The Math Behind Bitcoin - CoinDesk

INNCoin AnthemVault's Gold Backed Cryptocurrency

New 'alt' coin from a gold & silver dealer Anthem Vault

We have found that what started as investing in cryptocurrencies, has turned into a much bigger phenomenon. The underlying technology behind bitcoin is a revolutionary set of rules coded to allow people across the planet to exchange value.

We have found that what started as investing in cryptocurrencies, has turned into a much bigger phenomenon. The underlying technology behind bitcoin is a revolutionary set of rules coded to allow people across the planet to exchange value. submitted by FutureCoinClub to u/FutureCoinClub [link] [comments]

The list of best coins (in my humble opinion)

*This is not financial advice or suggestion. Just my opinion*
"S" - super
"A" - really good
"B" - good
"C" - has potential
"D" - keeping an eye on it
"E" - coins to gamble on

Digibyte [DGB]: "S"
I mentioned this coin a few times already. It's because DGB is a true successor of Satoshi's philosophy. It's the purest coin in the market. DGB is the "people's money".

Dash [DASH]: "S"
DAO and masternodes are the future. Satoshi had a vision of altruism. But we cannot expect people to be altruists and lend their infrastructure for the wellbeing of others. The community is just not strong enough to do so. Masternodes are a meritatory focused system to reward those who are willing to lend their infrastructure to be a node in the network. It's a win-win situation for the network and the node owner. Besides acting as a node, it allowed the development of some other features like optional privacy and instant payments.

Monero [XMR]: "S"
When we think about cash, one of its best features that come to mind is privacy. Monero is probably the most famous privacy coin. Transactions are private by default. Another great thing that Monero is taking care of is the prevention of mining centralization. Being able to mine a coin with a CPU is probably one of the main concepts we forgot when it comes to allowing every person to participate in the network.

Vechain [VET]: "A"
If you think about the use-cases of blockchain, you cannot forget how impactful it will be for supply chains. So far, Vechain is one of the best solutions. It's also the most adopted for now.

Nexus [NXS]: "A"
NXS is a coin that deserves to be in the "S" category. But there's still a long way to go for it to achieve that rank. It's a forward-thinking project. They understood how far decentralization has to go to achieve the real meaning of the word. They even though of the quantum computer problem. Fast database, satellites, quantum-resistant, decentralized internet, and user-friendliness are just a few keywords they focus on while developing the coin.

Bitcoin [BTC]: "A"
I'm somehow ashamed to put Bitcoin this low. But let me explain why I did so, while still keeping it in my top list. First of all, I have to say: "Thank you Satoshi!". Bitcoin got this low on my list because I have a feeling too many powerful people got their hands on it. Some got in for the right reasons, while others are not so benevolent. Bitcoin is not "people money" anymore. IMO (very very humble opinion), Bitcoin was a demo project. A very successful demo project. Satoshi gave us an open-source code as a gift to do with it whatever we want. Blockchain is the gift he gave us, not Bitcoin. And we (the community) did it. Bitcoin became a brand. More people heard of the word "Bitcoin" then "cryptocurrency". On the bright side, Bitcoin is the biggest network in the world. While this is true, hodling some is a good idea.

Litecoin [LTC]: "B"
At its time, not many understood what Bitcoin is, and what potential blockchains as technology have. Imagine how forward-thinking was Mr. Charlie Lee. He created the first altcoin. Technology-wise, LTC is a different coin. Mr. Lee didn't just copy-paste the code and name it differently. In my eyes, LTC will always be the "crypto silver" making it a good store of value and medium of exchange.

Chainlink [LINK]: "B"
I believe the solution they are going to provide is too important for the crypto space to ignore it. Oracles are the future, but until we don't see real use-case, it will remain listed as "B". Another reason that doesn't give him the right to be higher in the list is that it's an Eth token.

Dogecoin [DOGE]: "C"
When you think about content creation, you'll see it's highly centralized. Creators depend on the platform's policies and bread crumbs those platforms leave them even after people click on ads. One of the solutions to reward good creators is to make a fast and easy to use tipping system. The first thing that crosses your mind are probably tokens. But imagine a blockchain of its own that enables fast and cheap transactions. Yes, DGB is the way to go. But there is a coin with higher inflation which you don't want to hold for a long time, but spent around to reward other's work that helped you in some way or you enjoy reading or watching. Dogecoin has the potential of becoming the chosen one for this exact purpose.

Verge [XVG]: "C"
When Wikileaks added BTC as a donation medium, Satoshi politely asked to remove it because we were poking the hornet's nest. I don't remember he's exact words, but this was the context. A similar thing happened to Verge. It was like the flight of Icarus. Pornhub listed it as an optional payment method drawing a lot of attention to it. Verge was not mature enough for that kind of exposure. After that, it suffered an attack, and people gave up on it. But if you look closely at the technology behind it, you'll see it's a really good coin. It offers privacy differently then Monero does. If you already haven't, I strongly encourage you to read about Verge's tech. You'll be amazed.

"D" coins:
Polkadot [DOT]
Ethereum [ETH]
Electroneum [ETN]
Cardano [ADA]
Siacoin [SC]

"E" coins:
Theta [THETA]
Zilliqa [ZIL]
Decred [DCR]
Golem [GNT]
Enjin [ENJ]
Zcoin [XZC]
Energi [NRG]

Thank you Satoshi!
submitted by BlueBloodStrawberry to SatoshisPhilosophy [link] [comments]

Technical: Taproot: Why Activate?

This is a follow-up on
Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners?
And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess.
First, let's consider some principles of Bitcoin.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so).
So, how does Taproot affect those principles?

Taproot and Your /Coins

Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash).
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input).
However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits!
Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh?
With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save!
And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well!
(P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1)
Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service!
So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win!
(even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot)
And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!

Taproot and Your Contracts

No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade.
So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust.
Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade.
However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade.
In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address.
Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants).
But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer).
Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos).
(technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).

Taproot and Your Contracts, Part 2: Cryptographic Boogaloo

Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code.
This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded.
And you can do that, with HTLCs, today.
Of course, HTLCs do have problems:
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar".
Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given public key to you.
Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige).
(Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key).
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script.
(technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)

Quantum Quibbles!

Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable??
Well, in theory yes. In practice, they probably are not.
It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash.
When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key.
So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key.
(public keys should be public, that's why they're called public keys, LOL)
And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions.
So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort.
Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers.
For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).


I Wanna Be The Taprooter!

So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!

But I Hate Taproot!!

That's fine!

Discussions About Taproot Activation

submitted by almkglor to Bitcoin [link] [comments]

Fanboyism, maximalism, interoperabilty, working with others and division of time transcript

