9 Best Bitcoin & Crypto Exchanges / Trading Sites (2020)

VegasCoin

VegasCoin the Las Vegas Cryptocurrency just like bitcoin, litecoin and most like Auroracoin, but for Las Vegas, Nevada.
[link]

Cryptocurrency meets Augmented Reality: "The Pokémon Go of Crypto"

Crypto Hunt: Augmented reality meets Cryptocurrency. Get moving, get rewarded. Crypto Hunt is both a cryptocurrency and a free location-based AR game available on iOS/Android currently in open Beta testing and available for pre-sale contributors. CH allows you to get on your feet and solve riddles, discover treasure, and earn CH tokens with Professor Crypto as your guide.
[link]

Shift: The Next-Gen Blockchain with Phantom, a Killer dApp for Decentralized Web and File Hosting

Shift is the first next-gen blockchain with a built-in "killer dApp" for decentralized web hosting, called Phantom. We believe this pre-included feature of Shift will drive adoption and stimulate the development of a robust dApp ecosystem on the Shift platform, especially since anyone who knows JavaScript can develop decentralized applications (dApps) that use the Shift platform. Over the past two years, we have created the backbone of a robust dApp ecosystem to disrupt the hosting industry.
[link]

what is the best/most secure exchange/wallet to traded the most cryptos at the best and most up to date rates? /r/Bitcoin

what is the best/most secure exchange/wallet to traded the most cryptos at the best and most up to date rates? /Bitcoin submitted by BitcoinAllBot to BitcoinAll [link] [comments]

[uncensored-r/Bitcoin] what is the most secure brazilian bitcoin eth and ripple exchange in brazil?

The following post by bodytexture is being replicated because the post has been silently greylisted.
The original post can be found(in censored form) at this link:
np.reddit.com/ Bitcoin/comments/76dysn
The original post's content was as follows:
[removed]
submitted by censorship_notifier to noncensored_bitcoin [link] [comments]

Technical: Taproot: Why Activate?

This is a follow-up on https://old.reddit.com/Bitcoin/comments/hqzp14/technical_the_path_to_taproot_activation/
Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners?
And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess.
First, let's consider some principles of Bitcoin.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so).
So, how does Taproot affect those principles?

Taproot and Your /Coins

Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash).
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input).
However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits!
Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh?
With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save!
And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well!
(P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1)
Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service!
So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win!
(even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot)
And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!

Taproot and Your Contracts

No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade.
So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust.
Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade.
However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade.
In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address.
Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants).
But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer).
Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos).
(technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).

Taproot and Your Contracts, Part 2: Cryptographic Boogaloo

Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code.
This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded.
And you can do that, with HTLCs, today.
Of course, HTLCs do have problems:
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar".
Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given public key to you.
Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige).
(Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key).
So:
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script.
(technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)

Quantum Quibbles!

Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable??
Well, in theory yes. In practice, they probably are not.
It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash.
When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key.
So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key.
(public keys should be public, that's why they're called public keys, LOL)
And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions.
So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort.
Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers.
For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
So:
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).

Summary

I Wanna Be The Taprooter!

So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!

But I Hate Taproot!!

That's fine!

Discussions About Taproot Activation

submitted by almkglor to Bitcoin [link] [comments]

Why i’m bullish on Zilliqa (long read)

Edit: TL;DR added in the comments
 
Hey all, I've been researching coins since 2017 and have gone through 100s of them in the last 3 years. I got introduced to blockchain via Bitcoin of course, analyzed Ethereum thereafter and from that moment I have a keen interest in smart contact platforms. I’m passionate about Ethereum but I find Zilliqa to have a better risk-reward ratio. Especially because Zilliqa has found an elegant balance between being secure, decentralized and scalable in my opinion.
 
Below I post my analysis of why from all the coins I went through I’m most bullish on Zilliqa (yes I went through Tezos, EOS, NEO, VeChain, Harmony, Algorand, Cardano etc.). Note that this is not investment advice and although it's a thorough analysis there is obviously some bias involved. Looking forward to what you all think!
 
Fun fact: the name Zilliqa is a play on ‘silica’ silicon dioxide which means “Silicon for the high-throughput consensus computer.”
 
This post is divided into (i) Technology, (ii) Business & Partnerships, and (iii) Marketing & Community. I’ve tried to make the technology part readable for a broad audience. If you’ve ever tried understanding the inner workings of Bitcoin and Ethereum you should be able to grasp most parts. Otherwise, just skim through and once you are zoning out head to the next part.
 
Technology and some more:
 
Introduction
 
The technology is one of the main reasons why I’m so bullish on Zilliqa. First thing you see on their website is: “Zilliqa is a high-performance, high-security blockchain platform for enterprises and next-generation applications.” These are some bold statements.
 
Before we deep dive into the technology let’s take a step back in time first as they have quite the history. The initial research paper from which Zilliqa originated dates back to August 2016: Elastico: A Secure Sharding Protocol For Open Blockchains where Loi Luu (Kyber Network) is one of the co-authors. Other ideas that led to the development of what Zilliqa has become today are: Bitcoin-NG, collective signing CoSi, ByzCoin and Omniledger.
 
The technical white paper was made public in August 2017 and since then they have achieved everything stated in the white paper and also created their own open source intermediate level smart contract language called Scilla (functional programming language similar to OCaml) too.
 
Mainnet is live since the end of January 2019 with daily transaction rates growing continuously. About a week ago mainnet reached 5 million transactions, 500.000+ addresses in total along with 2400 nodes keeping the network decentralized and secure. Circulating supply is nearing 11 billion and currently only mining rewards are left. The maximum supply is 21 billion with annual inflation being 7.13% currently and will only decrease with time.
 
Zilliqa realized early on that the usage of public cryptocurrencies and smart contracts were increasing but decentralized, secure, and scalable alternatives were lacking in the crypto space. They proposed to apply sharding onto a public smart contract blockchain where the transaction rate increases almost linear with the increase in the amount of nodes. More nodes = higher transaction throughput and increased decentralization. Sharding comes in many forms and Zilliqa uses network-, transaction- and computational sharding. Network sharding opens up the possibility of using transaction- and computational sharding on top. Zilliqa does not use state sharding for now. We’ll come back to this later.
 
Before we continue dissecting how Zilliqa achieves such from a technological standpoint it’s good to keep in mind that a blockchain being decentralised and secure and scalable is still one of the main hurdles in allowing widespread usage of decentralised networks. In my opinion this needs to be solved first before blockchains can get to the point where they can create and add large scale value. So I invite you to read the next section to grasp the underlying fundamentals. Because after all these premises need to be true otherwise there isn’t a fundamental case to be bullish on Zilliqa, right?
 
Down the rabbit hole
 
How have they achieved this? Let’s define the basics first: key players on Zilliqa are the users and the miners. A user is anybody who uses the blockchain to transfer funds or run smart contracts. Miners are the (shard) nodes in the network who run the consensus protocol and get rewarded for their service in Zillings (ZIL). The mining network is divided into several smaller networks called shards, which is also referred to as ‘network sharding’. Miners subsequently are randomly assigned to a shard by another set of miners called DS (Directory Service) nodes. The regular shards process transactions and the outputs of these shards are eventually combined by the DS shard as they reach consensus on the final state. More on how these DS shards reach consensus (via pBFT) will be explained later on.
 
The Zilliqa network produces two types of blocks: DS blocks and Tx blocks. One DS Block consists of 100 Tx Blocks. And as previously mentioned there are two types of nodes concerned with reaching consensus: shard nodes and DS nodes. Becoming a shard node or DS node is being defined by the result of a PoW cycle (Ethash) at the beginning of the DS Block. All candidate mining nodes compete with each other and run the PoW (Proof-of-Work) cycle for 60 seconds and the submissions achieving the highest difficulty will be allowed on the network. And to put it in perspective: the average difficulty for one DS node is ~ 2 Th/s equaling 2.000.000 Mh/s or 55 thousand+ GeForce GTX 1070 / 8 GB GPUs at 35.4 Mh/s. Each DS Block 10 new DS nodes are allowed. And a shard node needs to provide around 8.53 GH/s currently (around 240 GTX 1070s). Dual mining ETH/ETC and ZIL is possible and can be done via mining software such as Phoenix and Claymore. There are pools and if you have large amounts of hashing power (Ethash) available you could mine solo.
 
The PoW cycle of 60 seconds is a peak performance and acts as an entry ticket to the network. The entry ticket is called a sybil resistance mechanism and makes it incredibly hard for adversaries to spawn lots of identities and manipulate the network with these identities. And after every 100 Tx Blocks which corresponds to roughly 1,5 hour this PoW process repeats. In between these 1,5 hour, no PoW needs to be done meaning Zilliqa’s energy consumption to keep the network secure is low. For more detailed information on how mining works click here.
Okay, hats off to you. You have made it this far. Before we go any deeper down the rabbit hole we first must understand why Zilliqa goes through all of the above technicalities and understand a bit more what a blockchain on a more fundamental level is. Because the core of Zilliqa’s consensus protocol relies on the usage of pBFT (practical Byzantine Fault Tolerance) we need to know more about state machines and their function. Navigate to Viewblock, a Zilliqa block explorer, and just come back to this article. We will use this site to navigate through a few concepts.
 
We have established that Zilliqa is a public and distributed blockchain. Meaning that everyone with an internet connection can send ZILs, trigger smart contracts, etc. and there is no central authority who fully controls the network. Zilliqa and other public and distributed blockchains (like Bitcoin and Ethereum) can also be defined as state machines.
 
Taking the liberty of paraphrasing examples and definitions given by Samuel Brooks’ medium article, he describes the definition of a blockchain (like Zilliqa) as: “A peer-to-peer, append-only datastore that uses consensus to synchronize cryptographically-secure data”.
 
Next, he states that: "blockchains are fundamentally systems for managing valid state transitions”. For some more context, I recommend reading the whole medium article to get a better grasp of the definitions and understanding of state machines. Nevertheless, let’s try to simplify and compile it into a single paragraph. Take traffic lights as an example: all its states (red, amber, and green) are predefined, all possible outcomes are known and it doesn’t matter if you encounter the traffic light today or tomorrow. It will still behave the same. Managing the states of a traffic light can be done by triggering a sensor on the road or pushing a button resulting in one traffic lights’ state going from green to red (via amber) and another light from red to green.
 
