RPCMiner 2013 download SourceForge.net

Financial Cryptography

[link]

Ultimate glossary of crypto currency terms, acronyms and abbreviations

I thought it would be really cool to have an ultimate guide for those new to crypto currencies and the terms used. I made this mostly for beginner’s and veterans alike. I’m not sure how much use you will get out of this. Stuff gets lost on Reddit quite easily so I hope this finds its way to you. Included in this list, I have included most of the terms used in crypto-communities. I have compiled this list from a multitude of sources. The list is in alphabetical order and may include some words/terms not exclusive to the crypto world but may be helpful regardless.
2FA
Two factor authentication. I highly advise that you use it.
51% Attack:
A situation where a single malicious individual or group gains control of more than half of a cryptocurrency network’s computing power. Theoretically, it could allow perpetrators to manipulate the system and spend the same coin multiple times, stop other users from completing blocks and make conflicting transactions to a chain that could harm the network.
Address (or Addy):
A unique string of numbers and letters (both upper and lower case) used to send, receive or store cryptocurrency on the network. It is also the public key in a pair of keys needed to sign a digital transaction. Addresses can be shared publicly as a text or in the form of a scannable QR code. They differ between cryptocurrencies. You can’t send Bitcoin to an Ethereum address, for example.
Altcoin (alternative coin): Any digital currency other than Bitcoin. These other currencies are alternatives to Bitcoin regarding features and functionalities (e.g. faster confirmation time, lower price, improved mining algorithm, higher total coin supply). There are hundreds of altcoins, including Ether, Ripple, Litecoin and many many others.
AIRDROP:
An event where the investors/participants are able to receive free tokens or coins into their digital wallet.
AML: Defines Anti-Money Laundering laws**.**
ARBITRAGE:
Getting risk-free profits by trading (simultaneous buying and selling of the cryptocurrency) on two different exchanges which have different prices for the same asset.
Ashdraked:
Being Ashdraked is essentially a more detailed version of being Zhoutonged. It is when you lose all of your invested capital, but you do so specifically by shorting Bitcoin. The expression “Ashdraked” comes from a story of a Romanian cryptocurrency investor who insisted upon shorting BTC, as he had done so successfully in the past. When the price of BTC rose from USD 300 to USD 500, the Romanian investor lost all of his money.
ATH (All Time High):
The highest price ever achieved by a cryptocurrency in its entire history. Alternatively, ATL is all time low
Bearish:
A tendency of prices to fall; a pessimistic expectation that the value of a coin is going to drop.
Bear trap:
A manipulation of a stock or commodity by investors.
Bitcoin:
The very first, and the highest ever valued, mass-market open source and decentralized cryptocurrency and digital payment system that runs on a worldwide peer to peer network. It operates independently of any centralized authorities
Bitconnect:
One of the biggest scams in the crypto world. it was made popular in the meme world by screaming idiot Carlos Matos, who infamously proclaimed," hey hey heeeey” and “what's a what's a what's up wasssssssssuuuuuuuuuuuuup, BitConneeeeeeeeeeeeeeeeeeeeeeeect!”. He is now in the mentally ill meme hall of fame.
Block:
A package of permanently recorded data about transactions occurring every time period (typically about 10 minutes) on the blockchain network. Once a record has been completed and verified, it goes into a blockchain and gives way to the next block. Each block also contains a complex mathematical puzzle with a unique answer, without which new blocks can’t be added to the chain.
Blockchain:
An unchangeable digital record of all transactions ever made in a particular cryptocurrency and shared across thousands of computers worldwide. It has no central authority governing it. Records, or blocks, are chained to each other using a cryptographic signature. They are stored publicly and chronologically, from the genesis block to the latest block, hence the term blockchain. Anyone can have access to the database and yet it remains incredibly difficult to hack.
Bullish:
A tendency of prices to rise; an optimistic expectation that a specific cryptocurrency will do well and its value is going to increase.
BTFD:
Buy the fucking dip. This advise was bestowed upon us by the gods themselves. It is the iron code to crypto enthusiasts.
Bull market:
A market that Cryptos are going up.
Consensus:
An agreement among blockchain participants on the validity of data. Consensus is reached when the majority of nodes on the network verify that the transaction is 100% valid.
Crypto bubble:
The instability of cryptocurrencies in terms of price value
Cryptocurrency:
A type of digital currency, secured by strong computer code (cryptography), that operates independently of any middlemen or central authoritie
Cryptography:
The art of converting sensitive data into a format unreadable for unauthorized users, which when decoded would result in a meaningful statement.
Cryptojacking:
The use of someone else’s device and profiting from its computational power to mine cryptocurrency without their knowledge and consent.
Crypto-Valhalla:
When HODLers(holders) eventually cash out they go to a place called crypto-Valhalla. The strong will be separated from the weak and the strong will then be given lambos.
DAO:
Decentralized Autonomous Organizations. It defines A blockchain technology inspired organization or corporation that exists and operates without human intervention.
Dapp (decentralized application):
An open-source application that runs and stores its data on a blockchain network (instead of a central server) to prevent a single failure point. This software is not controlled by the single body – information comes from people providing other people with data or computing power.
Decentralized:
A system with no fundamental control authority that governs the network. Instead, it is jointly managed by all users to the system.
Desktop wallet:
A wallet that stores the private keys on your computer, which allow the spending and management of your bitcoins.
DILDO:
Long red or green candles. This is a crypto signal that tells you that it is not favorable to trade at the moment. Found on candlestick charts.
Digital Signature:
An encrypted digital code attached to an electronic document to prove that the sender is who they say they are and confirm that a transaction is valid and should be accepted by the network.
Double Spending:
An attack on the blockchain where a malicious user manipulates the network by sending digital money to two different recipients at exactly the same time.
DYOR:
Means do your own research.
Encryption:
Converting data into code to protect it from unauthorized access, so that only the intended recipient(s) can decode it.
Eskrow:
the practice of having a third party act as an intermediary in a transaction. This third party holds the funds on and sends them off when the transaction is completed.
Ethereum:
