Bitmain Antminer S5 Review All You Need to Know - Bitcoin

08-13 21:45 - 'Building the Infrastructure for the Future Decentralized Financial Market, Coinbase Included HBTC.Com Debut DeFi Project - Nest Protocol' (self.Bitcoin) by /u/Nest_Fan removed from /r/Bitcoin within 24-34min

'''
As the world’s leading regulatory compliant digital asset exchange, Coinbase sets one of the most stringent requirements for digital asset listing which includes technical evaluation of projects, legal and risk analysis, market supply and demand analysis, and crypto-economics. Coinbase holds a strong reputation in the digital asset industry, and thus the “Coinbase Standard” is considered as the industry benchmark for other digital asset projects, and the market has even seen the “Coinbase effect”.
On July 25 2020, Coinbase quietly launched the pricing chart of a decentralized oracle project, NEST Protocol (NEST), into its portal. Although Coinbase has yet to announce the inclusion of the project in its evaluation list, it represents a keen interest in the DeFi sector, and particularly in the DeFi price oracle projects.
NEST Protocol is the rising star in the decentralized price oracle sector
Decentralized financial services offered by the current mainstream DeFi platforms such as MakerDAO, Compound, dYdX, etc. rely heavily on the market data provided by the oracle projects. Oracle projects act as reliable information sources to feed these price data to other DeFi Projects, connecting the price data from the centralized world to the DeFi space. As such, the price oracle is an integral part of the decentralized financial services infrastructure.
Traditionally, the price oracle collects data from different platforms and feeds these data points to the DeFi space to create data reference points to enable them to function properly. However, many problems currently exist in the DeFi space, for example, blockchain network congestion, malicious attacks, wild market fluctuations, and other factors that may cause the data given by the price oracle to deviate from the true market data. These ultimately cause users to trade on wrong information in the DeFi space and increases such transaction costs.
Decentralized finance requires a fast, secure, and reliable price oracle. The birth of the decentralized price oracle is the embodiment of the blockchain industry’s thinking, and the current market projects offering decentralized price oracle services which includes NEST Protocol, Chainlink, Band Protocol, Tellor, Witness, Oraclize, and many others.
The innovation of NEST-Price is that every data point has been agreed upon by market validators, in line with the blockchain consensus mechanism. NEST-Price synchronizes the off-chain price in a highly decentralized manner, creating real and valid price data on-chain. This is the unique differentiator between NEST-Price and other price oracles.
Compared with other price oracle projects, NEST also has other features and advantages, such as the proposed peer-to-peer quotation matching as well as its unique verifier verification structure, making NEST more resilient to malicious attacks, resulting in a more decentralized network, and it’s on-chain prices closer to the fair market price. All of this has resulted in the NEST Protocol becoming a rising star in the DeFi price oracle sector. HBTC.com selects high-quality projects to list and partnering with NEST to promote the development of DeFi ecosystem
During the selection of quality assets, exchanges like [HBTC.com]1 and Coinbase adhere to the principle of a rigorous selection of assets from different projects to enable a proper range of digital assets. At the same time, in order to solve existing pain points in the digital asset industry, which currently lacks a market-making management solution, HBTC.com also has launched its own “coin listing crowdsourcing [liquidity initiative]2 “, redefining the exchange market making model.
HBTC.com, through its coin listing strategy, effectively reduces the problem of low liquidity in the early stages of high-quality projects, ensuring the smoothness of the user experience, and achieves a win-win situation for traders, the community, and the respective trading platform. These initiatives, coupled with reliable user protection and a responsible attitude, have earned a positive reputation among users.
Since its inception, the HBTC.com exchange has been committed to the discovery of both quality and promising digital asset projects. At a time when DeFi is growing rapidly, HBTC.com has a unique perspective for the decentralized price oracle sector and has prioritized NEST as a premium partner to debut the project alongside with its global branding upgrade. In addition, HBTC.com has [100% proof of reserves]3 for traders to validate the existence of assets via the Merkle tree, which brings transparency to the extreme.
In May 2020, NEST token delivered a 883.29% of return, at its peak, after its global debut on HBTC.com. At present, HBTC Exchange addresses holding NEST token accounts in a total of 141 million, ranked first in the overall network. At the same time, the HBTC Exchange network exclusively releases NEST staking mining and data show that NEST 24-hour turnover has reached $20.4 million.
Post-listing of the NEST token, HBTC.com has also listed DeFi projects such as DF, OKS, NEST, SWTH, JST, NVT, and other DeFi projects with market potential; some projects have achieved astonishing performance in the secondary market.
HBTC.com’s path to DeFi: developing public chains to prepare for the future ecosystem breakout.
In terms of the DeFi product and ecosystem infrastructure, HBTC has deployed HBTC Chain since launched in 2018, an infrastructure designed for decentralized finance and DeFi business with patented Bluehelix decentralized cross-chain clearing and custody technology.
The HBTC Chain is the DeFi ecosystem infrastructure that the team has spent a significant amount of effort to build. It is based on decentralization and community consensus and integrates cryptography and blockchain technologies to support decentralized association-based governance capabilities at the technical level. Based on decentralized key management, combining various cryptography tools including ECDSA, commitment, zero-knowledge proof, and multi-party computation, It implements the distributed private key generation and signature for cross-chain assets among all validators. On top of that, this technology can realize light-weight and non-intrusive cross-chain asset custody. On the clearing layer, HBTC Chain employs BHPOS consensus and horizontal sharding mechanisms to achieve high-performing transaction clearing, and implementation of OpenDex protocol to help the development of the DeFi ecosystem.
In addition, with the success experience of Bluehelix Cloud SaaS and white label solutions and the HBTC Brokerage system, HBTC’s public chain also innovatively supports CEX+DEX mixed matchmaking model and OpenDex protocol and proposes the three-tier node system which consists of standard node + consensus node + core node. This structure provides HBTC public chain certain advantages in terms of performance and cross-chain transactions. Users can easily establish a DEX with OpenDex protocol at nearly zero cost, and all DEX will share the liquidity and support customized user interface and trading parameters. The trading experience can be completely comparable to centralized spot exchanges.
With the launch of its test network, it is now possible to develop various DeFi applications on the HBTC public chain, such as decentralized swap, so that private keys are not controlled by any party; no KYC, which can prevent personal information leakage; and asset security through the setting of invalidation, cancellation of transactions and other functions, cross-chain asset mappings, such as the ability to issue cross-chain cBTC or other chain tokens, fully decentralized asset mapping contracts, and 100% reserves.
Conclusion
In the past few months, the DeFi market has been extremely active, the price of DeFi tokens has been rising, and a new round of competition with the centralized exchanges has started. HBTC Chain relies on the powerful technology of Bluehelix and [HBTC.com]1 , giving all public chains the ability to interconnect, and put into both DeFi and SaaS levels. Undoubtedly, as one of the first exchanges to build the DeFi ecosystem, HBTC is leading the breakout in the current DeFi craze and has now become the first choice of users to engage with quality DeFi projects.

From BITCOIN news([[link]6 )
'''
Building the Infrastructure for the Future Decentralized Financial Market, Coinbase Included HBTC.Com Debut DeFi Project - Nest Protocol
Go1dfish undelete link
unreddit undelete link
Author: Nest_Fan
1: *btc*com/ 2: m*diu**com/hbt***ficia*/hbt*-launches-ba**liquidi*y***owd*unding-li*ti*g-plan-redefine-t*e*exch*nge-*i*tin**m*d*l***6*58f*f1d* 3: hbtc.ze**e*k*co*/hc/*n-us/a**icles/3***46287754-HBT*-10*-*ro***of*Reserve 4: hb*c.co*/ 5: n*ws.bitcoin.c*m*bu*ld*ng-t**-infr***ructur*-f*r-the*fut*re*decen**ali**d-*inanc*a*-market-coi**as*-*ncluded-h*t*-*o*-*ebut-de**-p*oject-n*st-**otocol* 6: n**s.bit*oin*com/building-th*-infrast*u*ture*for-t*e-fut****decen**a**zed**inancia*-m*rket-coinbase-**c*uded-*b*c-c***deb***defi-**oject-*est**r**ocol/]^^5
Unknown links are censored to prevent spreading illicit content.
submitted by removalbot to removalbot [link] [comments]

My stock study watchlist. would appreciate criticisms or red flags

Core
- FB ecosystem
This is the stock that i believe is invested in the right places and has a path forward in the global market. I work as a React developer in fintech and I greatly enjoy their technology. The reason I stopped using snapchat was because I couldn't use it on low connection in Mexico, but Instagram worked marvelously. I use Whatsapp to stay in touch with my family in mexico and Facebook to stay in touch with my mom. There's something extremely powerful about that in my opinion.
They're conservative with their push and development of camera and VR technology which is wise in my opinion give the many opportunities that exist in that space. They're pushing along with fintech in India, again with small business through Whatsapp. And they provide a suite of customer services for small business and entrepeneurs.

- Microsoft
I think they will have a great run during the cloud era of software development. Their acquiring of Github AND NPM goes to show how in touch they are with developer servicing.

- Paypal
Paypal has a marvelous history and is a battle tested pioneer in the fintech space. I see them repeating their previous successes by acquiring Honey. I work with Honey in the fintech space and now I'm understanding that Paypal has an auto coupon scraper on my Amazon purchases while my Visa ones don't. This is the forward thinking I love from Paypal despite not being as flashy as Square.

- Disney
Disney is quintessential american entertainment. I believe their deep roots in American culture and the entertainment industry will provide a solid bedrock for them for the generations to come.

- Waste Management
Sanitation and environmental, like internet connection technology, are about the same when it comes to market penetration. It is a scarcity. Sanitation is a critical part of any society's development and wellbeing. I think WM will be there to benefit from increased urbanization and industriousness from technology and wealth growth.

- Kansas City Southern
I'm Mexican and my family are avocado farmers. I believe in the future prospects of Mexico and its relationship with its neighbors. Mexico is a bustling nation and many youth are international students that carry degrees. This is a far cry from having military policing streets in rural neighborhoods decades ago. Kansas city southern is part of the supply chain that connects Mexico to main industrious Mexican states like Monterrey, Jalisco, and Michaocan. I like rail in this regard because it's a lot of weight in one operation of heavy materials. So Canadians that use Mexican mining will also benefit from this railroad.
- Nintendo
I believe in the future of gaming as a market and if I were to take a shot at who would be the most stable, I would vote for Nintendo. Like Facebook, they approach the family unit and grow generationally. I love their curveball approach to gaming and I think that creativity, along with it's customers trust, will be something I can hold onto for a long time versus companies that have a history of developing games like Call of Duty or World of Warcraft. Nintendo can take different forms: in the living room, at sweaty tournaments, online, mobile, on your phone, on a TV, in the movies, etc.

Closely watching
- United Health or Cigna
This is only going to grow and wont change due to American politics for 8 years at a minimum.
- Cisco
Same as Microsoft but for IT.
- Impossible Foods IPO
I've been vegetarian for 10 years and Impossible Burgers has been one of the most mindblowing experiences of my life. The product is phenomenal and on a league of its owned compared to Beyond Meat. IMHO Beyond taste like cheap school lunchroom burgers and Impossible tastes like something I would be excited to feed my family. If their pork products are great then I am ALL in because Chicken products are by far the easiest thing to replicate. I'm extremely excited about this product.
- Visa
They make a ton of money on transactions. I saw them hiring for blockchain development so it leads me to believe that they're adapting.
- Square
I work in the fintech space and I like their modest approach to financial services. Their acquiring of a bank charter is actually incredibly important due to all the procurement and legal processes that go behind being a fintech company (abiding by federal security laws, etc). The one reason I like Chase banking is because I enjoy their app. I see Square as a competitor to Chase, surprisingly.
- Apple
Apple designs its products with customer service in mind. I think the future of education technology will likely go to Apple because of this. Their screens and cameras are wonderful and I can see them pioneering computer vision products because of this. They are THE American Tech company.
- TMobile
Aggressive as hell and grew to be a large player through savvy moves across time. Their customer service is a highlight for me.
- JPM
Customer service for banking is unmatched IMO. If any legacy banker will make it across changes, I believe Chase is doing what it takes to adapt and think forward.
- Planet Fitness
$10 gyms, clean, and casual enough for the general population. You can't beat $10 gym membership when you're broke as fuck. I've been a heavy lifter before and still used Planet fitness in my transitions across states and whatnot. I need to look at their numbers more closely.
- Volkwagen
I trust Europe and Japan to take EVs more seriously. I don't know who will seriously come close to competing with Tesla in the long run but they'll have to.
- Panasonic
Panasonic, much like AMD, did not immediately reflect the value of what they have produced. AMD did not explode inline with bitcoin or cheaper GPU consumption, in the same way Panasonic did not reflect a massive spike in price after speculation in Tesla grew. They're an important arm to the EV market that spreads across many players ranging from Tesla to Toyota to big tech.

- Lyft
I think Lyft's focus on customer service and regional clientele will pay off against Uber, who is growing too quickly and spreading thin. Lyft will benefit from the development of computer vision and Big tech's interest in automanufacturing.

- Crypto (Bitcoin or XRP)
I like crypto as a technology as a software engineer. I see the value in a faster process for procuring and exchanging legal tender that does not have to go through the bottleneck of the ACH process or through legal issues like the PATRIOT ACT or the Bank Secrecy Act. It still fundamentally respects those laws without the frustrations of banking service bottlenecks. I think the halvening protocol has an interesting affect on Bitcoin and supply and the market that it's trying to generate.