Hi everybody, this is Charles Hoskinson broadcasting live from warm sunny Colorado.
I wanted to make a video about division of time. I've been recently making a lot of commentary on the ETC ecosystem. I've also reached out to other ecosystems like the Bitcoin Cash ecosystem, the Litecoin ecosystem for a variety of reasons and I noticed that there are some people in the comments and then telegram and twitter and other places say "oh no" focus 100% of your effort on Cardano! Why are you talking to ETC, why are you doing this and doing that?
So first off I run a big company. I we have over 250 people. About half of those people wake up every day and they're involved in Cardano. The other half are not so. As the CEO of a company where you have that kind of division there's non-Cardano things I do. Cardano's our largest project, we're heavily involved in it and obviously we wake up every day and we want Cardano to be successful and have billions of users and this is why we are following the process we're following. We're building the technology we're building. It's why we work very hard trying to commercialize it.
Every deal we do in Africa, every deal we do in eastern Europe, every deal we do in Asia, we have a Cardano first policy of deploying those deals on that platform and we built that platform to service those deals and as that platform evolves you'll see more use and utility from our sales channels in that respect. That said, one of the pillars of a third generation cryptocurrency is interoperability. It's kind of a silly thing to be a maximalist but then also talk about interoperability. What the hell is the point that? Either you want one chain to rule them all and therefore you don't care at all about talking to other systems or you put your money where your mouth is and you work on those other systems. You build expertise in those systems, you affect changes in those systems so that those systems can partner with our systems and work with our systems.
You know the Samsung CEO? He has a division that every day gets up and works with Apple and they work on the motherboards of the iPhone and build memory for them. Do all kinds of cool things and Samsung's division knows what the iPhone is going to look like before any of us knows. At the same time, there's another division at Samsung that wakes up every day and works on phones like the Galaxy to compete with the iPhone. Great companies have the capacity to do these things and we are a great company in that respect we have different and dedicated teams for different products and projects.
Now, we will never work on overlapping systems. It's not the case that we're going to have developers go and work on Cardano and something that's a direct competitor of Cardano because it makes no competitive sense for that to happen and I do not view ETC as a competitor of Cardano. It's a proof-of-work system, not a proof-of-stake system. It's a code-is-law system, not a world-financial operating system. It's a system that will always have a smaller group of people in it and always have a smaller set of things to do so time spent there with a completely separate team has no bearing or impact on our ability to deliver things with Cardano.
I can't accelerate things above and beyond what the teams can do, for example, today. I'm waiting for Daedalus flight to come out. There is nothing I can do. I can't pick up the phone and call the engineers and say can you ship it 15 minutes faster. The plan, it's been set, the release manager is there, the QA, team's there, everybody knows what to do. There's consensus amongst that team. They're going off to the mountain top, get it done and when it's done they'll let me know and then I'll tweet "new Daedalus is out guys" go play with it and it gives me some work to do of course but until they finish their job there's nothing to do in that respect. The Cardano plans we have are well set , we know exactly what we need to do. Those teams are working hard and I do everything in my power to accelerate things where and when it's safe to do so and everything in my power to get things done.
Shelley, for example. We worked so hard to get that out on July 29th, we had almost unlimited overtime. Everyone worked the weekend. Some people worked over 40 days straight to get that release done. Meanwhile half of the company was doing other things in other capacities and working on those projects. None of their work or the other cryptocurrencies we tend to work with had any bearing or impact on our ability to accelerate or decelerate the Shelley work stream. I just want to make sure everybody understands that and for people who have developed a maximalist mindset to get out of that maximalist mindset. There's a place for maximalism, it's called Bitcoin maximalism. If you live there, go there, okay and go believe in that project, in that chain but this is the Cardano ecosystem. It's going to literally work with hundreds if not thousands of different standards over its life. From central banks to other cryptocurrencies to legacy financial operators from the Chases of the world to the Goldman Sachs' of the world.
Provisions will be made to build special hooks for these systems including interoperability with permission systems. It's very likely in the next 24 months Cardano will be talking to an instance of Hyperledger Fabric from IBM. Very likely that that's going to happen. It's very likely that we'll consult on a project that does that and no way does this diminish the road map or somehow make Cardano less competitive. It's actually quite the opposite. The fact that we can work with those systems, the fact that we can do things with those systems means that the platform as a whole is intrinsically more valuable. It's easier to sell to Fortune 500 companies. It's easier to get use utility and adoption because people understand that they're not being led down the road of vendor lock-in and regressing back to the old days of internet explorer or what ConsenSys is trying to do with Ethereum, trying to lock everybody into one standard, one system, rather the value proposition we offer.
Is true interoperability the ability to move in and out? Furthermore, when you create partnerships with other ecosystems then their success is our success. For example, if the treasury system proposal succeeds in ETC they will be in the market for a permanent treasury system in 2021. We as a community can make the case that we've constructed with Voltaire is a great choice for them and of course we'll try to make that case and if it's successful we provide mutual value and benefit more volume and transactions and activity on the Cardano network, and for ETC they have a best-in-class treasury system that meets the values of that community. The exact same argument can be made for Litecoin, or for Bitcoin cash or for other systems and if you want to see the wrapped Litecoin video that I did earlier in the year it gives a great road map for a potential push there.
Furthermore, what if we turn Daedalus into a multi-currency wallet? That's already going to happen because we have a multi-asset standard and so when people issue tokens on Cardano Daedalus will support those tokens sometime in the future. It would be very easy for us to pull Ethereum classic and Litecoin and Bitcoin cash and other ecosystems into the Daedalus wallet. What does that mean? It means that people who live in that ecosystem will be using our technology as their day-to-day experience in hosting for their token! What does that mean if we have a DEX built into that thing? It potentially could create more adoption in use and utility for ada and this is the point we accomplish so much more working together than beating each other down.
I am damn tired of the cryptocurrency markets as they are. The fanboys, the trolls, the FUD, the maximalism, the relentless allegations that people you disagree with or hold different tokens are scammers or criminals or bad human beings. It's time we as an industry set this aside and grow up. Just grow up or else what's the point? Why would anybody looking from the outside at all of this chaos and noise and insanity and maximalism want to come play in this pool? It's like you're about to enter a bar and you see a bar fight. Do you keep going in or you turn around and walk away and say I don't want that trouble. I'm going to go down the street somewhere else that's safer and so how will we ever get mainstream adoption, how will we ever make the argument to governments that they should trust their elections, their property, perhaps even the money of their people on our systems if we're incapable of entertaining other ideas, other philosophies and other ecosystems? We don't deserve the right for that responsibility if we're not mature enough to have differences of opinion and be able to welcome other ecosystems into our own.
So this video is a call against maximalism first and foremost and second it's a realization that the duties of an executive officer are extensive meaning that there are days I wake up and there are Ethereum days and, by the way, working in that ecosystem gives me and my company exhaustive knowledge on how Ethereum works which allows me then to build a better product than they have and understand where all the bodies are buried: all the flaws in the protocols, the security issues, the performance issues, the smart contract development experience. That intimacy is extremely important to be able to predict, react and also plan a competitive strategy that can take you in a different and better direction.
You just don't live in a mono-culture. It's a bad deal, that's the second point. You have many projects. When you have a larger company, some of those projects are completely separate from each other. Some of those projects may have a bit of overlap. We have a philosophy that we don't work on competing products. For example we have done work with horizon (Horizon2020?) and as a consequence of doing work with them we're probably not going to work on zcash at the same time. As long as we have that relationship there we, for example, work on Cardano so we're not going to go work on another proof-of-stake system that wants to be a financial operating system. That would be a direct competitor. For example, Tezos would be happy to jointly author papers and coordinate collaboration but there needs to be a Cardano benefit in that relationship whereas ETC as I've mentioned is a totally different system and it's something that we have as a company historically worked on for years.
We started our participation in 2016. We built a full client in that process. Did that have any impact on our ability to deliver Cardano? We had a completely separate engineering team. That team was actually sourced from external companies. Scalac and Atix Labs to begin with and then we built on top of it and it had different product and project management and it was completely written with a different group. So it might as well have been a different company for that matter and I just talked to the team but the Cardano team was doing its own thing so I I think we need to just cut it out. Cut out the maximalism, cut out this idea that there is only one truth. We live in a nuanced world and we live in a world of interoperability. We have to embrace that if we wish to be successful and let us be the adults in the room. Let's be the place where this isn't the bar fight and let's be the place that welcomes everybody.
Furthermore, I've noticed some criticism from my own community. When people criticize us and they go to the politics of destruction or personal attacks or yield on criticizing people's intelligence or whatever have you... Cut that out too. Let's be a better community. I repeatedly call upon the Tezos foundation to tell its community to stop criticizing Cardano and calling it's "a scam project". So, I'll call upon my own community, I have seen things that shouldn't have happened. Certain members of Cardano community replying to people over twitter, replying to people who criticize us have resorted to personal attacks and so forth. Again, just ignore them , mute, let's embrace unity, let's embrace being better, yes, occasionally you got to kick people in the teeth especially when people are lying and what you do is you call them out on the lies that they've made. You specifically point out where they have done things that are a bit crazy or disingenuous and dishonest.
For example, we had a meeting today with Ethereum classic and it was blatantly apparent to me that this process has been set up to fail and be exclusive and prevent alternative ideas from a certain power structure from being held. So, I made a 30-minute whiteboard video where I not only called it out but I proposed an alternative and said this is how we're going to transcend that process and get to a much more productive way of doing things. Some of the criticism we have is justified because of product delays or because people don't fully understand who we are and what we're trying to do and obviously there's history there. So, first and foremost, let's reply with facts. First and foremost let's reply with dignity and respect and empathy for the other person's position and you know what? If they continue to push forward then you kick him in the teeth and you say it's obvious you don't want to have a conversation. You're a troll, but to my community please do this and please have this level of respect and dignity with others and with each other.
For example, we right now have a lot of debates with small stake pools versus large stake pools, there's plenty of people floating around with differences of opinion and our mantra should always be disagree without being disagreeable. People are going to have other values people, are gonna have differences of opinion and people are gonna have different perspectives. You can't change that reality nor should you. We all have the right to think and have differences of opinion but we also should expect a dialog that's fair and has empathy in it and so I call upon everybody to preserve that decorum as we move forward and also understand that some days we wake up we have to do things that are non-Cardano related in order for us all to be successful because not all the world will ever be Cardano related. We always need partners whether it be great pieces of hardware like Ledger and Trezor or exchanges to work with different wallets and sometimes those partners do stuff with us and sometimes those partners do things with other people. We have friends, we have projects we admire and respect.
For example, I've expressed repeatedly great admiration for the Algorand project. I think they're doing a phenomenal job and they have great leadership with Silvio Micali. I think the research and the engineering there is top notch. I personally believe Cardano is better. That's because we built it and that's because we think we have a better strategy to market and ultimately the market's going to decide which standards to go with and whether it's going to be many standards or a consolidation. That's not my decision. I just have to wake up every day and fight for the things I believe in. That said, never once have we ever criticized Algorand because they are in essence the model of empathy and dignity and good communication and being very proactive at focusing on solutions when they make announcements. They make announcements about new things that they're doing and new partners that they have and never once have they ever criticized another project or engaged in fanboyism. That's a great community, that's a great project and it's a model for where the space should go and I admire that deeply and greatly especially when you contrast it with other projects that have been less empathetic in their history.
We all have our problems, we all have our issues. I know that we all can be better and so that's my final point. Let's do that. Let's be better as an industry. Let's be a bit friendlier and let's invest the time and effort necessary to really understand and listen to each other because ultimately I think that's going to get us where we need to go and be able to get us to a point where we have that adoption of millions and billions of people and fundamentally change the fabric of society.
Otherwise we will be victims of our own success and descend into tribalism and descend into sectarian violence and then ultimately destroy the entire industry because it will become co-opted by large companies who use a surface-level marketing to take the brand, take the notion of a blockchain but then install centralized authorities behind them and in which case we've lost. I don't want that to happen I want the movement to succeed. I want us to understand each other and I enjoy having great competitors sometimes working with them sometimes fighting them in the battle of the markets, in the markets of ideas and ultimately I think we as a community have a chance to also be a model for everyone else.
So, let's do that. Thank you...
submitted by stake_pool to cardano [link] [comments]

[Table] IAmA dark web expert, investigative journalist and true crime author. I’ve met dark web kingpins in far flung prisons and delved the murky depths of child predator forums. I’ve written six books and over a dozen Casefile podcast episodes. AMA (part 2/2)