Ethereum is an open source, public, blockchain-based platform that runs smart contracts and allows you to build dapps on it. Ethereum is fueled by the cryptocurrency Ether.
Exchange:
A platform (centralized or decentralized) for exchanging (trading) different forms of cryptocurrencies. These exchanges allow you to exchange cryptos for local currency. Some popular exchanges are Coinbase, Bittrex, Kraken and more.
Faucet:
A website which gives away free cryptocurrencies.
Fiat money:
Fiat currency is legal tender whose value is backed by the government that issued it, such as the US dollar or UK pound.
Fork:
A split in the blockchain, resulting in two separate branches, an original and a new alternate version of the cryptocurrency. As a single blockchain forks into two, they will both run simultaneously on different parts of the network. For example, Bitcoin Cash is a Bitcoin fork.
FOMO:
Fear of missing out.
Frictionless:
A system is frictionless when there are zero transaction costs or trading retraints.
FUD:
Fear, Uncertainty and Doubt regarding the crypto market.
Gas:
A fee paid to run transactions, dapps and smart contracts on Ethereum.
Halving:
A 50% decrease in block reward after the mining of a pre-specified number of blocks. Every 4 years, the “reward” for successfully mining a block of bitcoin is reduced by half. This is referred to as “Halving”.
Hardware wallet:
Physical wallet devices that can securely store cryptocurrency maximally. Some examples are Ledger Nano S**,** Digital Bitbox and more**.**
Hash:
The process that takes input data of varying sizes, performs an operation on it and converts it into a fixed size output. It cannot be reversed.
Hashing:
The process by which you mine bitcoin or similar cryptocurrency, by trying to solve the mathematical problem within it, using cryptographic hash functions.
HODL:
A Bitcoin enthusiast once accidentally misspelled the word HOLD and it is now part of the bitcoin legend. It can also mean hold on for dear life.
ICO (Initial Coin Offering):
A blockchain-based fundraising mechanism, or a public crowd sale of a new digital coin, used to raise capital from supporters for an early stage crypto venture. Beware of these as there have been quite a few scams in the past.
John mcAfee:
A man who will one day eat his balls on live television for falsely predicting bitcoin going to 100k. He has also become a small meme within the crypto community for his outlandish claims.
JOMO:
Joy of missing out. For those who are so depressed about missing out their sadness becomes joy.
KYC:
Know your customer(alternatively consumer).
Lambo:
This stands for Lamborghini. A small meme within the investing community where the moment someone gets rich they spend their earnings on a lambo. One day we will all have lambos in crypto-valhalla.
Ledger:
Away from Blockchain, it is a book of financial transactions and balances. In the world of crypto, the blockchain functions as a ledger. A digital currency’s ledger records all transactions which took place on a certain block chain network.
Leverage:
Trading with borrowed capital (margin) in order to increase the potential return of an investment.
Liquidity:
The availability of an asset to be bought and sold easily, without affecting its market price.
of the coins.
Margin trading:
The trading of assets or securities bought with borrowed money.
Market cap/MCAP:
A short-term for Market Capitalization. Market Capitalization refers to the market value of a particular cryptocurrency. It is computed by multiplying the Price of an individual unit of coins by the total circulating supply.
Miner:
A computer participating in any cryptocurrency network performing proof of work. This is usually done to receive block rewards.
Mining:
The act of solving a complex math equation to validate a blockchain transaction using computer processing power and specialized hardware.
Mining contract:
A method of investing in bitcoin mining hardware, allowing anyone to rent out a pre-specified amount of hashing power, for an agreed amount of time. The mining service takes care of hardware maintenance, hosting and electricity costs, making it simpler for investors.
Mining rig:
A computer specially designed for mining cryptocurrencies.
Mooning:
A situation the price of a coin rapidly increases in value. Can also be used as: “I hope bitcoin goes to the moon”
Node:
Any computing device that connects to the blockchain network.
Open source:
The practice of sharing the source code for a piece of computer software, allowing it to be distributed and altered by anyone.
OTC:
Over the counter. Trading is done directly between parties.
P2P (Peer to Peer):
A type of network connection where participants interact directly with each other rather than through a centralized third party. The system allows the exchange of resources from A to B, without having to go through a separate server.
Paper wallet:
A form of “cold storage” where the private keys are printed onto a piece of paper and stored offline. Considered as one of the safest crypto wallets, the truth is that it majors in sweeping coins from your wallets.
Pre mining:
The mining of a cryptocurrency by its developers before it is released to the public.
Proof of stake (POS):
A consensus distribution algorithm which essentially rewards you based upon the amount of the coin that you own. In other words, more investment in the coin will leads to more gain when you mine with this protocol In Proof of Stake, the resource held by the “miner” is their stake in the currency.
PROOF OF WORK (POW) :
The competition of computers competing to solve a tough crypto math problem. The first computer that does this is allowed to create new blocks and record information.” The miner is then usually rewarded via transaction fees.
Protocol:
A standardized set of rules for formatting and processing data.
Public key / private key:
A cryptographic code that allows a user to receive cryptocurrencies into an account. The public key is made available to everyone via a publicly accessible directory, and the private key remains confidential to its respective owner. Because the key pair is mathematically related, whatever is encrypted with a public key may only be decrypted by its corresponding private key.
Pump and dump:
Massive buying and selling activity of cryptocurrencies (sometimes organized and to one’s benefit) which essentially result in a phenomenon where the significant surge in the value of coin followed by a huge crash take place in a short time frame.
Recovery phrase:
A set of phrases you are given whereby you can regain or access your wallet should you lose the private key to your wallets — paper, mobile, desktop, and hardware wallet. These phrases are some random 12–24 words. A recovery Phrase can also be called as Recovery seed, Seed Key, Recovery Key, or Seed Phrase.
REKT:
Referring to the word “wrecked”. It defines a situation whereby an investor or trader who has been ruined utterly following the massive losses suffered in crypto industry.
Ripple:
An alternative payment network to Bitcoin based on similar cryptography. The ripple network uses XRP as currency and is capable of sending any asset type.
ROI:
Return on investment.
Safu:
A crypto term for safe popularized by the Bizonnaci YouTube channel after the CEO of Binance tweeted
“Funds are safe."
“the exchage I use got hacked!”“Oh no, are your funds safu?”
“My coins better be safu!”