-
submitted by codingprofessor to investing [link] [comments]

Looking for opinions on my New Warriors re-write by a non-fan/non-comic reader

So I'm not a comic reader but the news of the various happenings with in the comic industry tend to peek my dabbling interests of political science and marketing.
So when I saw the new "New Warriors" backlash I couldn't get it out of head that night so I laid in bed for the next 3 hours just working out what could make the characters more interesting.
I recognize that by not being a comic reader beyond Dilbert I'm probably making a lot of mistakes but I'm honestly curious as to what actual comic readers would think of my changes.
I'm leaving actual character designs to far more talented people though.
So to start off with "Screentime" I came up with the idea that instead of some "Internet Gas" bullshit that instead he would have a large optical data storage crystal shatter over his head and embed thousands of various sized shards of the nanocrystals that make up one of these storage crystals.
Idea came from this Wikipedia: https://en.wikipedia.org/wiki/5D_optical_data_storage
Now where I take it and twist it from reality is that all of these shards pickup various electromagnetic waves like Wi-Fi, Radio, Cell towers, etc... and being embedded in his brain means that he is still connected to the internet 24/7 unless he is in a Faraday Cage. Now as for his character I wanted to depict a teen that is both overwhelmed by the amount of information he now has sometime unwillingly cascading through his head kind of like ADD and the fact that he can find out everyone’s secrets both good and bad.
Every text, every camera, every file server, if it has a electronic connection of some sort even a very low powered wireless one if he is in range he can access it regardless of passwords or firewalls. I wanted to highlight the he would make his own personal code of conduct not to speak of any of the things he now knows unless he is specifically working on solving a particular crime. So if he is searching for a murder and finds out that the murders best friend is a rapist he wouldn't tell anyone of this finding as its beyond the scope of his search.
At times I would show that the weight of basically trusting himself not to violate everyone's privacy unwarranted is a unspeakable burden for a teenager. However as a teenager he would find silver linings to his power, like literally unlimited porn of every type imaginable, watching movies right off of the studios hard drives, mining bitcoin in his sleep, most importantly for his combat ability being able to access a vast library of 3D printed weapon designs and the machines to produce these weapons thus meaning that he is armed with the latest and greatest small arms.
As I mentioned before if Screentime is in a Faraday Cage he loses his internet connection this can be used to give him a break from the overwhelming information he is constantly exposed to help him sleep or by a villain trying to remove his intelligence gathering ability.
The only other thing that can block his reception is his Team mate Deadzone's shields. So next up on my rewrite hit parade is Snowflake and the now renamed Deadzone. Power wise Deadzone is the by far the most changed. Where before he could only raise shields if someone he cared for was in danger, which is the single biggest load of shit ever. Now he can raise various sized shields and shield bubbles at will.
The thing about his shields is that they are all 3D shields meaning that while they are however tall and wide as Deadzone needs they are all 1 inch thick. Within these shields is a perfect void: No matter and no energy within. This means that say a Cyclops like laser blast is absorbed by this void until you get to a point where the interior of the shield is either full of energy or matter at which point the shield should be deactivated.
However Deadzone can run the risk of holding the shield longer and suddenly the shield becomes an explosive as this void is now so full of energy or matter that only Deadzones powers are holding them together. This has its tactical uses but it can be hard to judge as if he releases the shield to soon or too fast then he can create a vacuum bomb inadvertently. This requires an extreme amount of focus if Deadzone is to avoid collateral damage and if he makes a shield too big for him to hold and/or it doesn't receive enough damage to fill up the void completely before he drops it he can easily do more harm than good.
I should also note that while I mostly stayed away from speaking on the art design because I don't have enough skill to come up with a better original design than spandex suits. Deadzone and his powers are no longer pink. He looks the typical African-American athlete and his shields are pitch black due to their void like nature.
Snowflake is actually more or less unchanged as far as powers go being your typical cryokinetic. The biggest change I would make is remove her woke pro-noun nonsense as that doesn't add anything to the character.
Now the biggest change to both of these characters is their relationship to each other and how it effects how they interact with the rest of the world. So in some of the art that has been posted made them look to be far more than just brother and sister and seeing that they otherwise have relatively little less to make them standout as characters I decided to take that implied relationship and go straight for the teeth.
So yes they are in a fully active incestuous relationship, this massive dark secret has made them comparatively insular especially when it comes to making friends however its also given them a different perspective on life. They see the penalty for being underaged superheroes as a comparative slap on the wrist compared to their main “crime” and thus show a willingness to engage in their work that is matched by few others.
They are more emphatic then most of the other team members save for Screentime but that is because he probably already knows why someone is doing or acting the way they are. They are not woke however they simply accept people as they are and move on, not trying to draw attention lest that attention get turned on them and their secret gets out. This is their single greatest fear beyond loosing one another.
The last character that I managed to rewrite is Trailblazer. She remains the leader and the “mother” of the group much as she had done in her foster home. She volunteers a lot both to help others and to hide the crippling depression of taking on so many burdens. This however has still reared it ugly head in her eating habits leading to her heavy build.
After she gets sucked into the superhero role she one night hears a endless chanting coming from a box of things she had left from her parents among which is her grandfather's backpack. This backpack is a pocket dimension but beyond that time within the backpack can slow down greatly as much as 1000 years inside the backpack can pass for every second in the real world if the user so wishes it.
Trailblazer sticks her head inside this backpack and falls in and meets a ancient Native American warrior ancestor this is the spirit that gives the backpack its power. He offers to train her inside the backpack much like Goku in DragonballZ using the Hyperbolic Time Chamber to do a years worth of training in only a day.
Trailblazer takes him up on his offer and for the next 5 years or 5 hours in reality she is put through a grueling training regimen that turns the overweight teenager into a toned though still “thic” warrior. She is gifted a Spirit Tomahawk to serve as her permanent weapon that is always at her side as a symbol of completing her training and the new connection that she has with her ancestors.
Though armed with this Tomahawk she still can receive or summon weapons from her backpack though her control of this ability right now is limited to simple melee weapons or bows and arrows unless she has time to sit down and focus on the backpack completely to summon a more complex object like a gun and its ammo.
B-Negitive is where I finally threw in the towel. I have no idea who this Michael Morbius is and I couldn't see of any redeeming character trait or feature to draw from. Maybe if he was more human I could do a teenage Blade but I don't know how as a upstart writer to pull that off from the current state without just scraping the character completely.
I'm looking for opinions and feedback as I have little else to do while on shelter-in-place and when I posted this in Marvel I got nothing after 5 days, I'm really curious to see if I was on to something.
submitted by Hybris51129 to comicbooks [link] [comments]

Some informative responses from Colin and Andy from the just-concluded Nano AMA at the Atomic Wallet Telegram group

The AMA ran today from 13:00 - 14:20 UTC, with Colin and Andy. I've copied over some of their responses that I found give me better insight into Nano. Their responses are in italics. Responses to different questions are separated by double spaces. Colin's responses are listed first, followed by Andy's. Sorry I couldn't copy over the questions as well. I've added my comments in places.
From Colin:
PoW coins have done a good marketing that the energy expenditure makes your coins more secure but it’s really unnecessory. PoW coins need to continue expending work because if they stop, their security parameter erodes.
Nano has no such problem, once an election for a transaction is complete, it’s confirmed. If it sits there it stays confirmed and it doesn’t need any extra effort. Wow, put that way, Bitcoin seems unsustainable in the long term when there is an alternative like Nano.

Yes the circulating supply is forever like this. The reason it can’t change is because nano transactions can only send your current balance or less to someone else, this means new coins can never be injected in to the system. Interesting design reason new Nano can't be minted.

Volatility is a focus with all cryptocurrencies and it comes from low volume, it’s not intrinsic to cryptocurrency itself. To cure low volume our focus is integrating it in to parts of the economy where it solves a problem, rather than just emulating credit cards etc.
Not having fees in the network puts us in a very good position for buying beer, for example. Typically credit card providers will charge 2-5% for a purchase, maybe even more, and it tight margin businesses that make 2-5% profit anyway, this is huge. A lot of Reddit discussion on crypto adoption considers only user experience and overlooks benefits to merchants.

Nano is purpose built to be the fastest and most decentralized currency around. Our transactions settle in less than 1 second and it’s all done on a network with no fees, and a tiny environmental footprint
Decentralization is an essential focus for us, many other cryptocurrencies can get fast or low cost, but they can’t also maintain decentralization which I think we do very well.
Well the sustainability comes from 2 main parts. We have a laser sharp focus on being the most efficient currency. This means our development stays focused and eventually the amount of things going in to the code base will trend downward; once we’ve achieved the goal we just have to make things more efficient.
The second part of sustainability is our Open Representative Voting which is our replacement for PoW mining. We saw the energy expenditure as something that would come in conflict with any system that would attain high adoption so our goal was to get the same or better decentralization benefits and also have a low energy footprint. We think we achieved that goal as our representatives are all over the world under many different organizations. A healthy decentralized representative set is good for long term sustainability.

And on the simplicity, nano is probably one of the easiest cryptocurrencies to use. There are no fees to calculate, the UX impact of entering a fee is greatly understated. How much should the fee be? Does my grandma know what network load is? What does it mean with respect to fee?
Nano simply has accounts and balances, you send and it lands in their wallet in less than a second, nothing can be simpler.

We’re not looking to expand in to defi right now. I have some reservations about it’s viability. One thing I’ve noticed in my many years of seeing technology evolution is to not try and change 2 things at once. We don’t want to simultaneously change the currency people use and also change how finances are done. First change the currency, then change the finances.
I think Libra suffers from a market mis-assesment. Essentially what they’re claiming is be a multi-currency bank account for every facebook user. Getting users electronic bank accounts isn’t a technology problem, it’s a regulatory and logistics problem. Since Facebook is essentially being a bank for people, they’re going to be required to comply with KYC requirements. Sending/receiving isn’t going to be open as it is in cryptocurrency because of AML requirements. People are not going to have access to the system in remote areas because how do they deposit or more importantly withdraw local currency from their Libra accounts.
I think privacy is a big concern with our transactions and credit card purchases and it’s only getting worse. Letting Facebook/Libra know all your purchase history I think is a huge mistake.
I think it also doesn’t fundamentally solve the central banking problem where they can print more money and inflate the currency supply. I see this behavior as a fundamentally unethical thing that cryptocurrency solves and Libra is taking a huge step back on that.
I don’t see anything compelling about it and I don’t see long term viability.

I think disk usage is going to be a low concern long term. The goal with Nano is to be a widely used commercial grade currency so the representatives will be banks and other financial institutions, universities, and tech companies. Considering how much youtube, instagram, and other social media data is created each day, I don’t think the ledger size will be a long-term limiting factor. Looks like the role of hobbyists in running nodes will diminish with widening adoption.

Nano’s value is being the fastest, most efficient currency around. Entreprenuers make use of natural market incentives / natural efficiencies to make money on a business.
Cryptocurrency has distorted that term a bit with something more closely resembling subsidies. The transaction fees and block rewards are subsidizing the security parameter and processing prioritization. PoW chains need this subsidy because their security parameter costs a lot. Additionally we’ve seen miners work to limit the network’s throughput in order to rent-seek on the limited transaction space. Damn, talk about unaligned incentives between users and miners.
The people we’re looking for are the entreprenuers that know how to make use of a faster, lower cost currency.

Yes, having a fixed supply is an essential component of currency. If people can add more currency to the system, they’re taking value away from everyone else in that process. It’s unfair and unethical.
1 Nano actually can be divided down very small so there’s no risk of not having enough coins.

In this response, Colin is addressing a question about Steem and other dPoS systems. One major difference with Nano consensus is: having more Nano does not get you more Nano, there are no rewards for holding Nano. Holding nano doesn’t give people voting privledges on network changes, or any other centralizing component associated with holding.
Another big difference is voting in nano does not produce blocks, it chooses between conflicting blocks that a user publishes. If you don’t attempt to double-spend, your transactions cannot be voted against.

From Andy:
1. The faucet did indeed seed Nano's amazing international communities, and the contributions from around the world to the project have been unbelievable over that last 2.5 years. Communities are still active, engaged and building 💪
2. The effects of Nano being added to the Atomic Wallet (and other multi-currency wallets) is two fold. It increases the accessibility and convenience of storing Nano alongside other coins and also helps to disperse voting weight across a wider spread of representatives - increasing decentralization!

We certainly feel that Nano possesses far and away the best fundamentals, democratic approach to decentralization, and user experience.
Being fully distributed and operating on a the mainnet since 2015 is also very important, and puts Nano way ahead of many other projects making bold claims about future potential.
Nano is here today, and works as one would expect the digital money would!

Privacy is an attractive proposition to users of digital money for obvious reasons, it can be very important. Our position towards privacy is more conservative as we have seen many more hurdles to mainstream adoption being put in front of privacy-based projects.
With that being said, there are eyes towards the technical implications of introducing privacy, but it is extremely difficult to do this without incurring slowdowns to settlement times.
Throughout 2019 we were able to make significant progress in helping some of the more well-established cryptocurrency services such as exchanges, fiat gateways, payment platforms, and wallets- like Atomic 😄, to understand and integrate Nano. This proliferation of Nano across the space has ensured that it is increasingly more convenient for users and merchants to access and begin using Nano for payments.
submitted by Live_Magnetic_Air to nanocurrency [link] [comments]

DFINITY Research Report

DFINITY Research Report
Author: Gamals Ahmed, CoinEx Business Ambassador
ABSTRACT
The DFINITY blockchain computer provides a secure, performant and flexible consensus mechanism. At its core, DFINITY contains a decentralized randomness beacon, which acts as a verifiable random function (VRF) that produces a stream of outputs over time. The novel technique behind the beacon relies on the existence of a unique-deterministic, non-interactive, DKG-friendly threshold signatures scheme. The only known examples of such a scheme are pairing-based and derived from BLS.
The DFINITY blockchain is layered on top of the DFINITY beacon and uses the beacon as its source of randomness for leader selection and leader ranking. A “weight” is attributed to a chain based on the ranks of the leaders who propose the blocks in the chain, and that weight is used to select between competing chains. The DFINITY blockchain is layered on top of the DFINITY beacon and uses the beacon as its source of randomness for leader selection and leader ranking blockchain is further hardened by a notarization process which dramatically improves the time to finality and eliminates the nothing-at-stake and selfish mining attacks.
DFINITY consensus algorithm is made to scale through continuous quorum selections driven by the random beacon. In practice, DFINITY achieves block times of a few seconds and transaction finality after only two confirmations. The system gracefully handles temporary losses of network synchrony including network splits, while it is provably secure under synchrony.

1.INTRODUCTION

DFINITY is building a new kind of public decentralized cloud computing resource. The company’s platform uses blockchain technology which is aimed at building a new kind of public decentralized cloud computing resource with unlimited capacity, performance and algorithmic governance shared by the world, with the capability to power autonomous self-updating software systems, enabling organizations to design and deploy custom-tailored cloud computing projects, thereby reducing enterprise IT system costs by 90%.
DFINITY aims to explore new territory and prove that the blockchain opportunity is far broader and deeper than anyone has hitherto realized, unlocking the opportunity with powerful new crypto.
Although a standalone project, DFINITY is not maximalist minded and is a great supporter of Ethereum.
The DFINITY blockchain computer provides a secure, performant and flexible consensus mechanism. At its core, DFINITY contains a decentralized randomness beacon, which acts as a verifiable random function (VRF) that produces a stream of outputs over time. The novel technique behind the beacon relies on the existence of a unique-deterministic, non-interactive, DKG-friendly threshold signatures scheme. The only known examples of such a scheme are pairing-based and derived from BLS.
DFINITY’s consensus mechanism has four layers: notary (provides fast finality guarantees to clients and external observers), blockchain (builds a blockchain from validated transactions via the Probabilistic Slot Protocol driven by the random beacon), random beacon (provides the source of randomness for all higher layers like smart contract applications), and identity (provides a registry of all clients).
DFINITY’s consensus mechanism has four layers

Figure1: DFINITY’s consensus mechanism layers
1. Identity layer:
Active participants in the DFINITY Network are called clients. Where clients are registered with permanent identities under a pseudonym. Moreover, DFINITY supports open membership by providing a protocol for registering new clients by depositing a stake with an insurance period. This is the responsibility of the first layer.
2. Random Beacon layer:
Provides the source of randomness (VRF) for all higher layers including ap- plications (smart contracts). The random beacon in the second layer is an unbiasable, verifiable random function (VRF) that is produced jointly by registered clients. Each random output of the VRF is unpredictable by anyone until just before it becomes avail- able to everyone. This is a key technology of the DFINITY system, which relies on a threshold signature scheme with the properties of uniqueness and non-interactivity.

https://preview.redd.it/hkcf53ic05e51.jpg?width=441&format=pjpg&auto=webp&s=44d45c9602ee630705ce92902b8a8379201d8111
3. Blockchain layer:
The third layer deploys the “probabilistic slot protocol” (PSP). This protocol ranks the clients for each height of the chain, in an order that is derived determin- istically from the unbiased output of the random beacon for that height. A weight is then assigned to block proposals based on the proposer’s rank such that blocks from clients at the top of the list receive a higher weight. Forks are resolved by giving favor to the “heaviest” chain in terms of accumulated block weight — quite sim- ilar to how traditional proof-of-work consensus is based on the highest accumulated amount of work.
The first advantage of the PSP protocol is that the ranking is available instantaneously, which allows for a predictable, constant block time. The second advantage is that there is always a single highest-ranked client, which allows for a homogenous network bandwidth utilization. Instead, a race between clients would favor a usage in bursts.
4. Notarization layer:
Provides fast finality guarantees to clients and external observers. DFINITY deploys the novel technique of block notarization in its fourth layer to speed up finality. A notarization is a threshold signature under a block created jointly by registered clients. Only notarized blocks can be included in a chain. Of all RSA-based alternatives exist but suffer from an impracticality of setting up the thresh- old keys without a trusted dealer.
DFINITY achieves its high speed and short block times exactly because notarization is not full consensus.
DFINITY does not suffer from selfish mining attack or a problem nothing at stake because the authentication step is impossible for the opponent to build and maintain a series of linked and trusted blocks in secret.
DFINITY’s consensus is designed to operate on a network of millions of clients. To en- able scalability to this extent, the random beacon and notarization protocols are designed such as that they can be safely and efficiently delegated to a committee