Source | Guestbook
Previous thread
Questions Answers
Around here nobody talks about the argument that increased regulation of the internet would help stop child predators. Is that true, and if so where do you fall on the Net Neutrality vs law enforcement spectrum? No I don't think that's true at all. Child predators have been around much longer than the internet, and I would argue child abuse was more prevalent 50+ years ago when children were seen and not heard and it wasn't talked about. The dark web hasn't created more predators, it has just given them a new place to gather and hang out.
The one thing I found really interesting when I was lurking the forums of the child predators was their frustration about how children are now taught from a very young age that certain touching and acts are wrong and that they shouldn't keep certain secrets. It came up over and over again that they could not abuse certain children because they knew those children had someone they would tell. It was pretty clear that education was a child's best defence against getting abused.
the below is a reply to the above
That's so interesting, thanks for the AMA! Can you remember any other thing that a child could do in order to protect himself from being abused? What other characteristics do the abusers hate in potential victims? That seems to be the main one. Kids who speak up and who have close relationships with one or more people they are likely to confide in
What do folks talk about in the child predator forums? Do they like give each other advice on how to improve their craft? Yes, quite literally. The give each other tips on how not to get caught, how to edit out incriminating details in videos, how to drug children, techniques for convincing kids not to tell etc
the below is a reply to the above
Given your insight into how predators operate, do you have any advice for parents on protecting their kids? I'll cut'n'paste a response i gave to someone else about this, because it was something that really stuck out to me:
The one thing I found really interesting when I was lurking the forums of the child predators was their frustration about how children are now taught from a very young age that certain touching and acts are wrong and that they shouldn't keep certain secrets. It came up over and over again that they could not abuse certain children because they knew those children had someone they would tell. It was pretty clear that education was a child's best defence against getting abused. Kids who speak up and who have close relationships with one or more people they are likely to confide in
Has the exponential increase in Bitcoin value affected darknet dealers in any profound way? I can imagine that some drug dealers were sitting on quite a large sum of Bitcoin when the value shot up. Crypto purists hate to admit it, but bitcoin would not be where it is today without Silk Road. It was sitting at less than a dollar when Silk Road began and the markets showed a robust use case for cryptocurrency and as the markets grew, so did the demand for bitcoin. It also provided real-life use data for those who were not interested in drugs but who weren't sure if it had practical application. When SR went down, Bitcoin was at about $650 and it continued to grow as adoption became more mainstream. There are many many stories of drug dealers (and at least one faux-hitman!) who gained most of their wealth not by selling the drugs, but by the growth in value of their bitcoin holdings
Since you have a lot of experience with them online. Do you think pedophiles(not child abusers) should be treated as criminals, or as people suffering from a mental illness? Contact offenders should be treated as criminals, because they are criminals. They have abused or hurt someone. Same with those who support the creation and dissemination of child abuse materials.
Pedophiles who do not act on their urges should be given as much help as humanly possible.
Are there any mysterious or suspicious pages or communities that you haven’t been able to access? Anything that seems especially weird? there are a lot of Russian communities that I can't access, mostly because I don't speak Russian. Some of the more technical hacking communities have entry barriers that I'm not technical enough to score an invite to
How much these bad people really exist out there? Hundreds? Thousands? More? It depends what you mean by bad. If you mean people who use the dark web to buy drugs (who I do not consider bad) then there are many many thousands. There are also thousands of people who deal in stolen information to make money.
Unfortunately there are also thousands of child predators and the dark web has provided a "safe space" for them to come together to share materials and "tips". I hope this is where most of the resources of law enforcement are concentrated
Ehy mine is a rare question: what do you know about art on dark web? I'm talking about the black market made of stolen important pieces from museums, art used as value to money laundry and other criminal affairs I'm an artist and what I know is people don't think too much about the dark side of art and probably they need to open their eyes about I really haven't come across much in the way of that. Some of the markets have an "art" section, but that is mostly blotter art
How accurate are the legends? Any legends in particular? For a lowdown copied from a post I made in another forum:
1Red Rooms  The one that is most persistent is the myth of the "Red Room" - live streaming of torture/rape that ends in the murder of the victim and which people can pay to watch, or even bid to type in commands for the torturer to carry out (highest bid wins!). The most famous was the “ISIS Red Room” pictured above, where people could provide instructions to torture captured terrorists - you can read what happened here.
People have this idea of Hostel with webcams exist all over the dark web, but you just need an invite to get into them. It's ridiculous. They don't exist. They certainly wouldn't exist on Tor. But people are desperate to believe and they always come back with "You can't prove they don't exist, people are crazy, therefore they must exist." Picture my eyes rolling here.
2.Hitman sites
I don't think many people are taken in by the hitmen sites anymore, though the press loves playing up the fact that there are sites offering up hitman services. But every single one of them has turned out to be a scam, especially Besa Mafia, the one that did the most marketing. Again, you can read about it at the same link as above.
3.Exotic animals  People are always asking where they can find markets for exotic animals. Obviously the illegal trade in exotic animals exists, and some communications and transactions may well take place over Tor, but there are no markets like the drug markets where you can go and look at a picture and then put a tiger or ocelot or something into your basket and buy it with bitcoin.
1.People buy and sell drugs.
The drug markets are more busy than ever. You have probably heard of Silk Road, the most famous online drug market that got busted a few years ago and the owner sent to prison for two consecutive life terms? A lot of people thought that was the end of drugs being sold on the dark web. In fact, dark web sales of drugs have tripled since the shutdown of Silk Road.
The reason people buy drugs this way is that for many they offer a safer alternative for people who are going to do drugs anyway. There is no possibility of any violence. The vast majority of the time a buyer knows exactly what they are getting, because of the feedback and rating system. That's not the case in a nightclub, or even friends-of-friends, where you just blindly accept that the pill, powder or tab is what the seller says it is.
2.People buy and sell other illegal things
Mostly they buy and sell stolen credit cards and financial information, fake IDs (though lots of these are scams), personal information, “dumps” of hacked data and fraud-related items. For a long time, a seller was making a fortune selling fake discount coupons that really worked.
3.People access and create childporn  Unlike the other markets, the CP market is generally not for money, but rather they are groups who swap vile images and videos for free. The worst of the worst is called “hurtcore’. Thankfully, most of the people behind the worst sites have been arrested and put in jail.
4.People talk about stuff
There are plenty of sites, forums and chatrooms where people talk about all sorts of things - conspiracies, aliens, weird stuff. They take advantage of the anonymity.
5.People anonymously release information
Whistleblowers use the dark web to release information and make sure their identities won't be compromised. You will find Wikileaks, for example, on the dark web.
6.People surf the web anonymously
The number 1 thing people use the dark web for is just to surf the web completely anonymously. Not everybody wants to be tracked by advertisers.
I have a question: what are the odds of the casual Darkweb drug buyer - not buying mega loads all the time - the occasional purchase - what are the risks of being busted? Kinda figuring pretty low. But you’re the expert. What do you think? Obviously there is always a risk, but the risk is very low. It is rare for personal amounts to be seized. Even if a package is seized, there's usually no resources to follow it up. Many people report simply receiving a letter from Customs saying they have seized what they believe is contraband and the person has a choice of going to claim it or it will be destroyed. Even if LE does knock on the door there is plausible deniability: "I don't know who sent that stuff to me".
So yeah, rare, but it does happen. You might be the unlucky one
How do you find things on the dark web without search engines? There are a lot of entry sites, set up with links to the most popular places. You can generally get a link to one of them by browsing places like reddit. From there it is a matter of checking out different places, people will put links in forums etc.
I also use a Pastebin where people paste sites they have made/found, and a Fresh Onion site, which crawls all the newly-populated .onion addresses
Hi. there!! Thank you for answering questions. Mine is very simple. How do sellers get the drugs to people? Regular mail? That's always puzzled me bc I'd assume USPS, UPS, fedEx or any other mail carrier would catch at least some goods. If people are ordering drugs, particularly in powder form, for personal use, they can be flattened, sealed in MBB (moisture barrier baggies) and sent in a regular business envelope, indistinguishable from billions of other envelopes going through the postal system every day. The chances of a particular package being intercepted is very low.
Some people take the extra precaution of having the person taking delivery of the drugs different to the person/household that is ordering them.
How did you move from being a corporate lawyer to researching and writing about dark web? I was in London, working for one of the most conservative law firms in the world when the Global Financial Crisis hit. I liked the job but it struck me when people were losing their livelihoods that I was working for the bad guys. I'd always wanted to be a writer so when I came back to Australia I quit law and enrolled in a writing course planning to be a novelist, but I discovered I was better at journalism. I first wrote for newspapers here about Silk Road and it grew from there
I've always wanted to check out the dark web, what is a normal day for you look like on there? Can you give me any tips on how to safely surf the dark web? A normal day looks like me sitting at my desk writing things on my computer. When I'm researching a book or a case I venture away from my computer to trials and to interview people (at least I did pre-COVID)
There is nothing inherently unsafe in surfing the dark web. All the usual precautions you take surfing the clearweb apply. Don't visit any child exploitation sites - it will be pretty obvious that's what they are by the names/descriptions before you log in.
It is only when you want to do more than surfing - e.g. buying drugs etc - that you need to do a LOT of homework or you will absolutely get scammed
Is there anything good about the dark web? It depends what you are into. A lot of academic research has concluded that the darknet markets provide a safer way for people to buy and use drugs, due to the ratings of vendors, services that independently test and report back on batches of drugs, doctor on staff ready to answer questions, no violence in transactions etc.
News sites provide a dark web option so that whistleblowers can safety provide information and upload documents that get stripped of any identifying metadata before being available.
It bypasses firewalls and allows for secure communications under hostile regimes
the below is a reply to the above
How does this make you feel about the idea of the decriminalization of drugs? I've always been for full legalization of drugs, and studying the darknet markets just proved I was right.
I was invited to an experts roundtable in Portugal about drugs and cybercrime a few years ago and the Portugal model of decriminalisation has been a great success
the below is a reply to the above
Hey, you are still answering. Been reading this thread for 1-2 hours now. Thank you so much for all the good work and info! Always been intrigued by this topic, downloaded tor once to explore a bit but couldn’t and deleted it right away, to be on the safer side. Great insights. Thanks! I've been writing it for about 14 hours. Going a bit loopy
How was working on Casefile? What's the production process like? Which episodes did u do?? I have listened to... all of them.... I absolutely LOVE working for Casefile. I am a freelancer, so I source and write my own cases and then sell the scripts to Casefile. I've done at least a dozen, but some of my most popular are Amy Allwine, Mark & John, Ella Tundra, Leigh Leigh, Rebecca Schaeffer...
As for the production process, once I have sold the script to them, a staff member edits them and then they are passed on to Casey to narrate. After that, they go to Mike for sound editing, music etc. They are the best team ever
the below is a reply to the above
Oh, Leigh Leigh was so well written!! How do you choose which stories to write? Do you just pick true crime you're interested in? Thank you! I have a huge list of potential episodes. Any time I come across an interesting crime on reddit, or in the news or wherever I make a note of it. Then I just pick one when it comes time to write a new script.
Sometimes I've been personally involved (e.g. Amy Allwine), gone to trials etc. Those are always the best ones
Hi Eiley, your twitter just reminded me of this AMA :) What are your thoughts on bitcoin? And would you prefer to be paid in crypto or fiat? OOOOH, I know that name! Love & Light to you!
I like Bitcoin and I wish I had a whole lot of it and like many many people, I wish I had kept the first crypto I bought at something like $4 a coin :D I do not have a whole lot of it but I do have a little bit. I like the philosophy behind it and in theory it should change the world. However the reality is that the vast majority of it is concentrated in a very few hands which allows for market manipulation and stops it being useful as a post-fiat currency.
As long as I'm getting paid, I'm pretty happy!
the below is a reply to the question
I too remember your name Pluto! Such a decent human ❤ he is!! True OG right there <3
Is the dark web subject to more racism than its counterpart, the world wide web? There are some white power sites and that sort of thing and the chans are even more uncensored than the clearweb ones (4chan, 8chan) but to be honest they are the same cesspools in different spots. Drug forums don't seem to be very racist. I've seen worse on Twitter
Have you seen any consequential political or social organizing being carried out on the dark web? Not directly, but the dark web helped facilitate the Arab Spring uprising in 2010 by allowing activists to remain anonymous and to access blocked websites and social media. Wikileaks, obviously. Some white supremacy organizations seem to use it to coordinate attacks, but they are not places I'm keen to hang out in.
What’s the most expensive thing for sale you’ve seen on the dark web? What was surprisingly inexpensive? I can't remember specific listings, but there were sometimes sales of things like coke by the kilo, so that sort of thing I guess.
LSD could easily be found for $1/tab and one huge dealer gave it away for free if it was for personal use
the below has been split into separate questions
1. I’m going to ask a couple in hopes that one will catch your interest! I know you’re anonymous on the dark web, but even so, have you ever felt worried about your safety? I actually made the decision to be upfront and honest about who I am on the dark web, so I use the name OzFreelancer (which is easily traceable to my real name) on all the dark web sites where i went looking for interviews. The people there had the option of talking to me or not, so they had no reason to want to harm me.
2. I’ve found your comments about your relationship with Yura fascinating. Did y’all develop a friendship? Did you build any other relationships that stand out in your mind? Since you were straightforward about being on the dark web for stories, did people seem reluctant to communicate, or were they excited for the opportunity to divulge a secret? We do have a friendship of sorts, it is really quite weird. I do hope to met him one day. I met all of the senior staff of Silk Road other than the Dread Pirate Roberts himself and keep in touch with some. Some people wanted nothing to do with me of course, but many more were happy to talk to me. i think sometimes it was a relief to them to be able to talk to one person who they knew was who they said they were.
3. On violent forums, did users ever express remorse, guilt, shame, or anything indicative of some recognition that what they were viewing/seeking was awful? Do you see doxxing teams on the dark web working together to uncover info, or is the info already there through previous hacks/breaches, and someone just accesses and releases it? Sorry if any of those don’t make sense! I’m not familiar with the dark web lingo but am so intrigued by your work. Not really. I think if they were contributing to the forums, they were comfortable with who they were and what they were doing. Many of the "regular" pedophiles expressed revulsion about Lux and hurtcore sites though
