bag holder
On February 12th the IOTA Foundation (IF) posted a status update:
February 12th 2020 - 08:55 After receiving several reports of fund theft that looked out of the ordinary in a short timeframe we decided to warn about this in Discord and on Twitter. As a precaution we ask you to keep your Trinity wallet closed for now.
25 minutes later they decide to shut down the "coordinator", blocking all "value" transactions.
February 12th 2020 - 09:20 After initial investigation we decided to turn off the Coordinator to make sure no further theft can occur until we find out the root cause of these thefts. Further investigation taking place from here on.
They then spend 5 days investigating the theft. After about 24 hours, only about 10 people reported that they had been stolen from/were identified.
February 13th 2020 - 07:45 We've shifted the complete focus of all relevant resources of the IOTA Foundation to this investigation last night and we have been working in teams to investigate impact and cause together with the identified victims. The conclusions so far are: - Most evidence is pointing towards seed theft, cause still unknown and under investigation - Victims (around 10 that identified with the IOTA Foundation so far) all seem to have recently used Trinity
However, it seems by examining at the transactions that they knew were associated with the theft and were able to identify some new thefts.
February 14th 2020 - 05:45 ... The investigation has yielded absolutely no indication that there has been a core protocol breach of any kind. Rather, all evidence so far points to a problem with a dependency of the Trinity wallet. The attack pattern analysis showed that the halt of the coordinator interrupted the attacker's attempts to liquidate funds on exchanges. The stolen funds have been purposely and repeatedly merged and split to obfuscate the investigation, and with the current token exchange rate as well as exchanges' KYC limits in mind. We received additional feedback from more exchanges (not all yet), confirming that none of the identified transactions has been received or liquidated. Our current assumption is that the perpetrator targeted high value accounts first, before moving on to smaller accounts and then being interrupted early by the halt of the coordinator. (Again: Hardware wallet users are not affected.)
To me, the details sound like the perpetrator was experienced and knew how to convert the tokens to a less-centralized cryptocurency without KYC/AML. It wasn't simply a crime of opportunity, but rather there was some planning. There was a lot of speculation over whether or not the hacker was "sophisticated". Of course, he did manage to pwn IOTA's official wallet. However, the "Chairman of the Board" of IOTA wrote "Let's just say theres a lot of traces. The attacker does not seem to have been tоо sophisticated", on discord. Screenshot On February 16th, IF released a new version of their wallet.
Trinity Desktop 1.4.1 is out. ... - Update: Remove exchange support (#2565) - Update: Adjust update alerts and disable auto update (#2566) - Fix: Allow wallet entry when nodes are not in sync (#2563) - Update: New Crowdin translations (#2553) - Fix: Endless loading cycle (#2568)
Two interesting changes are they removed exchange support and they disabled auto updates. IF had recently integrated "Moonpay"in their wallet, which allows users to buy IOTA with their credit cards for a 4.5% fee. Moonpay appears to be affiliated with Roger Ver and Bitcoin.com but I didn't look into this too much. Purely speculation, but it seems that Moonpay may be involved in the key theft. Quite a few users in Discord were reporting that they had trouble with the new version. About 12 hours later they released a new desktop version (1.4.2) with
- Fix: Incorrect alert on password change for some users (#2570)
Fast forward to today, IF released their remediation plan. Basically, if you used their official wallet since December 17th, 2019 then your seed might be compromised. However, they say that the attack didn't really start until January 25th, so the Dec 17th date is out of an abundance of caution. (Note: I'm pretty sure December 17th is when Moonpay integration occurred.) Here's the IF remediation plan from status.iota.org:
February 17th 2020 - 05:47 Here is a short overview of the attack remediation plan and the next steps going forward. Essentially the remediation plan involves three steps: STEP 1: INSTALL UPDATED VERSION OF TRINITY As announced yesterday, we have released an updated version of Trinity which allows you to check your balance and transactions. Please download this newest version of Trinity here and install it over your old version: https://github.com/iotaledgetrinity-wallet/releases/tag/desktop-1.4.1 When you download the new version, MAKE SURE TO CHANGE YOUR PASSWORD AND STORE IT IN A PASSWORD MANAGER. If you have used the same password also for other services or websites, we strongly recommend you change it there, too, as a precaution. By upgrading to this new version of Trinity, you will remove the vulnerability from your wallet and render the hacker incapable of accessing your wallet if s/he has not already done so. STEP 2: MIGRATE YOUR TOKENS TO SAFE SEEDS In the upcoming days, we will release a seed migration tool that will allow users to transfer their tokens to a safe seed. We strongly recommend that ALL users who have opened any version of Trinity (Desktop or Mobile) since the 17th of December 2019 utilize the tool and migrate their tokens to a new, safe seed during the soon-to-be-announced migration period BEFORE the coordinator is re-started. More information on the tool and how to use it will be provided when the tool is published. By migrating your tokens to new, safe seeds prior to the re-start of the coordinator, you will render the attacker incapable of making unauthorized transfers of your tokens if s/he has not already done so. *Note: our current information indicates that the hack started on or around 25 January 2020 and that only Trinity Desktop users’ seeds were potentially compromised. However, out of an abundance of caution, we are nevertheless recommending that ALL users (not only desktop users) who are concerned about possible token loss should migrate their tokens to a new seed. *Note: Ledger Nano users do not need to use the migration tool but a password change is still strongly recommended. STEP 3: RECLAIM YOUR STOLEN TOKENS IF NECESSARY Our current information indicates that only a limited number of bundles were successfully transferred by the attacker out of the true owners’ wallets. We have notified all exchanges of all compromised bundles we are aware of so as to prevent any further movement of any stolen tokens. We therefore anticipate that in the majority of cases, Steps 1 and 2 will be sufficient to protect most users’ tokens. To address the minority of cases in which unauthorized token transfers were made out of users’ wallets, a third step is needed. We will perform a global snapshot of the network that will, pending community validation, enable us to bring stolen tokens back to the affected users. More information on the process as well as the consequences for all affected users will be provided soon. Assuming the snapshot is successfully validated by the IOTA community (node operators), we will implement a KYC procedure involving a third party that will enable all users who had their tokens stolen to reclaim them. The same procedure will also be required for certain cases in which the migration tool is used fraudulently or incorrectly. More information on this process will follow shortly. After the migration process, we will restart the coordinator and resume normal operations on the network. An update on the timeline will be released in the upcoming days. We will publish detailed instructions on the steps users should take as soon as the remediation tools and processes are ready. For now, please make sure to download the new Trinity version to change your password and check your balance. We would also like to ask any affected users from the United States to come forward and DM our team, as your cooperation could assist us with ongoing law enforcement investigations. Thank you all for your patience. We will continue to update you on all important steps along the way and will do our best to make the transition as easy and smooth as possible.
So yea, if you got your tokens stolen, they will return them to you after you submit KYC/AML to the IOTA Foundation, assuming that "node operators" agree to roll back the theft. Hopefully users didn't reuse the same seed for another cryptocurrency because they won't be able to roll those back. It sounds like they're working with the FBI (or US law enforcement) on this which is a bit surprising. I'm skeptical that they have really identified the perpetrator -- a common attack is to steal developer Github credentials which could be what happened here. But again, that's purely speculation. Please don't repost this on your for-profit crypto news site without attributing to me ;) edit: formatting
March beermoney earnings report (£319.16) - Who paid me in March
I figured I'd post my first beermoney earnings report and no this is not an april fools, I hope u/flybywire2a doesn't mind me borring his formatting as i'm bad at starting from scratch. Anyway here's what I made :
Passive - Browser Extension
Passive - SMS
Passive - Facebook
Passive - SMS
Passive - Location
Google Opinion Rewards
Passive - Cloud Mining
Passive - Cloud Mining
Passive - Browser
Seems pretty good for a third month considering i'm doing everything haphazardly, sadly I didn't record the prior months but started doing it now in case I need to ever pay tax on my earnings.