With public blockchains like Zilliqa, this isn’t so straightforward and simple. It started with block #1 almost 1,5 years ago and every 45 seconds or so a new block linked to the previous block is being added. Resulting in a chain of blocks with transactions in it that everyone can verify from block #1 to the current #647.000+ block. The state is ever changing and the states it can find itself in are infinite. And while the traffic light might work together in tandem with various other traffic lights, it’s rather insignificant comparing it to a public blockchain. Because Zilliqa consists of 2400 nodes who need to work together to achieve consensus on what the latest valid state is while some of these nodes may have latency or broadcast issues, drop offline or are deliberately trying to attack the network, etc.
 
Now go back to the Viewblock page take a look at the amount of transaction, addresses, block and DS height and then hit refresh. Obviously as expected you see new incremented values on one or all parameters. And how did the Zilliqa blockchain manage to transition from a previous valid state to the latest valid state? By using pBFT to reach consensus on the latest valid state.
 
After having obtained the entry ticket, miners execute pBFT to reach consensus on the ever-changing state of the blockchain. pBFT requires a series of network communication between nodes, and as such there is no GPU involved (but CPU). Resulting in the total energy consumed to keep the blockchain secure, decentralized and scalable being low.
 
pBFT stands for practical Byzantine Fault Tolerance and is an optimization on the Byzantine Fault Tolerant algorithm. To quote Blockonomi: “In the context of distributed systems, Byzantine Fault Tolerance is the ability of a distributed computer network to function as desired and correctly reach a sufficient consensus despite malicious components (nodes) of the system failing or propagating incorrect information to other peers.” Zilliqa is such a distributed computer network and depends on the honesty of the nodes (shard and DS) to reach consensus and to continuously update the state with the latest block. If pBFT is a new term for you I can highly recommend the Blockonomi article.
 
The idea of pBFT was introduced in 1999 - one of the authors even won a Turing award for it - and it is well researched and applied in various blockchains and distributed systems nowadays. If you want more advanced information than the Blockonomi link provides click here. And if you’re in between Blockonomi and the University of Singapore read the Zilliqa Design Story Part 2 dating from October 2017.
Quoting from the Zilliqa tech whitepaper: “pBFT relies upon a correct leader (which is randomly selected) to begin each phase and proceed when the sufficient majority exists. In case the leader is byzantine it can stall the entire consensus protocol. To address this challenge, pBFT offers a view change protocol to replace the byzantine leader with another one.”
 
pBFT can tolerate ⅓ of the nodes being dishonest (offline counts as Byzantine = dishonest) and the consensus protocol will function without stalling or hiccups. Once there are more than ⅓ of dishonest nodes but no more than ⅔ the network will be stalled and a view change will be triggered to elect a new DS leader. Only when more than ⅔ of the nodes are dishonest (66%) double-spend attacks become possible.
 
If the network stalls no transactions can be processed and one has to wait until a new honest leader has been elected. When the mainnet was just launched and in its early phases, view changes happened regularly. As of today the last stalling of the network - and view change being triggered - was at the end of October 2019.
 
Another benefit of using pBFT for consensus besides low energy is the immediate finality it provides. Once your transaction is included in a block and the block is added to the chain it’s done. Lastly, take a look at this article where three types of finality are being defined: probabilistic, absolute and economic finality. Zilliqa falls under the absolute finality (just like Tendermint for example). Although lengthy already we skipped through some of the inner workings from Zilliqa’s consensus: read the Zilliqa Design Story Part 3 and you will be close to having a complete picture on it. Enough about PoW, sybil resistance mechanism, pBFT, etc. Another thing we haven’t looked at yet is the amount of decentralization.
 
Decentralisation
 
Currently, there are four shards, each one of them consisting of 600 nodes. 1 shard with 600 so-called DS nodes (Directory Service - they need to achieve a higher difficulty than shard nodes) and 1800 shard nodes of which 250 are shard guards (centralized nodes controlled by the team). The amount of shard guards has been steadily declining from 1200 in January 2019 to 250 as of May 2020. On the Viewblock statistics, you can see that many of the nodes are being located in the US but those are only the (CPU parts of the) shard nodes who perform pBFT. There is no data from where the PoW sources are coming. And when the Zilliqa blockchain starts reaching its transaction capacity limit, a network upgrade needs to be executed to lift the current cap of maximum 2400 nodes to allow more nodes and formation of more shards which will allow to network to keep on scaling according to demand.
Besides shard nodes there are also seed nodes. The main role of seed nodes is to serve as direct access points (for end-users and clients) to the core Zilliqa network that validates transactions. Seed nodes consolidate transaction requests and forward these to the lookup nodes (another type of nodes) for distribution to the shards in the network. Seed nodes also maintain the entire transaction history and the global state of the blockchain which is needed to provide services such as block explorers. Seed nodes in the Zilliqa network are comparable to Infura on Ethereum.
 
The seed nodes were first only operated by Zilliqa themselves, exchanges and Viewblock. Operators of seed nodes like exchanges had no incentive to open them for the greater public. They were centralised at first. Decentralisation at the seed nodes level has been steadily rolled out since March 2020 ( Zilliqa Improvement Proposal 3 ). Currently the amount of seed nodes is being increased, they are public-facing and at the same time PoS is applied to incentivize seed node operators and make it possible for ZIL holders to stake and earn passive yields. Important distinction: seed nodes are not involved with consensus! That is still PoW as entry ticket and pBFT for the actual consensus.
 
5% of the block rewards are being assigned to seed nodes (from the beginning in 2019) and those are being used to pay out ZIL stakers. The 5% block rewards with an annual yield of 10.03% translate to roughly 610 MM ZILs in total that can be staked. Exchanges use the custodial variant of staking and wallets like Moonlet will use the non-custodial version (starting in Q3 2020). Staking is being done by sending ZILs to a smart contract created by Zilliqa and audited by Quantstamp.
 
With a high amount of DS; shard nodes and seed nodes becoming more decentralized too, Zilliqa qualifies for the label of decentralized in my opinion.
 
Smart contracts
 
Let me start by saying I’m not a developer and my programming skills are quite limited. So I‘m taking the ELI5 route (maybe 12) but if you are familiar with Javascript, Solidity or specifically OCaml please head straight to Scilla - read the docs to get a good initial grasp of how Zilliqa’s smart contract language Scilla works and if you ask yourself “why another programming language?” check this article. And if you want to play around with some sample contracts in an IDE click here. The faucet can be found here. And more information on architecture, dapp development and API can be found on the Developer Portal.
If you are more into listening and watching: check this recent webinar explaining Zilliqa and Scilla. Link is time-stamped so you’ll start right away with a platform introduction, roadmap 2020 and afterwards a proper Scilla introduction.
 
Generalized: programming languages can be divided into being ‘object-oriented’ or ‘functional’. Here is an ELI5 given by software development academy: * “all programs have two basic components, data – what the program knows – and behavior – what the program can do with that data. So object-oriented programming states that combining data and related behaviors in one place, is called “object”, which makes it easier to understand how a particular program works. On the other hand, functional programming argues that data and behavior are different things and should be separated to ensure their clarity.” *
 
Scilla is on the functional side and shares similarities with OCaml: OCaml is a general-purpose programming language with an emphasis on expressiveness and safety. It has an advanced type system that helps catch your mistakes without getting in your way. It's used in environments where a single mistake can cost millions and speed matters, is supported by an active community, and has a rich set of libraries and development tools. For all its power, OCaml is also pretty simple, which is one reason it's often used as a teaching language.
 
Scilla is blockchain agnostic, can be implemented onto other blockchains as well, is recognized by academics and won a so-called Distinguished Artifact Award award at the end of last year.
 
One of the reasons why the Zilliqa team decided to create their own programming language focused on preventing smart contract vulnerabilities is that adding logic on a blockchain, programming, means that you cannot afford to make mistakes. Otherwise, it could cost you. It’s all great and fun blockchains being immutable but updating your code because you found a bug isn’t the same as with a regular web application for example. And with smart contracts, it inherently involves cryptocurrencies in some form thus value.
 
Another difference with programming languages on a blockchain is gas. Every transaction you do on a smart contract platform like Zilliqa or Ethereum costs gas. With gas you basically pay for computational costs. Sending a ZIL from address A to address B costs 0.001 ZIL currently. Smart contracts are more complex, often involve various functions and require more gas (if gas is a new concept click here ).
 
So with Scilla, similar to Solidity, you need to make sure that “every function in your smart contract will run as expected without hitting gas limits. An improper resource analysis may lead to situations where funds may get stuck simply because a part of the smart contract code cannot be executed due to gas limits. Such constraints are not present in traditional software systems”. Scilla design story part 1
 
Some examples of smart contract issues you’d want to avoid are: leaking funds, ‘unexpected changes to critical state variables’ (example: someone other than you setting his or her address as the owner of the smart contract after creation) or simply killing a contract.
 
Scilla also allows for formal verification. Wikipedia to the rescue: In the context of hardware and software systems, formal verification is the act of proving or disproving the correctness of intended algorithms underlying a system with respect to a certain formal specification or property, using formal methods of mathematics.
 
Formal verification can be helpful in proving the correctness of systems such as: cryptographic protocols, combinational circuits, digital circuits with internal memory, and software expressed as source code.
 
Scilla is being developed hand-in-hand with formalization of its semantics and its embedding into the Coq proof assistant — a state-of-the art tool for mechanized proofs about properties of programs.”
 
Simply put, with Scilla and accompanying tooling developers can be mathematically sure and proof that the smart contract they’ve written does what he or she intends it to do.
 
Smart contract on a sharded environment and state sharding
 
There is one more topic I’d like to touch on: smart contract execution in a sharded environment (and what is the effect of state sharding). This is a complex topic. I’m not able to explain it any easier than what is posted here. But I will try to compress the post into something easy to digest.
 