Sats/Satoshi:
The smallest fraction of a bitcoin is called a “satoshi” or “sat”. It represents one hundred-millionth of a bitcoin and is named after Satoshi Nakamoto.
Satoshi Nakamoto:
This was the pseudonym for the mysterious creator of Bitcoin.
Scalability:
The ability of a cryptocurrency to contain the massive use of its Blockchain.
Sharding:
A scaling solution for the Blockchain. It is generally a method that allows nodes to have partial copies of the complete blockchain in order to increase overall network performance and consensus speeds.
Shitcoin:
Coin with little potential or future prospects.
Shill:
Spreading buzz by heavily promoting a particular coin in the community to create awareness.
Short position:
Selling of a specific cryptocurrency with an expectation that it will drop in value.
Silk road:
The online marketplace where drugs and other illicit items were traded for Bitcoin. This marketplace is using accessed through “TOR”, and VPNs. In October 2013, a Silk Road was shut down in by the FBI.
Smart Contract:
Certain computational benchmarks or barriers that have to be met in turn for money or data to be deposited or even be used to verify things such as land rights.
Software Wallet:
A crypto wallet that exists purely as software files on a computer. Usually, software wallets can be generated for free from a variety of sources.
Solidity:
A contract-oriented coding language for implementing smart contracts on Ethereum. Its syntax is similar to that of JavaScript.
Stable coin:
A cryptocoin with an extremely low volatility that can be used to trade against the overall market.
Staking:
Staking is the process of actively participating in transaction validation (similar to mining) on a proof-of-stake (PoS) blockchain. On these blockchains, anyone with a minimum-required balance of a specific cryptocurrency can validate transactions and earn Staking rewards.
Surge:
When a crypto currency appreciates or goes up in price.
Tank:
The opposite of mooning. When a coin tanks it can also be described as crashing.
Tendies
For traders , the chief prize is “tendies” (chicken tenders, the treat an overgrown man-child receives for being a “Good Boy”) .
Token:
A unit of value that represents a digital asset built on a blockchain system. A token is usually considered as a “coin” of a cryptocurrency, but it really has a wider functionality.
TOR: “The Onion Router” is a free web browser designed to protect users’ anonymity and resist censorship. Tor is usually used surfing the web anonymously and access sites on the “Darkweb”.
Transaction fee:
An amount of money users are charged from their transaction when sending cryptocurrencies.
Volatility:
A measure of fluctuations in the price of a financial instrument over time. High volatility in bitcoin is seen as risky since its shifting value discourages people from spending or accepting it.
Wallet:
A file that stores all your private keys and communicates with the blockchain to perform transactions. It allows you to send and receive bitcoins securely as well as view your balance and transaction history.
Whale:
An investor that holds a tremendous amount of cryptocurrency. Their extraordinary large holdings allow them to control prices and manipulate the market.
Whitepaper:

A comprehensive report or guide made to understand an issue or help decision making. It is also seen as a technical write up that most cryptocurrencies provide to take a deep look into the structure and plan of the cryptocurrency/Blockchain project. Satoshi Nakamoto was the first to release a whitepaper on Bitcoin, titled “Bitcoin: A Peer-to-Peer Electronic Cash System” in late 2008.
And with that I finally complete my odyssey. I sincerely hope that this helped you and if you are new, I welcome you to crypto. If you read all of that I hope it increased, you in knowledge.
my final definition:
Crypto-Family:
A collection of all the HODLers and crypto fanatics. A place where all people alike unite over a love for crypto.
We are all in this together as we pioneer the new world that is crypto currency. I wish you a great day and Happy HODLing.
-u/flacciduck
feel free to comment words or terms that you feel should be included or about any errors I made.
Edit1:some fixes were made and added words.
submitted by flacciduck to CryptoCurrency [link] [comments]