1.1 OVERVIEW ABOUT DFINITY

DFINITY is a blockchain-based cloud-computing project that aims to develop an open, public network, referred to as the “internet computer,” to host the next generation of software and data. and it is a decentralized and non-proprietary network to run the next generation of mega-applications. It dubbed this public network “Cloud 3.0”.
DFINITY is a third generation virtual blockchain network that sets out to function as an “intelligent decentralised cloud,”¹ strongly focused on delivering a viable corporate cloud solution. The DFINITY project is overseen, supported and promoted by DFINITY Stiftung a not-for-profit foundation based in Zug, Switzerland.
DFINITY is a decentralized network design whose protocols generate a reliable “virtual blockchain computer” running on top of a peer-to-peer network upon which software can be installed and can operate in the tamperproof mode of smart contracts.
DFINITY introduces algorithmic governance in the form of a “Blockchain Nervous System” that can protect users from attacks and help restart broken systems, dynamically optimize network security and efficiency, upgrade the protocol and mitigate misuse of the platform, for example by those wishing to run illegal or immoral systems.
DFINITY is an Ethereum-compatible smart contract platform that is implementing some revolutionary ideas to address blockchain performance, scaling, and governance. Whereas
DFINITY could pose a credible threat to Ethereum’s extinction, the project is pursuing a coevolutionary strategy by contributing funding and effort to Ethereum projects and freely offering their technology to Ethereum for adoption. DFINITY has labeled itself Ethereum’s “crazy sister” to express it’s close genetic resemblance to Ethereum, differentiated by its obsession with performance and neuron-inspired governance model.
Dfinity raised $61 million from Andreesen Horowitz and Polychain Capital in a February 2018 funding round. At the time, Dfinity said it wanted to create an “internet computer” to cut the costs of running cloud-based business applications. A further $102 million funding round in August 2018 brought the project’s total funding to $195 million.
In May 2018, Dfinity announced plans to distribute around $35 million worth of Dfinity tokens in an airdrop. It was part of the company’s plan to create a “Cloud 3.0.” Because of regulatory concerns, none of the tokens went to US residents.
DFINITY be broadening and strengthening the EVM ecosystem by giving applications a choice of platforms with different characteristics. However, if DFINITY succeeds in delivering a fully EVM-compatible smart contract platform with higher transaction throughput, faster confirmation times, and governance mechanisms that can resolve public disputes without causing community splits, then it will represent a clearly superior choice for deploying new applications and, as its network effects grow, an attractive place to bring existing ones. Of course the challenge for DFINITY will be to deliver on these promises while meeting the security demands of a public chain with significant value at risk.

1.1.1 DFINITY FUTURE

  • DFINITY aims to explore new blockchain territory related to the original goals of the Ethereum project and is sometimes considered “Ethereum’s crazy sister.”
  • DFINITY is developing blockchain-based infrastructure to support a new style of the internet (akin to Ethereum’s “World Computer”), one in which the internet itself will support software applications and data rather than various cloud hosting providers.
  • The project suggests this reinvented software platform can simplify the development of new software systems, reduce the human capital needed to maintain and secure data, and preserve user data privacy.
  • Dfinity aims to reduce the costs of cloud services by creating a decentralized “internet computer” which may launch in 2020
  • Dfinity claims transactions on its network are finalized in 3–5 seconds, compared to 1 hour for Bitcoin and 10 minutes for Ethereum.

1.1.2 DFINITY’S VISION

DFINITY’s vision is its new internet infrastructure can support a wide variety of end-user and enterprise applications. Social media, messaging, search, storage, and peer-to-peer Internet interactions are all examples of functionalities that DFINITY plans to host atop its public Web 3.0 cloud-like computing resource. In order to provide the transaction and data capacity necessary to support this ambitious vision, DFINITY features a unique consensus model (dubbed Threshold Relay) and algorithmic governance via its Blockchain Nervous System (BNS) — sometimes also referred to as the Network Nervous System or NNS.

1.2 DFINITY COMMUNITY

The DFINITY community brings people and organizations together to learn and collaborate on products that help steward the next-generation of internet software and services. The Internet Computer allows developers to take on the monopolization of the internet, and return the internet back to its free and open roots. We’re committed to connecting those who believe the same through our events, content, and discussions.

https://preview.redd.it/0zv64fzf05e51.png?width=637&format=png&auto=webp&s=e2b17365fae3c679a32431062d8e3c00a57673cf

1.3 DFINITY ROADMAP (TIMELINE) February 15, 2017

February 15, 2017
Ethereum based community seed round raises 4M Swiss francs (CHF)
The DFINITY Stiftung, a not-for-profit foundation entity based in Zug, Switzerland, raised the round. The foundation held $10M of assets as of April 2017.
February 8, 2018
Dfinity announces a $61M fundraising round led by Polychain Capital and Andreessen Horowitz
The round $61M round led by Polychain Capital and Andreessen Horowitz, along with an DFINITY Ecosystem Venture Fund which will be used to support projects developing on the DFINITY platform, and an Ethereum based raise in 2017 brings the total funding for the project over $100 million. This is the first cryptocurrency token that Andressen Horowitz has invested in, led by Chris Dixon.
August 2018
Dfinity raises a $102,000,000 venture round from Multicoin Capital, Village Global, Aspect Ventures, Andreessen Horowitz, Polychain Capital, Scalar Capital, Amino Capital and SV Angel.
January 23, 2020
Dfinity launches an open source platform aimed at the social networking giants

2.DFINITY TECHNOLOGY

Dfinity is building what it calls the internet computer, a decentralized technology spread across a network of independent data centers that allows software to run anywhere on the internet rather than in server farms that are increasingly controlled by large firms, such as Amazon Web Services or Google Cloud. This week Dfinity is releasing its software to third-party developers, who it hopes will start making the internet computer’s killer apps. It is planning a public release later this year.
At its core, the DFINITY consensus mechanism is a variation of the Proof of Stake (PoS) model, but offers an alternative to traditional Proof of Work (PoW) and delegated PoS (dPoS) networks. Threshold Relay intends to strike a balance between inefficiencies of decentralized PoW blockchains (generally characterized by slow block times) and the less robust game theory involved in vote delegation (as seen in dPoS blockchains). In DFINITY, a committee of “miners” is randomly selected to add a new block to the chain. An individual miner’s probability of being elected to the committee proposing and computing the next block (or blocks) is proportional to the number of dfinities the miner has staked on the network. Further, a “weight” is attributed to a DFINITY chain based on the ranks of the miners who propose blocks in the chain, and that weight is used to choose between competing chains (i.e. resolve chain forks).
A decentralized random beacon manages the random selection process of temporary block producers. This beacon is a Variable Random Function (VRF), which is a pseudo-random function that provides publicly verifiable proofs of its outputs’ correctness. A core component of the random beacon is the use of Boneh-Lynn-Shacham (BLS) signatures. By leveraging the BLS signature scheme, the DFINITY protocol ensures no actor in the network can determine the outcome of the next random assignment.
Dfinity is introducing a new standard, which it calls the internet computer protocol (ICP). These new rules let developers move software around the internet as well as data. All software needs computers to run on, but with ICP the computers could be anywhere. Instead of running on a dedicated server in Google Cloud, for example, the software would have no fixed physical address, moving between servers owned by independent data centers around the world. “Conceptually, it’s kind of running everywhere,” says Dfinity engineering manager Stanley Jones.
DFINITY also features a native programming language, called ActorScript (name may be subject to change), and a virtual machine for smart contract creation and execution. The new smart contract language is intended to simplify the management of application state for programmers via an orthogonal persistence environment (which means active programs are
not required to retrieve or save their state). All ActorScript contracts are eventually compiled down to WebAssembly instructions so the DFINITY virtual machine layer can execute the logic of applications running on the network. The advantage of using the WebAssembly standard is that all major browsers support it and a variety of programming languages can compile down to Wasm (not just ActorScript).
Dfinity is moving fast. Recently, Dfinity showed off a TikTok clone called CanCan. In January it demoed a LinkedIn-alike called LinkedUp. Neither app is being made public, but they make a convincing case that apps made for the internet computer can rival the real things.

2.1 DFINITY CORE APPLICATIONS

The DFINITY cloud has two core applications:
  1. Enabling the re-engineering of business: DFINITY ambitiously aims to facilitate the re-engineering of mass-market services (such as Web Search, Ridesharing Services, Messaging Services, Social Media, Supply Chain, etc) into open source businesses that leverage autonomous software and decentralised governance systems to operate and update themselves more efficiently.
  2. Enable the re-engineering of enterprise IT systems to reduce costs: DFINITY seeks to re-engineer enterprise IT systems to take advantage of the unique properties that blockchain computer networks provide.
At present, computation on blockchain-based computer networks is far more expensive than traditional, centralised solutions (Amazon Web Services, Microsoft Azure, Google Cloud Platform, etc). Despite increasing computational cost, DFINITY intends to lower net costs “by 90% or more” through reducing the human capital cost associated with sustaining and supporting these services.
Whilst conceptually similar to Ethereum, DFINITY employs original and new cryptography methods and protocols (crypto:3) at the network level, in concert with AI and network-fuelled systemic governance (Blockchain Nervous System — BNS) to facilitate Corporate adoption.
DFINITY recognises that different users value different properties and sees itself as more of a fully compatible extension of the Ethereum ecosystem rather than a competitor of the Ethereum network.
In the future, DFINITY hopes that much of their “new crypto might be used within the Ethereum network and are also working hard on shared technology components.”
As the DFINITY project develops over time, the DFINITY Stiftung foundation intends to steadily increase the BNS’ decision-making responsibilities over time, eventually resulting in the dissolution of its own involvement entirely, once the BNS is sufficiently sophisticated.
DFINITY consensus mechanism is a heavily optimized proof of stake (PoS) model. It places a strong emphasis on transaction finality through implementing a Threshold Relay technique in conjunction with the BLS signature scheme and a notarization method to address many of the problems associated with PoS consensus.

2.2 THRESHOLD RELAY

As a public cloud computing resource, DFINITY targets business applications by substantially reducing cloud computing costs for IT systems. They aim to achieve this with a highly scalable and powerful network with potentially unlimited capacity. The DFINITY platform is chalk full of innovative designs and features like their Blockchain Nervous System (BNS) for algorithmic governance.
One of the primary components of the platform is its novel Threshold Relay Consensus model from which randomness is produced, driving the other systems that the network depends on to operate effectively. The consensus system was first designed for a permissioned participation model but can be paired with any method of Sybil resistance for an open participation model.
“The Threshold Relay is the mechanism by which Dfinity randomly samples replicas into groups, sets the groups (committees) up for threshold operation, chooses the current committee, and relays from one committee to the next is called the threshold relay.”
Threshold Relay consists of four layers (As mentioned previously):
  1. Notary layer, which provides fast finality guarantees to clients and external observers and eliminates nothing-at-stake and selfish mining attacks, providing Sybil attack resistance.
  2. Blockchain layer that builds a blockchain from validated transactions via the Probabilistic Slot Protocol driven by the random beacon.
  3. Random beacon, which as previously covered, provides the source of randomness for all higher layers like the blockchain layer smart contract applications.
  4. Identity layer that provides a registry of all clients.

2.2.1 HOW DOES THRESHOLD RELAY WORK?

Threshold Relay produces an endogenous random beacon, and each new value defines random group(s) of clients that may independently try and form into a “threshold group”. The composition of each group is entirely random such that they can intersect and clients can be presented in multiple groups. In DFINITY, each group is comprised of 400 members. When a group is defined, the members attempt to set up a BLS threshold signature system using a distributed key generation protocol. If they are successful within some fixed number of blocks, they then register the public key (“identity”) created for their group on the global blockchain using a special transaction, such that it will become part of the set of active groups in a following “epoch”. The network begins at “genesis” with some number of predefined groups, one of which is nominated to create a signature on some default value. Such signatures are random values — if they were not then the group’s signatures on messages would be predictable and the threshold signature system insecure — and each random value produced thus is used to select a random successor group. This next group then signs the previous random value to produce a new random value and select another group, relaying between groups ad infinitum and producing a sequence of random values.
In a cryptographic threshold signature system a group can produce a signature on a message upon the cooperation of some minimum threshold of its members, which is set to 51% in the DFINITY network. To produce the threshold signature, group members sign the message
individually (here the preceding group’s threshold signature) creating individual “signature shares” that are then broadcast to other group members. The group threshold signature can be constructed upon combination of a sufficient threshold of signature shares. So for example, if the group size is 400, if the threshold is set at 201 any client that collects that many shares will be able to construct the group’s signature on the message. Other group members can validate each signature share, and any client using the group’s public key can validate the single group threshold signature produced by combining them. The magic of the BLS scheme is that it is “unique and deterministic” meaning that from whatever subset of group members the required number of signature shares are collected, the single threshold signature created is always the same and only a single correct value is possible.
Consequently, the sequence of random values produced is entirely deterministic and unmanipulable, and signatures generated by relaying between groups produces a Verifiable Random Function, or VRF. Although the sequence of random values is pre-determined given some set of participating groups, each new random value can only be produced upon the minimal agreement of a threshold of the current group. Conversely, in order for relaying to stall because a random number was not produced, the number of correct processes must be below the threshold. Thresholds are configured so that this is extremely unlikely. For example, if the group size is set to 400, and the threshold is 201, 200 or more of the processes must become faulty to prevent production. If there are 10,000 processes in the network, of which 3,000 are faulty, the probability this will occur is less than 10e-17.

2.3 DFINITY TOKEN

The DFINITY blockchain also supports a native token, called dfinities (DFN), which perform multiple roles within the network, including:
  1. Fuel for deploying and running smart contracts.
  2. Security deposits (i.e. staking) that enable participation in the BNS governance system.
  3. Security deposits that allow client software or private DFINITY cloud networks to connect to the public network.
Although dfinities will end up being assigned a value by the market, the DFINITY team does not intend for DFN to act as a currency. Instead, the project has envisioned PHI, a “next-generation” crypto-fiat scheme, to act as a stable medium of exchange within the DFINITY ecosystem.
Neuron operators can earn Dfinities by participating in network-wide votes, which could be concerning protocol upgrades, a new economic policy, etc. DFN rewards for participating in the governance system are proportional to the number of tokens staked inside a neuron.

2.4 SCALABILITY

DFINITY is constantly developing with a structure that separates consensus, validation, and storage into separate layers. The storage layer is divided into multiple strings, each of which is responsible for processing transactions that occur in the fragment state. The verification layer is responsible for combining hashes of all fragments in a Merkle-like structure that results in a global state fractionation that is stored in blocks in the top-level chain.