Please be aware all sign-ups require you to use a ref link or code in order to get the bonus.
Chip [non|refcode - ARWLEPXY (£10 sign-up bonus)] - You'll need to allow for two auto-saves that happen every four days and within 30 days of those conditions being met you will recive £10 which you can immediately withdraw with your auto-saves. You can easily pause your auto-saves after the first two.
Tickr [non|refcode - callumt1608 (£10 sign-up bonus)] - You'll need to make a one off (recommend £5-10) or monthly deposit at which point you'll recive your £10 but you must wait 90 days before being able to withdraw it
Xapo [non|ref($10 sign-up bonus)] - You'll have to deposit $100 worth (check £-$ value) into the account at which point you'll recive your bonus in BTC which you can convert to GBP and withdraw, should you not recive your bonus within a day or so contact support and pm me (support will want my email address and full name to verify the bonus).
Trading212 [non|ref(£1-100 sign-up bonus)] - You will have to deposit £1 to recive the share, 3 days to sell it and then 30 to wait for the money to settle at which point you can withdraw it.
Bitwala [non|ref(€15 sign-up bonus)] - You only need to verify your account which will require Proof of ID and Address (Make sure it shows the date and your name) and you will have to create a bitcoin wallet so you can have €15 worth of bitcoin deposited into it within 15 banking days at which point convert it to GBP and withdraw.
Zuex [non|ref/ refcode - ZWYIVB (£40 sign-up bonus)] - You will recive £40 in your account upon signing up however you cannot withdraw this amount but you can withdraw any interest generated off it so I'm personally just letting it build and build until I am satisfied.
Streetbees [non|refcode - 75496X ] - payout upon survey review, no minimum. The surveys are carried out like a conversation and pay £1 minimum, these tend to be less mind numbing than most surveys due to the conversational nature of the surveys and as a plus they're very frequent.
BigToken [non|refcode - ML15ACAC6 ] - payout within 7 business days, $5 minimum. This one is actually very convenient cause everything is a micro survey of one question so it's easy to do on the go, no complex questions. You can only cash out 1/4th of your points total. They seem to have fixed their payment issues now so everyone getting paid again after a long hiatus.
Google Opinion Rewards [non] - payout immediately but only in the form of google play credit. All the surveys are based on location data from you walking about and visiting places so you're probably not going to get many while in quarantine but when you can this is the easiest way to never pay for an android app ever again.
Viewsbank [non] - payout at the end of each month, £12 minimum. Pretty much what you'd expect from a survey site, nice ui, getting disqualified from a survey is very uncommon it feels, surveys can be viewed on the website and you'll also be alerted to them via email when they become available.
CitizenMe [non] - payout instantly, no minimum. Micro survey app very trustworthy and reliable company you'll consistently get one or two paying surveys each day perhaps more based on your demographic. Highly recommended.
OnePulse [non] - payout instantly, $5 minimum. Micro survey app similar to CitizenMe. Highly Recommended.
IntelliZoom [non] - payout in ~3 weeks, no minimum. Can check the website for available tests and they send out regular email alerts to those tests in addition to notify you. I get probably 10+ invites a week but not always a fit for the demographic.
TopCashback [non|ref(£7.50 sign-up bonus)] - payout varies based on the website/product/service you get cashback on, no minimum. I recommend if you're ever buying anything whatsoever online quickly pop on here and check if you can get cashback for it but do make sure you have anything that blocks cookies turned off. I also recommend you sign up for QuidCo[non|ref(£10 sign-up bonus)] & OhMyDosh![non|ref(£1 sign-up bonus)] and check all three when checking for cashback sometimes one is better than the other.
ReceiptHog [non] - payout within 7 business days, £3 minimum. You scan your receipts from shopping and get points for them which you exchange for payment, can take a while but money is money.
Huyu [non|refcode - 5URTPVVJ (£0.50 sign-up bonus)] - payout within 7 business days, £5 minimum. Same as ReceiptHog but will only accept receipts from grocery/supermarkets.