Proposal: The Sia Foundation

Vision Statement

A common sentiment is brewing online; a shared desire for the internet that might have been. After decades of corporate encroachment, you don't need to be a power user to realize that something has gone very wrong.
In the early days of the internet, the future was bright. In that future, when you sent an instant message, it traveled directly to the recipient. When you needed to pay a friend, you announced a transfer of value to their public key. When an app was missing a feature you wanted, you opened up the source code and implemented it. When you took a picture on your phone, it was immediately encrypted and backed up to storage that you controlled. In that future, people would laugh at the idea of having to authenticate themselves to some corporation before doing these things.
What did we get instead? Rather than a network of human-sized communities, we have a handful of enormous commons, each controlled by a faceless corporate entity. Hey user, want to send a message? You can, but we'll store a copy of it indefinitely, unencrypted, for our preference-learning algorithms to pore over; how else could we slap targeted ads on every piece of content you see? Want to pay a friend? You can—in our Monopoly money. Want a new feature? Submit a request to our Support Center and we'll totally maybe think about it. Want to backup a photo? You can—inside our walled garden, which only we (and the NSA, of course) can access. Just be careful what you share, because merely locking you out of your account and deleting all your data is far from the worst thing we could do.
You rationalize this: "MEGACORP would never do such a thing; it would be bad for business." But we all know, at some level, that this state of affairs, this inversion of power, is not merely "unfortunate" or "suboptimal" – No. It is degrading. Even if MEGACORP were purely benevolent, it is degrading that we must ask its permission to talk to our friends; that we must rely on it to safeguard our treasured memories; that our digital lives are completely beholden to those who seek only to extract value from us.
At the root of this issue is the centralization of data. MEGACORP can surveil you—because your emails and video chats flow through their servers. And MEGACORP can control you—because they hold your data hostage. But centralization is a solution to a technical problem: How can we make the user's data accessible from anywhere in the world, on any device? For a long time, no alternative solution to this problem was forthcoming.
Today, thanks to a confluence of established techniques and recent innovations, we have solved the accessibility problem without resorting to centralization. Hashing, encryption, and erasure encoding got us most of the way, but one barrier remained: incentives. How do you incentivize an anonymous stranger to store your data? Earlier protocols like BitTorrent worked around this limitation by relying on altruism, tit-for-tat requirements, or "points" – in other words, nothing you could pay your electric bill with. Finally, in 2009, a solution appeared: Bitcoin. Not long after, Sia was born.
Cryptography has unleashed the latent power of the internet by enabling interactions between mutually-distrustful parties. Sia harnesses this power to turn the cloud storage market into a proper marketplace, where buyers and sellers can transact directly, with no intermediaries, anywhere in the world. No more silos or walled gardens: your data is encrypted, so it can't be spied on, and it's stored on many servers, so no single entity can hold it hostage. Thanks to projects like Sia, the internet is being re-decentralized.
Sia began its life as a startup, which means it has always been subjected to two competing forces: the ideals of its founders, and the profit motive inherent to all businesses. Its founders have taken great pains to never compromise on the former, but this often threatened the company's financial viability. With the establishment of the Sia Foundation, this tension is resolved. The Foundation, freed of the obligation to generate profit, is a pure embodiment of the ideals from which Sia originally sprung.
The goals and responsibilities of the Foundation are numerous: to maintain core Sia protocols and consensus code; to support developers building on top of Sia and its protocols; to promote Sia and facilitate partnerships in other spheres and communities; to ensure that users can easily acquire and safely store siacoins; to develop network scalability solutions; to implement hardforks and lead the community through them; and much more. In a broader sense, its mission is to commoditize data storage, making it cheap, ubiquitous, and accessible to all, without compromising privacy or performance.
Sia is a perfect example of how we can achieve better living through cryptography. We now begin a new chapter in Sia's history. May our stewardship lead it into a bright future.
 

Overview

Today, we are proposing the creation of the Sia Foundation: a new non-profit entity that builds and supports distributed cloud storage infrastructure, with a specific focus on the Sia storage platform. What follows is an informal overview of the Sia Foundation, covering two major topics: how the Foundation will be funded, and what its funds will be used for.

Organizational Structure

The Sia Foundation will be structured as a non-profit entity incorporated in the United States, likely a 501(c)(3) organization or similar. The actions of the Foundation will be constrained by its charter, which formalizes the specific obligations and overall mission outlined in this document. The charter will be updated on an annual basis to reflect the current goals of the Sia community.
The organization will be operated by a board of directors, initially comprising Luke Champine as President and Eddie Wang as Chairman. Luke Champine will be leaving his position at Nebulous to work at the Foundation full-time, and will seek to divest his shares of Nebulous stock along with other potential conflicts of interest. Neither Luke nor Eddie personally own any siafunds or significant quantities of siacoin.

Funding

The primary source of funding for the Foundation will come from a new block subsidy. Following a hardfork, 30 KS per block will be allocated to the "Foundation Fund," continuing in perpetuity. The existing 30 KS per block miner reward is not affected. Additionally, one year's worth of block subsidies (approximately 1.57 GS) will be allocated to the Fund immediately upon activation of the hardfork.
As detailed below, the Foundation will provably burn any coins that it cannot meaningfully spend. As such, the 30 KS subsidy should be viewed as a maximum. This allows the Foundation to grow alongside Sia without requiring additional hardforks.
The Foundation will not be funded to any degree by the possession or sale of siafunds. Siafunds were originally introduced as a means of incentivizing growth, and we still believe in their effectiveness: a siafund holder wants to increase the amount of storage on Sia as much as possible. While the Foundation obviously wants Sia to succeed, its driving force should be its charter. Deriving significant revenue from siafunds would jeopardize the Foundation's impartiality and focus. Ultimately, we want the Foundation to act in the best interests of Sia, not in growing its own budget.

Responsibilities

The Foundation inherits a great number of responsibilities from Nebulous. Each quarter, the Foundation will publish the progress it has made over the past quarter, and list the responsibilities it intends to prioritize over the coming quarter. This will be accompanied by a financial report, detailing each area of expenditure over the past quarter, and forecasting expenditures for the coming quarter. Below, we summarize some of the myriad responsibilities towards which the Foundation is expected to allocate its resources.