2.5 DFINITY CONSENSUS ALGORITHM

The single most important aspect of the user experience is certainly the time required before a transaction becomes final. This is not solved by a short block time alone — Dfinity’s team also had to reduce the number of confirmations required to a small constant. DFINITY moreover had to provide a provably secure proof-of-stake algorithm that scales to millions of active participants without compromising any bit on decentralization.
Dfinity soon realized that the key to scalability lay in having an unmanipulable source of randomness available. Hence they built a scalable decentralized random beacon, based on what they call the Threshold Relay technique, right into the foundation of the protocol. This strong foundation drives a scalable and fast consensus layer: On top of the beacon runs a blockchain which utilizes notarization by threshold groups to achieve near-instant finality. Details can be found in the overview paper that we are releasing today.
The roots of the DFINITY consensus mechanism date back to 2014 when thair Chief Scientist, Dominic Williams, started to look for more efficient ways to drive large consensus networks. Since then, much research has gone into the protocol and it took several iterations to reach its current design.
For any practical consensus system the difficulty lies in navigating the tight terrain that one is given between the boundaries imposed by theoretical impossibility-results and practical performance limitations.
The first key milestone was the novel Threshold Relay technique for decentralized, deterministic randomness, which is made possible by certain unique characteristics of the BLS signature system. The next breakthrough was the notarization technique, which allows DFINITY consensus to solve the traditional problems that come with proof-of-stake systems. Getting the security proofs sound was the final step before publication.
DFINITY consensus has made the proper trade-offs between the practical side (realistic threat models and security assumptions) and the theoretical side (provable security). Out came a flexible, tunable algorithm, which we expect will establish itself as the best performing proof-of-stake algorithm. In particular, having the built-in random beacon will prove to be indispensable when building out sharding and scalable validation techniques.

2.6 LINKEDUP

The startup has rather cheekily called this “an open version of LinkedIn,” the Microsoft-owned social network for professionals. Unlike LinkedIn, LinkedUp, which runs on any browser, is not owned or controlled by a corporate entity.
LinkedUp is built on Dfinity’s so-called Internet Computer, its name for the platform it is building to distribute the next generation of software and open internet services.
The software is hosted directly on the internet on a Switzerland-based independent data center, but in the concept of the Internet Computer, it could be hosted at your house or mine. The compute power to run the application LinkedUp, in this case — is coming not from Amazon AWS, Google Cloud or Microsoft Azure, but is instead based on the distributed architecture that Dfinity is building.
Specifically, Dfinity notes that when enterprises and developers run their web apps and enterprise systems on the Internet Computer, the content is decentralized across a minimum of four or a maximum of an unlimited number of nodes in Dfinity’s global network of independent data centers.
Dfinity is an open source for LinkedUp to developers for creating other types of open internet services on the architecture it has built.
“Open Social Network for Professional Profiles” suggests that on Dfinity model one can create “Open WhatsApp”, “Open eBay”, “Open Salesforce” or “Open Facebook”.
The tools include a Canister Software Developer Kit and a simple programming language called Motoko that is optimized for Dfinity’s Internet Computer.
“The Internet Computer is conceived as an alternative to the $3.8 trillion legacy IT stack, and empowers the next generation of developers to build a new breed of tamper-proof enterprise software systems and open internet services. We are democratizing software development,” Williams said. “The Bronze release of the Internet Computer provides developers and enterprises a glimpse into the infinite possibilities of building on the Internet Computer — which also reflects the strength of the Dfinity team we have built so far.”
Dfinity says its “Internet Computer Protocol” allows for a new type of software called autonomous software, which can guarantee permanent APIs that cannot be revoked. When all these open internet services (e.g. open versions of WhatsApp, Facebook, eBay, Salesforce, etc.) are combined with other open software and services it creates “mutual network effects” where everyone benefits.
On 1 November, DFINITY has released 13 new public versions of the SDK, to our second major milestone [at WEF Davos] of demoing a decentralized web app called LinkedUp on the Internet Computer. Subsequent milestones towards the public launch of the Internet Computer will involve:
  1. On boarding a global network of independent data centers.
  2. Fully tested economic system.
  3. Fully tested Network Nervous Systems for configuration and upgrades

2.7 WHAT IS MOTOKO?

Motoko is a new software language being developed by the DFINITY Foundation, with an accompanying SDK, that is designed to help the broadest possible audience of developers create reliable and maintainable websites, enterprise systems and internet services on the Internet Computer with ease. By developing the Motoko language, the DFINITY Foundation will ensure that a language that is highly optimized for the new environment is available. However, the Internet Computer can support any number of different software frameworks, and the DFINITY Foundation is also working on SDKs that support the Rust and C languages. Eventually, it is expected there will be many different SDKs that target the Internet Computer.
Full article
submitted by CoinEx_Institution to u/CoinEx_Institution [link] [comments]

Where is Bitcoin Going and When?

Where is Bitcoin Going and When?

The Federal Reserve and the United States government are pumping extreme amounts of money into the economy, already totaling over $484 billion. They are doing so because it already had a goal to inflate the United States Dollar (USD) so that the market can continue to all-time highs. It has always had this goal. They do not care how much inflation goes up by now as we are going into a depression with the potential to totally crash the US economy forever. They believe the only way to save the market from going to zero or negative values is to inflate it so much that it cannot possibly crash that low. Even if the market does not dip that low, inflation serves the interest of powerful people.
The impending crash of the stock market has ramifications for Bitcoin, as, though there is no direct ongoing-correlation between the two, major movements in traditional markets will necessarily affect Bitcoin. According to the Blockchain Center’s Cryptocurrency Correlation Tool, Bitcoin is not correlated with the stock market. However, when major market movements occur, they send ripples throughout the financial ecosystem which necessary affect even ordinarily uncorrelated assets.
Therefore, Bitcoin will reach X price on X date after crashing to a price of X by X date.

Stock Market Crash

The Federal Reserve has caused some serious consternation with their release of ridiculous amounts of money in an attempt to buoy the economy. At face value, it does not seem to have any rationale or logic behind it other than keeping the economy afloat long enough for individuals to profit financially and politically. However, there is an underlying basis to what is going on which is important to understand in order to profit financially.
All markets are functionally price probing systems. They constantly undergo a price-discovery process. In a fiat system, money is an illusory and a fundamentally synthetic instrument with no intrinsic value – similar to Bitcoin. The primary difference between Bitcoin is the underlying technology which provides a slew of benefits that fiat does not. Fiat, however, has an advantage in being able to have the support of powerful nation-states which can use their might to insure the currency’s prosperity.
Traditional stock markets are composed of indices (pl. of index). Indices are non-trading market instruments which are essentially summaries of business values which comprise them. They are continuously recalculated throughout a trading day, and sometimes reflected through tradable instruments such as Exchange Traded Funds or Futures. Indices are weighted by market capitalizations of various businesses.
Price theory essentially states that when a market fails to take out a new low in a given range, it will have an objective to take out the high. When a market fails to take out a new high, it has an objective to make a new low. This is why price-time charts go up and down, as it does this on a second-by-second, minute-by-minute, day-by-day, and even century-by-century basis. Therefore, market indices will always return to some type of bull market as, once a true low is formed, the market will have a price objective to take out a new high outside of its’ given range – which is an all-time high. Instruments can only functionally fall to zero, whereas they can grow infinitely.
So, why inflate the economy so much?
Deflation is disastrous for central banks and markets as it raises the possibility of producing an overall price objective of zero or negative values. Therefore, under a fractional reserve system with a fiat currency managed by a central bank – the goal of the central bank is to depreciate the currency. The dollar is manipulated constantly with the intention of depreciating its’ value.
Central banks have a goal of continued inflated fiat values. They tend to ordinarily contain it at less than ten percent (10%) per annum in order for the psyche of the general populace to slowly adjust price increases. As such, the markets are divorced from any other logic. Economic policy is the maintenance of human egos, not catering to fundamental analysis. Gross Domestic Product (GDP) growth is well-known not to be a measure of actual growth or output. It is a measure of increase in dollars processed. Banks seek to produce raising numbers which make society feel like it is growing economically, making people optimistic. To do so, the currency is inflated, though inflation itself does not actually increase growth. When society is optimistic, it spends and engages in business – resulting in actual growth. It also encourages people to take on credit and debts, creating more fictional fiat.
Inflation is necessary for markets to continue to reach new heights, generating positive emotional responses from the populace, encouraging spending, encouraging debt intake, further inflating the currency, and increasing the sale of government bonds. The fiat system only survives by generating more imaginary money on a regular basis.
Bitcoin investors may profit from this by realizing that stock investors as a whole always stand to profit from the market so long as it is managed by a central bank and does not collapse entirely. If those elements are filled, it has an unending price objective to raise to new heights. It also allows us to realize that this response indicates that the higher-ups believe that the economy could crash in entirety, and it may be wise for investors to have multiple well-thought-out exit strategies.

Economic Analysis of Bitcoin

The reason why the Fed is so aggressively inflating the economy is due to fears that it will collapse forever or never rebound. As such, coupled with a global depression, a huge demand will appear for a reserve currency which is fundamentally different than the previous system. Bitcoin, though a currency or asset, is also a market. It also undergoes a constant price-probing process. Unlike traditional markets, Bitcoin has the exact opposite goal. Bitcoin seeks to appreciate in value and not depreciate. This has a quite different affect in that Bitcoin could potentially become worthless and have a price objective of zero.
Bitcoin was created in 2008 by a now famous mysterious figure known as Satoshi Nakamoto and its’ open source code was released in 2009. It was the first decentralized cryptocurrency to utilize a novel protocol known as the blockchain. Up to one megabyte of data may be sent with each transaction. It is decentralized, anonymous, transparent, easy to set-up, and provides myriad other benefits. Bitcoin is not backed up by anything other than its’ own technology.
Bitcoin is can never be expected to collapse as a framework, even were it to become worthless. The stock market has the potential to collapse in entirety, whereas, as long as the internet exists, Bitcoin will be a functional system with a self-authenticating framework. That capacity to persist regardless of the actual price of Bitcoin and the deflationary nature of Bitcoin means that it has something which fiat does not – inherent value.
Bitcoin is based on a distributed database known as the “blockchain.” Blockchains are essentially decentralized virtual ledger books, replete with pages known as “blocks.” Each page in a ledger is composed of paragraph entries, which are the actual transactions in the block.
Blockchains store information in the form of numerical transactions, which are just numbers. We can consider these numbers digital assets, such as Bitcoin. The data in a blockchain is immutable and recorded only by consensus-based algorithms. Bitcoin is cryptographic and all transactions are direct, without intermediary, peer-to-peer.
Bitcoin does not require trust in a central bank. It requires trust on the technology behind it, which is open-source and may be evaluated by anyone at any time. Furthermore, it is impossible to manipulate as doing so would require all of the nodes in the network to be hacked at once – unlike the stock market which is manipulated by the government and “Market Makers”. Bitcoin is also private in that, though the ledge is openly distributed, it is encrypted. Bitcoin’s blockchain has one of the greatest redundancy and information disaster recovery systems ever developed.
Bitcoin has a distributed governance model in that it is controlled by its’ users. There is no need to trust a payment processor or bank, or even to pay fees to such entities. There are also no third-party fees for transaction processing. As the ledge is immutable and transparent it is never possible to change it – the data on the blockchain is permanent. The system is not easily susceptible to attacks as it is widely distributed. Furthermore, as users of Bitcoin have their private keys assigned to their transactions, they are virtually impossible to fake. No lengthy verification, reconciliation, nor clearing process exists with Bitcoin.
Bitcoin is based on a proof-of-work algorithm. Every transaction on the network has an associated mathetical “puzzle”. Computers known as miners compete to solve the complex cryptographic hash algorithm that comprises that puzzle. The solution is proof that the miner engaged in sufficient work. The puzzle is known as a nonce, a number used only once. There is only one major nonce at a time and it issues 12.5 Bitcoin. Once it is solved, the fact that the nonce has been solved is made public.
A block is mined on average of once every ten minutes. However, the blockchain checks every 2,016,000 minutes (approximately four years) if 201,600 blocks were mined. If it was faster, it increases difficulty by half, thereby deflating Bitcoin. If it was slower, it decreases, thereby inflating Bitcoin. It will continue to do this until zero Bitcoin are issued, projected at the year 2140. On the twelfth of May, 2020, the blockchain will halve the amount of Bitcoin issued when each nonce is guessed. When Bitcoin was first created, fifty were issued per block as a reward to miners. 6.25 BTC will be issued from that point on once each nonce is solved.
Unlike fiat, Bitcoin is a deflationary currency. As BTC becomes scarcer, demand for it will increase, also raising the price. In this, BTC is similar to gold. It is predictable in its’ output, unlike the USD, as it is based on a programmed supply. We can predict BTC’s deflation and inflation almost exactly, if not exactly. Only 21 million BTC will ever be produced, unless the entire network concedes to change the protocol – which is highly unlikely.
Some of the drawbacks to BTC include congestion. At peak congestion, it may take an entire day to process a Bitcoin transaction as only three to five transactions may be processed per second. Receiving priority on a payment may cost up to the equivalent of twenty dollars ($20). Bitcoin mining consumes enough energy in one day to power a single-family home for an entire week.

Trading or Investing?

The fundamental divide in trading revolves around the question of market structure. Many feel that the market operates totally randomly and its’ behavior cannot be predicted. For the purposes of this article, we will assume that the market has a structure, but that that structure is not perfect. That market structure naturally generates chart patterns as the market records prices in time. In order to determine when the stock market will crash, causing a major decline in BTC price, we will analyze an instrument, an exchange traded fund, which represents an index, as opposed to a particular stock. The price patterns of the various stocks in an index are effectively smoothed out. In doing so, a more technical picture arises. Perhaps the most popular of these is the SPDR S&P Standard and Poor 500 Exchange Traded Fund ($SPY).
In trading, little to no concern is given about value of underlying asset. We are concerned primarily about liquidity and trading ranges, which are the amount of value fluctuating on a short-term basis, as measured by volatility-implied trading ranges. Fundamental analysis plays a role, however markets often do not react to real-world factors in a logical fashion. Therefore, fundamental analysis is more appropriate for long-term investing.
The fundamental derivatives of a chart are time (x-axis) and price (y-axis). The primary technical indicator is price, as everything else is lagging in the past. Price represents current asking price and incorrectly implementing positions based on price is one of the biggest trading errors.
Markets and currencies ordinarily have noise, their tendency to back-and-fill, which must be filtered out for true pattern recognition. That noise does have a utility, however, in allowing traders second chances to enter favorable positions at slightly less favorable entry points. When you have any market with enough liquidity for historical data to record a pattern, then a structure can be divined. The market probes prices as part of an ongoing price-discovery process. Market technicians must sometimes look outside of the technical realm and use visual inspection to ascertain the relevance of certain patterns, using a qualitative eye that recognizes the underlying quantitative nature
Markets and instruments rise slower than they correct, however they rise much more than they fall. In the same vein, instruments can only fall to having no worth, whereas they could theoretically grow infinitely and have continued to grow over time. Money in a fiat system is illusory. It is a fundamentally synthetic instrument which has no intrinsic value. Hence, the recent seemingly illogical fluctuations in the market.
According to trade theory, the unending purpose of a market or instrument is to create and break price ranges according to the laws of supply and demand. We must determine when to trade based on each market inflection point as defined in price and in time as opposed to abandoning the trend (as the contrarian trading in this sub often does). Time and Price symmetry must be used to be in accordance with the trend. When coupled with a favorable risk to reward ratio, the ability to stay in the market for most of the defined time period, and adherence to risk management rules; the trader has a solid methodology for achieving considerable gains.
We will engage in a longer term market-oriented analysis to avoid any time-focused pressure. The Bitcoin market is open twenty-four-hours a day, so trading may be done when the individual is ready, without any pressing need to be constantly alert. Let alone, we can safely project months in advance with relatively high accuracy. Bitcoin is an asset which an individual can both trade and invest, however this article will be focused on trading due to the wide volatility in BTC prices over the short-term.