Earlier on we have established that Zilliqa can process transactions in parallel due to network sharding. This is where the linear scalability comes from. We can define simple transactions: a transaction from address A to B (Category 1), a transaction where a user interacts with one smart contract (Category 2) and the most complex ones where triggering a transaction results in multiple smart contracts being involved (Category 3). The shards are able to process transactions on their own without interference of the other shards. With Category 1 transactions that is doable, with Category 2 transactions sometimes if that address is in the same shard as the smart contract but with Category 3 you definitely need communication between the shards. Solving that requires to make a set of communication rules the protocol needs to follow in order to process all transactions in a generalised fashion.
 
And this is where the downsides of state sharding comes in currently. All shards in Zilliqa have access to the complete state. Yes the state size (0.1 GB at the moment) grows and all of the nodes need to store it but it also means that they don’t need to shop around for information available on other shards. Requiring more communication and adding more complexity. Computer science knowledge and/or developer knowledge required links if you want to dig further: Scilla - language grammar Scilla - Foundations for Verifiable Decentralised Computations on a Blockchain Gas Accounting NUS x Zilliqa: Smart contract language workshop
 
Easier to follow links on programming Scilla https://learnscilla.com/home Ivan on Tech
 
Roadmap / Zilliqa 2.0
 
There is no strict defined roadmap but here are topics being worked on. And via the Zilliqa website there is also more information on the projects they are working on.
 
Business & Partnerships
 
It’s not only technology in which Zilliqa seems to be excelling as their ecosystem has been expanding and starting to grow rapidly. The project is on a mission to provide OpenFinance (OpFi) to the world and Singapore is the right place to be due to its progressive regulations and futuristic thinking. Singapore has taken a proactive approach towards cryptocurrencies by introducing the Payment Services Act 2019 (PS Act). Among other things, the PS Act will regulate intermediaries dealing with certain cryptocurrencies, with a particular focus on consumer protection and anti-money laundering. It will also provide a stable regulatory licensing and operating framework for cryptocurrency entities, effectively covering all crypto businesses and exchanges based in Singapore. According to PWC 82% of the surveyed executives in Singapore reported blockchain initiatives underway and 13% of them have already brought the initiatives live to the market. There is also an increasing list of organizations that are starting to provide digital payment services. Moreover, Singaporean blockchain developers Building Cities Beyond has recently created an innovation $15 million grant to encourage development on its ecosystem. This all suggests that Singapore tries to position itself as (one of) the leading blockchain hubs in the world.
 
Zilliqa seems to already take advantage of this and recently helped launch Hg Exchange on their platform, together with financial institutions PhillipCapital, PrimePartners and Fundnel. Hg Exchange, which is now approved by the Monetary Authority of Singapore (MAS), uses smart contracts to represent digital assets. Through Hg Exchange financial institutions worldwide can use Zilliqa's safe-by-design smart contracts to enable the trading of private equities. For example, think of companies such as Grab, Airbnb, SpaceX that are not available for public trading right now. Hg Exchange will allow investors to buy shares of private companies & unicorns and capture their value before an IPO. Anquan, the main company behind Zilliqa, has also recently announced that they became a partner and shareholder in TEN31 Bank, which is a fully regulated bank allowing for tokenization of assets and is aiming to bridge the gap between conventional banking and the blockchain world. If STOs, the tokenization of assets, and equity trading will continue to increase, then Zilliqa’s public blockchain would be the ideal candidate due to its strategic positioning, partnerships, regulatory compliance and the technology that is being built on top of it.
 
What is also very encouraging is their focus on banking the un(der)banked. They are launching a stablecoin basket starting with XSGD. As many of you know, stablecoins are currently mostly used for trading. However, Zilliqa is actively trying to broaden the use case of stablecoins. I recommend everybody to read this text that Amrit Kumar wrote (one of the co-founders). These stablecoins will be integrated in the traditional markets and bridge the gap between the crypto world and the traditional world. This could potentially revolutionize and legitimise the crypto space if retailers and companies will for example start to use stablecoins for payments or remittances, instead of it solely being used for trading.
 
Zilliqa also released their DeFi strategic roadmap (dating November 2019) which seems to be aligning well with their OpFi strategy. A non-custodial DEX is coming to Zilliqa made by Switcheo which allows cross-chain trading (atomic swaps) between ETH, EOS and ZIL based tokens. They also signed a Memorandum of Understanding for a (soon to be announced) USD stablecoin. And as Zilliqa is all about regulations and being compliant, I’m speculating on it to be a regulated USD stablecoin. Furthermore, XSGD is already created and visible on block explorer and XIDR (Indonesian Stablecoin) is also coming soon via StraitsX. Here also an overview of the Tech Stack for Financial Applications from September 2019. Further quoting Amrit Kumar on this:
 
There are two basic building blocks in DeFi/OpFi though: 1) stablecoins as you need a non-volatile currency to get access to this market and 2) a dex to be able to trade all these financial assets. The rest are built on top of these blocks.
 
So far, together with our partners and community, we have worked on developing these building blocks with XSGD as a stablecoin. We are working on bringing a USD-backed stablecoin as well. We will soon have a decentralised exchange developed by Switcheo. And with HGX going live, we are also venturing into the tokenization space. More to come in the future.”
 
Additionally, they also have this ZILHive initiative that injects capital into projects. There have been already 6 waves of various teams working on infrastructure, innovation and research, and they are not from ASEAN or Singapore only but global: see Grantees breakdown by country. Over 60 project teams from over 20 countries have contributed to Zilliqa's ecosystem. This includes individuals and teams developing wallets, explorers, developer toolkits, smart contract testing frameworks, dapps, etc. As some of you may know, Unstoppable Domains (UD) blew up when they launched on Zilliqa. UD aims to replace cryptocurrency addresses with a human-readable name and allows for uncensorable websites. Zilliqa will probably be the only one able to handle all these transactions onchain due to ability to scale and its resulting low fees which is why the UD team launched this on Zilliqa in the first place. Furthermore, Zilliqa also has a strong emphasis on security, compliance, and privacy, which is why they partnered with companies like Elliptic, ChainSecurity (part of PwC Switzerland), and Incognito. Their sister company Aqilliz (Zilliqa spelled backwards) focuses on revolutionizing the digital advertising space and is doing interesting things like using Zilliqa to track outdoor digital ads with companies like Foodpanda.
 
Zilliqa is listed on nearly all major exchanges, having several different fiat-gateways and recently have been added to Binance’s margin trading and futures trading with really good volume. They also have a very impressive team with good credentials and experience. They don't just have “tech people”. They have a mix of tech people, business people, marketeers, scientists, and more. Naturally, it's good to have a mix of people with different skill sets if you work in the crypto space.
 
Marketing & Community
 
Zilliqa has a very strong community. If you just follow their Twitter their engagement is much higher for a coin that has approximately 80k followers. They also have been ‘coin of the day’ by LunarCrush many times. LunarCrush tracks real-time cryptocurrency value and social data. According to their data, it seems Zilliqa has a more fundamental and deeper understanding of marketing and community engagement than almost all other coins. While almost all coins have been a bit frozen in the last months, Zilliqa seems to be on its own bull run. It was somewhere in the 100s a few months ago and is currently ranked #46 on CoinGecko. Their official Telegram also has over 20k people and is very active, and their community channel which is over 7k now is more active and larger than many other official channels. Their local communities also seem to be growing.
 
Moreover, their community started ‘Zillacracy’ together with the Zilliqa core team ( see www.zillacracy.com ). It’s a community-run initiative where people from all over the world are now helping with marketing and development on Zilliqa. Since its launch in February 2020 they have been doing a lot and will also run their own non-custodial seed node for staking. This seed node will also allow them to start generating revenue for them to become a self sustaining entity that could potentially scale up to become a decentralized company working in parallel with the Zilliqa core team. Comparing it to all the other smart contract platforms (e.g. Cardano, EOS, Tezos etc.) they don't seem to have started a similar initiative (correct me if I’m wrong though). This suggests in my opinion that these other smart contract platforms do not fully understand how to utilize the ‘power of the community’. This is something you cannot ‘buy with money’ and gives many projects in the space a disadvantage.
 
Zilliqa also released two social products called SocialPay and Zeeves. SocialPay allows users to earn ZILs while tweeting with a specific hashtag. They have recently used it in partnership with the Singapore Red Cross for a marketing campaign after their initial pilot program. It seems like a very valuable social product with a good use case. I can see a lot of traditional companies entering the space through this product, which they seem to suggest will happen. Tokenizing hashtags with smart contracts to get network effect is a very smart and innovative idea.
 
Regarding Zeeves, this is a tipping bot for Telegram. They already have 1000s of signups and they plan to keep upgrading it for more and more people to use it (e.g. they recently have added a quiz features). They also use it during AMAs to reward people in real-time. It’s a very smart approach to grow their communities and get familiar with ZIL. I can see this becoming very big on Telegram. This tool suggests, again, that the Zilliqa team has a deeper understanding of what the crypto space and community needs and is good at finding the right innovative tools to grow and scale.
 