Maintain and enhance core Sia software

Arguably, this is the most important responsibility of the Foundation. At the heart of Sia is its consensus algorithm: regardless of other differences, all Sia software must agree upon the content and rules of the blockchain. It is therefore crucial that the algorithm be stewarded by an entity that is accountable to the community, transparent in its decision-making, and has no profit motive or other conflicts of interest.
Accordingly, Sia’s consensus functionality will no longer be directly maintained by Nebulous. Instead, the Foundation will release and maintain an implementation of a "minimal Sia full node," comprising the Sia consensus algorithm and P2P networking code. The source code will be available in a public repository, and signed binaries will be published for each release.
Other parties may use this code to provide alternative full node software. For example, Nebulous may extend the minimal full node with wallet, renter, and host functionality. The source code of any such implementation may be submitted to the Foundation for review. If the code passes review, the Foundation will provide "endorsement signatures" for the commit hash used and for binaries compiled internally by the Foundation. Specifically, these signatures assert that the Foundation believes the software contains no consensus-breaking changes or other modifications to imported Foundation code. Endorsement signatures and Foundation-compiled binaries may be displayed and distributed by the receiving party, along with an appropriate disclaimer.
A minimal full node is not terribly useful on its own; the wallet, renter, host, and other extensions are what make Sia a proper developer platform. Currently, the only implementations of these extensions are maintained by Nebulous. The Foundation will contract Nebulous to ensure that these extensions continue to receive updates and enhancements. Later on, the Foundation intends to develop its own implementations of these extensions and others. As with the minimal node software, these extensions will be open source and available in public repositories for use by any Sia node software.
With the consensus code now managed by the Foundation, the task of implementing and orchestrating hardforks becomes its responsibility as well. When the Foundation determines that a hardfork is necessary (whether through internal discussion or via community petition), a formal proposal will be drafted and submitted for public review, during which arguments for and against the proposal may be submitted to a public repository. During this time, the hardfork code will be implemented, either by Foundation employees or by external contributors working closely with the Foundation. Once the implementation is finished, final arguments will be heard. The Foundation board will then vote whether to accept or reject the proposal, and announce their decision along with appropriate justification. Assuming the proposal was accepted, the Foundation will announce the block height at which the hardfork will activate, and will subsequently release source code and signed binaries that incorporate the hardfork code.
Regardless of the Foundation's decision, it is the community that ultimately determines whether a fork is accepted or rejected – nothing can change that. Foundation node software will never automatically update, so all forks must be explicitly adopted by users. Furthermore, the Foundation will provide replay and wipeout protection for its hard forks, protecting other chains from unintended or malicious reorgs. Similarly, the Foundation will ensure that any file contracts formed prior to a fork activation will continue to be honored on both chains until they expire.
Finally, the Foundation also intends to pursue scalability solutions for the Sia blockchain. In particular, work has already begun on an implementation of Utreexo, which will greatly reduce the space requirements of fully-validating nodes (allowing a full node to be run on a smartphone) while increasing throughput and decreasing initial sync time. A hardfork implementing Utreexo will be submitted to the community as per the process detailed above.
As this is the most important responsibility of the Foundation, it will receive a significant portion of the Foundation’s budget, primarily in the form of developer salaries and contracting agreements.

Support community services

We intend to allocate 25% of the Foundation Fund towards the community. This allocation will be held and disbursed in the form of siacoins, and will pay for grants, bounties, hackathons, and other community-driven endeavours.
Any community-run service, such as a Skynet portal, explorer or web wallet, may apply to have its costs covered by the Foundation. Upon approval, the Foundation will reimburse expenses incurred by the service, subject to the exact terms agreed to. The intent of these grants is not to provide a source of income, but rather to make such services "break even" for their operators, so that members of the community can enrich the Sia ecosystem without worrying about the impact on their own finances.

Ensure easy acquisition and storage of siacoins

Most users will acquire their siacoins via an exchange. The Foundation will provide support to Sia-compatible exchanges, and pursue relevant integrations at its discretion, such as Coinbase's new Rosetta standard. The Foundation may also release DEX software that enables trading cryptocurrencies without the need for a third party. (The Foundation itself will never operate as a money transmitter.)
Increasingly, users are storing their cryptocurrency on hardware wallets. The Foundation will maintain the existing Ledger Nano S integration, and pursue further integrations at its discretion.
Of course, all hardware wallets must be paired with software running on a computer or smartphone, so the Foundation will also develop and/or maintain client-side wallet software, including both full-node wallets and "lite" wallets. Community-operated wallet services, i.e. web wallets, may be funded via grants.
Like core software maintenance, this responsibility will be funded in the form of developer salaries and contracting agreements.

Protect the ecosystem

When it comes to cryptocurrency security, patching software vulnerabilities is table stakes; there are significant legal and social threats that we must be mindful of as well. As such, the Foundation will earmark a portion of its fund to defend the community from legal action. The Foundation will also safeguard the network from 51% attacks and other threats to network security by implementing softforks and/or hardforks where necessary.
The Foundation also intends to assist in the development of a new FOSS software license, and to solicit legal memos on various Sia-related matters, such as hosting in the United States and the EU.
In a broader sense, the establishment of the Foundation makes the ecosystem more robust by transferring core development to a more neutral entity. Thanks to its funding structure, the Foundation will be immune to various forms of pressure that for-profit companies are susceptible to.

Drive adoption of Sia

Although the overriding goal of the Foundation is to make Sia the best platform it can be, all that work will be in vain if no one uses the platform. There are a number of ways the Foundation can promote Sia and get it into the hands of potential users and developers.
In-person conferences are understandably far less popular now, but the Foundation can sponsor and/or participate in virtual conferences. (In-person conferences may be held in the future, permitting circumstances.) Similarly, the Foundation will provide prizes for hackathons, which may be organized by community members, Nebulous, or the Foundation itself. Lastly, partnerships with other companies in the cryptocurrency space—or the cloud storage space—are a great way to increase awareness of Sia. To handle these responsibilities, one of the early priorities of the Foundation will be to hire a marketing director.