these have probably been asked before but has there ever been a time where you where genuinely been scared for your life and whats the most messed up thing you've witnessed did you have any help? Yeah both things have been answered in this thread, so I'll cut'n'paste
The only time I've felt even slightly in danger despite all this nosing around in there was when I helped uncover a hitman scam. The owner of Besa Mafia, the most profitable murder-for-hire site in history, came after me when I started writing about him. He made loads of threats ("you don't know who I am, but I know who you are and where you live") but that wasnt scary, as I had access to the backdoor of his site thanks to a friendly hacker and knew he didn't really want to hurt anybody.
It took a bit of a darker turn when he told the people who had signed up to work as hitmen on his site - and who he made video themselves burning cars with signs on them to advertise how legit his site was, then never sent them the promised money for doing so - that I was the owner of the site who had ripped them off. That could have become ugly, but luckily even the thugs weren't dumb enough to believe him.
The only other time I've been a bit nervous was when Homeland Security wanted to have a "friendly" meeting with me on one of my trips to the US to attend a trial. They were friendly, but scary too.
The most frightening experience I've ever had is coming face to face with Lux, the owner of Pedoempire and Hurt2theCore, the most evil and reviled person on the entire dark web. He was responsible for procuring and hosting Daisy's Destruction, the most repulsive video ever made, created by Peter Scully, whose crimes were so bad, the Philippines are considering reinstating the death penalty especially for him.
It wasn't frightening because Lux was frightening - he was anything but. It was frightening because he looked so inoffensive and normal.
It was frightening because he was living proof that monsters walk among us and we never know.
[deleted] It is absolute crap for browsing the clearweb, and a lot of sites detect that it is odd traffic and you have to solve their CAPTCHAs before doing the most basic things
I’m sure you’ve seen some really bad stuff, do you regularly talk to a therapist to help? I've never seen a therapist (they don't really seem to be a thing in Australia they way they are in the US), but I have been known to unload on my partner and my dog
the below is a reply to the question
Yo, speaking as an Aussie, they absolutely are a thing, you can get them covered thru medicare, and I recommend it if you possibly can! Bro, therapy is awesome. I'm not against therapy as a thing, but I've honestly never been so traumatised that I feel I need it. Also I had a bad experience with a psychologist after I watched my partner die in an accident - they suggested I find God, and I noped out of there
the below is another reply to the answer
Therapist is an American term- we call them psychs. And the one who told you to find God was terrible and out of line. Yeah she didn't last long before I was over it. Also a doctor decided I needed Xanax, which was also a bad move, because what I really needed was to grieve and Xanax doesn't let you do that properly
Do you find any good things on the dark web? Happy stuff that gives people hope? Or just the trash? I like the psychonaut communities. They just want peace, love and mungbeans for everybody
Have you heard of "The Primarch System" rumor of the dark web? Sounds downright silly to me. But I'm curious if anyone who spends time on the deep web actually takes it seriously, or if as an idea it is connected to anything serious at all. Nah, up there with the Shadow Web and Mariana's Web. There's always people who want to find out where the "deeper" "more secret" "really dark" stuff is. To them I say what, hurtcore isn't dark enough for you?
Doesn't delving the murky depths of child predator forums categorize you with the child predators in the eyes of an investigating law enforcement agency? Do you have some sort of amnesty due to your journalism, or is that something you worry about having to explain away? Has your presence there ever caused some sort of a scare? No, I never went into any of the sites that had actual photos or videos (you can't un-see that shit), but did spend a lot of time in pedophile discussion forums. I also went to a hurtcore hearing and saw screenshots in the police files, as well as listening for two days to videos being described frame-by-frame and private communications between the site owner and the sadists.
Besides drugs and sex crimes, what else is going on in the dark web? Are there other interesting nooks and crannies? I often post screenshots of bizarre sites I find on my Twitter. However, the main uses for the dark web are drugs, digital/fraud goods and child exploitation
I have one, it might be rather boring though, but here goes. On these "child predator forums" are they actually forums devoted to stalking children and do they share social media profiles of children among themselves? That would be kik ids, snapchat and facebook ids, instagram, stuff like that, info that would allow online access and that may have been chosen for suitability? Creepy question I know, but anyway I would be interested to hear your answer. I came here from TrueCrime, you referred to these things in your post on that sub. I suspect I already know the answer yet would like to hear your take on it. Yes, they provide information and tips on how to approach children, how to ensure they won't tell, how to sedate them in some instances, where to find child exploitation material, how to remove metadata and any identifying characteristics in photos and videos before sharing and so on.
They don't tend to share socia media, as that is the sort of thing that can be traced easily. They do talk about how to approach kids on social media and on the worst forums how to blackmail children into stripping/meeting etc
the below is a reply to the above
So you're saying they have a more general approach rather than identifying individual children on the internet? Again a creepy question because what I suggest is that a child's social media could be used and circulated on the dark web as potential information to gain access by anonymity, even if it was just online access only. I actually wonder as I have recently read of the anonymity of apps like ''kik messenger'' and how the police are often unable to get any information from the communications as they remain encrypted and off the server and require little if any valid ID to make an account. No doubt photos from social media are uploaded as part of the materials they have. I haven't seen anything where they get together and try to track down a specific child, but I'm sure some predators do this. Most are more likely to abuse children in their orbit - family, kids of friends, or they work where they have access to children
I heard there are forums to download books but it was really dangerous, Is it true? I'm just a poor guy who wants to finish the young Jack sparrow series Whenever you download anything from a pirate site you run the risk of infection
What do you think of QAnon? Wackjob conspiracy
the below is a reply to the above
Who should the conspiracy theorists actually be worried about if they actually care about thwarting pedophilia? The vast, vast majority of child abuse takes place within the child's personal orbit - relatives, family friends, parents of their own friends, people involved in their activities (coaches, leaders, etc)
So, those people
the below is another reply to the answer
Also how to we get people to stop believing in QAnon? Outside my area of expertise, sorry
do you personally believe there was/is any truth to the "defense" (story) that DPR was a title handed down to different admins for the original silk road, or was it just a convenient defense? do you have any theories as to who satoshi nakamoto is? besides the original SR, are there any other darkweb markets that you think have a good enough story to turn into a book? eg sheep market? i've seen you talk a little about the child predator forums, and (as with h2tc) noted are mainly populated by males. i'm curious if you've ever encountered females on such forums/websites (eg. btfk) No. There was a time that I believed the person posting on the forums as DPR changed, but the ownership and administration of the market I believe never changed hands. Variety Jones is claiming a part ownership (which may or may not be true) but I believe that is so he can run a Fourth Amendment argument
So many theories have some credibility to them, but no one theory ticks all the boxes. Highly recommend the 3-part youtube deep dive by Barely Sociable
I'm not sure any one market has the story that Silk Road had, but I would like to write a definitive history that encompasses the most compelling features of all the markets. Backopy of BMR apparently got away clean. The admins of Atlantis got wind of a security issue and closed shop, trying to warn DPR. AlphaBay ended in Alexander Cazes death in a Bangkok prison cell. Then everyone flocked to Hansa, which by that time was being run by law enforcement. Evolution ended in the most brazen exit scam, followed by a bizarre cloak'n'dagger situation played out right here on reddit. The WSM/DDW follow-the-money case. And these are just some that come right off the top of my head. I just need a publisher to provide me an advance I can live off while I write it!
There were a very few people on the forums who identified as female (obvs anyone can be anyone on a dark web forum) and there have been one or two arrests of women in relation to dark web child pornography. Peter Scully's female assistant who carried out some of the torture was originally one of his victims, turned into a sadist.
What’s the one lingering unanswered question you have about SR? I am hanging out for Joel Ellingson to go to trial so that I can find out once and for all whether redandwhite, lucydrop and Tony76 are one and the same person.
There are several people who I got to "know" by their handles who I wonder about from time to time, but mostly I hope they are safe and well and i don't want to track them down or expose them
the below is a reply to the above
Eileen, I am fangirling PRE-TTY hard right now. Talking SR and Tony76 with you is how I imagine it feels to talk to a royal correspondent about Prince Andrew 😅 Ellingson being all three would be a very neat end to an otherwise insane story. Part of me wants to pin Oracle in with that trio too but that’s mostly a desperate attempt from me to add another layer to the madness. I miss the twists and turns that came with the rise and fall of SR. From your own experience - would you agree with the idea that more than one person staffed the DPR account? Thanks for the reply! Ha! You have no idea what it is like when I find someone who really knows about this stuff and can have informed conversations about it. I latch onto them and don't let go. The very BEST was meeting up with DPR's three deputies (SSBD in Australia, Inigo in US and Libertas in Ireland) so I could actually have conversations with people who knew more than I did! Variety Jones was cool too, but the conversation couldn't flow too freely thanks to him being incarcerated in Bangkok prison at the time.
I think others sometimes posted from the forum account, but Ulbricht kept a vice-like grip on his market account
the below is a reply to the above
I can imagine it’s so satisfying and exciting to get those tidbits of info that piece the jigsaw together. The bedlam that played out over the forum in the aftermath was a cloud of paranoia and adrenaline that kept me refreshing pages for days. Would love to hear accounts from SSBD, Inigo and Libertas from this time. One last question: what were your thoughts when the Chloe Ayling story first broke? I assumed it was a publicity stunt. I don't think that any more. I guess I can't blame her for milking her kidnapping for publicity in the aftermath, though I don't think she does herself any favors the way she goes about it sometimes
Sorry if this has been covered before but in your research, mainly related to child abuse, where are these children coming from? Children in their care/ family? Kidnapped? The vast majority of child abuse is carried out by someone within their social circle - family and acquaintances. However, the hurtcore stuff was often carried out in third world countries on orphans or where desperate families gave up their children to "benefactors" who they believed were going to provide food an education
What Casefile episodes have you written? I became obsessed with it and ripped through all the episodes and now nothing will fill that void. Thanks for your efforts! Casefile – the murder of Amy Allwine
Casefile – Blue Skies, Black Death
Casefile – Ella Tundra
Casefile – Dnepropetrovsk Maniacs
Casefile – Motown Murders
Casefile – Rebecca Schaeffer
Casefile – Sian Kingi
Casefile – John & Mark
Casefile – Shauna Howe
Casefile – Chloe Ayling
Casefile – Johnny Altinger
Casefile – Killer Petey
Casefile – The Santa Claus Bank Robbery
Casefile – Martha Puebla
Casefile – Leigh Leigh
Is there any way parents can keep their kids safe from this without being helicopter parents? I'll cut'n'paste a response i gave to someone else about this, because it was something that really stuck out to me:
The one thing I found really interesting when I was lurking the forums of the child predators was their frustration about how children are now taught from a very young age that certain touching and acts are wrong and that they shouldn't keep certain secrets. It came up over and over again that they could not abuse certain children because they knew those children had someone they would tell. It was pretty clear that education was a child's best defence against getting abused. Kids who speak up and who have close relationships with one or more people they are likely to confide in
What does it take in terms of degrees and experience to get into this business? Nothing official. I was a lawyer, but that had no bearing on what I do now (I did corporate law). I didn't have any official credentials when I began as a freelance journalist, though later I got a diploma of professional writing and editing. Anyone can be an author, provided they can write
If you could take a guess from your findings, what would be some speculative statistics on these abuse/torture sites? How many people (tens of thousands?) are involved? Do they generally come from the same places in the world or are they seemingly geographically random (based on victim ethnicity, or language spoken, perhaps)... what are some quantifying stats to wrap our heads around how prevalent this shit is? Most dark web users come from western countries, just because infrastructure supports it. The sites often have tens of thousands of registered users, but a lot of them would be people for whom curiosity got the better of them and who signed up then left. Active users more like in the thousands, hyper-active users the hundreds.
One of the things that makes life difficult for law enforcement is that most of these sites don't operate on a commercial basis - people aren't making money from them, so there is no cryptocurrency chain to follow. They operate on a sharing basis and to get access to the more private parts of the sites, a user has to upload "fresh" material and/or prove they are actively abusing a child. Hurt2theCore used to get users to have the children hold up signs or have the site name or a username written on their bodies with a marker. This stopped law enforcement from getting access to those parts (like the "producers lounge") of the sites unless they were able to take over an account of a user who already had access. Even then, the rules of the hurtcore sites would require constant new proof in order to maintain access.
Some sites allowed people to buy access, such as one called "Welcome to Video" and then were taken down by law enforcement carrying out blockchain analysis of the Bitcoin transaction that led to the owner when they cashed out to fiat without moneylaundering precautions
the below is a reply to the above
Do you think LE uses deep fakes to simulate a picture to gain access? Is that possible? It is definitely possible, but I don't know whether they are doing it as they are understandably secretive about their methods. I know it is deeply problematic, as even fake child porn is still illegal (even cartoon stuff, including some Hentai in some countries). But they have used questionable methods before, most notably running the dark web's largest site, Playpen, for over a year in order to identify contact offenders
the below is another reply to the original answer
Am I hearing you that many people are NOT doing this for financial gain? Just to do it and share it?? Child exploitation, yes, it is mostly a sharing community. Some people make some money out of it, but it is not like drugs where a lot of people are making a LOT of money
On the subject of abused kids... did you ever help the kids in any way? I never met any of the kids. I never saw any of the photos and videos. I don't know who any of the kids are.
Daisy has been taken into care and her identity changed. I hope she is doing okay
What exactly does the dark web look like? You hear about it often, but don’t know if it looks like Google Chrome, Safari, or just a page full of code. It looks like a normal browser and operates just like a normal browser. It's just that it can access sites that your normal browser can't.
e.g. http://thehub5himseelprs44xzgfrb4obgujkqwy5tzbsh5yttebqhaau23yd.onion/index.php is the URL of a dark web forum. If you plug it into your normal browser you will get an error. If you plug it into the Tor browser you will get the registration page for The Hub
How do you keep yourself from hating all humanity? I am happy to report that, even on the dark web, the good people outnumber the bad
Hi! First off I'd like to say that I find what you do quite fascinating and would love to do something like that in the future. My question is in regards to art and other forms of artistic expression on the dark web. Is it true that the dark web is a place where you can also find awesome things such as art and literature? Not really, because all that stuff is readily available on the clearweb. There are sites like the Imperial Library of Trantor, which is a pirate site for books, where you can read thousands of books for free, but that's really no different to The Pirate Bay. Some people share their LSD art, but again, nothing you won't find on the clearweb
submitted by 500scnds to tabled [link] [comments]