Brave [non|ref] - payout monthly, no minimum. Opt-in to the brave rewards in the brave browser and you will recive non-intrusive ads occasionally and be paid for viewing these at the end of the month in BAT. It'll help if you understand crypto already as you'll need to sell your crypto to get tangible cash. I recommend checking the coinbase mega-thread as there is a step for extra money related to it that you can complete.
Electroneum [non|refcode - BEEF3D ] - You basically just confirm you want to cloud mine each day until you feel you've accumulated enough to sell on an exchange. It'll help if you understand crypto already as you'll need to sell your crypto to get tangible cash. I recommend checking the coinbase mega-thread.
Phoneum [non|ref (200PHT sign-up bonus)] - You basically just confirm you want to cloud mine each week until you feel you've accumulated enough to sell on an exchange. It'll help if you understand crypto already as you'll need to sell your crypto to get tangible cash. I recommend checking the coinbase mega-thread.
UpVoice [non] - payout instantly, $5 minimum. Completely passive, tracks your usage data of Facebook, YouTube, Amazon and other partnered sites and pays you in return.
Lazybucks [non|ref] - payout 7 business days, no minimum. Completely passive, requires you to have a facebook account with an untouched ad account or business account. The way they work is they interact with ads on behalf of advertisers to review that they are working.
MoneySMS [non|refcode - 683408DCD9 (€0.50 sign-up bonus)] - payout within 7 business days, €2 minimum. Completely passive, The way this works is companies will send texts to your phone to verify that their mobile infrastructure (like Two Factor Auth via text) is working and the app will check they've recivied the expected text and credit you €0.02-0.05 for each text so you can expect payout after 2 or 3 months.
McMoney [non|refcode - 9YQ73EX5 ($0.51 sign-up bonus)] - payout within 7 business days, $5 minimum. Same as MoneySMS.
Panel App [non|ref] - payout within 7 business days, £1 minimum. Completely passive, Utilizes your location data for research purposes, you make get surveys in response to where you've been which add a little extra to reaching your payout faster.
Adult Entertainment - Definitely not for everyone
OnlyFans [non|ref] - payout at the end of each month, $20 minimum, 20% fee on your earnings. This honestly will not be for everyone but i'm quite comfortable taking nudes and curating it as its basically like an Instagram profile. You'll need to market yourself a little (use reddit/twitteinstagram), keep a consistent posting schedule and appeal to peoples desires. Can be quite the confidence boost. Look at your body logically and figure out who you appeal to and what niche you fit into in relation to peoples desires.
I'm Launching the First Truly Decentralized Private Marketplace [x-post from r/cryptocurrency]
Hey everyone, Posting this here since there was a lively discussion related to the cs/engineering principles of the system on the cryptocurrency thread. This sub will probably be particularly interested in the paper on the system, which describes how the system works from a technical standpoint. I've been working for almost a year now on a platform I call the Ultranet that I'm planning on launching in three weeks on February 25th at 12pm Pacific Time (signup here to be notified). It's a marketplace platform that is fully-decentralized, private, and censorship-resistant. It works by having each user who runs the software download and store a cryptographically-secured copy of all of the listings, orders, ratings, and all other marketplace data through a concept I introduce in the paper called a "block pool." This means that as long as a single node somewhere in the world is running the Ultranet software, all data, including all listings and all reputation data, will be preserved. This is in stark contrast to virtually all platforms that exist today, which are subject to censorship of listings and/or outright take-down, the latter of which results in all reputation data being lost. Moreover, the Ultranet achieves censorship-resistance and privacy (it's pseudo-anonymous like Bitcoin) while maintaining feature parity and user experience parity with existing centralized marketplaces. It also introduces Ultra, a hyper-deflationary cryptocurrency that is burned every time an order is placed on the system and by merchants in order to promote their listings, resulting in increasing scarcity over time (i.e. hyper-deflation). Importantly, the use of a native cryptocurrency allows the value of the