Fund Management

The Foundation Fund will be controlled by a multisig address. Each member of the Foundation's board will control one of the signing keys, with the signature threshold to be determined once the final composition of the board is known. (This threshold may also be increased or decreased if the number of board members changes.) Additionally, one timelocked signing key will be controlled by David Vorick. This key will act as a “dead man’s switch,” to be used in the event of an emergency that prevents Foundation board members from reaching the signature threshold. The timelock ensures that this key cannot be used unless the Foundation fails to sign a transaction for several months.
On the 1st of each month, the Foundation will use its keys to transfer all siacoins in the Fund to two new addresses. The first address will be controlled by a high-security hot wallet, and will receive approximately one month's worth of Foundation expenditures. The second address, receiving the remaining siacoins, will be a modified version of the source address: specifically, it will increase the timelock on David Vorick's signing key by one month. Any other changes to the set of signing keys, such as the arrival or departure of board members, will be incorporated into this address as well.
The Foundation Fund is allocated in SC, but many of the Foundation's expenditures must be paid in USD or other fiat currency. Accordingly, the Foundation will convert, at its discretion, a portion of its monthly withdrawals to fiat currency. We expect this conversion to be primarily facilitated by private "OTC" sales to accredited investors. The Foundation currently has no plans to speculate in cryptocurrency or other assets.
Finally, it is important that the Foundation adds value to the Sia platform well in excess of the inflation introduced by the block subsidy. For this reason, the Foundation intends to provably burn, on a quarterly basis, any coins that it cannot allocate towards any justifiable expense. In other words, coins will be burned whenever doing so provides greater value to the platform than any other use. Furthermore, the Foundation will cap its SC treasury at 5% of the total supply, and will cap its USD treasury at 4 years’ worth of predicted expenses.
 
Addendum: Hardfork Timeline
We would like to see this proposal finalized and accepted by the community no later than September 30th. A new version of siad, implementing the hardfork, will be released no later than October 15th. The hardfork will activate at block 293220, which is expected to occur around 12pm EST on January 1st, 2021.
 
Addendum: Inflation specifics
The total supply of siacoins as of January 1st, 2021 will be approximately 45.243 GS. The initial subsidy of 1.57 GS thus increases the supply by 3.47%, and the total annual inflation in 2021 will be at most 10.4% (if zero coins are burned). In 2022, total annual inflation will be at most 6.28%, and will steadily decrease in subsequent years.
 

Conclusion

We see the establishment of the Foundation as an important step in the maturation of the Sia project. It provides the ecosystem with a sustainable source of funding that can be exclusively directed towards achieving Sia's ambitious goals. Compared to other projects with far deeper pockets, Sia has always punched above its weight; once we're on equal footing, there's no telling what we'll be able to achieve.
Nevertheless, we do not propose this change lightly, and have taken pains to ensure that the Foundation will act in accordance with the ideals that this community shares. It will operate transparently, keep inflation to a minimum, and respect the user's fundamental role in decentralized systems. We hope that everyone in the community will consider this proposal carefully, and look forward to a productive discussion.
submitted by lukechampine to siacoin [link] [comments]

Technical: Taproot: Why Activate?

This is a follow-up on https://old.reddit.com/Bitcoin/comments/hqzp14/technical_the_path_to_taproot_activation/
Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners?
And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess.
First, let's consider some principles of Bitcoin.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so).
So, how does Taproot affect those principles?

Taproot and Your /Coins

Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash).
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input).
However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits!
Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh?
With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save!
And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well!
(P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1)
Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service!
So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win!
(even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot)
And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!

Taproot and Your Contracts

No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade.
So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust.
Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade.
However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade.
In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address.
Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants).
But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer).
Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos).
(technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).

Taproot and Your Contracts, Part 2: Cryptographic Boogaloo

Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code.
This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded.
And you can do that, with HTLCs, today.
Of course, HTLCs do have problems:
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar".
Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given public key to you.
Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige).
(Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key).
So:
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script.
(technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)

Quantum Quibbles!

Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable??
Well, in theory yes. In practice, they probably are not.
It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash.
When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key.
So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key.
(public keys should be public, that's why they're called public keys, LOL)
And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions.
So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort.
Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers.
For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
So:
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).

Summary

I Wanna Be The Taprooter!

So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!

But I Hate Taproot!!

That's fine!

Discussions About Taproot Activation

submitted by almkglor to Bitcoin [link] [comments]

[ Bitcoin ] Technical: Taproot: Why Activate?

Topic originally posted in Bitcoin by almkglor [link]
This is a follow-up on https://old.reddit.com/Bitcoin/comments/hqzp14/technical_the_path_to_taproot_activation/
Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners?
And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess.
First, let's consider some principles of Bitcoin.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so).
So, how does Taproot affect those principles?

Taproot and Your /Coins

Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash).
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input).
However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits!
Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh?
With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save!
And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well!
(P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1)
Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service!
So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win!
(even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot)
And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!

Taproot and Your Contracts

No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade.
So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust.
Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade.
However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade.
In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address.
Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants).
But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer).
Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos).
(technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).

Taproot and Your Contracts, Part 2: Cryptographic Boogaloo

Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code.
This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded.
And you can do that, with HTLCs, today.
Of course, HTLCs do have problems:
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar".
Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given private key to you.
Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige).
(Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key).
So:
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script.
(technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)

Quantum Quibbles!

Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable??
Well, in theory yes. In practice, they probably are not.
It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash.
When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key.
So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key.
(public keys should be public, that's why they're called public keys, LOL)
And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions.
So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort.
Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers.
For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
So:
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).

Summary

I Wanna Be The Taprooter!

So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!

But I Hate Taproot!!

That's fine!

Discussions About Taproot Activation

almkglor your post has been copied because one or more comments in this topic have been removed. This copy will preserve unmoderated topic. If you would like to opt-out, please send a message using [this link].
[deleted comment]
[deleted comment]
[deleted comment]
submitted by anticensor_bot to u/anticensor_bot [link] [comments]

How does cryptocurrency works?