To be honest, I haven’t covered everything (i’m also reaching the character limited haha). So many updates happening lately that it's hard to keep up, such as the International Monetary Fund mentioning Zilliqa in their report, custodial and non-custodial Staking, Binance Margin, Futures, Widget, entering the Indian market, and more. The Head of Marketing Colin Miles has also released this as an overview of what is coming next. And last but not least, Vitalik Buterin has been mentioning Zilliqa lately acknowledging Zilliqa and mentioning that both projects have a lot of room to grow. There is much more info of course and a good part of it has been served to you on a silver platter. I invite you to continue researching by yourself :-) And if you have any comments or questions please post here!
submitted by haveyouheardaboutit to CryptoCurrency [link] [comments]

The Unofficial Cardano FAQ - V3

(if you would like to add information or see mistakes, just comment below and I will credit you)
What is Cardano? Cardano is an open source and permissionless "Third Generation" blockchain project being developed by IOHK. Development and research started in 2015, with the 1.0 mainnet launching in 2017. Cardano blockchain is currently being developed into two layers. The first one is the ledger of account values, and the second one is the reason why values are transferred from one account to the other.
  1. Cardano Settlement Layer (CSL) - The CSL acts as the ledger of account or balance ledger. This is an idea created as an improvement of bitcoin blockchain. It uses a proof-of-stake consensus algorithm known as Ouroboros to generate new blocks and confirm transactions.
  2. Cardano Computation Layer (CCL) - The CCL contains the data how values are transferred. Since the computation layer is not connected to balance ledger, users of the CCL can create customized rules (smart contracts) when evaluating transactions. (https://support.bitkub.com/hc/en-us/articles/360006678892-What-are-the-two-layers-of-Cardano-)
IOHK has the contract with an undisclosed party to develop the project until the end of 2020, at which point the community may elect another development team - on the assumption that the voting infrastructure has been completed. However CEO Charles Hoskinson has stated that they will develop the project until it is completed, and they are simply financed until the end of 2020.
Cardano was the first project built on a peer-reviewed scientific development method, resulting in dozens of research papers produced by IOHK. Among these papers is Ouroboros Genesis, proving that a Proof of Stake protocol can be just as secure as Proof of Work - which was originally developed for Bitcoin, and refined for Ethereum. This PoS protocol considerably lowers the resources cost to maintain network while still maintaining security and network speed.
Cardano as a financial infrastructure is not yet completed, With significant development to be rolled out.
What were the other two generations of blockchain? Gen 1 was Bitcoin. It exists by itself and talks to nobody but Bitcoin. It is capable of peer to peer transactions without a third party in such a way that you cannot cheat the system. This was a major step forward for the E-cash concept that people have been working on for the 20 years prior.
Gen 2 was Ethereum and other smart-contract platforms that allow other coins and platforms to be built on top of their infrastructure. These coins can interact with others on the platform, but cannot interact with other platforms. Meaning it is still not truly interoperable. Most Gen 2 blockchains are also using Proof of Work likes Bitcoin, which effects scaling. Also missing is a built-in method to pay for upgrades and voting mechanics for decision making.
Gen 3 blockchains are a complete package designed to replace the current financial infrastructure of the world. Cardano is using Proof of Stake to ensure security and decentralisation(Shelley). Scaling through parallel computation (Hydra in Basho), Sidechains to allow the platform to interact with other platforms (Basho), and also include mechanisms for voting for project funding, changes to the protocol and improvement proposals (Voltaire). Finally smart contracts platform for new and established projects that are developer friendly (Goguen).
Who is the team behind Cardano? There are three organisations that are contributing to the development of Cardano. The first is the Cardano Foundation, an objective, non-profit organisation based in Switzerland. Its core responsibilities are to nurture, grow and educate Cardano users and commercial communities, to engage with authorities on regulatory and commercial matters and to act as a blockchain and cryptocurrency standards body. The second entity is IOHK, a leading cryptocurrency research and development company, which holds the contract to develop the platform until 2020. The final business partner is Emurgo, which invests in start-ups and assists commercial ventures to build on the Cardano blockchain.
www.Cardano.org www.emurgo.io https://cardanofoundation.org/en/
What is the difference between Proof of Work and Proof of stake? Both these protocols are known as “consensus protocols” that confirm whether a transaction is valid or invalid without a middleman like Visa or your bank. Every node (active and updated copy of the blockchain) can agree that the transaction did take place legitimately. If more than half validators agree, then the ledger is updated and the transaction is now secured. Proof-of-Work (PoW) happens when a miner is elected to solve an exceptionally difficult math problem and gets credit for adding a verified block to the blockchain. Finding a solution is an arduous guessing game that takes a considerable amount of computing power to compete for the correct answer. It is like “pick a number between 1 and one trillion” and when you get it right, you get $30,000 in Bitcoin, so the more computers you have working on it, the faster you can solve it. Also the more people who are trying to solve the same block, the harder the algorithm, so it may become 1 in 20 trillion. The downside is the massive amounts of power required to run the computers that run the network, and the slow pace that blocks are solved. To “Hack” a PoW system, you need 51% of the computing power, which would allow you to deny transactions, or spend the same coin twice. At the moment there are 8 main mining operations for bitcoin, and 4 of them make up more that 51% of the mining power.
PoS instead selects a coin at random that already exists, and the person who owns that coin is elected to put the work in to validate the block. This means there is no contest and no guessing game. Some computer power is required, but only a fraction of a PoW system. The complex nature of selecting a coin that exists on the correct and longest chain and is owned by someone who can complete the block, AND in such a way that it is secure AND that computer currently running AND that person also having an incentive to complete the work, has made the development of PoS very slow. However only a few years ago it wasn’t even possible. In this method, the more of the coin (ADA) you stake, the more likely you are to be selected to close a block. Cardano also allows you to delegate your stake to someone else to validate the block so they do the work, and you share in the reward for doing so.
To “hack” a PoS blockchain you need to own 51% of the tokens, which is significantly harder than owning 51% of the computing power.
What is ADA and how is it different to Cardano? Cardano is the name of the network infrastructure, and can be thought of like a rail network. ADA is the native token that has been developed alongside Cardano to facilitate the network operation. This helps confusion and maintains distinction, compared to Ethereum being the native token of Ethereum. Similar to bitcoin or any other token, ADA can be sent peer to peer as payment, but is also the reward for running the network, and what is taken as transaction fees.
In this metaphor “Cardano” is the train tracks, that everything runs on. A stake pool would be the locomotive, facilitating transactions on the network while ADA is the coal that powers the locomotive. The train carriages are Decentralised applications (Dapps) that are also running on cardano tracks, but are not actively powering the network.
What is staking Cardano is a Proof of Stake protocol, and uses already existing coins like a marker to ensure security. The protocol chooses a coin at random and the owner of that coin is elected to validate a block of transactions. Staking is the process of adding your ADA coins to a Pool that has the resources to run the network. If the pool you have chosen to "delegate" your stake to is chosen to close/validate a block, then you get a portion of the rewards. The ADA never leaves your wallet, and you can "undelegate" whenever you like. this increases stability of the network and also gives an incentive to pool operators to invest the time and hardware required to run a pool.
What is a stake-pool and how does it work? Cardano.org FAQ on the issue goes into much more detail
A stake pool is where the computing power of the network takes place. During ITN there was 1200 registered stake pools while 300 were creating blocks. You can manage your own stake-pool or delegate your ADA to an already registered pool. Rewards are determined by the protocol, however the pool may elect to charge fee Percentages, or flat rate fee to upkeep their pool.
Can I Stake my ADA right now? The staking testnet has closed, If you participated in the Incentivised Test Net and earned rewards, instructions to check the balance are here.
However if you have just purchased some or it was held on an exchange, then you will need to wait until the Shelley mainnet launch happening at the end of July 2020.
Where do I stake my ADA? Daedalus Flight wallet, and Yoroi Wallet (as a chrome extension) are the current best options. Adalite and several other third-party wallets also exist. Coinbase will also allow staking as a custodial service, and many exchanges may offer “staking as a service” so you can leave your coins on the exchange and still earn rewards if you enjoy trading. I do not recommend leaving coins on an exchange unless you are actively trading.
What are the staking rewards now and what can I expect on a return in the future? The Incentivised Test Net (ITN) Delivered 10%-15%pa returns on average. The future of staking will most likely be lower, but will depend on the amount of ADA staked across the network and the amount of network traffic.
Check https://staking.cardano.org/en/calculato for a clearer picture.
what is a Pledge? To stop one person operating many pools, the rewards that a pool earns will vary depending on the amount of personal ADA they “pledge” to open the pool. This means that 50 pools with a 1,00ADA pledge each will be overall less profitable than 1-2 pool with the max ADA pledge (unknown but likely around 300k). Even if the 50 pools have the same over stake delegated by other users and have a better chance of being selected to close a block, the 50 pools may receive lower rewards.. (at least that is the theory)
Who is IOHK? IOHK is a for-profit software engineering company founded by CEO Charles Hoskinson and Jeremy Wood in 2015 that has taken a scientific approach to the development of blockchain. IOHK started with “first principles” and looked at questions like “what is a blockchain” and “what should a blockchain be able to do” rather than accepting the established paradigm of Bitcoin and Ethereum. IOHK was originally Input Output Hong Kong, but is now Input Output Global and is based in Wyoming USA employing over 230 staff. IOHK has established research labs in several universities in order to complete the Cardano project, and is also developing Ethereum Classic, Atala, Mantis and possibly other Blockchain related programs and infrastructure.
Who is Charles? Charles Hoskinson is an early adopter of cryptocurrencies, American entrepreneur and cryptocurrency specialist. Charles Co-founded Ethereum with Vitalik Buterin and 5-8 others, However he only worked on that project for approximately six-months. Charles is now the CEO of IOHK and the director of The Bitcoin Education Project.
Why isn’t ADA on coinbase? Cardano and coinbase have recently connected in a big way. With IOHK turning over all their ADA to the custodial services of Coinbase. This means that Cardano and Coinbase have been working together for some time and there is a strong partnership forming. Staking and cold storage will be available and trading on Coinbase will most likely become available after the release of Shelley (although no official word yet)
Why Doesn’t Cardano have a Wikipedia Page? Wikipedia has strict guidelines on what can be turned into an article. As there has been no coverage of Cardano from mainstream media or “noteworthy” sources, there is no article yet. Wikipedia will also not accept sources from IOHK as they are not considered “reliable” and must come from a third party. This will most likely change soon.
Cardano does have a dedicated community driven wiki
https://cardanowiki.info/wiki/Home
What is Atala and why do I care?*
Atala is a suite of services being developed on top of the cardano blockchain by IOHK that focusses on credential certification, for things like education, work history and degrees (Atala Prism). Product counterfeiting protection through registering products on a blockchain and create taper-proof provenance. This does not only apply to Gucci handbags, but also medication, art, and anything that can be counterfeited (Atala Scan). As well as supply chain tracking to see issues and inefficiencies with greater transparency(Atala Trace).
Im new, how much is a good investment?
Cardano is still a speculative market and although there is amazing potential here, it is still only potential. When investing in any High risk market like Crypto, only every invest what you are willing to lose. Cardano may be testing the 10c barrier now. But in March it dumped to 1.7c. And if you suddenly need your money back during the dump then you are out of luck. Do your research before you FOMO in. Start with a small amount and send it between wallets and exchanges to understand how the system works. Store your private keys offline (or online cloud service but encrypted) with a method that is unlikely to be damaged AND have multiple copies. So in the case of a house fire or a blow to the head, or the cloud service being shutdown/destroyed, you do not lose your money.
Timelines
https://roadmap.cardano.org/en/
Shelley Decentralisation rollout and news
Goguen smart contract rollout
Voltaire Voting mechanics – no official roll out timeline (though promised for 2020)
Basho scaling and sidechains – no official roll out time line (most likely 2021)
submitted by YourBestMateRobbo to cardano [link] [comments]

How my dorm became a drug superhighway.