Technical Indicator Analysis of Bitcoin

Technical indicators are often considered self-fulfilling prophecies due to mass-market psychology gravitating towards certain common numbers yielded from them. They are also often discounted when it comes to BTC. That means a trader must be especially aware of these numbers as they can prognosticate market movements. Often, they are meaningless in the larger picture of things.
  • Volume – derived from the market itself, it is mostly irrelevant. The major problem with volume for stocks is that the US market open causes tremendous volume surges eradicating any intrinsic volume analysis. This does not occur with BTC, as it is open twenty-four-seven. At major highs and lows, the market is typically anemic. Most traders are not active at terminal discretes (peaks and troughs) because of levels of fear. Volume allows us confidence in time and price symmetry market inflection points, if we observe low volume at a foretold range of values. We can rationalize that an absolute discrete is usually only discovered and anticipated by very few traders. As the general market realizes it, a herd mentality will push the market in the direction favorable to defending it. Volume is also useful for swing trading, as chances for swing’s validity increases if an increase in volume is seen on and after the swing’s activation. Volume is steadily decreasing. Lows and highs are reached when volume is lower.
Therefore, due to the relatively high volume on the 12th of March, we can safely determine that a low for BTC was not reached.
  • VIX – Volatility Index, this technical indicator indicates level of fear by the amount of options-based “insurance” in portfolios. A low VIX environment, less than 20 for the S&P index, indicates a stable market with a possible uptrend. A high VIX, over 20, indicates a possible downtrend. VIX is essentially useless for BTC as BTC-based options do not exist. It allows us to predict the market low for $SPY, which will have an indirect impact on BTC in the short term, likely leading to the yearly low. However, it is equally important to see how VIX is changing over time, if it is decreasing or increasing, as that indicates increasing or decreasing fear. Low volatility allows high leverage without risk or rest. Occasionally, markets do rise with high VIX.
As VIX is unusually high, in the forties, we can be confident that a downtrend for the S&P 500 is imminent.
  • RSI (Relative Strength Index): The most important technical indicator, useful for determining highs and lows when time symmetry is not availing itself. Sometimes analysis of RSI can conflict in different time frames, easiest way to use it is when it is at extremes – either under 30 or over 70. Extremes can be used for filtering highs or lows based on time-and-price window calculations. Highly instructive as to major corrective clues and indicative of continued directional movement. Must determine if longer-term RSI values find support at same values as before. It is currently at 73.56.
  • Secondly, RSI may be used as a high or low filter, to observe the level that short-term RSI reaches in counter-trend corrections. Repetitions based on market movements based on RSI determine how long a trade should be held onto. Once a short term RSI reaches an extreme and stay there, the other RSI’s should gradually reach the same extremes. Once all RSI’s are at extreme highs, a trend confirmation should occur and RSI’s should drop to their midpoint.

Trend Definition Analysis of Bitcoin

Trend definition is highly powerful, cannot be understated. Knowledge of trend logic is enough to be a profitable trader, yet defining a trend is an arduous process. Multiple trends coexist across multiple time frames and across multiple market sectors. Like time structure, it makes the underlying price of the instrument irrelevant. Trend definitions cannot determine the validity of newly formed discretes. Trend becomes apparent when trades based in counter-trend inflection points continue to fail.
Downtrends are defined as an instrument making lower lows and lower highs that are recurrent, additive, qualified swing setups. Downtrends for all instruments are similar, except forex. They are fast and complete much quicker than uptrends. An average downtrend is 18 months, something which we will return to. An uptrend inception occurs when an instrument reaches a point where it fails to make a new low, then that low will be tested. After that, the instrument will either have a deep range retracement or it may take out the low slightly, resulting in a double-bottom. A swing must eventually form.
A simple way to roughly determine trend is to attempt to draw a line from three tops going upwards (uptrend) or a line from three bottoms going downwards (downtrend). It is not possible to correctly draw a downtrend line on the BTC chart, but it is possible to correctly draw an uptrend – indicating that the overall trend is downwards. The only mitigating factor is the impending stock market crash.

Time Symmetry Analysis of Bitcoin

Time is the movement from the past through the present into the future. It is a measurement in quantified intervals. In many ways, our perception of it is a human construct. It is more powerful than price as time may be utilized for a trade regardless of the market inflection point’s price. Were it possible to perfectly understand time, price would be totally irrelevant due to the predictive certainty time affords. Time structure is easier to learn than price, but much more difficult to apply with any accuracy. It is the hardest aspect of trading to learn, but also the most rewarding.
Humans do not have the ability to recognize every time window, however the ability to define market inflection points in terms of time is the single most powerful trading edge. Regardless, price should not be abandoned for time alone. Time structure analysis It is inherently flawed, as such the markets have a fail-safe, which is Price Structure. Even though Time is much more powerful, Price Structure should never be completely ignored. Time is the qualifier for Price and vice versa. Time can fail by tricking traders into counter-trend trading.
Time is a predestined trade quantifier, a filter to slow trades down, as it allows a trader to specifically focus on specific time windows and rest at others. It allows for quantitative measurements to reach deterministic values and is the primary qualifier for trends. Time structure should be utilized before price structure, and it is the primary trade criterion which requires support from price. We can see price structure on a chart, as areas of mathematical support or resistance, but we cannot see time structure.
Time may be used to tell us an exact point in the future where the market will inflect, after Price Theory has been fulfilled. In the present, price objectives based on price theory added to possible future times for market inflection points give us the exact time of market inflection points and price.
Time Structure is repetitions of time or inherent cycles of time, occurring in a methodical way to provide time windows which may be utilized for inflection points. They are not easily recognized and not easily defined by a price chart as measuring and observing time is very exact. Time structure is not a science, yet it does require precise measurements. Nothing is certain or definite. The critical question must be if a particular approach to time structure is currently lucrative or not.
We will measure it in intervals of 180 bars. Our goal is to determine time windows, when the market will react and when we should pay the most attention. By using time repetitions, the fact that market inflection points occurred at some point in the past and should, therefore, reoccur at some point in the future, we should obtain confidence as to when SPY will reach a market inflection point. Time repetitions are essentially the market’s memory. However, simply measuring the time between two points then trying to extrapolate into the future does not work. Measuring time is not the same as defining time repetitions. We will evaluate past sessions for market inflection points, whether discretes, qualified swings, or intra-range. Then records the times that the market has made highs or lows in a comparable time period to the future one seeks to trade in.
What follows is a time Histogram – A grouping of times which appear close together, then segregated based on that closeness. Time is aligned into combined histogram of repetitions and cycles, however cycles are irrelevant on a daily basis. If trading on an hourly basis, do not use hours.
  • Yearly Lows (last seven years): 1/1/13, 4/10/14, 1/15/15, 1/17/16, 1/1/17, 12/15/18, 2/6/19
  • Monthly Mode: 1, 1, 1, 1, 2, 4, 12
  • Daily Mode: 1, 1, 6, 10, 15, 15, 17
  • Monthly Lows (for the last year): 3/12/20 (10:00pm), 2/28/20 (7:09am), 1/2/20 (8:09pm), 12/18/19 (8:00am), 11/25/19 (1:00am), 10/24/19 (2:59am), 9/30/19 (2:59am), 8/29,19 (4:00am), 7/17/19 (7:59am), 6/4/19 (5:59pm), 5/1/19 (12:00am), 4/1/19 (12:00am)
  • Daily Lows Mode for those Months: 1, 1, 2, 4, 12, 17, 18, 24, 25, 28, 29, 30
  • Hourly Lows Mode for those Months (Military time): 0100, 0200, 0200, 0400, 0700, 0700, 0800, 1200, 1200, 1700, 2000, 2200
  • Minute Lows Mode for those Months: 00, 00, 00, 00, 00, 00, 09, 09, 59, 59, 59, 59
  • Day of the Week Lows (last twenty-six weeks):
Weighted Times are repetitions which appears multiple times within the same list, observed and accentuated once divided into relevant sections of the histogram. They are important in the presently defined trading time period and are similar to a mathematical mode with respect to a series. Phased times are essentially periodical patterns in histograms, though they do not guarantee inflection points
Evaluating the yearly lows, we see that BTC tends to have its lows primarily at the beginning of every year, with a possibility of it being at the end of the year. Following the same methodology, we get the middle of the month as the likeliest day. However, evaluating the monthly lows for the past year, the beginning and end of the month are more likely for lows.
Therefore, we have two primary dates from our histogram.
1/1/21, 1/15/21, and 1/29/21
2:00am, 8:00am, 12:00pm, or 10:00pm
In fact, the high for this year was February the 14th, only thirty days off from our histogram calculations.
The 8.6-Year Armstrong-Princeton Global Economic Confidence model states that 2.15 year intervals occur between corrections, relevant highs and lows. 2.15 years from the all-time peak discrete is February 9, 2020 – a reasonably accurate depiction of the low for this year (which was on 3/12/20). (Taking only the Armstrong model into account, the next high should be Saturday, April 23, 2022). Therefore, the Armstrong model indicates that we have actually bottomed out for the year!
Bear markets cannot exist in perpetuity whereas bull markets can. Bear markets will eventually have price objectives of zero, whereas bull markets can increase to infinity. It can occur for individual market instruments, but not markets as a whole. Since bull markets are defined by low volatility, they also last longer. Once a bull market is indicated, the trader can remain in a long position until a new high is reached, then switch to shorts. The average bear market is eighteen months long, giving us a date of August 19th, 2021 for the end of this bear market – roughly speaking. They cannot be shorter than fifteen months for a central-bank controlled market, which does not apply to Bitcoin. (Otherwise, it would continue until Sunday, September 12, 2021.) However, we should expect Bitcoin to experience its’ exponential growth after the stock market re-enters a bull market.
Terry Laundy’s T-Theory implemented by measuring the time of an indicator from peak to trough, then using that to define a future time window. It is similar to an head-and-shoulders pattern in that it is the process of forming the right side from a synthetic technical indicator. If the indicator is making continued lows, then time is recalculated for defining the right side of the T. The date of the market inflection point may be a price or indicator inflection date, so it is not always exactly useful. It is better to make us aware of possible market inflection points, clustered with other data. It gives us an RSI low of May, 9th 2020.
The Bradley Cycle is coupled with volatility allows start dates for campaigns or put options as insurance in portfolios for stocks. However, it is also useful for predicting market moves instead of terminal dates for discretes. Using dates which correspond to discretes, we can see how those dates correspond with changes in VIX.
Therefore, our timeline looks like:
  • 2/14/20 – yearly high ($10372 USD)
  • 3/12/20 – yearly low thus far ($3858 USD)
  • 5/9/20 – T-Theory true yearly low (BTC between 4863 and 3569)
  • 5/26/20 – hashrate difficulty halvening
  • 11/14/20 – stock market low
  • 1/15/21 – yearly low for BTC, around $8528
  • 8/19/21 – end of stock bear market
  • 11/26/21 – eighteen months from halvening, average peak from halvenings (BTC begins rising from $3000 area to above $23,312)
  • 4/23/22 – all-time high
Taken from my blog: http://aliamin.info/2020/
submitted by aibnsamin1 to Bitcoin [link] [comments]

D100 Ways to Mess With "I wish for all the gold in the world!"