*New Story* Do autonomous trucks dream of CW McCall?

I've got some serial stories I'd like to tell about living with (and in) technology and the industry.
Do autonomous trucks dream of CW McCall?
Falstaff’s story
“For a bright shining moment, we added a lot of shareholder value”. Falstaff had a comic with that caption in his double sized cubicle, the kind reserved for senior engineers. For a while he thought it showed that he didn’t fully buy into the corporate line, but that he’d still do as he was told as long as he had a shot at the big payout. RSUs, the big acquisition. The end of year bonus. That was the deal in the before time, when things mostly worked out for most people it seemed.
Falstaff knew he wasn’t the smartest, but he didn’t complain, didn’t pick fights and lived pretty well. His bad habits didn’t impact his work life and he still might hit it big enough to quit and try something else. To have options.
Then everything happened at once. The fires. The diseases. The chaos. Nobody knew who was in charge for a year or so. Things came back. A few years passed and the wealthy parts of the coastal cities looked shiny again. Most people called it normal. To the casual eye, it was. You could still get sushi delivered to the office late at night, ski in the Rockies if you could take the time off. Things were pretty good if you stayed where you belonged and kept your metrics up. Things fell off as you went East or to the not-so-quaint rural areas that couldn’t swing a music festival or good photo opportunities for social media. Go far enough and you found the places where the Feds just walked away. Not our problem any more.
That’s how Falstaff saw the world and his place in it. He had’nt had much sleep. Drugs, risky behavior and the self-loathing kept him occupied, making his morning commute that much less pleasant. He stopped staring at the RVs and tents parked on the land next to the on-ramp as he got on the 101. He jabbed the infotainment system to find some noise to sooth or at least distract him.
“Today, the Department of Energy announced that repairs have been completed ahead of schedule for the Diablo Canyon Power Plant. Radiation levels are now below acceptable levels for the first time in three years”
“We’ve got an autonomous truck accident with a car by Exit 6 on the 280 Eastbound, so expect delays while CHP and a support team from Freightliner gets that cleaned up”
It didn’t work. He still felt adrift and unhappy in the morning commute, so he silenced the radio and drove to the office.
The office was uneventful. Park, security checkpoint, a long walk to his building, a coffee on the way to his cubicle. He pulled the privacy screen closed behind him and sat down. A quick scan of his eyes and there was his project- a payment processing application that would cut out another payment application for a small percentage of a massive stream of money.
He looked over last night’s chatter, split the tasks into ‘do the work’ and ‘show that I’m adding value’ categories.
The fear and sadness caught up with him. He wasn’t ever going to get out. If he ran as fast as he could, he’d stay exactly where he was until his rent outpaced his income. His stock options would vest just fast enough to keep him going, but he’d never get out.
The morning dragged. Tweak this, report this to someone else. The bureaucratic minutiae and make-work washed over him until lunch. He looked forward to lunch with Tran, hoping that might get him out of his funk. Tran wasn’t so much a friend as one of the few people who admitted how screwed up everything was, so there wasn’t any danger of speaking the obvious and getting a negative reputation.
Tran was out today, so Falstaff ate leftovers and instant noodles in his cubicle.
His phone buzzed. There was a message on MomTalk, a chat for wealthy mothers to discuss brunch, day drinking and their children.
An engineer friend of Falstaff’s set it up as a joke to lampoon the women she couldn’t stand and her friends played along, adopting over the top personae and complaining about nonexistent spouses and domestic staff. After things came back, it was a way to talk freely, if in code.
Heather: Hey. I’m in deep trouble. The Nanny’s unhappy and I need someone to pick up the kids.
Falstaff sighed. Tran must need something.
Sheila: Missed you for lunch. Not feeling well?
Heather: Serious. My kid is stuck under my desk and I need him to come home. UNDERSTAND? NOW!
He got up, took his brown cardboard biodegradable instant noodle container and walked a few rows over to Tran’s cubicle. Where Falstaff’s cube was disorganized and well worn, Tran’s was sparse with better furniture. Falstaff felt under the desk and noticed a decal with one end loose. A quick pull and the label peeled off into his hand, along with a small flash memory card, the size of a fingernail.
He stood up and quickly looked up and down the aisle between the cubicles. Nobody noticed. Nobody really paid much attention to him on a good day unless they needed something from him anyway.
Back in his own cubicle, he went back to the chat:
Sheila: How urgent is this? Chip can have dinner with us or we can drop him off on the way to fencing class.
Falstaff was concerned. Tran didn’t make jokes. Laughing at Falstaff’s attempts at humor was enough. He had figured that Tran’s talk of ‘having gangsters in his family’ was an attempt to seem dangerous despite being a cubicle denizen, the way middle aged men bought loud motorcycles that they never rode.
He folded the decal over the card, pressed the sides together and dropped it in the instant noodle cup, then pushed it down with the corn-plastic chopsticks.
The background chatter got quiet and multiple employees raised their heads prairie-dog like. Several members of the company security detail were looking through Tran’s cubicle. Geoff, the brush-cut ex-cop security guard for this building was standing in the aisle attempting to look like he mattered to the operation as the more polished and definitely better paid detail carefully boxed the contents of Tran’s cubicle.
Falstaff picked up his phone and noodle container and started walking towards an exit away from the commotion. Geoff noticed and walked briskly after him. As Falstaff walked out of the building, Geoff called out his real name, then jogged behind him, puffing his half a size too small corporate logo’d golf shirt.
Ironed golf shirt.
Falstaff heard Geoff behind him, but decided to ignore him. Geoff was a blue-badged contractor, safely ignored. Normally.
Geoff ran in front of him and blocked his path to the parking garage.
“You wouldn’t happen to know where Tran is, would you? I’ve seen you with him ”
Falstaff tapped on his white badge. “You’re not my real dad. You can’t tell me what to do”
Falstaff squeezed past him into the parking garage’s doorway.
Geoff glared at him while Falstaff got in his car and put the noodle carton in the fancy retracting cupholder. He started his car and drove off as calmly as he could manage. Despite his attempt at seeming indifferent, his mind was racing. He attempted to make good time without getting attention. Luckily, silver Porsches were a cliché and therefore almost invisible in the Valley.
Twenty minutes later, he was in his mid-grade two bedroom apartment overlooking the parking lot. His cat, Hank, greeted him with a raised head and half open eyes.
Falstaff gave the cat some perfunctory petting, while trying to sequence the next few tasks.
He went to the refrigerator in the kitchen, carrying the ramen cup in one hand. He selected a can of energy drink and thought for a second.
His smartwatch and phone went in the freezer. Fishing the wrapped memory card out of the cup, he picked up the can and walked to his couch, where a bestickered high end laptop rested. Debating between speed and security, he turned off networking on his laptop, then inserted the card into the laptop gingerly, mounting it read-only in case Tran left something aggressive on the card.
Huh. A couple really large encrypted files. And seven smaller files with long filenames of seemingly random numbers and letters. He ejected the card and gingerly placed it on the arm of the couch.
The file names were bitcoin addressses. A lookup showed a total value of almost $600 million in value there.
The files themselves were encrypted. Falstaff stared at the wall for a minute or two, then realized that Tran had decided to quit and take an unauthorized retirement bonus from their shared employer. Enough money to kill for.
Who knew about this, and more importantly, who knew Falstaff had the key? Tran did. Perhaps his gangster friends knew.
He pulled his phone out of the freezer. A few project related emails and three MomTalk direct messages.
Heather:Where y’at?
Heather:I have investors. They’re quite insistent. They’re on their way to you.
It was time to go. Now.
Falstaff put the laptop down and ran to his bedroom. He pawed through a closet and pulled out the giant duffel he used to carry two week’s laundry from his grad student apartment to the cheaper off-campus laundromat. He quickly shoved a variety of clothes, some scuffed hiking boots and some corporate branded technical outdoors gear into it.
Behind a shelf, he found a long, antiquated Russian bolt-action rifle and a few paper-wrapped boxes of bullets. It wasn’t the firearm someone on the run would want, but it’s what he had. It went into the duffle bag, which he dragged into the living room. Hank jumped down and inspected the bag.
“Hank, I’ll hook you up in a second”
A quick scour of the kitchen and Falstaff had two thick trashbags and a box of water jugs with his current employer’s old logo on them, which he emptied into the sink and turned on the faucet.
As the sink filled, he filled the trashbags with whatever looked useful- tools, hobby electronics, his laptop and cat food. He pulled out a fat stack of cash from the bottom of his drug stash box. He contemplated forced sobriety, then carefully closed the box and put it in the bag, along with the cash.
Don’t change everything at once, he thought. Now isn’t the time to risk sobriety.
Falstaff rummaged around in the hall closet and dug out a bright pink cat carrier and stuffed Hank into it, then turned to the overflowing sink in his kitchen. He opened and filled the bottles in what he hoped was an efficient use of time, then pushed them back into the box.
His phone buzzed again. He contemplated throwing it back in the freezer, then thought better of it, shoving it and the watch back in his pocket.
Hank started meowing.
“We’re not going to the vet today, dude. Shut it for now”
Falstaff looked out his window. Typical traffic. Typical parking lot. A few charging stations, a fence and tents on the other side. He opened the window and threw the bags into the bushes below. He picked up Hank’s carrier, his laptop and looked at the box of water bottles.
Wait. Stop. Think. Breathe.
Tran’s card. A minute of searching found where he left it on the couch. He stuck that in his pocket, then ran out of his apartment. He considered the elevator, then decided on the stairs as they were closer to the bags and his car.
A few minutes of pushing and shoving had the trash bags in the front trunk , the oversized duffle in the passenger seat and Hank’s carrier seat belted in the tiny back seat. He spun the tires and entered the flow of traffic, such as it was.
He looked at his phone. More people seemed to want a response. Ignoring them, he found the closest florist’s shop and fifteen minutes later, pulled into the strip mall that contained it.
A few minutes later, he was in possession of three “Birthday Balloon Extravaganzas”, finishing off the shop’s tank of helium and a bit of Falstaff’s cash. He tied the strings around his smartwatch and let it rise and drift past the confines of the parking lot. The hastily constructed wad of tape and ribbon connecting his phone to the other two Extravaganzas generated a more labored flight, but eventually it drifted away. He looked into the shop’s camera and flipped it the bird as he left and jumped back in his car.
Soon he was back on the road, relaxing with his elbow out the window. Despite the stop and go traffic, he felt safe enough to relax and make longer range plans. Even Hank had settled down for the moment. The hot air felt less oppressive somehow. He contemplated the right set of music for an escape from civilization, trying on a few genres to decide. The screen also showed that the freeway was less than a quarter mile on the right and traffic would be light.
Then he looked again at the screen and thought about antennas. His radio talked to the cell tower, which talked to the Internet. Every application knew where he was.
Which meant Tran’s investors or their ex-employer could know as well.
One hand on the wheel, he looked around for something to pull the radio out of the dashboard. Hank meowed.
“You have an idea? No? Please be quiet”
Rummaging around in the glove box, he noticed an old folding knife. Falstaff slowly pried the radio from the dashboard while occasionally looking up at the tailgate of a modern SUV ahead of him. Realizing there was a rear-facing camera on the SUV staring at him, he slid down below the dash as best he could.
A few more stop and go cycles and the radio was free of the dash. He unplugged cables by feel, but one took his attention away from the road while he pried at it with his knife
He was distracted by a horn blast by his ear. Another SUV was forcing itself into his lane while the driver gesticulated at him.
Falstaff reciprocated by waving angrily at him, knife still in hand. The driver of the SUV held the horn down, angering Falstaff enough to open the window and throw the now free radio at the noise.
Feeling the embarrassment, he jerked the wheel to the right and accelerated into the bicycle lane with a chirp of tires and howl from the engine behind him.
A minute later, he was on the highway, quickly leaving Silicon Valley. He hoped to make the Nevada line before anyone figured out what he was doing.
submitted by lawtechie to talesoflawtechie [link] [comments]

Since they're calling for r/btc to be banned...

Maybe it's time to discuss bitcoin's history again. Credit to u/singularity87 for the original post over 3 years ago.