The year was 2012, and we were all supposed to die in December. It was my freshman year of college. I was settling in quite well. I made friends with a bunch of people in our residence hall, we hit it off immediately. We started going out on the weekends, starting with thirsty Thursday, which turns out is actually a thing. I had more than one room mate. We lived in a four person suite with two bedrooms. I had a full ride to my University, so I had a lot of extra money to spend on my living arrangements and meal plan. Oh yeah, I was also a huge pothead.
I made friends with the dealer on my floor and started buying him extra meals in exchange for weed. That's when one of my room mates came to me with a proposition. He asked me if I knew what bitcoins were. I did not. He explained the virtual currency and how it worked. Then he really laid it all out. He told me that he had quite a lot of bitcoins and that he wants to get into selling weed. It all sounded great, but I wasn't sure what he needed me for. He then told me that he doesn't really talk to anyone and that he always sees me with people and going to parties every weekend. Okay, this makes sense. He told me how the operation would work, and it sounded swell. For the record, I was eighteen and very stupid. Anyway, he would purchase the drugs from the Silk Road, a dark website where you can buy literally fucking anything. Our friend Noah would then get the goods delivered to his apartment, which had a mailroom with hundreds of mailboxes. This was good because it would be just a little bit less suspicious, also his apartment was not on our campus. Then we'd package everything there and move it to our dorm, which had it's own security. We lived in North Philadelphia, so the security and police were always looking out for the students. After we safely had the products, I would find the buyers.
Our first shipment went well. We ordered a half pound of weed, a gram of hash, ten hits of LSD, a small bag of opium (for us), and 1000mg of Alprazolam extract for my room mate's personal anxiety treatment. We got into this business to become weed salesmen. That weed took forever to sell. Everyone who sold weed already had good connections from their hometowns. The LSD though, that sold in five fucking minutes to one buyer who was interested in buying much more than ten hits. He asked us if we could sell him a couple hundred tabs. He said he'd pay $350 for each sheet of 100. We looked at the price per sheet on the Silk Road. It would cost us only $80 each. Yes sir, we can absolutely sell you a couple sheets. We told him we'd call him when it arrived. Later that night we brewed some opium tea and celebrated entering the LSD business. We bought the sheets for him, and we also bought two extras in case anyone else wanted some.
The next shipment came with no problems. Our friend came over and bought the sheets we had promised him. We made nearly $800 on that deal. We thought that was a lot, so we celebrated. Later that same day, while smoking a blunt in our courtyard, I made friends with some art students. They invited me to their dorm on the third floor. I agreed, went with them, and we listened to music and painted the walls of the dorm room which was super against the rules. They started talking about how they had taken magic mushrooms two weeks before and how it was life changing. I told them I had two-hundred hits of acid in my room. I've never seen people get so excited in my entire life. They bought all of it. They paid $400 for each sheet. Seemingly out of nowhere we made $600. Again, we thought this was a lot.
My room mate was really happy with my networking abilities. Dude, I was just getting high with some hipster art students. I didn't really possess the "networking skills" that everyone thought I had. We went online and purchased another five sheets. We started getting a bit more confident in our ability to sell this magic money making paper. That week I was in one of my classes and had to do a group project with a kid named Eddy. We went to his apartment to work on the project after class. Eddy had an apartment off campus because he was an upperclassman. On the way he asked if I smoked weed. Of course. He said he had something to show me. When we got there he showed me a small weed plant he was growing. It was an adorable little plant in a flower pot by the window. I asked if he needed any weed and he said that he did not. We smoked a bit and then her offered me a Xanax. I had never taken Xanax, so I googled the pill he offered me. Alprazolam. Huh, that's funny. I told him I had 1000mg of alprazolam in my room. This excited him.
I asked my room mate if he was willing to sell some of his private stash. Eddy only wanted to buy around 100 milligrams. He agreed and I brought Eddy to my dorm. We gave it to him for the cool price of $150, a slick markdown from what he was paying. After all we hadn't even planned on selling that stuff. He asked how we got it so cheap and if we could get anything else. We told him that we sell LSD. He said he loves hallucinogens and would love to purchase a sheet, so he did. Four sheets left. If we sell them, we can get a new and faster computer.
The weekend came and I was hanging out with two of my friends from our residence hall. Joe, who was really chill and loved smoking weed as much as I did. And Bianca, who was so cool that it frightened me. She was really intimidating. I had a huge crush on her, but she was "talking" to a kid that lived in Johnson and Hardwick hall. Bianca was the type of person you see in movies about cool kids doing cool things. A character who has a lot of depth, but it takes nearly the whole movie to slowly peel back the layers, and by that time you're in love. I told her if we sold the rest of our acid I'd buy her a new tattoo. She was covered in them. That night Joe was going to take us to his friend Jamie's house. We were going to try cocaine for the first time. I was terrified. Not only was I terrified about trying cocaine, but I was scared of doing it with Bianca. I just didn't know how I would act, and I didn't want to do something stupid.
We arrived at Jamie's house. Jamie was also intimidating. His house was what your typical trap house looked like at the time, with a bunch of really expensive music equipment. Everybody wanted to be a rapper or a D.J. that year. He introduced all his friends and offered us lines of coke. Here we go. Joe went first, he'd already done some before. Bianca went next without hesitation. Now it was my turn. I remember my hand shaking with the rolled up bill between my fingers. I chose the smallest line and sniffed. It did not taste anything like I expected. Five minutes went by. Oh, this is what cocaine is like. It was so underwhelming. It was also some thoroughly stepped on shit. I know that now because since then I've done some foreign blow that literally almost made my heart stop. Anyway, Jamie and I got to talking, mostly about his "music career". Jamie told me if I ever wanted to buy cocaine in bulk to hit him up. I laughed and told him if he ever wanted to buy LSD in bulk to hit me up. I was half joking. He looked at me with the straightest face and asked if I was serious. Honestly, this Jamie guy really scared the shit out of me. He was a good ten inches taller than me and the whole scene was really starting to freak me out. I told him I was serious though. He told me to come with him.
He brought me into his room and closed the door. In the room it was quiet. The walls were sound proofed. I looked around and the room was full of money, cocaine, and guns. Okay, he's probably not going to kill me. I hope. He then asked about my LSD connection. I told him I could get sheets for $350. He said he wanted books. Books? This guy wants books? I didn't know this at the time, but a book is a thousand hits of LSD. I told him I had to talk to some people and I would let him know the price, but that I could definitely make it happen. We went back into the party and he gave me line after line of cocaine. Joe offered him money for the lines, but Jamie told him not to pay. He said your friend here bought you guys as much coke as you want for the night. Honestly, that made me feel really cool. After the party I talked to my room mate and told him what happened. We looked up the price of a book on the Silk Road. $300. Not only could we have saved a lot of money if we had just bought a book from the start, but we were going to make a lot more money selling by the book. The days of getting excited over $800 were about to come to an abrupt end.
I talked to Jamie and asked how much he would be willing to pay for each book. He said he would pay no more than $3000 for each book. We decided we would sell him the books for $2,800 each. He agreed and asked how many we had. I said we can start with five books. He agreed. This was perfect. Not only were we about to make more money than we had ever expected, but acid was incredibly easy to ship. They were basically sheets of paper. Our supplier used to send it to us in between the pages of large children's coloring books. The books, or prints, as our supplier called them, blended with the kid's books very well. Our prints consisted of a large picture of Bart Simpson, The Grateful Dead bears, and a double rainbow portrait. If you didn't know what acid was, you wouldn't know these were drugs. We made nearly $14,000 from that first deal.
Over the course of a few months we would sell close to thirty-thousand hits of LSD. We had $75,000 in cash sitting in an empty bedroom at Noah's apartment. I stopped going to class. My room mate had filled his entire room with computer parts and instruments. Noah, well we didn't really see him much, but he was always present when we needed a shipment. We broke our cardinal rule of not getting high on our own supply. We took a lot of acid that semester. It was an extremely enlightening period for us. Things in my world began to take on entirely new meaning. I had a newfound appreciation for things I had never noticed. The connections with my friends became very strong and we talked about a lot of stuff that was just too deep for my other peers to even scratch the surface of. It was nice.
By my birthday in February we had over $200,000 in cash. We didn't die in December, not that I thought we would, but some people were legitimately surprised. They were mostly art students. Things started getting a little crazy. My room mate and I were taking a lot of Xanax by this time and a lot of nights celebrating were never logged as memories. We always told ourselves we would only sell LSD. We had sparked a huge psychedelic scene in and around Philadelphia. There were literally parties where everyone was tripping acid. Many groups of people began taking acid and doing really creative stuff that I admired so much. So much good music and art was around during that period. I felt like I was living in San Fransisco in the middle 60's. It felt like we were part of this incredible scene that nobody outside of the city knew about. Of course every wave has to break and roll back.
It was getting close to the summer. I hadn't been to class in months. We hadn't seen Noah since the previous shipment about a month prior. It was a regular weekday, but I wasn't going to class, so I took two hits of acid. I spent most of that evening and night writing and yapping into my tape recorder. I was on the subject of togetherness and how there are so many things that are so incredible that we never notice even though they're right in front of us. Acid talk. I was looking at a glass of water, thinking about its importance, and how so many of us take it for granted. That's when my room mate came home. This was my room mate though. Remember, we had a two bedroom, four person suite. My room mate, who was never involved in our operation. He was obliterated, and not from alcohol. This was something else. He limped into the room and collapsed on the bed. I immediately got the rest of my room mates together. That's when Christian told me what transpired earlier while I was locked in the bedroom tripping acid. He told me that my room mate had broken up with his girlfriend, took an entire bottle of lorazepam, and tried to cut his leg open with my biology scalpel. What the fuck.
I examined his leg and he did not try to cut it open, he succeeded. He had a gigantic cut all the way down his lower leg that was fixed up by his father who is a surgeon. His father then brought him back to the dorm. The condition he was in was terrifying. He was breathing, but not well. His heart rate was also very low and we had to monitor him for the remainder of the night, taking shifts to make sure he didn't stop breathing. I couldn't believe his father had brought him back in the condition he was in. The next morning I was exhausted. My room mate and I, the one with the bitcoins, left and went to Noah's apartment to relax for an hour. While we were gone Bianca was to watch over him with her room mate. When we got to Noah's we had a new problem. Noah hadn't gotten out of bed for what looked like weeks. He had ran out of his antidepressants and was in bad shape. At this point I checked out. I walked into the living room and opened a bottle of champagne. I poured a glass, popped a Xanax, and sat on the sofa. I was still a little foggy from my acid trip and I hadn't slept all night. That's when my phone rang. It was Bianca.
I answered the phone and her first words were: "Your room is full of police.". Well, it's been a good run. On my desk were a couple thousand hits of LSD and a handgun. In the other bedroom were numerous unopened box's of expensive computer parts, scales and drug paraphernalia galore, and a large pile of white powdered alprazolam. That room also smelled heavily of weed because there was a half pound out in the open. We had gotten very sloppy. I asked her if my room mate was okay. She said that's why the police are there. She said his mom was trying to reach him and he wasn't answering her, so she called the police for a wellness check. Bianca then started talking to someone and hung up the phone.
We pondered whether or not to flee the country and become outlaws. We did after all have all the cash here at Noah's. Close to a million dollars. Maybe more. Because we were getting sloppy, we had also started selling hash, Xanax, LSD, 25i-NBOMe, 2c-b, 2c-i, 2c-E, Mescaline, cocaine, MDMA, MDA, LSA, clonazepam, ativan, and other various designer drugs. We were going down for a long time. I started thinking about my life. It literally was flashing before my eyes. I thought about my high school crush, and how I should have been more upfront with her about how much I liked her. I loved her. I thought about the time we slept in the same bed and I couldn't fall asleep because I couldn't believe she was really laying next to me. I remembered how I never wanted to wake up next to anyone else. I thought about my trivial crush on Bianca and how shallow it really was. I thought about my parents and how they'd raised me better. How they did so much for me so that I could go away to college and have a better life than they had. I thought about sitting on the beach last summer without a care in the world. The "problems" in my life that seemed hilarious now. Will I go to prom? Is my car cool enough? My k/d ratio in Call of Duty. How could so much happen in less than a year? That's when Bianca called me again.
I was terrified to pick up that phone. We looked outside to see if police were surrounding the apartment complex. They were not. I answered the phone. She said the police were gone. She had put my gun and LSD in my desk drawer. The police never entered the other bedroom. It was just a wellness check. An ambulance came and took my room mate. He was going to be okay. I hugged my partner in crime and we cried. I wish I could tell you we cleaned up our lives after that. My room mate with the bitcoins developed a really dangerous drug habit after that. He spent most of his money on drugs over the next few years. I went back to class after that summer, but stopped going again because I wanted to party instead and start a career as a writer. I failed out of college. Throughout the years I went on numerous adventures all around the world. I have hundreds of stories, I just have to write them. Oh and I have to learn how to write properly. I don't use a lot of drugs today, and I don't encourage people to use drugs. I have unfortunately lost many friends during the opiate epidemic. Weed is cool though, I like weed. I wouldn't tell people to smoke it, but I'll never shame someone for enjoying some cannabis. Actually, I don't really shame people for anything, it's just not my place to judge anyone. Feel free to judge me though, about how my dorm became a drug superhighway.