  1. It rains down on the character and kills them
  2. Infinite gold is just a single gold piece that constantly reappears in your pocket after being spent
  3. That's the gold from the town treasury used to pay it's workers, now there's rioting in the streets
  4. Can't be arsed to go through all the comments but all the gold could teleport back into the interior of the world - to the mines it originated in or just like dispersed through the mantle again?
  5. All of the gold in the world is condensed into one single coin that flotas in front of the wishmaker for a few seconds. When he goes to grab it, it stops floating and the combined mass of all the gold in the world is to heavy for any mortal to hold. It tears through his hand and throws him to the ground, leaving a 20 meter wide crater where the coin landed. Nothing can pick up the coin, but that just means that no one can steal it from the wish maker.
  6. Everyone in the world gains the belief that gold is your personal property and feels weird about possessing it. It's like an old roommate's CDs, or an ex boyfriend's hoodie. They'll put the same amount of effort into returning it to you, but only when it's convenient. You can't really spend it anywhere either, unless they have an unhealthy desire for your possessions.
  7. "ok it's all yours, go get it". (no gold moves)
  8. Trade continues with coins made of other metals, and gold is a weird fringe metal that nobody will honor
  9. All your gear is now gilded, and all other gold coins lose their color. Nobody other than you remembers the old color of gold
  10. The uncaring diety that granted your wish also brought all the dragons that guarded hoards of gold
  11. All the gold from underground bursts from the earth in front of you, with no convenient way to move it.
  12. All the gold in the rest of the world disappears. Widespread chaos and confusion reigns. Literally all the gold in the world is carried in his pack. No gold in temple decorations.. magical items with gold no longer work.. etc.
  13. The world is not defined as this world. You got all the gold in the only diamond world, so, none.
  14. "All the gold in the world" was a poem written by a bad bard. You get a worthless piece of paper with a lackluster poem.
  15. "All the Gold" is almost dead nag of a riding horse and was in the world. The rapid trip to get to you kills it.
  16. You are encumbered by the gold in your possession and can not empty your inventory fast enough to escape encumbrance in the middle of nowhere. (Hope a town eventually forms around you fast.)
  17. You get what you wish and everyone and everything else knows it, but, you do not immediately know. (good luck with all the thieves, assassins, nobles, bandits, demons, etc. gunning for you and your gold.)
  18. Every creature that falls under "fae" or similar are forced to deliver the gold to you. Everyone from a common fairy to fae deities come one after the other, each with only one gold piece until you have all the gold in the world. They're concious of their actions but can't move freely until the deed is done. Who knows what they'd do to you once they regain control of their bodies
  19. You get the gold... but its somewhere. Good luck finding it.
  20. All the gold in the world, except for what’s on your person, vanishes in an instant.
  21. All gold within 60’ of the wish maker flies to them as metal to a powerful magnet and sticks to them. They can only remove gold from their body that they are giving/donating to a person, cause, church, or kingdom/city-state, empire etc. (the person must be a stranger or passing acquaintance, no more than that, or they are using as payment for goods or services or repaying a financial debt. STR checks for movement and CON checks to remain standing will eventually be needed.
  22. Gold-rust monster.
  23. They get all the gold in the world in a spendable and secure manner. But some of that gold is cursed by various wizards and magical entities in various ways for various reasons. The owner of it now bears at least a dozen unrelated curses, maybe more.
  24. You get all the gold but now no one has any so it holds no value. We move back into a barter system until a new form of currency can be established.
  25. They get midas' touch and everything they touch turns into gold but if they touch a creature the creatures gains +5 ac and can still attack and move normally
  26. The character becomes coated in gold, lowering mobility but greatly increasing defense
  27. All gold not owned by them turns into silver.
  28. They get their gold, only to find that the primary currency is now platinum. Gold is now only used as a component some spells, or for the properties of the material itself.
  29. All the gold in the world disappears. There is no gold, so you have all that there is.
  30. The gold stays where it is but technically IS their property. Good luck convincing everyone else that...
  31. All of the gold in the world immediately teleports to their location, killing the PC immediately via crushing and flattening entire cities at once beneath thousands of tons of gold ore, coins, and dust
  32. Ok, you now own all the gold in the world. However, it is still located exactly where it was before. You own it but it hasn't moved. Go get it if you want. And try convince the current possessor of it that you are the owner.
  33. All the gold comes with all the dragons...
  34. .. they cant physically shift the huge mountain of gold and people come from far and wide to take a wheelbarrow full of gold that is too large to be protected by the party..
  35. Theres no gold anywhere else so everyone reverts to spending lead coins instead. Gold decreases in value substantially. ...
  36. All the gold in the world technically belongs to the player but it's still wherever it was before he/she owned it. It now depicts the players head on every coin and people everywhere say things like "hey I know you you're from money!" Etc
  37. It’s in bitcoin, what’s bitcoin? Just wait a couple thousand years.
  38. Because wishes are directed to the gods themselves, and they see the entire universe as their "world" the gold from all around the universe is summoned to the PC's or NPC's location, the sheer amount of gold is so large that the entire planet is destroyed, along with any moons it might have, if the dm decides that the universe the campaign is in is very very very VERY rich in gold, he might aswell say that because so much gold was teleported to a specific location, it collapsed upon itself and formed a black hole.
  39. Your players hear a loud, familiar sound of earth moving as if an earth elemental started traveling beneath them. Your player hears something rustle in the grass, PC looks down and there, under a dead leaf, lies a single spec of gold ore. Pulled from the earth they stand on the gold ore inside the earth always moves up towards the player. If they stay in one spot for longer than a week it begins to pile.
  40. It is in one enormous coin, and nobody can make change. You try to break it into smaller pieces, but are stopped by the authorities because it has the emperor's face on it.
  41. Everyone else will see the color gold as a muted grey.
  42. You now possess all the gold in the world, but now everyone wants to kill you for it
  43. The wisher get the world's supply of fool's gold (pyrite). Hope they enjoy the irony.
  44. Every sentient creature is "informed" that you are now the owner of all the gold in the world. No gold actually moves anywhere and it is up to you to enforce your righteous claim.
  45. The color "gold" is suddenly drained from all things which become more brown or yellow. Now only you can bestow this color onto objects and creatures.
  46. You get your wish, but no one has any gold left so the economy crashes.
  47. All the gold in the world includes the gold guarded by every dragon. Bringing the gold to you also brings you its previous owner or notifies them of your act.
  48. This could also be applied to innumerable other monsters as well.
  49. At first, the gold rivers streaming through the air above the wisher's location is amazing. Verucai Saltberry can eat her heart out. Then, as the rivers make landfall, a nervous quiet overcomes all those who witness the spectacle.
  50. All the gold in the world now rains down upon their location.
  51. After half of one hour, 2d12 * 10 acres are covered in anything made of gold. Coins. Ore. Candelabras. You name it. I don't think there are enough dice to calculate the weight...
  52. Hot molten gold floods in your direction
  53. The world decides that gold is now useless since no one has it. They switch to using electrum.
  54. You get it. Exactly as you intended, all the gold coins in the world. But, every dragon, king, crime boss, even members of your own party just had all their gold stolen from them, and they aren't happy about it.
  55. The color gold dissapears from everything in the world unless it is owned by the wisher. Gold is suddenly indistinguishable from silver except by alchemists and smiths and dragons. As a trade currency it becomes almost worthless. The economy plunges into turmoil and as the value of gold plummets so do dragons interest in it. The land devolves into chaos as they suddenly struggle to work out wealth. Gems and iron both skyrocket in value. Dragons, furious at their essentially worthless hordes that they’ve amassed over the years rage across the land. Gold dragons go black. They’ve lost their color. There is a sudden increase in black dragons. Chaos takes hold and the black dragons start taking over the land.
  56. All the gold in the world disappears leaving only what they have on their person
  57. The dragons of the world soon realize where their horde has been taken. They all have you in their sight.
  58. It’s in one solid brick that’s practically worthless for the size
  59. You find yourself atop a mountain of all of the world's gold. Every greedy dragon in the world will soon be converging on your location to fight for this prize, with you in the middle. This being all the gold, that pile includes the scales from every gold dragon in the world, which you've just forcibly torn apart with your wish. Even the good-aligned dragons now see you as a genocidal monster that must be destroyed for the safety of their own kind. Your death is suddenly the singular goal that unites almost every dragon in the world. Also, all Electrum becomes a sort of brittle silver. That will please our DM, who hates having to include electrum coins in currency conversions.
  60. "Granted" and it seems as if nothing happens.Then, after a moment passes, there is a slight thump nearby.And then something light hits the player, rattling off of him, looking down he sees a small, wonderful necklace with a lithe, golden chain attached to it.And then a coin lands next to it.And then another.And another.The sound of falling gold escalates, turning into a storming, crashing chaos as all gold in the entire world falls from the sky in a roaring hail of death.And then all is silent, coins, jewelry, ore, newly refined gold and everything else stands as a small mountain where once there was a campsite and a forest, all of the players are dead or dying underneath that silent, golden hill.
  61. The planet's core loses all of its gold, which, in a supercritical molten state, appears floating as a series of masses overhead. This explodes and showers the area in forcefully-flung chunks of gold. Good job.
  62. The gods of wealth and trade are suddenly obliterated, and you are filled with divine power contained only by your mortal vessel, which wrecks havok on the divine realms and the mortal world. You probably don't survive. Good job.
  63. The gold is helpfully contained for you, and only consists of gold coins! ...Unfortunately, they appear in every single container or vessel you own or touch, forever, making it impossible to eat or drink except off the ground and makes clothing, home ownership, or trade tricky. Good job.
  64. They now own the license to obscure Half-Orc Bard Elzic Pagavian's folk album "All the gold in the world". Elzic is, however, an extremely competent adventurer and will not stand for having his art stolen out from under him.
  65. The power behind the wish misunderstands the intent and makes the wisher the only person to have a thing of that color.
  66. They get all the gold in the world, being the only one to posses gold, it becomes useless and the world's currency standards change.
  67. They didn't specify which world, molten gold pours in from a fire world
  68. Granted, since they specified “in the world” they now have a mountain sized pile of unrefined and impure Gold Ore, this pisses off all the Dwarvern clans as each ones mining operation is funded mostly by processing and selling Gold and similar materials. You and the party are now enemies of every dwarf Clan and their allies.
  69. I started an entire campaign with a similar premise involving a lamp, an efreet, and a Wish. I had a kingdom's worth of gold appear in a magical bag (like a bag of holding), but it was a solid cube that couldn't be pulled through the tiny opening of its container. Made for a lot of memorable scheming on the part of the players!
  70. They get all the gold in the world, the economy is no longer based on gold as there is none in circulation, brass coins replace gold coins
  71. You immediately stand upon a mountain of all the gold in the world. Seeing as you are the only one who has any, Silver becomes the dominant currency, making gold worthless. In addition, you piss off several dragons with hoards. At the same time, most kingdoms fall into financial ruin as they desperately attempt to find a new currency. While all this is happening, sinkholes begin to appear around the world as huge underground deposits of gold have vanished, allowing the ground to give way.
  72. All the gold not owned by the players is suddenly converted into silver. Currency now takes up 10x the amount of space which means any storage suddenly becomes limited.
  73. For the wealthy lords, it’s a nuisance that their pockets are suddenly weighed down or overflowing. For the banks that have just exploded... it’s a different matter.
  74. All the gold deposits from underground are drawn to the PCs creating huge destructive geysers and destroying everything in their path on the way to them.
  75. All the gold deposits from underground are drawn to the PCs creating huge destructive geysers and destroying everything in their path on the way to them.
  76. They start magnetically attracting every coin they walk by forever.
  77. All the gold in the world disappears and the world is changed to a paper-money system. The gold you have is the only gold remaining in the world, but it is useless as a currency. Maybe some alchemist will buy it from you?
  78. The rest of the gold in the world disappears, all that's left is what three player has on them
  79. Assuming they mean currency they're giving all the gold in the world translated into copper and they need to find a way to haul the several million metric tons of copper they have now. assuming they mean or they are now surrounded by all currently existing veins of unrefined gold ore
  80. The player now owns all the gold in the world... And the accompanying tax bill.
  81. Elderly people appear
  82. You get all the Gold in the world, and everyone is hunting you for thievery
  83. Gold is molten, appears in your pocket
  84. total collapse of the gold economy because there’s a lot more gold beneath the crust than in it, and it’s all technically in the world
Contributions by: Everyone who commented
submitted by ThatDnder to d100 [link] [comments]

New Warriors re-write by a non-fan/non-comic reader

So I'm not a comic reader but the news of the various happenings with in the comic industry tend to peek my dabbling interests of political science and marketing.
So when I saw the new "New Warriors" backlash I couldn't get it out of head that night so I laid in bed for the next 3 hours just working out what could make the characters more interesting.
I recognize that by not being a comic reader beyond Dilbert I'm probably making a lot of mistakes but I'm honestly curious as to what actual comic readers would think of my changes.
I'm leaving actual character designs to far more talented people though.
So to start off with "Screentime" I came up with the idea that instead of some "Internet Gas" bullshit that instead he would have a large optical data storage crystal shatter over his head and embed thousands of various sized shards of the nanocrystals that make up one of these storage crystals.
Idea came from this Wikipedia: https://en.wikipedia.org/wiki/5D_optical_data_storage
Now where I take it and twist it from reality is that all of these shards pickup various electromagnetic waves like Wi-Fi, Radio, Cell towers, etc... and being embedded in his brain means that he is still connected to the internet 24/7 unless he is in a Faraday Cage. Now as for his character I wanted to depict a teen that is both overwhelmed by the amount of information he now has sometime unwillingly cascading through his head kind of like ADD and the fact that he can find out everyone’s secrets both good and bad.
Every text, every camera, every file server, if it has a electronic connection of some sort even a very low powered wireless one if he is in range he can access it regardless of passwords or firewalls. I wanted to highlight the he would make his own personal code of conduct not to speak of any of the things he now knows unless he is specifically working on solving a particular crime. So if he is searching for a murder and finds out that the murders best friend is a rapist he wouldn't tell anyone of this finding as its beyond the scope of his search.
At times I would show that the weight of basically trusting himself not to violate everyone's privacy unwarranted is a unspeakable burden for a teenager. However as a teenager he would find silver linings to his power, like literally unlimited porn of every type imaginable, watching movies right off of the studios hard drives, mining bitcoin in his sleep, most importantly for his combat ability being able to access a vast library of 3D printed weapon designs and the machines to produce these weapons thus meaning that he is armed with the latest and greatest small arms.
As I mentioned before if Screentime is in a Faraday Cage he loses his internet connection this can be used to give him a break from the overwhelming information he is constantly exposed to help him sleep or by a villain trying to remove his intelligence gathering ability.
The only other thing that can block his reception is his Team mate Deadzone's shields. So next up on my rewrite hit parade is Snowflake and the now renamed Deadzone. Power wise Deadzone is the by far the most changed. Where before he could only raise shields if someone he cared for was in danger, which is the single biggest load of shit ever. Now he can raise various sized shields and shield bubbles at will.
The thing about his shields is that they are all 3D shields meaning that while they are however tall and wide as Deadzone needs they are all 1 inch thick. Within these shields is a perfect void: No matter and no energy within. This means that say a Cyclops like laser blast is absorbed by this void until you get to a point where the interior of the shield is either full of energy or matter at which point the shield should be deactivated.
However Deadzone can run the risk of holding the shield longer and suddenly the shield becomes an explosive as this void is now so full of energy or matter that only Deadzones powers are holding them together. This has its tactical uses but it can be hard to judge as if he releases the shield to soon or too fast then he can create a vacuum bomb inadvertently. This requires an extreme amount of focus if Deadzone is to avoid collateral damage and if he makes a shield too big for him to hold and/or it doesn't receive enough damage to fill up the void completely before he drops it he can easily do more harm than good.
I should also note that while I mostly stayed away from speaking on the art design because I don't have enough skill to come up with a better original design than spandex suits. Deadzone and his powers are no longer pink. He looks the typical African-American athlete and his shields are pitch black due to their void like nature.
Snowflake is actually more or less unchanged as far as powers go being your typical cryokinetic. The biggest change I would make is remove her woke pro-noun nonsense as that doesn't add anything to the character.
Now the biggest change to both of these characters is their relationship to each other and how it effects how they interact with the rest of the world. So in some of the art that has been posted made them look to be far more than just brother and sister and seeing that they otherwise have relatively little less to make them standout as characters I decided to take that implied relationship and go straight for the teeth.
So yes they are in a fully active incestuous relationship, this massive dark secret has made them comparatively insular especially when it comes to making friends however its also given them a different perspective on life. They see the penalty for being underaged superheroes as a comparative slap on the wrist compared to their main “crime” and thus show a willingness to engage in their work that is matched by few others.
They are more emphatic then most of the other team members save for Screentime but that is because he probably already knows why someone is doing or acting the way they are. They are not woke however they simply accept people as they are and move on, not trying to draw attention lest that attention get turned on them and their secret gets out. This is their single greatest fear beyond loosing one another.
The last character that I managed to rewrite is Trailblazer. She remains the leader and the “mother” of the group much as she had done in her foster home. She volunteers a lot both to help others and to hide the crippling depression of taking on so many burdens. This however has still reared it ugly head in her eating habits leading to her heavy build.
After she gets sucked into the superhero role she one night hears a endless chanting coming from a box of things she had left from her parents among which is her grandfather's backpack. This backpack is a pocket dimension but beyond that time within the backpack can slow down greatly as much as 1000 years inside the backpack can pass for every second in the real world if the user so wishes it.
Trailblazer sticks her head inside this backpack and falls in and meets a ancient Native American warrior ancestor this is the spirit that gives the backpack its power. He offers to train her inside the backpack much like Goku in DragonballZ using the Hyperbolic Time Chamber to do a years worth of training in only a day.
Trailblazer takes him up on his offer and for the next 5 years or 5 hours in reality she is put through a grueling training regimen that turns the overweight teenager into a toned though still “thic” warrior. She is gifted a Spirit Tomahawk to serve as her permanent weapon that is always at her side as a symbol of completing her training and the new connection that she has with her ancestors.
Though armed with this Tomahawk she still can receive or summon weapons from her backpack though her control of this ability right now is limited to simple melee weapons or bows and arrows unless she has time to sit down and focus on the backpack completely to summon a more complex object like a gun and its ammo.
B-Negitive is where I finally threw in the towel. I have no idea who this Michael Morbius is and I couldn't see of any redeeming character trait or feature to draw from. Maybe if he was more human I could do a teenage Blade but I don't know how as a upstart writer to pull that off from the current state without just scraping the character completely.
I'm looking for opinions and feedback as I have little else to do while on shelter-in-place.
submitted by Hybris51129 to Marvel [link] [comments]