People should get the full story of bitcoin because it is probably one of the strangest of all reddit subs.
bitcoin, the main sub for the bitcoin community is held and run by a person who goes by the pseudonym u/theymos. Theymos not only controls bitcoin, but also and These are top three communication channels for the bitcoin community, all controlled by just one person.
For most of bitcoin's history this did not create a problem (at least not an obvious one anyway) until around mid 2015. This happened to be around the time a new player appeared on the scene, a for-profit company called Blockstream. Blockstream was made up of/hired many (but not all) of the main bitcoin developers. (To be clear, Blockstream was founded before mid 2015 but did not become publicly active until then). A lot of people, including myself, tried to point out there we're some very serious potential conflicts of interest that could arise when one single company controls most of the main developers for the biggest decentralised and distributed cryptocurrency. There were a lot of unknowns but people seemed to give them the benefit of the doubt because they were apparently about to release some new software called "sidechains" that could offer some benefits to the network.
Not long after Blockstream came on the scene the issue of bitcoin's scalability once again came to forefront of the community. This issue came within the community a number of times since bitcoins inception. Bitcoin, as dictated in the code, cannot handle any more than around 3 transactions per second at the moment. To put that in perspective Paypal handles around 15 transactions per second on average and VISA handles something like 2000 transactions per second. The discussion in the community has been around how best to allow bitcoin to scale to allow a higher number of transactions in a given amount of time. I suggest that if anyone is interested in learning more about this problem from a technical angle, they go to btc and do a search. It's a complex issue but for many who have followed bitcoin for many years, the possible solutions seem relatively obvious. Essentially, currently the limit is put in place in just a few lines of code. This was not originally present when bitcoin was first released. It was in fact put in place afterwards as a measure to stop a bloating attack on the network. Because all bitcoin transactions have to be stored forever on the bitcoin network, someone could theoretically simply transmit a large number of transactions which would have to be stored by the entire network forever. When bitcoin was released, transactions were actually for free as the only people running the network were enthusiasts. In fact a single bitcoin did not even have any specific value so it would be impossible set a fee value. This meant that a malicious person could make the size of the bitcoin ledger grow very rapidly without much/any cost which would stop people from wanting to join the network due to the resource requirements needed to store it, which at the time would have been for very little gain.
Towards the end of the summer last year, this bitcoin scaling debate surfaced again as it was becoming clear that the transaction limit for bitcoin was semi regularly being reached and that it would not be long until it would be regularly hit and the network would become congested. This was a very serious issue for a currency. Bitcoin had made progress over the years to the point of retailers starting to offer it as a payment option. Bitcoin companies like, Microsoft, Paypal, Steam and many more had began to adopt it. If the transaction limit would be constantly maxed out, the network would become unreliable and slow for users. Users and businesses would not be able to make a reliable estimate when their transaction would be confirmed by the network.
Users, developers and businesses (which at the time was pretty much the only real bitcoin subreddit) started to discuss how we should solve the problem bitcoin. There was significant support from the users and businesses behind a simple solution put forward by the developer Gavin Andreesen. Gavin was the lead developer after Satoshi Nakamoto left bitcoin and he left it in his hands. Gavin initially proposed a very simple solution of increasing the limit which was to change the few lines of code to increase the maximum number of transactions that are allowed. For most of bitcoin's history the transaction limit had been set far far higher than the number of transactions that could potentially happen on the network. The concept of increasing the limit one time was based on the fact that history had proven that no issue had been cause by this in the past.
A certain group of bitcoin developers decided that increasing the limit by this amount was too much and that it was dangerous. They said that the increased use of resources that the network would use would create centralisation pressures which could destroy the network. The theory was that a miner of the network with more resources could publish many more transactions than a competing small miner could handle and therefore the network would tend towards few large miners rather than many small miners. The group of developers who supported this theory were all developers who worked for the company Blockstream. The argument from people in support of increasing the transaction capacity by this amount was that there are always inherent centralisation pressure with bitcoin mining. For example miners who can access the cheapest electricity will tend to succeed and that bigger miners will be able to find this cheaper electricity easier. Miners who have access to the most efficient computer chips will tend to succeed and that larger miners are more likely to be able to afford the development of them. The argument from Gavin and other who supported increasing the transaction capacity by this method are essentially there are economies of scale in mining and that these economies have far bigger centralisation pressures than increased resource cost for a larger number of transactions (up to the new limit proposed). For example, at the time the total size of the blockchain was around 50GB. Even for the cost of a 500GB SSD is only $150 and would last a number of years. This is in-comparison to the $100,000's in revenue per day a miner would be making.
Various developers put forth various other proposals, including Gavin Andresen who put forth a more conservative increase that would then continue to increase over time inline with technological improvements. Some of the employees of blockstream also put forth some proposals, but all were so conservative, it would take bitcoin many decades before it could reach a scale of VISA. Even though there was significant support from the community behind Gavin's simple proposal of increasing the limit it was becoming clear certain members of the bitcoin community who were part of Blockstream were starting to become increasingly vitriolic and divisive. Gavin then teamed up with one of the other main bitcoin developers Mike Hearn and released a coded (i.e. working) version of the bitcoin software that would only activate if it was supported by a significant majority of the network. What happened next was where things really started to get weird.
After this free and open source software was released, Theymos, the person who controls all the main communication channels for the bitcoin community implemented a new moderation policy that disallowed any discussion of this new software. Specifically, if people were to discuss this software, their comments would be deleted and ultimately they would be banned temporarily or permanently. This caused chaos within the community as there was very clear support for this software at the time and it seemed our best hope for finally solving the problem and moving on. Instead a censorship campaign was started. At first it 'all' they were doing was banning and removing discussions but after a while it turned into actively manipulating the discussion. For example, if a thread was created where there was positive sentiment for increasing the transaction capacity or being negative about the moderation policies or negative about the actions of certain bitcoin developers, the mods of bitcoin would selectively change the sorting order of threads to 'controversial' so that the most support opinions would be sorted to the bottom of the thread and the most vitriolic would be sorted to the top of the thread. This was initially very transparent as it was possible to see that the most downvoted comments were at the top and some of the most upvoted were at the bottom. So they then implemented hiding the voting scores next to the users name. This made impossible to work out the sentiment of the community and when combined with selectively setting the sorting order to controversial it was possible control what information users were seeing. Also, due to the very very large number of removed comments and users it was becoming obvious the scale of censorship going on. To hide this they implemented code in their CSS for the sub that completely hid comments that they had removed so that the censorship itself was hidden. Anyone in support of scaling bitcoin were removed from the main communication channels. Theymos even proudly announced that he didn't care if he had to remove 90% of the users. He also later acknowledged that he knew he had the ability to block support of this software using the control he had over the communication channels.
While this was all going on, Blockstream and it's employees started lobbying the community by paying for conferences about scaling bitcoin, but with the very very strange rule that no decisions could be made and no complete solutions could be proposed. These conferences were likely strategically (and successfully) created to stunt support for the scaling software Gavin and Mike had released by forcing the community to take a "lets wait and see what comes from the conferences" kind of approach. Since no final solutions were allowed at these conferences, they only served to hinder and splinter the communities efforts to find a solution. As the software Gavin and Mike released called BitcoinXT gained support it started to be attacked. Users of the software were attack by DDOS. Employees of Blockstream were recommending attacks against the software, such as faking support for it, to only then drop support at the last moment to put the network in disarray. Blockstream employees were also publicly talking about suing Gavin and Mike from various different angles simply for releasing this open source software that no one was forced to run. In the end Mike Hearn decided to leave due to the way many members of the bitcoin community had treated him. This was due to the massive disinformation campaign against him on bitcoin. One of the many tactics that are used against anyone who does not support Blockstream and the bitcoin developers who work for them is that you will be targeted in a smear campaign. This has happened to a number of individuals and companies who showed support for scaling bitcoin. Theymos has threatened companies that he will ban any discussion of them on the communication channels he controls (i.e. all the main ones) for simply running software that he disagrees with (i.e. any software that scales bitcoin).
As time passed, more and more proposals were offered, all against the backdrop of ever increasing censorship in the main bitcoin communication channels. It finally come down the smallest and most conservative solution. This solution was much smaller than even the employees of Blockstream had proposed months earlier. As usual there was enormous attacks from all sides and the most vocal opponents were the employees of Blockstream. These attacks still are ongoing today. As this software started to gain support, Blockstream organised more meetings, especially with the biggest bitcoin miners and made a pact with them. They promised that they would release code that would offer an on-chain scaling solution hardfork within about 4 months, but if the miners wanted this they would have to commit to running their software and only their software. The miners agreed and the ended up not running the most conservative proposal possible. This was in February last year. There is no hardfork proposal in sight from the people who agreed to this pact and bitcoin is still stuck with the exact same transaction limit it has had since the limit was put in place about 6 years ago. Gavin has also been publicly smeared by the developers at Blockstream and a plot was made against him to have him removed from the development team. Gavin has now been, for all intents an purposes, expelled from bitcoin development. This has meant that all control of bitcoin development is in the hands of the developers working at Blockstream.
There is a new proposal that offers a market based approach to scaling bitcoin. This essentially lets the market decide. Of course, as usual there has been attacks against it, and verbal attacks from the employees of Blockstream. This has the biggest chance of gaining wide support and solving the problem for good.
To give you an idea of Blockstream; It has hired most of the main and active bitcoin developers and is now synonymous with the "Core" bitcoin development team. They AFAIK no products at all. They have received around $75m in funding. Every single thing they do is supported by theymos. They have started implementing an entirely new economic system for bitcoin against the will of it's users and have blocked any and all attempts to scaling the network in line with the original vision.
Although this comment is ridiculously long, it really only covers the tip of the iceberg. You could write a book on the last two years of bitcoin. The things that have been going on have been mind blowing. One last thing that I think is worth talking about is the u/bashco's claim of vote manipulation.
The users that the video talks about have very very large numbers of downvotes mostly due to them having a very very high chance of being astroturfers. Around about the same time last year when Blockstream came active on the scene every single bitcoin troll disappeared, and I mean literally every single one. In the years before that there were a large number of active anti-bitcoin trolls. They even have an active sub buttcoin. Up until last year you could go down to the bottom of pretty much any thread in bitcoin and see many of the usual trolls who were heavily downvoted for saying something along the lines of "bitcoin is shit", "You guys and your tulips" etc. But suddenly last year they all disappeared. Instead a new type of bitcoin user appeared. Someone who said they were fully in support of bitcoin but they just so happened to support every single thing Blockstream and its employees said and did. They had the exact same tone as the trolls who had disappeared. Their way to talking to people was aggressive, they'd call people names, they had a relatively poor understanding of how bitcoin fundamentally worked. They were extremely argumentative. These users are the majority of the list of that video. When the 10's of thousands of users were censored and expelled from bitcoin they ended up congregating in btc. The strange thing was that the users listed in that video also moved over to btc and spend all day everyday posting troll-like comments and misinformation. Naturally they get heavily downvoted by the real users in btc. They spend their time constantly causing as much drama as possible. At every opportunity they scream about "censorship" in btc while they are happy about the censorship in bitcoin. These people are astroturfers. What someone somewhere worked out, is that all you have to do to take down a community is say that you are on their side. It is an astoundingly effective form of psychological attack.
submitted by CuriousTitmouse to btc [link] [comments]

Meet the YFDAI Team!

Meet the YFDAI Team!
Over the course of mere months, the DeFi space has grown to the tune of billions in 2020. While DeFi has earned its title as the next hottest crypto trend, its popularity has shown to be a double-edged sword. Reports of scams and “rug pulls” have volleyed into crypto news outlets, social media, and discussion groups, damaging the reputation of the DeFi space.
DeFi is unique in that the tenets of trust and decentralization has normalized the practice of anonymity to the point where nearly every single DeFi team launches anonymously. While the freedom to create DeFi tools does support the notion that anyone should be able to create an honest financial protocol for the goodwill of the people, the opposite effect often occurs. If the past few months has proven anything, it’s that the normalization of anonymity has acted as both the greatest weapon and the greatest defence for fraudulent actors and dishonest entities. Because of this, DeFi is often seen as a free-for-all minefield as countless exit scams and “rugpulls” have become the norm. Having this as an accepted vice of DeFi shouldn’t mean investors should normalize risk of losses. It should inspire projects to set a higher standard in the DeFi space.
We are excited to announce that the YFDAI team has taken the tenets of decentralized finance and expanded on them. As a DeFi protocol, we champion decentralization and the collective action of the community to pave the road towards true transparency and security for all. After countless hours of legal counseling, we’re proud to announce that we will be among the very few DeFi projects to go public and among the first to set a new precedent for the DeFi space.
Say hello to the YFDAI team.
Meet Pritha Paul (Olivia) — Chief Strategic — Volunteer
Olivia is both a software engineer and a Businesswoman. Having been an avid fan of blockchain and trader of cryptocurrencies, Olivia felt the need to contribute her expertise to the cryptocurrency space. This desire prompted her to create YFDAI, one of DeFi’s most secure and trusted protocols. Seeing the cryptocurrency space as a professional programmer, Olivia knows the importance of making a clean and secure DeFi protocol.
With the rate of fraudulent projects ascending contemporaneously with the rise of DeFi, Olivia knew it was crucial to have a trusted and well-secured protocol that can guide as an example for other projects to follow. Along with this idea, Olivia felt that for DeFi to reach its highest potential, there needed to be an ecosystem that protects investors and supports DeFi projects looking to bring real value to the space. With this in mind, Olivia came up with YFDAI’s signature SafeSwap and LaunchPad platforms.
Olivia has a number of qualifications and holds a bachelor’s in Computer Applications. Some of her advanced programming languages include: C, C++, JAVA, Python, Oracle.
Meet Tapas Paul (Rocky) — Lead Dev — Volunteer
Doubling as a software developer and website designer, Tapas carries ample experience in web development and design. Having been familiar with cryptocurrencies for years, his initial descent into the space came in the golden year of 2017. Since then, Tapas has been engaged in crypto and felt the need to create a truly honest and secure DeFi platform together with Pritha. Tapas’s vast expertise in web development and blockchain gives YFDAI an edge in becoming one of the top DeFi protocols in the space.
Tapas has a diverse range of tech experience that range from creating web applications and front-end designs for various startups to working as a senior blockchain developer for distributed solidity systems for complicated DAPPs. Since then, Tapas has provided Ethereum and TRON consulting to multiple blockchain startups entering the space.
Some of Tapas expertise and advanced programming languages include- Solidity, Web3 TronWeb, JavaScript, MongoDB, ExpressJS, ReactJS Node.JS React Native, HTML5, CSS3, Distributed Ledger Technology , Ethereum and TRON DAPPs, Authentication systems, Real Time Web Apps.
Meet Ankit Ruthala (Thore) — Chief Business Development — Volunteer
Thore carries a Bachelor’s in Mechanical Engineering with fundamental engineering and dynamics experience. He has extensive background experience in both engineering and blockchain development. With the ever-increasing level of innovation that is occurring in the blockchain and cryptocurrency space, Thore felt the need to contribute his own knowledge and expertise to the field. Thore’s extensive experience in the field is projected into the YFDAI project with the end-user in mind. Being proficient in both blockchain literacy and technical analyses, Thore understands the cryptocurrency space from both a developer and investor perspective.
Meet Wesley — Security Consultant — Volunteer
Wesley specializes in Infrastructure and security management with a background in economics. Having been involved in the cryptocurrency scene for over three years, Wesley has had ample exposure to the world of blockchain and cryptocurrencies. Since 2017, Wesley has worked as an agent for BTC Direct and in Binance community management.
Meet Cristian- Graphic Designer — Volunteer
Despite his previous work experience as a computer programmer, Cristian found his niche excelling in graphic design and maximizing brand identity. After winning over 400 graphic design competitions, Cristian now works as a dedicated graphic designer. Living by the mantra of “every profession is an act of service”, Cristian’s passion is manifested through his works in design, brand awareness, and customer satisfaction.
Meet Cris Content Writer — Volunteer
Cris first began his cryptocurrency journey in the summer of 2017. Since then, he has been obsessed with everything cryptocurrency and blockchain related. After being featured on a series of cryptocurrency publications on Medium, Cris found his way into writing and managing a variety of cryptocurrency startups. Cris now continues pursuing his passion in cryptocurrency while balancing life as a university student.
Meet Christof Waton — Business Development Consultant — Volunteer
Christof currently holds a bachelor’s in data communication and is currently completing his masters in Digital Currencies. His initial descent into cryptocurrencies came when he first bought Bitcoin in 2014. Since then, Christof has led his professional career in a variety of fields in and out of the crypto space. Within the crypto space, Christof has held positions as chief business development officer for both ExMarkets and CoinMargin. Outside of the crypto space Christof led as a consultant for both Dubai Hills Fund and Verifo, an e-money institution. After years of experience in both the financial and crypto industry, Christof has experienced cryptocurrency through the lens of a professional, investor, and an enthusiast.
Meet Philip Dow — Head Advisor — Volunteer
Phil operates as a strategic executive with a high-level background in project management, business development, and marketing. Phil first brought his expertise to the cryptocurrency field in 2016. Phil carries a wealth of knowledge as his years in crypto garnered him key connections with a variety of different cryptocurrency partners ranging from, developers, project CEOs, and marketing.
For the past 4 years Phil has brought coverage to a multitude of different blockchain companies, each offering unique expertise and applications in a wide variety of fields.
Now that the team identities have been released this dispels the “Elephant in the room”. The fact that the team chose to become non-anon opens up many doors that would otherwise be closed. The specifics of those opportunities will be made clear in the upcoming whitepaper and future announcements.
Even though the names and faces of the founders behind the project have been revealed, please note that there are many people who are working on the YFDAI project on a contractual basis and volunteer basis who have not been included in the disclosure. There are experts and advisors in the fields of business development, economics, law, and other areas vital to any business that play a major role in the success of YFDAI and who share the vision of the founders to clean up the DeFi space and offer a safe, reliable, and secure suite of DeFi products to the public.
While the team behind a crypto project is vital, the ultimate success of any DeFi project relies on the technology, the code, and the community. YFDAI’s technology and code have been designed to be bulletproof in order to maximize the safety and security for the end user. In the not too distant future, YFDAI’s business model envisions the everyday decisions to ultimately be made by you, the community, by way of the DAO as governance is turned over to the token holders.
To ensure we are operating as securely and compliantly as possible YFDAI has been incorporated as a Technology business in Singapore:
Company Name — Tejster Technologies PTE. LTD. Registration No — 202031933C Address — 50,Raffles Place,#37–00,Singapore Land Tower, Singapore (048623)
To finalise the compliance aspect YFDAI is in the process of obtaining full Financial Services regulation by means of receiving compliance and registration in the Republic of Estonia.
This will be a two stage process with an initial Virtual Currency Exchange and E-Wallet licence currently being sought. YDFAI’s legal representatives have moved this to an advanced stage and expect this to be finalized in Q4 2020. It is at this point that the team shall resume their full job titles and the term “Volunteer” will no longer be required.
The licenses will open up a plethora of opportunities which will be fully detailed in our soon to be released whitepaper and will also provide YFDAI with a level of accreditation that will provide users with full peace of mind.
Once YFDAI secures the Financial Services accreditation listed above, YFDAI will have full insurance coverage of the project’s financial holdings and transactions, including project wallets and user funds.
Thank you for your support and we look forward to setting a new standard of self regulation that will revolutionize the DeFI arena and level the playing field for all participants while minimizing the fraud and desecration of the bad actors who have infiltrated the DeFi space.
- YFDAI Team
Visit us on our website and chat with us on Telegram!
Telegram Community:
Telegram Announcements:
submitted by YFDAIFinance to u/YFDAIFinance [link] [comments]