\*Thanks for reading, more stories available on my blog. There's a link on my profile.*

Edit: This story is based around actual events that I have experienced.
submitted by XleepyJoeBenzo to Drugs [link] [comments]

Bitcoin Hacks & basic ways to protect your Crypto

Interest in Bitcoin is increasing globally. More and more people are willing to participate in Bitcoin trading and mining. However, Bitcoin history shows that it is not always as safe as we would like it to be. Let’s take a look at some major Bitcoin hacks.

Allinvain

Allinvain is a nickname of a user on BitcoinTalk forums. Basically, he was the first one to experience a major Bitcoin loss. He lost 25,000 bitcoins, all together it was worth around $500,000. The user believed that someone hacked into his computer to steal BTC.

Mt Gox

Shortly after Allinvain’s case, the next hack attempt happened. Mt Gox was one of the biggest exchanges that provided a trade between Bitcoin and fiat money. Hackers compromised its website and started to sell Bitcoins. Their actions made the price go down dramatically. However, attackers did not pay attention to the $1000 limit Mt Gox had. Nonetheless, that hack attack had an important influence on BTC.

Other exchanges

Exchanges are being attacked by hackers quite often.
In 2012 Bitfloor suffered a terrible attack and lost 24,000 BTC (around $250,000). Unfortunately, this exchange was not able to survive the attack and was closed in 2013.
In 2015 Bitstamp exchange was hacked. It lost approximately 19,000 BTC (around $5 million).
In 2016 Bitfinex also lost 120,000 BTC (around $77 million) to hackers.

Twitter hack

The last attack happened in one of the biggest social nets. Twitter became a part of the latest attackers’ actions. The most significant and world-famous accounts promoted Bitcoin scam for several hours.

Anti-hack protection

The most important question is how to protect your Bitcoin savings from upcoming attacks. Here are some basic things that may help you to be safe:
Even though there is no way to be a hundred percent safe, there are a lot of steps we can take to avoid unfortunate losses. Cryptocurrency services are improving their protection systems all the time, and we all should do what we can to make this network more secure.
submitted by SimpleSwapExchange to BitcoinMarkets [link] [comments]

PSA: How to use crypto to sell/buy PMs on r/PMsForSale

TL;DR 1: this is not an investment recommendation. This is not an endorsement of any crypto coin, token, or service. This post (which is a bit longish) describes how to use crypto as another payment mechanism. It would just add another tool to your PM trading toolbox.
TL;DR 2: This is not an exhaustive review – it’s a simplified how-to. Calling me out on certain minute aspects is useless. However, if I made a mistake, or omitted something important PLEAESE correct me.
TL;DR 3: I’ll describe everything in chapters, so as you go down, if you feel this is irrelevant to you, you can stop without spending too much time reading it all.

Chapter 1: Why use crypto

  1. You control the entire transaction, end to end. You do not need a third party (Like PayPal or Google) telling you what you’re allowed to sell, and for how much. You do not need to resort to subterfuge (“use Friends & Family, and make sure to leave no notes!”).
  2. Crypto transactions add a level of privacy (depending on how you use them).
  3. Transactions are secure (read more about blockchain technology), and usually only involve you sharing your crypto address with your counterpart.
  4. Transactions are irreversible – good if you’re an established seller who’s afraid of chargebacks by scammers.
  5. Yet transactions can still be proven – they’re out there on the blockchain, available for all to see.
  6. Most of the time, transactions are fast (depending on network traffic and amount of gas paid).

Chapter 2: Types of crypto

I’m not going to go into technicalities, and definitely not recommend anything. Let’s just split the crypto world right now into 2 types of coins: stable, and unstable.
  1. Unstable coins (Bitcoin, Ether, Ripple etc.) can see their fiat value go up or down several times a minute. They’re volatile, and while they can be used to pay, the buyer and seller need to agree on the spot, convert fiat to the coin and start the transaction – at the end of which, the fiat value received may be higher or lower than when the transfer started. Because of that, I’ll avoid discussing them here.
  2. Stable coins usually run on the Ethereum blockchain, and use a technology called “smart contract” to attach their value to fiat. A stable coin like USDC, DAI, USDT etc. will always be worth $1 (give or take 1% at certain times). For all intents and purposes, if I quote you a price of $250 and you send me 250 USDC – we’re done.

Chapter 3: what do I need to have to trade in stable coins?

  1. An address – your crypto address allows you to control crypto on the blockchain. More specifically, it allows you to withdraw funds (since everyone can deposit to your address, whether you want it or not).
  2. A crypto wallet. A wallet is NOT where you hold your coins! Your “money” is on the blockchain, assigned to your address. Your wallet allows you to mange the coins in that address. You can either use one of the free wallets out there, or have one provided to you by an exchange. I recommend MetaMask. It runs as a browser extension (Chrome, Firefox, Brave) or a mobile app. Make sure you do your due diligence before selecting a wallet, so you wont use a scammy app, that will use your pass phrase to clean up your address!
  3. Some Ether (usually 0.05-0.1 ether is enough for several transactions) – every transfer on the blockchain has a fee, representing compensation for the computer work done to transfer funds from address to address. This fee, known as “gas” can go from fractions of a cent to several dollars – depending on the blockchain traffic at the time. You can control the amount of gas, and price of gas for your transactions, but generally speaking: the less you pay, the slower the transfer. Gas is paid in Ether only, so you need some in your wallet (see below on how to get it).
  4. If you want to sell using crypto – you’re done!
  5. If you want to buy using Crypto, you’ll need to convert some fiat to stable coins – see next chapter.

Chapter 4: Quickest way to get stable coins

The easiest way to start (in the US – your miles/kilometres may vary elsewhere) is to open a Coinbase account.
(Disclaimer: you can choose any other exchange. I’m not compensated by Coinbase, I have no stake in Coinbase, I don’t work there, or know anyone who does. There’s a reason I mention them: they make this simple.)
While Coinbase is the fastest and easiest way to go for noobs, there are some caveats:
  1. Coinbase is a registered financial company. They require full KYC (i.e. photo of your driver’s license). Everything you do gets reported to the IRS, authorities, etc. But then, your bank does the same.
  2. Coinbase doesn’t care where the funds come and go – unless law enforcement, IRS, SEC etc tell them to care. If you’re privacy-oriented, an exchange is not for you, go to the next chapter.