network to accrue to its users rather than a privileged few, while also giving people an incentive to use the system early on (thus helping to solve the "platform chicken and egg problem"). Finally, the software has a built-in fully-decentralized exchange mechanism I introduce in the paper called "interchange" that allows users to purchase Ultra using Bitcoin or Monero without any third parties involved, along with a fully-decentralized end-to-end encrypted messaging platform. I know it's only natural for people to be skeptical when reading a post like this, but I worked really hard on this because I really believe that the direction society is headed under the dominance of "surveillance capitalism" needs to be challenged somehow, and because I thought all of the existing attempts at disrupting things weren't sufficient. As such, having invested a lot of time and energy into trying to engineer a better way, I think the Ultranet and the concepts I introduce in the paper and in the software itself can at least serve as a guide to get us started down a serious path toward a more open and more democratic platform ecosystem. I'm launching the Ultranet in three weeks on February 25th at 12pm Pacific Time, at which point I'm going to make the software available for download on the ultranet.one website. I was going to wait until then to make my first post, but I thought publicizing it a bit before I release the final version of the software could give me a chance to address any last-minute concerns people might have about the first iteration (which is why I'm also releasing the code today; see below). In the meantime, if you want to learn more about the platform, below are some resources:
Disclaimer: This is my editing, so there could be some misunderstandings. For the general view of 'what's going on?' of this dynamic ride... 2/16 dom어제 오전5:44 Just FYI: the team is now working on a plan on how to recover from this and get the network back into operations while also allowing anyone who might have been affected to safely transition.there are no guarantees just yet, but we will do our best to get this through ASAP. Hopefully we will have a concrete action plan tomorrow and will then communicate it. On the vulnerability side, all parties are notified and they are working with law enforcement and external auditors to fully understand how this happened.We will keep you guys posted. dom어제 오전5:47 needless to say,that the vulnerability itself was rather sophisticated and required access on multiple levels to be able to execute it on this scale. Hopefully we will be able to share more soon. [Did the vulnerability existed after or before the audit on trinity?] after the audit dom어제 오전5:51 Currently it looks likethis will only be for recent Trinity Desktop users dom어제 오전5:56 the entire Trinity team did an amazing job and there is not a single person to blame.The attack itself was very sophisticated and targeted at IOTA and Trinity itself. We are already working on v2 where none of this would be possible.We will share our learnings from this publicly and also share what kind of precautionary measures we are taking. dom어제 오전5:58 The community also did an amazing job in helping to guide us through and give assistance to other community members. dom어제 오전5:58 we actually were having discussions a few weeks ago to rename Trinity (because of the religious connotation) Jelle Millenaar [IF]어제 오전6:37 We didn't really have panic and chaos. We actually worked really well together. Jelle Millenaar [IF]어제 오전6:38 [IF members, do you get paid Over Time for all the awesome work or PURE DEDICATION?] nobody considers this overtime or anything. We just contribute because we know it is needed. dom어제 오전7:45 [If dependencies carry this risk, maybe they should've done an official CORE wallet and saved all the fluffy stuff for a third party app.] that's how the new Trinity will work.Sucks that it happened now especially after we wanted to put it into maintenance mode anyways dom어제 오전7:49 [How do we know if the hacker has our seeds?] this is related to a third party, unrelated to IF or IOTA dom어제 오전7:50 we know that this could have only been done through intrusion / collusion of an external source. [Dom are you fully confident to solve all those problems especially regarding the possibility of even more people getting scammed instantly after coo is back again?] yes, relatively sure. That is why we are taking the necessary time to plan accordingly. dom어제 오전7:55 We will provide more information on how this exploit was done soon. All the involved parties are aware of the situation dom어제 오전7:58 [Please give us