How does cryptocurrency works?
When we were a much smaller society, people could trade in the community pretty easily, but as the distance in our trade grew, we ended up inventing institutions such as banks, markets, stocks etc. that help us to conduct financial transactions. The currencies we are operating with nowadays are bills or coins, controlled by a centralized authority and tracked by previously mentioned financial institutions. The thing is, having a third party in our money transactions is not always what we wish for. But fortunately, today we have a tool that allows us to make fast and save financial transactions without any middlemen, it has no central authority and it is regulated by math. Sounds cool, right? Cryptocurrency is this tool. It is quite a peculiar system, so let’s take a closer look at it.
by StealthEX

Layers of a crypto-cake

Layer 1: Blockchain

First of all – any cryptocurrency is based on the blockchain. In simple words, blockchain is a kind of a database. It stores information in batches, called blocks that are linked together in a chronological way. As the blockchain is not located in one place but rather on thousands of computers around the globe, the blockchain and the transactions thus are decentralized, they have no head center. The newest blocks of transaction are continuously added on (or changed) to all the previous blocks. That’s how you get a cryptocurrency blockchain.
The technology’s name is a compound of the words “block” and “chain”, as the “blocks” of information are linked together in a “chain”. That’s how crypto security works – the information in the recently created block depends on the previous one. It means that no block can be changed without affecting the others, this system prevents a blockchain from being hacked.
There are 2 kinds of blockchain: private and public. Public, as goes by its name, is publicly available blockchain, whereas private blockchain is permissioned, which only a limited number of people have access to.

Layer 2: Transaction

In fact, everything begins with the intention of someone to complete a transaction. A transaction itself is a file that consists of the sender’s and recipient’s public keys (wallet addresses) and the amount of coins transferred. The sender begins by logging in into his cryptocurrency wallet with the private key – a unique combination of letters and numbers, something you would call a personal password in a bank. Now the transaction is signed and the first step which is called basic public key cryptography is completed.
Then the signed (encrypted) transaction is shared with everyone in the cryptocurrency network, meaning it gets to every other peer. We should mention that the transaction is firstly queued up to be added to the public ledger. Then, when it’s broadcasted to the public ledger, all the computers add a new transaction to a shared list of recent transactions, known as blocks.
Having a ledger forces everyone to “play fair” and reduce the risk of spending extra. The numbers of transactions are publicly available, but the information about senders and receivers is encrypted. Each transaction holds on to a unique set of keys. Whoever owns a set of keys, owns the amount of cryptocurrency associated with those keys (just like whoever owns a bank account owns the money in it). This is how peer-to-peer technology works.

Layer 3: Mining

Now let’s talk about mining. Once confirmed, the transaction is forever captured into the blockchain history**.** The verification of the block is done by Cryptocurrency Miners – they verify and then add blocks to the public ledger. To verify them, miners go down on the road of solving a very difficult math puzzle using powerful software, which is that the computer needs to produce the correct sequence number – “hash” – that is specific to the given block, there is not much chance of finding it. Whoever solves the puzzle first, gets the opportunity to officially add a block of transactions to the ledger and get fresh and new coins as reward. The reward is given in whatever cryptocurrency’s blockchain miners are operating into. For example, BTC originally used to reward miners in 50 BTC, but after the first halving it decreased to 25 BTC, and at present time it is 6.25 BTC. The process of miners competing against each other in order to complete the transactions on the network and get rewarded is known as the Proof-of-Work (PoW) algorithm, which is natural for BTC and many other cryptocurrencies. Also there are another consensus mechanisms: Proof-of-Stake (PoS), Delegated Proof-of-Stake (dPoS), Proof-of-Authority (PoA), Byzantine Fault Tolerance (BFT), Practical Byzantine Fault Tolerance (pBFT), Federated Byzantine Agreement (FBA) and Delegated Byzantine Fault Tolerance (dBFT). Still, all of them are used to facilitate an agreement between network participants.
The way that system works – when many computers try to verify a block – guarantees that no computer is going to monopolize a cryptocurrency market. To ensure the competition stays fair, the puzzle becomes harder as more computers join in. Summing it up, let’s say that mining is responsible for two aspects of the crypto mechanism: producing the proof and allowing more coins to enter circulation.

Types of cryptocurrency

In the virtual currency world there are a bunch of different cryptocurrency types with their own distinctive features.
The first cryptocurrency is, of course, Bitcoin. Bitcoin is the first crypto coin ever created and used. BTC is the most liquid cryptocurrency in the market and has the highest market cap among all the cryptocurrencies.

Altcoins

The term ‘altcoins’ means ‘alternatives’ of Bitcoin. The first altcoin Namecoin was created in 2011 and later on hundreds of them appeared in crypto-world, among them are Ravencoin, Dogecoin, Litecoin, Syscoin etc. Altcoins were initially launched with a purpose to overcome Bitcoin’s weak points and become upgraded substitutes of Bitcoin. Altcoins usually stand an independent blockchain and have their own miners and wallets. Some altcoins actually have boosted features yet none of them gained popularity akin to Bitcoin. More about altcoins in our article.

Tokens

Token is a unit of account that is used to represent the digital balance of an asset. Basically tokens represent an asset or utility that usually are made on another blockchain. Tokens are registered in a database based on blockchain technology, and they are accessed through special applications using electronic signature schemes.
Tokens and cryptocurrencies are not the same thing. Let’s explain it more detailed:
• First of all, unlike cryptocurrencies, tokens can be issued and managed both centralized and decentralized.
• The verification of the token transactions can be conducted both centralized and decentralized, when cryptocurrencies’ verification is only decentralized.
• Tokens do not necessarily run their own blockchain, but for cryptocurrencies having their own blockchain is compulsory.
• Tokens’ prices can be affected by a vast range of factors such as demand and supply, tokens’ additional emission, or binding to other assets. On the other hand, the price of cryptocurrencies is completely regulated by the market.
Tokens can be:
• Utility tokens – something that accesses a user to a product or service and support dApps built on the blockchain.
• Governance tokens – fuel for voting systems executed on the blockchain.
• Transactional tokens – serve as a unit of accounts and used for trading.
• Security tokens – represent legal ownership of an asset, can be used in addition to or in place of a password.
Tokens are usually created through smart contracts and are often adapted to an ICO – initial coin offering, which is a means of crowdfunding. It is much easier to create tokens, that is why they make a majority of coins in existence. Altcoin and token blockchains work on the concept of smart contracts or decentralized applications, where the programmable, self-executing code is ruling the transactions within a blockchain. By the way, the vast majority of tokens were distributed on the Ethereum platform.