Let’s look at the steps of using Coinbase, and how much they’ll cost you:

  1. Open Coinbase account (free)
  2. Go through KYC needed to connect a bank account to your Coinbase account (free)
  3. Transfer fiat to your account (free if bank transfer, otherwise credit/debit card fee applies)
  4. Convert fiat to the stable coin USDC (FREE! Since Coinbase “owns” USDC, they don’t charge anything to convert back and forth between USD and USDC. And it’s always 1-1 conversion.)
  5. Transfer USDC to an external wallet (yours, or a sellers) (FREE! Again, another perk – Coinbase pays your transfer gas fee).
  6. If you’re content with using Coinbase as your wallet, you are done!
a. When you want to buy, you ask the seller for his address, and transfer USDC to him (free).
b. When you want to sell, you give the user your Coinbase USDC address and he sends there (free again).
c. Make sure you send the right address – there are no backsies in crypto!!!

Using your own wallet:

  1. Install MetaMask. Follow instructions to create your address. Make sure you keep the pass phrase safe (NOT ON YOUR COMPUTER).
  2. Go through steps 1-5 to convert some fiat to USDC for free.
  3. Buy some ether – Currently Ether spot is about $230, meaning it’ll cost you about $10-20 to get some Ether + whatever fee Coinbase has on trading.
  4. Send the USDC to your new address.
  5. Send the Ether to your new address.
  6. You are now good to send and receive payments!
  7. When you receive USDC from a buyer, you can either keep them in your wallet for further use, or send to Coinbase, convert to fiat and send to your bank account. Always remember: on Coinbase 1 USDC == $1.

Chapter 5: Doing it on your own – for advanced users only

If you don’t like sharing all your info with Coinbase, you can definitely just install your own wallet (MetaMask is still the best option, IMHO, but there are many more), and fund it personally.
The biggest challenge you’ll face is: how do I convert fiat to crypto? Here are some options:
  1. The easiest: get someone to sell you some. Someone who already went through the whole process, and will agree to give you some crypto. Once you have crypto, you can easily convert it to any other crypto, without using any exchange, using crypto swap apps.
  2. The more expansive: use a service like Changelly (and there are others – again: I have no stake) to “buy” crypto. Take into account that they have fees. There are also services (like LocalBitcoins) that will allow you to buy directly from other people, for lower fees.
  3. You can use a different exchange, perhaps even one in a different country. Take into account that you’ll need to get actual money there, so at one point, someone will know something about you.
As said, once you have ANY crypto in your wallet, it’s easy to convert it to stable coins, Ether, or everything else you need.

Summary

I tried covering the basics of using crypto for payment. I did my best to avoid techy aspects and jargon.
Crypto is here to stay. Next (and current) generations will use it, like we’re using credit cards and PayPal. It will have no “magic” or “hoax” attached to it. It’s not “good” or “bad” – it’s just another way to convey value.
I was taught all this by someone. I’m sharing this with you now, in the hope you’ll share it with other people. That’s how knowledge grows.
If anyone wants any clarification, or expansion on any item, feel free to comment below, or reach out to me.
submitted by Niceguy955 to Silverbugs [link] [comments]

$MTXLT — The Fuel For Private DeFi

Call courtesy of facemeltersmicros on telegram
T.me/facemeltersmicros
Circ Supply: 47,844 Total Supply : 900,000
Price $47 Market Cap $2.2m
https://coinmarketcap.com/currencies/tixl/
Buy on probit exchange (liquidity is here) & Binance Dex
MTXLT (later TXL) is the native token of the Private DeFi Platform called Autobahn Network. It can be transferred through the network with zero-fees, reflecting the best features of today's cash.
What is Private DeFi?
Privacy should be fundamental in financial transactions. However, many existing DeFi platforms, such as Ethereum for example, fail to fulfil this criterion – either partly or completely. The Autobahn Network is one of the first of its kind to truly support private DeFi.
What is DeFi about the Autobahn Network?
The Autobahn Network will initially focus on the areas of asset tokenisation and providing a second-layer platform for existing assets on other chains. This will provide the foundation for offering further DeFi use cases in the future. The current focus is on the launch of Alphanet, which will be the first production release of the Autobahn Network.
The Autobahn Network is a decentralized next-generation, second-layer solution for digital assets. It provides the ability to use any cryptocurrency, including Bitcoin, as an efficient & effective means of world payment.
The Autobahn Network employs the most sophisticated technologies to have emerged from the blockchain world over recent years to build a decentralized network, tailored for payments. Bitcoin, and other digital assets, can be sent to the Autobahn Network. Once they are in the network they can then be transferred quickly, privately and with low transaction fees.
HOW DOES IT WORK?
• Send BTC to the Autobahn Network Gateway • The decentralized nodes hold your BTC via a Threshold Signature Scheme (TSS) • Transfer BTC within the network as often as you like • Withdraw BTC to the main blockchain, if you plan to hold it there • The decentralized nodes release your BTC via TSS
To fully appreciate high-speed, you have to experience it yourself. They have developed a fully working Testnet especially for this purpose:
https://autobahn.network/testnet
The Autobahn Network is developed by the non-profit company - Tixl gGmbH, based in Hamburg (Germany). Tixl raised seed capital of USD $1,250,000 in early 2019 by selling the Tixl Token (MTXLT) to retail investors.
Tech behind the Autobahn
https://medium.com/tixlcurrency/the-technology-behind-the-autobahn-network-81fdecf41c20
Most of the time the bottleneck is the consensus. Tixl use their own implementation of the Stellar Consensus Protocol (SCP). Since SCP is known to establish consensus within a few seconds, even if there are some more conflicting transactions, nodes will still be able to reach consensus quickly. It’s also known that SCP can deal with high transaction volumes. Although there is no verified statement from the Stellar foundation, there are rumors that SCP can handle 10,000 transactions per second in certain network constellations
Project milestones and key links
In the future:
Find more details on these events in the medium article released today
https://link.medium.com/qXfp3zjM57
WHY TIXL?
A number of different concepts for improving Bitcoin and the transfer of digital assets in general have been developed, with the ultimate goal of achieving fast and cheap transactions, or to provide privacy. The Tixl Token on the Autobahn Network provides a perfect combination of them all.
REVENUE STREAMS
Transaction Fees
Transactions in the Autobahn Network will be cheap but not completely free. Fees will be paid using in the currency of the asset being transfered. The revenue will then be used to purchase MTXLT on the open market. As a result, fees are indirectly paid in MTXLT.
Listing Fees
As soon as the Autobahn Network gains adoption, it will become a sought-after platform for other assets. A (monthly) listing fee, to be paid in MTXLT, will also serve to increase the public demand for MTXLT.
Additional Services
Besides the obvious sources of revenue, other features - like the purchase of nicknames - can also be used to generate revenue.
Social media buzz
Ivan on Tech about Tixl in "TOP ALTCOINS 2020 - Programmer explains"
https://youtu.be/ynyvwZetb8s
Something different?
Tixl global reserve has been developed to provide extra confidence to investors. Read more here:
https://medium.com/tixlcurrency/tixl-global-reserve-tgr-update-c59bee09c66d
Other questions
Do I need TXL to send and receive BTC and other third-party assets?
To ensure the greatest usability, they decided against using TXL directly as "fuel" because it would provide an obstacle to use if you had to buy TXL before you are able to transfer BTC, or other digital assets. The same issue has attracted criticism from users of other networks that support different assets. As a solution, they settled on the idea of allowing transaction fees for certain assets (for example, BTC) to be paid in their native currency. One can send BTC through the Autobahn Network without having to purchase TXL and pay much lower fees than you would on the Bitcoin blockchain itself.
How is Autobahn Network secured by Bitcoin?
To increase the decentralization of Autobahn Network, a hash representing the current state of the Autobahn Network ledger will be written onto the Bitcoin blockchain regularly. In doing so, the Autobahn Network will increase its trust level by leveraging the most secure and immutable blockchain in the world.
submitted by therealfacemelter to CryptoMoonShots [link] [comments]

[ Bitcoin ] Technical: Taproot: Why Activate?

Topic originally posted in Bitcoin by almkglor [link]
This is a follow-up on https://old.reddit.com/Bitcoin/comments/hqzp14/technical_the_path_to_taproot_activation/
Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners?
And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess.
First, let's consider some principles of Bitcoin.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so).
So, how does Taproot affect those principles?

Taproot and Your /Coins

Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash).
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input).
However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits!
Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh?
With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save!
And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well!
(P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1)
Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service!
So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win!
(even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot)
And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!

Taproot and Your Contracts

No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade.
So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust.
Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade.
However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade.
In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address.
Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants).
But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer).
Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos).
(technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).

Taproot and Your Contracts, Part 2: Cryptographic Boogaloo

Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code.
This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded.
And you can do that, with HTLCs, today.
Of course, HTLCs do have problems:
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar".
Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given private key to you.
Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige).
(Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key).
So:
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script.
(technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)

Quantum Quibbles!

Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable??
Well, in theory yes. In practice, they probably are not.
It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash.
When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key.
So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key.
(public keys should be public, that's why they're called public keys, LOL)
And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions.
So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort.
Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers.
For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
So:
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).

Summary

I Wanna Be The Taprooter!

So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!

But I Hate Taproot!!

That's fine!