some time before you start the coo information that we can move to new seed instantly] don't worry, we will get it all sorted out. dom어제 오전8:22 once life is a bit less "tumultuos" I still want to work on that Autonomous Bar concept powered by IOTA (access control, id verification, payment and a bunch of robots) Eric Hop [IF]어제 오후2:44 Pretty good. I'd be surprised if we find more theft bundles. Only found one more today, while building a timeline of the theft. Eric Hop [IF]어제 오후2:50 We have several separate teams. One is looking at how to resume. One is looking at how to be able to rescue the funds. Others are interacting with law enforcement and third parties. I'm part of DAFT. The Data Analysis Forensics Team.Haha Eric Hop [IF]어제 오후3:01 Some if the people in Coordicide team like Hans have been helping out.It was an all hands on deck situation. I actually loved it. We haven't had this much of a team spirit in quite a while.Usually everyone plays in their own sand box.But this time we all played together on the beach. It's such a joy working with so many extremely smart people. With so many eyes on the ball we did not miss much opportunities to figure things out. Eric Hop [IF]어제 오후3:07 And for me personally this was a great time. I am all about puzzle solving. And this was the greatest puzzle of all. With a built-in time limit.Haha Eric Hop [IF]어제 오후3:12 I'm not doing official statements. Butwe have a good overview of what happened and the extent of it. Right now we want to hammer down how to resume without risks and how to safeguard the stuck funds if possible.What is especially funny to me is that the coordinator that everyone was bitching about for years did exactly the thing it was meant to do. It allowed us to halt an exploit that otherwise would have cost everyone dearly. Eric Hop [IF]어제 오후3:15 It was meant as safeguard, training wheels, while we mature. And while we need to remove it due to it being a single point of failure and a bottle neck to scaling, I will be kind of sad to see it go. Yes, IF would have done the same to safeguard funds, if a third party wallet would have been the cause. Just because we can. Eric Hop [IF]어제 오후3:37 Yes it was a manual attack. The sophistication was in the exploit. But he seemed to be not too sophisticated iota-wise.Everyone has their specialties I guess. Eric Hop [IF]어제 오후3:41 And as an aside I wish people would fuck off about the whole iota not being decentralized because of coordinator,when every block chain token is centralized around a few mining pools that seriously disrupt any possibility for positive software development.They fucking hold back everything that influences their bottom line. Which is why Bitcoin and the rest have pretty much been stagnant for years while we move forward constantly. dom오늘 오전7:08 We will release a new Trinity version tomorrow with the fixes implemented.It's not yet the full transition tool, but it's the first step towards fully going back to operations. dom오늘 오전7:09 Just wait for the rest.It is important that we get this 100% right and we are still further investigating, so there is a lot of behind the scenes work happening right now. David Sønstebø오늘 오전8:52 So... Tangle EE Quite cool eh? It's so unfortunate that this asshole managed to distract everything away from one of the biggest steps towards global adoption Let's not give this fuckface further attention.The cause has been identified, law enforcement is involved and mitigation strategy is being worked on. There will be further official updates, but let's not halt the whole IOTA project due to one idiot. David Sønstebø오늘 오전8:56 [Is he identified?] Let's just say that there's a lot of traces. The attacker does not seem to have been too sophisticated. Official update on Monday will provide details. David Sønstebø오늘 오전9:03 [How will this situation affect iotas partners?] My best guess: further increasing our reputation as an organization that solves hard problems efficiently and doesn't shy away from difficulties.Every company in the world has had issues similar to this. Keep in mind that this does not at all affect the protocol/Tangle/IOTA. David Sønstebø오늘 오전9:08 We do have a bounty program. This/these individual/s were not interested in the greater good, pure greed and incompetence David Sønstebø오늘 오전9:10 [Any examples of use cases for DID on the tangle?] Virtually all use cases on Tangle requires a secure identifier and verifiable credentials.What I think will happen is that once Tangle EE ships the first version, all other companies using IOTA will start to implement it [One more question: How transparent will tangle EE be for the community?] 