Author: Gamals Ahmed, CoinEx Business Ambassador


The effects of the web by a number of companies have seduced a large number of users as these companies keep their data to prevent them from searching for alternatives. Likewise, these huge platforms have attracted applications to build their highest ecosystems before either severing access or actively opposing their interests when the applications became so successful. As a result, these walled gardens have effectively hindered innovation and monopolized large sections of the web. After the emergence of blockchain technology and decentralized cryptocurrencies, the need for applications to support decentralization has emerged. Several blockchain-based companies, applications and platforms have appeared in decentralization. In this research report, we will explain the approach adopted by the NEAR decentralization platform in designing and implementing the basic technology for its system. Near is a basic platform for cloud computing and decentralized storage managed by the community, designed to enable the open web for the future. On this web, everything can be created from new currencies to new applications to new industries, opening the door to an entirely new future.


The richness of the web is increasing day by day with the combined efforts of millions of people who have benefited from “innovation without permission” as content and applications are created without asking anyone. this lack of freedom of data has led to an environment hostile to the interests of its participants. And as we explained in the summary previously, web hosting companies have hindered innovation and greatly monopolized the web.
In the future, we can fix this by using new technologies to re-enable the permissionless innovation of the past in a way, which creates a more open web where users are free and applications are supportive rather than adversarial to their interests.
Decentralization emerged after the global financial crisis in 2008, which created fundamental problems of confidence in the heavily indebted banking system. Then the decentralized financial sector based on Blockchain technology has emerged since 2009.
Decentralized Blockchain technology has made it easy for decentralized digital currencies like Bitcoin to exchange billions of dollars in peer-to-peer transfers for a fraction of the price of a traditional banking system. This technology allows participants in the over $ 50 billion virtual goods economy to track, own and trade in these commodities without permission. It allows real-world goods to cross into the digital domain, with verified ownership and tracking just like that of the digital.
By default, the Internet where freedom of data enables innovation will lead to the development of a new form of software development. On this web, developers can quickly create applications from open state components and boost their efforts by using new business models that are enabled from within the program itself rather than relying on parasitic relationships with their users. This not only accelerates the creation of applications that have a more honest and cooperative relationship with its users, but also allows the emergence of completely new business built on them.
To enable these new applications and the open web, it needs the appropriate infrastructure. The new web platform cannot be controlled by a single entity and its use is not limited due to insufficient scalability. It should be decentralized in design like the web itself and supported by a community of distributors widely so that the value they store cannot be monitored, modified or removed without permission from the users who store this value on their behalf.
A new decentralization technology (Blockchain), which has facilitated decentralized digital currencies like Bitcoin, has made billions of dollars in peer-to-peer transfers at a fraction of the price of the traditional banking system. This technology allows participants in the $ 50 billion + virtual goods economy to track, own and trade in these goods without permission. It allows real-world goods to cross into the digital domain, with verified ownership and tracking just like that of the digital.
Although the cost of storing data or performing a calculation on the Ethereum blockchain is thousands and millions of times higher than the cost of performing the same functionality on Amazon Web Services. A developer can always create a “central” app or even a central currency for a fraction of the cost of doing the same on a decentralized platform because a decentralized platform, by definition, will have many iterations in its operations and storage.
Bitcoin can be thought of as the first, very basic, version of this global community-run cloud, though it is primarily used only to store and move the Bitcoin digital currency.
Ethereum is the second and slightly more sophisticated version, which expanded the basic principles of Bitcoin to create a more general computing and storage platform, though it is a raw technology, which hasn’t achieved meaningful mainstream adoption.


Because some elements of value, for example bits representing digital currency ownership, personal identity, or asset notes, are very sensitive. While in the central system, the following players can change the value of any credits they come into direct contact with:
  1. The developer who controls the release or update of the application’s code
  2. The platform where the data is stored
  3. The servers which run the application’s code
Even if none of these players intend to operate with bad faith, the actions of governments, police forces and hackers can easily turn their hands against their users and censor, modify or steal the balances they are supposed to protect.
A typical user will trust a typical centralized application, despite its potential vulnerabilities, with everyday data and computation. Typically, only banks and governments are trusted sufficiently to maintain custody of the most sensitive information — balances of wealth and identity. But these entities are also subject to the very human forces of hubris, corruption and theft.
Especially after the 2008 global financial crisis, which demonstrated the fundamental problems of confidence in a highly indebted banking system. And governments around the
world apply significant capital controls to citizens during times of crisis. After these examples, it has become a truism that hackers now own most or all of your sensitive data.
These decentralized applications operate on a more complex infrastructure than today’s web but they have access to an instantaneous and global pool of currency, value and information that today’s web, where data is stored in the silos of individual corporations, cannot provide.


A community-run system like this has very different challenges from centralized “cloud” infrastructure, which is running by a single entity or group of known entities. For example:
  1. It must be both inclusive to anyone and secure from manipulation or capture.
  2. Participants must be fairly compensated for their work while avoiding creating incentives for negligent or malicious behavior.
  3. It must be both game theoretically secure so good actors find the right equilibrium and resistant to manipulation so bad actors are actively prevented from negatively affecting the system.


NEAR is a global community-run computing and storage cloud which is organized to be permissionless and which is economically incentivized to create a strong and decentralized data layer for the new web.
Essentially, it is a platform for running applications which have access to a shared — and secure — pool of money, identity and data which is owned by their users. More technically, it combines the features of partition-resistant networking, serverless compute and distributed storage into a new kind of platform.
NEAR is a community-managed, decentralized cloud storage and computing platform, designed to enable the open web in the future. It uses the same core technology for Bitcoin and Blockchain. On this web, everything can be created from new currencies to new applications to new industries, opening the door to an entirely new future.
NEAR is a decentralized community-run cloud computing and storage platform, which is designed to enable the open web of the future. On this web, everything from new currencies to new applications to new industries can be created, opening the door to a brand new future.
NEAR is a scalable computing and storage platform with the potential to change how systems are designed, how applications are built and how the web itself works.
It is a complex technology allow developers and entrepreneurs to easily and sustainably build applications which reap the benefits of decentralization and participate in the Open Web while minimizing the associated costs for end users.
NEAR creates the only community-managed cloud that is strong enough to power the future of the open web, as NEAR is designed from the ground up to deliver intuitive experiences to
end users, expand capacity across millions of devices, and provide developers with new and sustainable business models for their applications.
The NEAR Platform uses a token — also called “NEAR”. This token allows the users of these cloud resources, regardless of where they are in the world, to fairly compensate the providers of the services and to ensure that these participants operate in good faith.


Through focus, we find that Platforms based on blockchain technologies like Bitcoin and Ethereum have made great progress and enriched the world with thousands of innovative applications spanning from games to decentralized financing.
However, these original networks and none of the networks that followed were not able to bridge the gap towards mainstream adoption of the applications created above them and do not provide this type of standard that fully supports the web.
This is a result of two key factors:
  1. System design
  2. Organization design
System design is relevant because the technical architecture of other platforms creates substantial problems with both usability and scalability which have made adoption nearly impossible by any but the most technical innovators. End-users experience 97–99% dropoff rates when using applications and developers find the process of creating and maintaining their applications endlessly frustrating.
Fixing these problems requires substantial and complex changes to current protocol architectures, something which existing organizations haven’t proven capable of implementing. Instead, they create multi-year backlogs of specification design and implementation, which result in their technology falling further and further behind.
NEAR’s platform and organization are architected specifically to solve the above-mentioned problems. The technical design is fanatically focused on creating the world’s most usable and scalable decentralized platform so global-scale applications can achieve real adoption. The organization and governance structure are designed to rapidly ship and continuously evolve the protocol so it will never become obsolete.

2.1.1 Features, which address these problems:

The most important problem that needs to be addressed is how to allow developers to create useful applications that users can use easily and that will capture the sustainable value of these developers.
2. End-User Usability
Developers will only build applications, which their end users can actually use. NEAR’s “progressive security” model allows developers to create experiences for their users which more closely resemble familiar web experiences by delaying onboarding, removing the need for user to learn “blockchain” concepts and limiting the number of permission-asking interactions the user must have to use the application.
1. Simple Onboarding: NEAR allows developers to take actions on behalf of their users, which allows them to onboard users without requiring these users to provide a wallet or interact with tokens immediately upon reaching an application. Because accounts keep track of application-specific keys, user accounts can also be used for the kind of “Single Sign On” (SSO) functionality that users are familiar with from the traditional web (eg “Login with Facebook/Google/Github/etc”).
2. Easy Subscriptions: Contract-based accounts allow for easy creation of subscriptions and custom permissioning for particular applications.
3. Familiar Usage Styles: The NEAR economic model allows developers to pay for usage on behalf of their users in order to hide the costs of infrastructure in a way that is in line with familiar web usage paradigms.
4. Predictable Pricing: NEAR prices transactions on the platform in simple terms, which allow end-users to experience predictable pricing and less cognitive load when using the platform.