Let's discuss some of the issues with Nano

Let's talk about some of Nano's biggest issues. I also made a video about this topic, available here: https://youtu.be/d9yb9ifurbg.
00:12 Spam
Issues
Potential Mitigations & Outstanding Issues
01:58 Privacy
Issues
  • Nano has no privacy. It is pseudonymous (like Bitcoin), not anonymous.
Potential Mitigations & Outstanding Issues & Outstanding Issues*
  • Second layer solutions like mixers can help, but some argue that isn't enough privacy.
  • The current protocol design + the computational overhead of privacy does not allow Nano to implement first layer privacy without compromising it's other features (fast, feeless, and scalable transactions).
02:56 Decentralization
Issues
  • Nano is currently not as decentralized as it could be. ~25% of the voting weight is held by Binance.
  • Users must choose representatives, and users don't always choose the best ones (or never choose).
Potential Mitigations & Outstanding Issues
  • Currently 4 unrelated parties (who all have a verifiable interest in keeping the network running) would have to work together to attack the network
  • Unlike Bitcoin, there is no mining or fees in Nano. This means that there is not a strong incentive for emergent centralization from profit maximization and economies of scale. We've seen this firsthand, as Nano's decentralization has increased over time.
  • Nano representative percentages are not that far off from Bitcoin mining pool percentages.
  • In Nano, voting weight can be remotely re-delegated to anyone at any time. This differs from Bitcoin, where consensus is controlled by miners and requires significant hardware investment.
  • The cost of a 51% attack scales with the market cap of Nano.
06:49 Marketing & adoption
Issues
  • The best technology doesn't always win. If no one knows about or uses Nano, it will die.
Potential Mitigations & Outstanding Issues
  • I would argue that the best technology typically does win, but it needs to be best in every way (price, speed, accessbility, etc). Nano is currently in a good place if you agree with that argument.
  • Bitcoin started small, and didn't spend money on marketing. It takes time to build a community.
  • The developers have said they will market more once the protocol is where they want it to be (v20 or v21?).
  • Community marketing initiatives have started to form organically (e.g. Twitter campaigns, YouTube ads, etc).
  • Marketing and adoption is a very difficult problem to solve, especially when you don't have first mover advantage or consistent cashflow.
08:07 Small developer fund
Issues
  • The developer fund only has 3 million NANO left (~$4MM), what happens after that?
Potential Mitigations & Outstanding Issues
  • The goal for Nano is to be an Internet RFC like TCP/IP or SMTP - development naturally slows down when the protocol is in a good place.
  • Nano development is completely open source, so anyone can participate. Multiple developers are now familiar with the Nano protocol.
  • Businesses and whales that benefit from Nano (exchanges, remittances, merchant services, etc) are incentivized to keep the protocol developed and running.
  • The developer fund was only ~5% of the supply - compare that to some of the other major cryptocurrencies.
10:08 Node incentives
Issues
  • There are no transaction fees, why would people run nodes to keep the network running?
Potential Mitigations & Outstanding Issues
  • The cost of consensus is so low in Nano that the benefits of the network itself are the incentive: decentralized money with 0 transaction fees that can be sent anywhere in the world nearly instantly. Similar to TCP/IP, email servers, and http servers. Just like Bitcoin full nodes.
  • Paying $50-$100 a month for a high-end node is a lot cheaper for merchants than paying 1-3% in total sales.
  • Businesses and whales that benefit from Nano (exchanges, remittances, merchant services, etc) are incentivized to keep the protocol developed and running.
11:58 No smart contracts
Issues
  • Nano doesn't support smart contracts.
Potential Mitigations & Outstanding Issues
  • Nano's sole goal is to be the most efficient peer-to-peer value transfer protocol possible. Adding smart contracts makes keeping Nano feeless, fast, and decentralized much more difficult.
  • Other solutions (e.g. Ethereum) exist for creating and enforcing smart contracts.
  • Code can still interact with Nano, but not on the first layer in a decentralized matter.
  • Real world smart contract adoption and usage is pretty limited at the moment, but that might not always be the case.
13:20 Price stability
Issues
  • Why would anyone accept or spend Nano if the price fluctuates so much?
  • Why wouldn't people just use a stablecoin version of Nano for sending and receiving money?
Potential Mitigations & Outstanding Issues
  • With good fiat gateways (stable, low fees, etc), you can always buy back the fiat equivalent of what you've spent.
  • The hope is that with enough adoption, people and businesses will eventually skip the fiat conversion and use Nano directly.
  • Because Nano is so fast, volatility is less of an issue. Transactions are confirmed in <10 seconds, and prices change less in that timeframe (vs 10 minutes to hours for Bitcoin).
  • Stablecoins reintroduce trust. Stable against what? Who controls the supply, and how do you get people to adopt them? What happens if the assets they're stable against fail? Nano is pure supply and demand.
  • With worldwide adoption, the market capitalization of Nano would be in the trillions. If that happens, even millions of dollars won't move the price significantly.
15:06 Deflation
Issues
  • Nano's current supply == max supply. Why would people spend Nano today if it could be worth more tomorrow?
  • What happens to principal representatives and voting weight as private keys are lost? How do you know keys are lost?
Potential Mitigations & Outstanding Issues
  • Nano is extremely divisible. 1 NANO is 1030 raw. Since there are no transaction fees, smaller and smaller amounts of Nano could be used to transact, even if the market cap reaches trillions.
  • People will always buy things they need (food, housing, etc).
  • I'm not sure what the plan is to adjust for lost keys. Probably requires more discussion.
Long-term Scalability
Issue
  • Current node software and hardware cannot handle thousands of TPS (low-end nodes fall behind at even 50 TPS).
  • The more representatives that exist, the more vote traffic is required (network bandwidth).
  • Low-end nodes currently slow down the network significantly. Principal representatives waste their resources constantly bootstrapping these weak nodes during network saturation.
Potential Mitigations & Outstanding Issues
  • Even as is, Nano can comfortably handle 50 TPS average - which is roughly the amount of transactions per day PayPal was doing in 2011 with nearly 100 million users.
  • Network bandwidth increases 50% a year.
  • There are some discussions of prioritizing bootstrapping by vote weight to limit the impact of weak nodes.
  • Since Nano uses an account balance system, pruning could drastically reduce storage requirements. You only need current state to keep the network running, not the full transaction history.
  • In the future, vote stapling could drastically reduce bandwidth usage by collecting all representative signatures up front and then only sharing that single aggregate signature.
  • Nano has no artificial protocol-based limits (e.g. block sizes or block times). It scales with hardware.
Obviously there is still a lot of work to be done in some areas, but overall I think Nano is a good place. For people that aren't Nano fans, what are your biggest concerns?
submitted by Qwahzi to CryptoCurrency [link] [comments]

Dive Into Tendermint Consensus Protocol (I)

Dive Into Tendermint Consensus Protocol (I)
This article is written by the CoinEx Chain lab. CoinEx Chain is the world’s first public chain exclusively designed for DEX, and will also include a Smart Chain supporting smart contracts and a Privacy Chain protecting users’ privacy.
longcpp @ 20200618
This is Part 1 of the serialized articles aimed to explain the Tendermint consensus protocol in detail.
Part 1. Preliminary of the consensus protocol: security model and PBFT protocol
Part 2. Tendermint consensus protocol illustrated: two-phase voting protocol and the locking and unlocking mechanism
Part 3. Weighted round-robin proposer selection algorithm used in Tendermint project
Any consensus agreement that is ultimately reached is the General Agreement, that is, the majority opinion. The consensus protocol on which the blockchain system operates is no exception. As a distributed system, the blockchain system aims to maintain the validity of the system. Intuitively, the validity of the blockchain system has two meanings: firstly, there is no ambiguity, and secondly, it can process requests to update its status. The former corresponds to the safety requirements of distributed systems, while the latter to the requirements of liveness. The validity of distributed systems is mainly maintained by consensus protocols, considering the multiple nodes and network communication involved in such systems may be unstable, which has brought huge challenges to the design of consensus protocols.

The semi-synchronous network model and Byzantine fault tolerance

Researchers of distributed systems characterize these problems that may occur in nodes and network communications using node failure models and network models. The fail-stop failure in node failure models refers to the situation where the node itself stops running due to configuration errors or other reasons, thus unable to go on with the consensus protocol. This type of failure will not cause side effects on other parts of the distributed system except that the node itself stops running. However, for such distributed systems as the public blockchain, when designing a consensus protocol, we still need to consider the evildoing intended by nodes besides their failure. These incidents are all included in the Byzantine Failure model, which covers all unexpected situations that may occur on the node, for example, passive downtime failures and any deviation intended by the nodes from the consensus protocol. For a better explanation, downtime failures refer to nodes’ passive running halt, and the Byzantine failure to any arbitrary deviation of nodes from the consensus protocol.
Compared with the node failure model which can be roughly divided into the passive and active models, the modeling of network communication is more difficult. The network itself suffers problems of instability and communication delay. Moreover, since all network communication is ultimately completed by the node which may have a downtime failure or a Byzantine failure in itself, it is usually difficult to define whether such failure arises from the node or the network itself when a node does not receive another node's network message. Although the network communication may be affected by many factors, the researchers found that the network model can be classified by the communication delay. For example, the node may fail to send data packages due to the fail-stop failure, and as a result, the corresponding communication delay is unknown and can be any value. According to the concept of communication delay, the network communication model can be divided into the following three categories:
  • The synchronous network model: There is a fixed, known upper bound of delay $\Delta$ in network communication. Under this model, the maximum delay of network communication between two nodes in the network is $\Delta$. Even if there is a malicious node, the communication delay arising therefrom does not exceed $\Delta$.
  • The asynchronous network model: There is an unknown delay in network communication, with the upper bound of the delay known, but the message can still be successfully delivered in the end. Under this model, the network communication delay between two nodes in the network can be any possible value, that is, a malicious node, if any, can arbitrarily extend the communication delay.
  • The semi-synchronous network model: Assume that there is a Global Stabilization Time (GST), before which it is an asynchronous network model and after which, a synchronous network model. In other words, there is a fixed, known upper bound of delay in network communication $\Delta$. A malicious node can delay the GST arbitrarily, and there will be no notification when no GST occurs. Under this model, the delay in the delivery of the message at the time $T$ is $\Delta + max(T, GST)$.
The synchronous network model is the most ideal network environment. Every message sent through the network can be received within a predictable time, but this model cannot reflect the real network communication situation. As in a real network, network failures are inevitable from time to time, causing the failure in the assumption of the synchronous network model. Yet the asynchronous network model goes to the other extreme and cannot reflect the real network situation either. Moreover, according to the FLP (Fischer-Lynch-Paterson) theorem, under this model if there is one node fails, no consensus protocol will reach consensus in a limited time. In contrast, the semi-synchronous network model can better describe the real-world network communication situation: network communication is usually synchronous or may return to normal after a short time. Such an experience must be no stranger to everyone: the web page, which usually gets loaded quite fast, opens slowly every now and then, and you need to try before you know the network is back to normal since there is usually no notification. The peer-to-peer (P2P) network communication, which is widely used in blockchain projects, also makes it possible for a node to send and receive information from multiple network channels. It is unrealistic to keep blocking the network information transmission of a node for a long time. Therefore, all the discussion below is under the semi-synchronous network model.
The design and selection of consensus protocols for public chain networks that allow nodes to dynamically join and leave need to consider possible Byzantine failures. Therefore, the consensus protocol of a public chain network is designed to guarantee the security and liveness of the network under the semi-synchronous network model on the premise of possible Byzantine failure. Researchers of distributed systems point out that to ensure the security and liveness of the system, the consensus protocol itself needs to meet three requirements:
  • Validity: The value reached by honest nodes must be the value proposed by one of them
  • Agreement: All honest nodes must reach consensus on the same value
  • Termination: The honest nodes must eventually reach consensus on a certain value
Validity and agreement can guarantee the security of the distributed system, that is, the honest nodes will never reach a consensus on a random value, and once the consensus is reached, all honest nodes agree on this value. Termination guarantees the liveness of distributed systems. A distributed system unable to reach consensus is useless.

The CAP theorem and Byzantine Generals Problem

In a semi-synchronous network, is it possible to design a Byzantine fault-tolerant consensus protocol that satisfies validity, agreement, and termination? How many Byzantine nodes can a system tolerance? The CAP theorem and Byzantine Generals Problem provide an answer for these two questions and have thus become the basic guidelines for the design of Byzantine fault-tolerant consensus protocols.
Lamport, Shostak, and Pease abstracted the design of the consensus mechanism in the distributed system in 1982 as the Byzantine Generals Problem, which refers to such a situation as described below: several generals each lead the army to fight in the war, and their troops are stationed in different places. The generals must formulate a unified action plan for the victory. However, since the camps are far away from each other, they can only communicate with each other through the communication soldiers, or, in other words, they cannot appear on the same occasion at the same time to reach a consensus. Unfortunately, among the generals, there is a traitor or two who intend to undermine the unified actions of the loyal generals by sending the wrong information, and the communication soldiers cannot send the message to the destination by themselves. It is assumed that each communication soldier can prove the information he has brought comes from a certain general, just as in the case of a real BFT consensus protocol, each node has its public and private keys to establish an encrypted communication channel for each other to ensure that its messages will not be tampered with in the network communication, and the message receiver can also verify the sender of the message based thereon. As already mentioned, any consensus agreement ultimately reached represents the consensus of the majority. In the process of generals communicating with each other for an offensive or retreat, a general also makes decisions based on the majority opinion from the information collected by himself.
According to the research of Lamport et al, if there are 1/3 or more traitors in the node, the generals cannot reach a unified decision. For example, in the following figure, assume there are 3 generals and only 1 traitor. In the figure on the left, suppose that General C is the traitor, and A and B are loyal. If A wants to launch an attack and informs B and C of such intention, yet the traitor C sends a message to B, suggesting what he has received from A is a retreat. In this case, B can't decide as he doesn't know who the traitor is, and the information received is insufficient for him to decide. If A is a traitor, he can send different messages to B and C. Then C faithfully reports to B the information he received. At this moment as B receives conflicting information, he cannot make any decisions. In both cases, even if B had received consistent information, it would be impossible for him to spot the traitor between A and C. Therefore, it is obvious that in both situations shown in the figure below, the honest General B cannot make a choice.
According to this conclusion, when there are $n$ generals with at most $f$ traitors (n≤3f), the generals cannot reach a consensus if $n \leq 3f$; and with $n > 3f$, a consensus can be reached. This conclusion also suggests that when the number of Byzantine failures $f$ exceeds 1/3 of the total number of nodes $n$ in the system $f \ge n/3$ , no consensus will be reached on any consensus protocol among all honest nodes. Only when $f < n/3$, such condition is likely to happen, without loss of generality, and for the subsequent discussion on the consensus protocol, $ n \ge 3f + 1$ by default.
The conclusion reached by Lamport et al. on the Byzantine Generals Problem draws a line between the possible and the impossible in the design of the Byzantine fault tolerance consensus protocol. Within the possible range, how will the consensus protocol be designed? Can both the security and liveness of distributed systems be fully guaranteed? Brewer provided the answer in his CAP theorem in 2000. It indicated that a distributed system requires the following three basic attributes, but any distributed system can only meet two of the three at the same time.
  1. Consistency: When any node responds to the request, it must either provide the latest status information or provide no status information
  2. Availability: Any node in the system must be able to continue reading and writing
  3. Partition Tolerance: The system can tolerate the loss of any number of messages between two nodes and still function normally

https://preview.redd.it/1ozfwk7u7m851.png?width=1400&format=png&auto=webp&s=fdee6318de2cf1c021e636654766a7a0fe7b38b4
A distributed system aims to provide consistent services. Therefore, the consistency attribute requires that the two nodes in the system cannot provide conflicting status information or expired information, which can ensure the security of the distributed system. The availability attribute is to ensure that the system can continuously update its status and guarantee the availability of distributed systems. The partition tolerance attribute is related to the network communication delay, and, under the semi-synchronous network model, it can be the status before GST when the network is in an asynchronous status with an unknown delay in the network communication. In this condition, communicating nodes may not receive information from each other, and the network is thus considered to be in a partitioned status. Partition tolerance requires the distributed system to function normally even in network partitions.
The proof of the CAP theorem can be demonstrated with the following diagram. The curve represents the network partition, and each network has four nodes, distinguished by the numbers 1, 2, 3, and 4. The distributed system stores color information, and all the status information stored by all nodes is blue at first.
  1. Partition tolerance and availability mean the loss of consistency: When node 1 receives a new request in the leftmost image, the status changes to red, the status transition information of node 1 is passed to node 3, and node 3 also updates the status information to red. However, since node 3 and node 4 did not receive the corresponding information due to the network partition, the status information is still blue. At this moment, if the status information is queried through node 2, the blue returned by node 2 is not the latest status of the system, thus losing consistency.
  2. Partition tolerance and consistency mean the loss of availability: In the middle figure, the initial status information of all nodes is blue. When node 1 and node 3 update the status information to red, node 2 and node 4 maintain the outdated information as blue due to network partition. Also when querying status information through node 2, you need to first ask other nodes to make sure you’re in the latest status before returning status information as node 2 needs to follow consistency, but because of the network partition, node 2 cannot receive any information from node 1 or node 3. Then node 2 cannot determine whether it is in the latest status, so it chooses not to return any information, thus depriving the system of availability.
  3. Consistency and availability mean the loss of the partition tolerance: In the right-most figure, the system does not have a network partition at first, and both status updates and queries can go smoothly. However, once a network partition occurs, it degenerates into one of the previous two conditions. It is thus proved that any distributed system cannot have consistency, availability, and partition tolerance all at the same time.