Discussions About Taproot Activation

almkglor your post has been copied because one or more comments in this topic have been removed. This copy will preserve unmoderated topic. If you would like to opt-out, please send a message using [this link].
[deleted comment]
[deleted comment]
[deleted comment]
submitted by anticensor_bot to u/anticensor_bot [link] [comments]

The events of a SIM swap attack (and defense tips)

Posted this on Coinbase and someone recommend it also be posted here. The information below on an attempted SIM swap attack was pieced together through a combination of login and security logs, recovering emails initiated by the attacker that were deleted and then deleted again from the trash folder, and learning from AT&T’s fraud representatives. The majority if this is factual, and we do our best to note where we are speculating or providing a circumstantial suspicion. TLDRs at the bottom.
The full story:
We were going about our business and received a text from AT&T that says “…Calls & texts will go to your new phone/SIM card. Call 866-563-4705 if you did not request.” We did not request this, and were suspicious that the text itself could be a phishing scam since we searched the phone number and it wasn’t overtly associated with AT&T. Thus, we tried calling AT&T’s main line at 611 but all we hear is beep beep beep. The phone number is already gone. We use another phone to call AT&T and at the same time start working on our already compromised email.
While we didn’t see everything real time, this is what the recovered emails show. In less than 2 minutes after receiving the text from AT&T, there is already an email indicating that the stolen phone number was used to sign into our email account associated with Coinbase. 2 minutes after that, there is an email from Coinbase saying:
"We have received your request for password reset from an unverified device. As a security precaution, an e-mail with a reset link will be sent to you in 24 hours. Alternatively, if you would like your password reset to be processed immediately, please submit a request using a verified device.
This 24 hour review period is designed to protect your Coinbase account."
This is where Coinbase got it right to have a 24 hour review period (actually a recovery period) before allowing the password to be reset. However, the attackers knew this and planned to steal the second email from Coinbase by setting email rules to forward all emails to a burner address and also have any emails containing “coinbase” re-routed so they don’t appear in the Inbox. 5 minutes later, they request a password reset from Gemini and the password was reset to the attacker’s password within a minute after that. The next minute they target and reset DropBox’s password followed immediately with Binance. Less than 2 minutes later, an email from Binance indicates that the password has been reset and another email arrives a minute later indicating a new device has been authorized.
It’s at this point that we begin locking the attacker out by (1) removing the phone number as 2FA (2) changing the email password, (3) and three forcing a logout of all sessions from the email. There was a bit of back and forth where they still had an active login and re-added the stolen phone number as 2FA.
They added only one more password reset to a gaming account that was not deleted. I can only suspect that was a decoy to make it look like the attack was directed at gaming rather than finances.
The Gemini and Binance accounts were empty and effectively abandoned, with no balances and inactive bank accounts (if any), and no transactions in 1-3 years. DropBox had no meaningful files (they probably look for private keys and authenticator backups) and the phone number they stole from us was suspended, so as far as the attacker is concerned, there is no meat on this bone to attack again… unless they had inside information.
This is where I suspect someone internal at Coinbase receiving wire deposits has been compromised in tipping off ripe accounts – accounts with new and somewhat large balances. We had completed a full withdrawal of funds from Coinbase earlier in the year, and had a balance of less than $20 heading into May. Deposits to Coinbase staggered in to get above six figures through mid-May then stopped. The attack occurred 7 days after the last large wire deposit was made to Coinbase.
From the perspective of an attacker that had no inside information, we were a dead end with abandoned Gemini and Binance accounts with zero balances and stale transactions, no DropBox information, and the suspended phone number access. Our Coinbase deposits were known to no one except us, Coinbase, and our bank. We were also able to stop the hacker’s email forwarding before Coinbase’s 24 hour period to send the password reset, so this one didn’t work out for the attackers and it would make sense for them to move on to the next rather than put efforts into a second attack only for Coinbase - for what would appear to be a zero-balance Coinbase account based on the other stale accounts.
Then…23 hours and 42 minutes after the first attack, another message from AT&T “…Calls & texts will go to your new phone/SIM card. Call 866-563-4705 if you did not request.” Here we go again. We had been confident in AT&T’s assurances that our account had been locked and would not be SIM swapped again, so we unwisely added the phone number back to our email account as a backup (it’s now removed permanently and we use burner emails for account recovery like we should have all along).
Upon seeing that our phone number had been stolen again I knew they were after the Coinbase reset email that was delayed by 24 hours from Coinbase as part of their security. We did 4 things within 2 minutes of that text: (1) removed the phone number again from the email account – this time for good, (2) market sell all Bitcoin on Coinbase, (3) withdraw from Coinbase, (4) have AT&T suspend service on the phone line.
In speaking with AT&T, they were floored that our SIM would be transferred again in light of all the notes about fraud on the account and the PIN being changed to random digits that had never been used by us before. Based on the response of disbelief from AT&T on the second port, I suspect that this attack also involved a compromised AT&T employee that worked with the attacker to provide timely access to the Coinbase password reset email. Apparently, this has been going on for years: https://www.flashpoint-intel.com/blog/sim-swap-fraud-account-takeove
with phone carrier employees swapping SIMs for $80s a swap.
Remember that most of this was hidden in real time, and was only known because we were able to recover emails deleted from Trash by the attacker.
Since we require any withdrawals to use Google Authenticator on Coinbase, our funds may have been secure nonetheless. However, under the circumstances with attackers that were apparently working with insiders to take our phone number twice in attempts to steal Bitcoin, and it being unknown if they had additional tools related to our Google Authenticator, we decided it was safer on the sidelines. The coins were held on the exchange for a quick exit depending on whether Bitcoin was going to break up or down from $10,000. A hardware wallet is always safest, but we were looking to time the market and not have transaction delays.
For some some security recommendations:
AT&T: If you are going to send a text saying that calls and texts are moving to a new number, provide a 10 minute window for the phone number to reply with a “NO” or “STOP” to prevent the move. This can escalate the SIM dispute to more trusted employees to determine who actually owns the line. Don’t let entry level employees swap SIMs.
Coinbase: Do not default to phone numbers as 2FA. Also, if someone logs in successfully with the password before the 24 hours are up, the password is known and there is no need to send the password reset email again for attacker to have forwarded to them. At least have an option to stop the password reset email from being sent. We did not tag our account at Coinbase with fraud because of the stories of frozen funds once an account is tagged. I’m not sure what the solution is there, but that is another problem.
Being a trader, it would be nice to think of Coinbase as any other type of security brokerage where your assets are yours (someone can’t steal your phone number and transfer your stocks to their account). We fell into that mindset of security, yet this experience has reminded us of the uniqueness of cryptocurrency and the lack of custodial assurance and insurance from exchanges because of the possession-is-everything properties of cryptocurrency.
As many have said before, 2FA with a phone number quickly becomes 1-factor authentication as soon as that phone number is associated with password recovery on your email or other accounts. Our overall recommendation is to avoid having a phone number associated with any recovery options across all your accounts.
TLDR on the process:
Scammers will steal your phone number (in our case twice in 24 hours) and use your phone number to access your email and accounts. They will use your email to reset passwords at financial accounts and file hosting such as DropBox. They will then use that combination to transfer any assets they can access from your accounts to theirs. They will do their best to hide this from you by
(1) not resetting your email password so as to raise suspicion,
(2) immediately delete any password reset emails you may receive from financial accounts to hide them from you,
(3) attempt to forward all emails sent to your address to a burner email, and
(4) set email rules to forward emails containing “coinbase” to an email folder other than your Inbox so that you don’t see the transactions and password reset emails that arrive to your inbox.
TLDR on defense tips: If your phone stops working or you receive a text of your number being ported do the following as soon as possible:
(1) log into your email account(s) associated with your financial accounts and remove your phone number as 2FA immediately
(2) change your email password,
(3) force a logout of all sessions from your email (at this point you have locked them out), then
(4) check your mail forwarding settings for forwards to burner addresses,
(5) check your mail rules for rerouting of emails from accounts such as Coinbase, and
(6) call your carrier to have them suspend service on your lost phone number and ask them to reinstate your SIM or get a new SIM. This will require a second phone because your personal phone number has been stolen.
We hope this helps some others be safe out there in protecting their coins. The more we know, the more we can protect ourselves. Wishing you all the best!
submitted by etheregg to CryptoCurrency [link] [comments]

Most Secure Wallets  Keep Your Crypto Safe & Secure Bitcoin: The Key Altcoins to Massive gains in 2020 ✅The BEST Bitcoin Wallet (BTC) To Use 2020 Some Of Bitcoin: What to know, when (or if) to invest in it - Fox Business The 6-Second Trick For How to Trade Bitcoin Futures - TD Ameritrade

Most people coming to this page will be asking how to buy bitcoin online through a secure means. Well, here is a good starting point. One of the first things to consider when searching for the best bitcoin exchange is; how safe are both the website and server. Most Secure Bitcoin & Cryptocurrency Exchange. The easiest way to Buy/Sell XRP , Ethereum ETH, Litecoin LITC, Dash, Bitcoin Cash (BCH), Zcash (ZEC) Bitcoin Gold (BTG), 0x (ZRX), Golem (GNT), OmiseGO (OMG), Augur (REP), Basic Attention Token (BAT) and Salt (SALT). With servers locked in highly secure buildings behind armed guards and biometric scanners, Kraken is easily one of the most secure exchanges around. 7. Binance. Binance is a cross-currency exchange platform that’s quickly garnering a reputation as one of the fastest, most reliable, and secure exchanges operating today. Comparing its security Bitcoin exchange deposits are a good example. Mt. Gox is the most infamous case of a fraudulent exchange, in which 650,000 bitcoins were lost. There were many warning signs before Gox failed and it’s worthwhile to research the entire saga to learn what they were. The most secure bitcoin exchange is… I could simply tell the reader what is the most secure bitcoin exchange right now, but this may be different by the time you actually read this article (I try to keep these articles up to date, but it can be difficult).

[index] [19265] [27386] [5255] [7194] [10935] [28839] [13271] [25308] [28428] [9450]

Most Secure Wallets Keep Your Crypto Safe & Secure

Hello guys, today I will show you the best secure Bitcoin Wallet that you can have. Wasabi is an open-source, non-custodial, privacy-focused Bitcoin wallet for desktop. It implements trustless ... The herd is coming: Bitcoin has already gained a lot of attention. The greater fool theory has started to show its effect. Coinbase, the US' largest bitcoin exchange, has seen a surge in the ... 0:11 Secure Your Bitcoin 0:13 Keep Your Bitcoin Safe 0:15 Best Bitcoin Wallet 0:17 Best Ethereum Wallet 0:19 Best Litecoin Wallet 0:21 Best Altcoin Wallet 0:23 Top Bitcoin Wallet 0:25 Top Ethereum ... Blockchain.com is another top wallet linked to a bitcoin exchange. Mycelium is one of the most secure mobile wallets, however it can be a little more difficult to use. Bitcoin wallet that is secure, decentralized, and will keep your Bitcoins on the blockchain safe. Best wallet for Bitcoin get it now! 🛒BUY the BEST, NEW, and SECURE Ledger Nano X:

Flag Counter