2.1.2 Design principles and development NEAR’s platform

1. Usability: Applications deployed to the platform should be seamless to use for end users and seamless to create for developers. Wherever possible, the underlying technology itself should fade to the background or be hidden completely from end users. Wherever possible, developers should use familiar languages and patterns during the development process. Basic applications should be intuitive and simple to create while applications that are more robust should still be secure.
2. Scalability: The platform should scale with no upper limit as long as there is economic justification for doing so in order to support enterprise-grade, globally used applications.
3. Sustainable Decentralization: The platform should encourage significant decentralization in both the short term and the long term in order to properly secure the value it hosts. The platform — and community — should be widely and permissionlessly inclusive and actively encourage decentralization and participation. To maintain sustainability, both technological and community governance mechanisms should allow for practical iteration while avoiding capture by any single parties in the end.
4. Simplicity: The design of each of the system’s components should be as simple as possible in order to achieve their primary purpose. Optimize for simplicity, pragmatism and ease of understanding above theoretical perfection.


NEAR’s platform provides a community-operated cloud infrastructure for deploying and running decentralized applications. It combines the features of a decentralized database with others of a serverless compute platform. The token, which allows this platform to run also, enables applications built on top of it to interact with each other in new ways. Together, these features allow developers to create censorship resistant back-ends for applications that deal with high stakes data like money, identity, assets, and open-state components, which interact seamlessly with each other. These application back-ends and components are called “smart contracts,” though we will often refer to these all as simply “applications” here.
The infrastructure, which makes up this cloud, is created from a potentially infinite number of “nodes” run by individuals around the world who offer portions of their CPU and hard drive space — whether on their laptops or more professionally deployed servers. Developers write smart contracts and deploy them to this cloud as if they were deploying to a single server, which is a process that feels very similar to how applications are deployed to existing centralized clouds.
Once the developer has deployed an application, called a “smart contract”, and marked it unchangeable (“immutable”), the application will now run for as long as at least a handful of members of the NEAR community continue to exist. When end users interact with that deployed application, they will generally do so through a familiar web or mobile interface just like any one of a million apps today.
In the central cloud hosted by some companies today like: Amazon or Google, developers pay for their apps every month based on the amount of usage needed, for example based on the number of requests created by users visiting their webpages. The NEAR platform similarly requires that either users or developers provide compensation for their usage to the community operators of this infrastructure. Like today’s cloud infrastructure, NEAR prices usage based on easy to understand metrics that aren’t heavily influenced by factors like system congestion. Such factors make it very complicated for developers on alternative blockchain-based systems today.
In the centralized cloud, the controlling corporation makes decisions unilaterally. NEAR community-run cloud is decentralized so updates must ultimately be accepted by a sufficient quorum of the network participants. Updates about its future are generated from the community and subject to an inclusive governance process, which balances efficiency and security.
In order to ensure that the operators of nodes — who are anonymous and potentially even malicious — run the code with good behavior, they participate in a staking process called “Proof of Stake”. In this process, they willingly put a portion of value at risk as a sort of deposit, which they will forfeit if it is proven that they have operated improperly.

2.2.1 Elements of the NEAR’s Platform

The NEAR platform is made up of many separate elements. Some of these are native to the platform itself while others are used in conjunction with or on top of it.
NEAR token is the fundamental native asset of the NEAR ecosystem and its functionality is enabled for all accounts. Each token is a unique digital asset similar to Ether, which can be used to:
a) Pay the system for processing transactions and storing data.
b) Run a validating node as part of the network by participating in the staking process.
c) Help determine how network resources are allocated and where its future technical direction will go by participating in governance processes.
The NEAR token enables the economic coordination of all participants who operate the network plus it enables new behaviors among the applications which are built on top of that network.
The platform is designed to easily store unique digital assets, which may include, but aren’t limited to:
  • Other Tokens: Tokens bridged from other chains (“wrapped”) or created atop the NEAR Platform can be easily stored and moved using the underlying platform. This allows many kinds of tokens to be used atop the platform to pay for goods and services. “Stablecoins,” specific kinds of token which are designed to match the price of another asset (like the US Dollar), are particularly useful for transacting on the network in this way.
  • Unique Digital Assets: Similar to tokens, digital assets (sometimes called “Non Fungible Tokens” (NFTs) ranging from in-game collectibles to representations of real-world asset ownership can be stored and moved using the platform.
The core platform, which is made up of the cloud of community-operated nodes, is the most basic piece of infrastructure provided. Developers can permissionlessly deploy smart contracts to this cloud and users can permissionlessly use the applications they power. Applications, which could range from consumer-facing games to digital currencies, can store their state (data) securely on the platform. This is conceptually similar to the Ethereum platform.
Operations that require an account, network use, or storage at the top of the platform require payment to the platform in the form of transaction fees that the platform then distributes to its community from the authentication contract. These operations could include creating new accounts, publishing new contracts, implementing code by contract and storing or modifying data by contract.
As long as the rules of the protocol are followed, any independent developer can write software, which interfaces with it (for example, by submitting transactions, creating accounts or even running a new node client) without asking for anyone’s permission first.
Set of tools and reference implementations created to facilitate its use by those developers and end users who prefer them. These tools include:
  • NEAR SDKs: NEAR platform supports (Rust and AssemblyScript) languages to write smart contracts. To provide a great experience for developers, NEAR has a full SDK, which includes standard data structures, examples and testing tools for these two languages.
  • Gitpod for NEAR: NEAR uses existing technology Gitpod to create zero time onboarding experience for developers. Gitpod provides an online “Integrated Development Environment” (IDE), which NEAR customized to allow developers to easily write, test and deploy smart contracts from a web browser.
  • NEAR Wallet: A wallet is a basic place for developers and end users to store the assets they need to use the network. NEAR Wallet is a reference implementation that is intended to work seamlessly with the progressive security model that lets application developers design more effective user experiences. It will eventually include built-in functionality to easily enable participation by holders in staking and governance processes on the network.
  • NEAR Explorer: To aid with both debugging of contracts and the understanding of network performance, Explorer presents information from the blockchain in an easily digestible web-based format.
  • NEAR Command Line Tools: The NEAR team provides a set of straightforward command line tools to allow developers to easily create, test and deploy applications from their local environments.
All of these tools are being created in an open-source manner so they can be modified or deployed by anyone.


Primarily economic forces drive the ecosystem, which makes up the NEAR platform. This economy creates the incentives, which allow participants permissionlessly organize to drive the platform’s key functions while creating strong disincentives for undesirable, irresponsible or malicious behavior. In order for the platform to be effective, these incentives need to exist both in the short term and in the long term.
The NEAR platform is a market among participants interested in two aspects:
  • On the supply side, certification contract operators and other core infrastructure must be motivated to provide these services that make up the community cloud.
  • On the demand side, platform developers and end-users who pay for their use need to be able to do so in a simple, clear and consistent way that helps them.
Further, economic forces can also be applied to support the ecosystem as a whole. They can be used at a micro level to create new business models by directly compensating the developers who create its most useful applications. They can also be used at a macro level by coordinating the efforts of a broader set of ecosystem participants who participate in everything from education to governance.


NEAR’s overall system design principles are used to inform its economic design according to the following interpretations:
1. Usability: End users and developers should have predictable and consistent pricing for their usage of the network. Users should never lose data forever.
2. Scalability: The platform should scale at economically justified thresholds.
3. Simplicity: The design of each of the system’s components should be as simple as possible in order to achieve their primary purpose.
4. Sustainable Decentralization: The barrier for participation in the platform as a validating node should be set as low as possible in order to bring a wide range of participants. Over time, their participation should not drive wealth and control into the hands of a small number. Individual transactions made far in the future must be at least as secure as those made today in order to safeguard the value they modify.


The NEAR economy is optimized to provide developers and end users with the easiest possible experience while still providing proper incentives for network security and ecosystem development.
Summary of the key ideas that drive the system:
  • Thresholded Proof of Stake: Validating node operators provide scarce and valuable compute resources to the network. In order to ensure that the computations they run are correct, they are required to “stake” NEAR tokens, which guarantee their results. If these results are found to be inaccurate, the staker loses their tokens. This is a fundamental mechanism for securing the network. The threshold for participating in the system is set algorithmically at the lowest level possible to allow for the broadest possible participation of validating nodes in a given “epoch” period (½ of a day).
  • Epoch Rewards: Node operators are paid for their service a fixed percentage of total supply as a “security” fee of roughly 4.5% annualized. This rate targets sufficient participation levels among stakers in order to secure the network while balancing with other usage of NEAR token in the ecosystem.
  • Protocol treasury: In addition to validators, protocol treasury received a 0.5% of total supply annually to continuously re-invest into ecosystem development.
  • Transaction Costs: Usage of the network consumes two separate kinds of resources — instantaneous and long term. Instantaneous costs are generated by every transaction because each transaction requires the usage of both the network itself and some of its computation resources. These are priced together as a mostly-predictable cost per transaction, which is paid in NEAR tokens.
  • Storage Costs: Storage is a long term cost because storing data represents an ongoing burden to the nodes of the network. Storage costs are covered by maintaining minimum balance of NEAR tokens on the account or contract. This provides indirect mechanism of payment via inflation to validators for maintaining contract and account state on their nodes.
  • Inflation: Inflation is determined as combination of payouts to validators and protocol treasury minus the collected transaction fees and few other NEAR burning mechanics (like name auction). Overall the maximum inflation is 5%, which can go down over time as network gets more usage and more transactions fees are burned. It’s possible that inflation becomes negative (total supply decreases) if there is enough fees burned.
  • Scaling Thresholds: In a network, which scales its capacity relative to the amount of usage it receives, the thresholds, which drive the network to bring on additional capacity are economic in nature.
  • Security Thresholds: Some thresholds, which provide for good behavior among participants are set using economic incentives. For example, “Fishermen” (described separately).
Full Report
submitted by CoinEx_Institution to Coinex [link] [comments]

$4500 Bitcoin?! Fortunes Will Be Made- What's Driving Bitcoin Crash Bitcoin!! 10 things you NEED TO KNOW about Cryptocurrency!! WARNING: The Truth About Bitcoin - YouTube $11,800 BITCOIN PARABOLIC!!!  $13,4K  Falling Wedge In Bitcoin Price  Altcoins Bleeding... But how does bitcoin actually work? - YouTube

A bitcoin is not tied to any particular bank or regulatory agency, with users identified by a wallet ID number , rather than by a name. In short, bitcoin are pieces of complicated computer code with a fluctuating, market driven dollar value. Bitcoin was the first major cryptocurrency created, appearing in January 2009. Its creation has been ... Bitcoin is often being referred to as digital gold, ultimate store of value, or the currency of the future. Common question by anyone who is new to Bitcoin is: what is Bitcoin backed by and where… In a recent video, Antonopoulos explained the Bitcoin Core code that controls the halving of the Bitcoin block reward in detail. Bitcoin halving code. Source: Bitcoin Core Software. Line by line explanation. Every time a Bitcoin block is evaluated or a new block is mined, the function GetBlockSubsidy gets called. Its purpose is to calculate the ... Like most other virtual assets, Bitcoin has a highly volatile value on the market, with a current price of around $13,000 per unit. It is highly affected by the demand of the investors and as a result, there was a peak in the value during 2017, when the price for 1 BTC was near $20,000. On the other side, its value during the first quarter of ... Bitcoin works on the logic of Distributed consensus. A 100 million Bitcoin is called a “sitoshi”. It can be programmed to be anything of Value–digitized and tokenized- like assets. The process of Mining helps to create new bitcoins. This is run through a very powerful computer and attempt to solve blocks. All transactions are pieces of this mathematical puzzle forming blocks. Once the ...

[index] [51036] [6274] [23565] [10446] [46647] [37114] [39266] [48856] [3117] [30035]

$4500 Bitcoin?! Fortunes Will Be Made- What's Driving Bitcoin Crash

Whether or not it's worth investing in, the math behind Bitcoin is an elegant solution to some complex problems. Hosted by: Michael Aranda Special Thanks: Da... Thanks for watching! For donations: Bitcoin - 1CpGMM8Ag8gNYL3FffusVqEBUvHyYenTP8 This video will show you how to start bitcoin mining from home. It's very easy and "free" to do if you have a gaming PC. *****... BitMEX Affiliate Link 10% Off Fees: Bitcoin Technical Analysis & Bitcoin News Today: Also, I'll use technical analysis... Currently bitcoin is around 100,000 times more valuable today than they were back in 2010 and, as of 2018, they continue to grow in value. Number 9: What is a bitcoin? For this we need to start ...