https://preview.redd.it/456x2blv7m851.png?width=1400&format=png&auto=webp&s=550797373145b8fc1471bdde68ed5f8d45adb52b
The discovery of the CAP theorem seems to declare that the aforementioned goals of the consensus protocol is impossible. However, if you’re careful enough, you may find from the above that those are all extreme cases, such as network partitions that cause the failure of information transmission, which could be rare, especially in P2P network. In the second case, the system rarely returns the same information with node 2, and the general practice is to query other nodes and return the latest status as believed after a while, regardless of whether it has received the request information of other nodes. Therefore, although the CAP theorem points out that any distributed system cannot satisfy the three attributes at the same time, it is not a binary choice, as the designer of the consensus protocol can weigh up all the three attributes according to the needs of the distributed system. However, as the communication delay is always involved in the distributed system, one always needs to choose between availability and consistency while ensuring a certain degree of partition tolerance. Specifically, in the second case, it is about the value that node 2 returns: a probably outdated value or no value. Returning the possibly outdated value may violate consistency but guarantees availability; yet returning no value deprives the system of availability but guarantees its consistency. Tendermint consensus protocol to be introduced is consistent in this trade-off. In other words, it will lose availability in some cases.
The genius of Satoshi Nakamoto is that with constraints of the CAP theorem, he managed to reach a reliable Byzantine consensus in a distributed network by combining PoW mechanism, Satoshi Nakamoto consensus, and economic incentives with appropriate parameter configuration. Whether Bitcoin's mechanism design solves the Byzantine Generals Problem has remained a dispute among academicians. Garay, Kiayias, and Leonardos analyzed the link between Bitcoin mechanism design and the Byzantine consensus in detail in their paper The Bitcoin Backbone Protocol: Analysis and Applications. In simple terms, the Satoshi Consensus is a probabilistic Byzantine fault-tolerant consensus protocol that depends on such conditions as the network communication environment and the proportion of malicious nodes' hashrate. When the proportion of malicious nodes’ hashrate does not exceed 1/2 in a good network communication environment, the Satoshi Consensus can reliably solve the Byzantine consensus problem in a distributed environment. However, when the environment turns bad, even with the proportion within 1/2, the Satoshi Consensus may still fail to reach a reliable conclusion on the Byzantine consensus problem. It is worth noting that the quality of the network environment is relative to Bitcoin's block interval. The 10-minute block generation interval of the Bitcoin can ensure that the system is in a good network communication environment in most cases, given the fact that the broadcast time of a block in the distributed network is usually just several seconds. In addition, economic incentives can motivate most nodes to actively comply with the agreement. It is thus considered that with the current Bitcoin network parameter configuration and mechanism design, the Bitcoin mechanism design has reliably solved the Byzantine Consensus problem in the current network environment.

Practical Byzantine Fault Tolerance, PBFT

It is not an easy task to design the Byzantine fault-tolerant consensus protocol in a semi-synchronous network. The first practically usable Byzantine fault-tolerant consensus protocol is the Practical Byzantine Fault Tolerance (PBFT) designed by Castro and Liskov in 1999, the first of its kind with polynomial complexity. For a distributed system with $n$ nodes, the communication complexity is $O(n2$.) Castro and Liskov showed in the paper that by transforming centralized file system into a distributed one using the PBFT protocol, the overwall performance was only slowed down by 3%. In this section we will briefly introduce the PBFT protocol, paving the way for further detailed explanations of the Tendermint protocol and the improvements of the Tendermint protocol.
The PBFT protocol that includes $n=3f+1$ nodes can tolerate up to $f$ Byzantine nodes. In the original paper of PBFT, full connection is required among all the $n$ nodes, that is, any two of the n nodes must be connected. All the nodes of the network jointly maintain the system status through network communication. In the Bitcoin network, a node can participate in or exit the consensus process through hashrate mining at any time, which is managed by the administrator, and the PFBT protocol needs to determine all the participating nodes before the protocol starts. All nodes in the PBFT protocol are divided into two categories, master nodes, and slave nodes. There is only one master node at any time, and all nodes take turns to be the master node. All nodes run in a rotation process called View, in each of which the master node will be reelected. The master node selection algorithm in PBFT is very simple: all nodes become the master node in turn by the index number. In each view, all nodes try to reach a consensus on the system status. It is worth mentioning that in the PBFT protocol, each node has its own digital signature key pair. All sent messages (including request messages from the client) need to be signed to ensure the integrity of the message in the network and the traceability of the message itself. (You can determine who sent a message based on the digital signature).
The following figure shows the basic flow of the PBFT consensus protocol. Assume that the current view’s master node is node 0. Client C initiates a request to the master node 0. After the master node receives the request, it broadcasts the request to all slave nodes that process the request of client C and return the result to the client. After the client receives f+1 identical results from different nodes (based on the signature value), the result can be taken as the final result of the entire operation. Since the system can have at most f Byzantine nodes, at least one of the f+1 results received by the client comes from an honest node, and the security of the consensus protocol guarantees that all honest nodes will reach consensus on the same status. So, the feedback from 1 honest node is enough to confirm that the corresponding request has been processed by the system.

https://preview.redd.it/sz8so5ly7m851.png?width=1400&format=png&auto=webp&s=d472810e76bbc202e91a25ef29a51e109a576554
For the status synchronization of all honest nodes, the PBFT protocol has two constraints on each node: on one hand, all nodes must start from the same status, and on the other, the status transition of all nodes must be definite, that is, given the same status and request, the results after the operation must be the same. Under these two constraints, as long as the entire system agrees on the processing order of all transactions, the status of all honest nodes will be consistent. This is also the main purpose of the PBFT protocol: to reach a consensus on the order of transactions between all nodes, thereby ensuring the security of the entire distributed system. In terms of availability, the PBFT consensus protocol relies on a timeout mechanism to find anomalies in the consensus process and start the View Change protocol in time to try to reach a consensus again.
The figure above shows a simplified workflow of the PBFT protocol. Where C is the client, 0, 1, 2, and 3 represent 4 nodes respectively. Specifically, 0 is the master node of the current view, 1, 2, 3 are slave nodes, and node 3 is faulty. Under normal circumstances, the PBFT consensus protocol reaches consensus on the order of transactions between nodes through a three-phase protocol. These three phases are respectively: Pre-Prepare, Prepare, and Commit:
  • The master node of the pre-preparation node is responsible for assigning the sequence number to the received client request, and broadcasting the message to the slave node. The message contains the hash value of the client request d, the sequence number of the current viewv, the sequence number n assigned by the master node to the request, and the signature information of the master nodesig. The scheme design of the PBFT protocol separates the request transmission from the request sequencing process, and the request transmission is not to be discussed here. The slave node that receives the message accepts the message after confirming the message is legitimate and enter preparation phase. The message in this step checks the basic signature, hash value, current view, and, most importantly, whether the master node has given the same sequence number to other request from the client in the current view.
  • In preparation, the slave node broadcasts the message to all nodes (including itself), indicating that it assigns the sequence number n to the client request with the hash value d under the current view v, with its signaturesig as proof. The node receiving the message will check the correctness of the signature, the matching of the view sequence number, etc., and accept the legitimate message. When the PRE-PREPARE message about a client request (from the main node) received by a node matches with the PREPARE from 2f slave nodes, the system has agreed on the sequence number requested by the client in the current view. This means that 2f+1 nodes in the current view agree with the request sequence number. Since it contains information from at most fmalicious nodes, there are a total of f+1 honest nodes that have agreed with the allocation of the request sequence number. With f malicious nodes, there are a total of 2f+1 honest nodes, so f+1represents the majority of the honest nodes, which is the consensus of the majority mentioned before.
  • After the node (including the master node and the slave node) receives a PRE-PREPARE message requested by the client and 2f PREPARE messages, the message is broadcast across the network and enters the submission phase. This message is used to indicate that the node has observed that the whole network has reached a consensus on the sequence number allocation of the request message from the client. When the node receives 2f+1 COMMIT messages, there are at least f+1 honest nodes, that is, most of the honest nodes have observed that the entire network has reached consensus on the arrangement of sequence numbers of the request message from the client. The node can process the client request and return the execution result to the client at this moment.
Roughly speaking, in the pre-preparation phase, the master node assigns a sequence number to all new client requests. During preparation, all nodes reach consensus on the client request sequence number in this view, while in submission the consistency of the request sequence number of the client in different views is to be guaranteed. In addition, the design of the PBFT protocol itself does not require the request message to be submitted by the assigned sequence number, but out of order. That can improve the efficiency of the implementation of the consensus protocol. Yet, the messages are still processed by the sequence number assigned by the consensus protocol for the consistency of the distributed system.
In the three-phase protocol execution of the PBFT protocol, in addition to maintaining the status information of the distributed system, the node itself also needs to log all kinds of consensus information it receives. The gradual accumulation of logs will consume considerable system resources. Therefore, the PBFT protocol additionally defines checkpoints to help the node deal with garbage collection. You can set a checkpoint every 100 or 1000 sequence numbers according to the request sequence number. After the client request at the checkpoint is executed, the node broadcasts messages throughout the network, indicating that after the node executes the client request with sequence number n, the hash value of the system status is d, and it is vouched by its own signature sig. After 2f+1 matching CHECKPOINT messages (one of which can come from the node itself) are received, most of the honest nodes in the entire network have reached a consensus on the system status after the execution of the client request with the sequence numbern, and then you can clear all relevant log records of client requests with the sequence number less than n. The node needs to save these2f+1 CHECKPOINTmessages as proof of the legitimate status at this moment, and the corresponding checkpoint is called a stable checkpoint.
The three-phase protocol of the PBFT protocol can ensure the consistency of the processing order of the client request, and the checkpoint mechanism is set to help nodes perform garbage collection and further ensures the status consistency of the distributed system, both of which can guarantee the security of the distributed system aforementioned. How is the availability of the distributed system guaranteed? In the semi-synchronous network model, a timeout mechanism is usually introduced, which is related to delays in the network environment. It is assumed that the network delay has a known upper bound after GST. In such condition, an initial value is usually set according to the network condition of the system deployed. In case of a timeout event, besides the corresponding processing flow triggered, additional mechanisms will be activated to readjust the waiting time. For example, an algorithm like TCP's exponential back off can be adopted to adjust the waiting time after a timeout event.
To ensure the availability of the system in the PBFT protocol, a timeout mechanism is also introduced. In addition, due to the potential the Byzantine failure in the master node itself, the PBFT protocol also needs to ensure the security and availability of the system in this case. When the Byzantine failure occurs in the master node, for example, when the slave node does not receive the PRE-PREPARE message or the PRE-PREPARE message sent by the master node from the master node within the time window and is thus determined to be illegitimate, the slave node can broadcast to the entire network, indicating that the node requests to switch to the new view with sequence number v+1. n indicates the request sequence number corresponding to the latest stable checkpoint local to the node, and C is to prove the stable checkpoint 2f+1 legitimate CHECKPOINT messages as aforementioned. After the latest stable checkpoint and before initiating the VIEWCHANGE message, the system may have reached a consensus on the sequence numbers of some request messages in the previous view. To ensure the consistency of these request sequence numbers to be switched in the view, the VIEWCHANGE message needs to carry this kind of the information to the new view, which is also the meaning of the P field in the message. P contains all the client request messages collected at the node with a request sequence number greater than n and the proof that a consensus has been reached on the sequence number in the node: the legitimate PRE-PREPARE message of the request and 2f matching PREPARE messages. When the master node in view v+1 collects 2f+1 VIEWCHANGE messages, it can broadcast the NEW-VIEW message and take the entire system into a new view. For the security of the system in combination with the three-phase protocol of the PBFT protocol, the construction rules of the NEW-VIEW information are designed in a quite complicated way. You can refer to the original paper of PBFT for more details.

https://preview.redd.it/x5efdc908m851.png?width=1400&format=png&auto=webp&s=97b4fd879d0ec668ee0990ea4cadf476167a2948
VIEWCHANGE contains a lot of information. For example, C contains 2f+1 signature information, P contains several signature sets, and each set has 2f+1 signature. At least 2f+1 nodes need to send a VIEWCHANGE message before prompting the system to enter the next new view, and that means, in addition to the complex logic of constructing the information of VIEWCHANGE and NEW-VIEW, the communication complexity of the view conversion protocol is $O(n2$.) Such complexity also limits the PBFT protocol to support only a few nodes, and when there are 100 nodes, it is usually too complex to practically deploy PBFT. It is worth noting that in some materials the communication complexity of the PBFT protocol is inappropriately attributed to the full connection between n nodes. By changing the fully connected network topology to the P2P network topology based on distributed hash tables commonly used in blockchain projects, high communication complexity caused by full connection can be conveniently solved, yet still, it is difficult to improve the communication complexity during the view conversion process. In recent years, researchers have proposed to reduce the amount of communication in this step by adopting aggregate signature scheme. With this technology, 2f+1 signature information can be compressed into one, thereby reducing the communication volume during view change.
submitted by coinexchain to u/coinexchain [link] [comments]

Inside a Secret Chinese Bitcoin Mine - YouTube Inside a Bitcoin mine that earns $70K a day - YouTube Extreme Mining at CoinPot - YouTube Inside of a HUGE BITCOIN mining FARM ! - YouTube How to mine $1,000,000 of Bitcoin using just a laptop ...

There is extreme volatility and deviation in the DXY itself compared to dominance, after tracing along perfectly for years. Altcoins perform well during dollar weakness, even more so than Bitcoin according to what the correlation suggests. If this is true and more stimulus is on the way. A very powerful altcoin season could be right around the ... Mining Bitcoin on Mars would be unprofitable because of the propagation delay, assuming Earth maintains hash power dominance. The Martian miners would have a view of the blockchain up to 22 minutes out of date, so by the time their latest mined block reaches the majority of hash power on Earth, on average there would be four new blocks added to the chain. — Clark Moody, Bitcoin and the ... Bitcoin Mining Hardware Comparison Currently, based on (1) price per hash and (2) electrical efficiency the best Bitcoin miner options are: AntMiner S7 4.73 Th/s 0.25 W/Gh 8.8 pounds Yes N/A 0.1645 AntMiner S9 13.5 Th/s 0.098 W/Gh 8.1 pounds Yes N/A 0.3603 Avalon6 3.5 Th/s 0.29 W/Gh 9.5 pounds No N/A 0.1232 Bitmain Tech introduces, second newest version of its Antminer series of Bitcoin miners ... Best Bitcoin Mining Software Reviewed. By: Ofir Beigel Last updated: 8/23/20 If you’re thinking of getting into Bitcoin mining, one of the things you’re going to need is a software to run your mining hardware.In this post I’ll review the top Bitcoin mining software available on the market. Block weight is defined as Base size * 3 + Total size. (rationale) ... Any commitments that are not consensus-critical to Bitcoin, such as merge-mining, MUST NOT use the witness reserved value to preserve the ability to do upgrades of the Bitcoin consensus protocol. The optional data space following the commitment also leaves room for metadata of future softforks, and MUST NOT be used for ...

[index] [18343] [40717] [1209] [33694] [18717] [28633] [9972] [28207] [12899] [38578]

Inside a Secret Chinese Bitcoin Mine - YouTube

♥ FOR REGISTER FREE BITCOIN @ http://faucethub.io/r/19614655 ♥ https://bitcoinfreemining2u.blogspot.my/ SUBSCRIBE FOR MORE HOW MUCH - http://shorturl.at/arBHL Nviddia GTX 1080 Ti - https://amzn.to/2Hiw5xp 6X GPU Mining Rig Case - https://bitcoinmerch.com/produc... Bitcoin is skyrocketing right now ! We had a look behind the scenes of bitcoin mining and a bitcoin miner Farm. join the event here: https://www.miningconf.o... Start trading Bitcoin and cryptocurrency here: http://bit.ly/2Vptr2X IMPORTANT!! This method only illustrates how mining works. You will not make any money f... In 2014, before Ethereum and altcoin mania, before ICOs and concerns about Tether and Facebook's Libra, Motherboard gained access to a massive and secretive ...

#