100%. This is why I/we consider Tangle EE to be such a significant milestone,it's not "just" IF, this is a coalition of major companies, start-ups and leading academic institutions building the solutions David Sønstebø오늘 오전9:11 [any ETA for the 1st Version?] That's another good thing, IF won't issue the ETAs, Tangle EE will : David Sønstebø오늘 오전9:12 [What does T(angle)EE do exactly?] It's a partnership and collaboration between several entities to develop and ship code and blueprints that are relevant for product developers and service providers That blog post is a good read to get better comprehension David Sønstebø오늘 오전9:13 It's incredibly important that IF's role slowly but surely decreases in importance. IOTA has to succeed independent of IF post-Coordicide and multiversial-slicing (advanced sharding equivalent) David Sønstebø오늘 오전9:14 I would say that it's an incredible important piece of the puzzle.Naturally Object Management Group (OMG) in Tangle EE will be key here as well, but IOTA is not married to "just" Eclipse. We also work closely with Linux Foundation. However, Tangle EE is very focused David Sønstebø오늘 오전9:22 I don't think IF will disappear, however, it will hopefully be purely R&D-driven in 10 years, whereas the other efforts are taken over by the ecosystem(companies, academia, start-ups and enthusiasts).Even post-Coordicide, we already now have theories on how to go way beyond even that.If we achieve our goal of IOTA being equivalent to TCP/IP, there will naturally be continuous development and research in the foreseeable future.I doubt we will reach complete satisfaction,especially now that smart contracts and oracles enter the equation: there's certainly more work to be done for IF, but my goal is for IF to "simply" be R&D David Sønstebø오늘 오전9:27 Definitely.This is why I coined the requirement for a "grandma on crack"; this is truly how simply using IOTA should be in 2-5 years. Just like very few even know wtf TCP/IP is David Sønstebø오늘 오전9:57 I agree 100% with your assessment, though as would Netflix do with Blockbuster's assessment when they declined to acquire Netflix. At the end of the day it's all about basic economic and human behavioural principles. Human nature does not change, but our environment does.Disruption will continue forever. Darwinian principles will forever remain true. A better option = adoption. It doesn't matter how hard the incumbents fight against it, they either adapt or go Kodak/Nokia/AOL
I generated a new address through bitcoin-cli. Against the new address I tried to issue free bitcoins from one of the testnet faucet. I can see transaction number on the faucet website which shows transaction was created successfully on faucet website. But I don't see any wallet notify event in debug.log file. Please correct me If I am guessing ... What is Bitcoin? - Blockchain Courses . Looking for the perfect course? We’re here to help. Answer a couple of quick questions, to help us find the most relevant content for you! bitcoin bitcoin cash bitcoin gold bitcoin private bitcoin talk block height blockchain bootstrap cli wallet dash dash wallet dogecoin litecoin neo nodes pivx qt ravencoin reddcoin sync wallet backup wallet nodes wallet setup wallet update xtrabytes. coinguides Follow on Twitter August 28, 2018. 0 3,525 . Facebook Twitter LinkedIn Pinterest Reddit. Show More . Share. Facebook Twitter LinkedIn ... If the price of Bitcoin falls by 30% and the collateral drops to $70,000 in value, the loan proceeds of $50,000 are equal to 70% of the value of the collateral as 50,000 divided by $70,000 comes close to 70%. This threshold causes a trigger event to take place, and upon notification by BlockFi, you have 72 hours to contribute more collateral in order to further support your loan. However, the ... Check Bitcoin (BTC) transaction, value: 5.90444653, date: 2020-10-27
What is Bitcoin? Bitcoin Explained Simply for Dummies ...
Whether or not it's worth investing in, the math behind Bitcoin is an elegant solution to some complex problems. Hosted by: Michael Aranda Special Thanks: Da... This video will show you how to start bitcoin mining from home. It's very easy and "free" to do if you have a gaming PC. *****... What do you need to mine one Bitcoin BTC coin in 2020? Let's review Bitcoin mining profitability and what BTC mining rigs you would need to mine an entire co... Early Bird Session. This video is unavailable. Watch Queue Queue In this video we will be going over the basic foundation of reading price charts, which is candlesticks Subscribe Like and Share if this was helpful Follow me on IG I Follow back @chicago ...