Forks

Generally a fork occurs when a protocol code, on which the blockchain is operating, is being changed, modified and updated by developers or users. Due to the changes, the blockchain splits into 2 paths: an old way of doing things and a new way. These changes may happen because: a disagreement between users and creators; a major hack, as it was with Ethereum; developers’ decision to fix errors and add new functionality. The blockchain mainly splits into hard forks and soft forks. Shortly speaking, coin hard forks cannot work with older versions while soft forks still can work with older versions.
Hard fork – after a hard fork, a new version is completely separated from the previous one, there’s no connection between them anymore, although the new version keeps the data of all the previous transactions but now on, each version will have its own transaction history. In order to use the new versions, every node has to upgrade their software. A hard fork requires majority support (or consensus) from coin holders with a connection to the coin network. If enough users don’t update then you will be unable to get a clean upgrade which could lead to a break in the blockchain.
Soft fork – a protocol change, but with backward compatibility. The rules of the network have been changed, but nodes running the old software will still be able to validate transactions, but those updated nodes won’t be able to mine new blocks. So to be used and useful, soft forks require the majority of the network’s hash power. Otherwise, they risk becoming set out and anyway ending up as a hard fork.

Stablecoins

As it comes from the name, stablecoins are price-stabilized that are becoming big in the crypto world. Still enjoying most of the “typical-cryptocurrency” benefits, it is standing out as a fixed and stable coin, not volatile at all. Stablecoins’ values are stabilized by pegging them to other assets such as the US Dollar or gold.
Stablecoins include Tether (USDT), Standard (PAX), Gemini Dollar (GUSD) which are backed by the US Dollar and approved by the New York State Department of Financial Services.

Conclusion

Now that we hacked into cryptocurrency, you probably understand that it is much less mysterious than it first seemed. Nowadays, cryptocurrencies are making the revolution of the financial institution. For example, Bitcoin is currently used in 96 countries and growing, with more than 12,000 transactions per hour. More and more investors are involved, banks and governments realize that these cutting edge technologies are prone to draw their control away. Cryptocurrencies are slowly changing the world and you can choose – either stand beside and observe or become part of history in the making.
And remember if you need to exchange your coins StealthEX is here for you. We provide a selection of more than 300 coins and constantly updating the cryptocurrency list so that our customers will find a suitable option. Our service does not require registration and allows you to remain anonymous. Why don’t you check it out? Just go to StealthEX and follow these easy steps:
✔ Choose the pair and the amount for your exchange. For example BTC to ETH.
✔ Press the “Start exchange” button.
✔ Provide the recipient address to which the coins will be transferred.
✔ Move your cryptocurrency for the exchange.
✔ Receive your coins.
Follow us on Medium, Twitter, Facebook, and Reddit to get StealthEX.io updates and the latest news about the crypto world. For all requests message us via [[email protected]](mailto:[email protected]).
The views and opinions expressed here are solely those of the author. Every investment and trading move involves risk. You should conduct your own research when making a decision.
Original article was posted on https://stealthex.io/blog/2020/09/29/how-does-cryptocurrency-works/
submitted by Stealthex_io to StealthEX [link] [comments]

The deepest report: Bitmain's self-help history

The deepest report: Bitmain's self-help history
The original intention of this article is to let readers understand the causes and consequences of Bitmain internal fighting, but after writing it, I found that it is not so much internal fighting as it is a long history of self-help.
The story is very long. Let's adjust the timeline to the eve of December 17, 2018. That was one of Bitmain's most critical moments and the beginning of a series of subsequent stories.
1. Self-immolation In September 2018, Bitmain's financial department warned management that the company's cash flow has become very tight and operating costs must be reduced to allow the company to continue. The blockchain unicorn, which is valued at more than 15 billion U.S. dollars, is crippled in the run and struggling to break the corner.
In 2017, Bitmain made a profit of 1 billion US dollars In the first half of 2018, Bitmain made a profit of 1 billion US dollars Three rounds of financing, a total of 800 million US dollars Net assets should exceed 3 billion U.S. dollars In September 2018, Bitmain had tight cash flow and was on the verge of bankruptcy
A simple comparison, it is not difficult to see that Bitmain's ability to make money is incredible, and its ability to burn money is even more extreme.
How does Bitmain burn money? Do you pour cash into gasoline and burn it, or hire a lot of employees to stuff the banknotes one by one into the shredder? The actual situation is closer to the latter.
The following data can help readers quickly learn Bitmain's money burning skills.
At the beginning of 2018, the entire cryptocurrency market has entered a bear market, but Bitmain's monthly operating costs have been rising wildly. Operating costs have risen from 10 million US dollars at the beginning of the year to 50 million US dollars at the end of the year.
Large-scale expansion of the R&D team is one of the main reasons. The HR who once worked at Bitmain revealed that the company once hired more than 50 employees a day and nearly 500 employees a month. Even so, it was criticized for its slow recruitment speed. The cash consumption in this area is approximately $250 million.
Operating costs are just the tip of the iceberg. Excessive chip trial production can become a classic case of project management courses. Readers who pay attention to Cryptocurrency mining can easily find that Bitmain is still working hard to clear the inventory of Antminer S9 in 2019. As the co-CEO, Ketuan Zhan did not listen to the advice or even warnings of the Finance Department, insisting on the implementation of Excessive chip trial production, resulting in a large accumulation of inventory and tight capital turnover. Another CEO, Jihan Wu, once revealed that the loss of Excessive chip trial production to the company was approximately US$1.5 billion.
Large-scale expansion of the R&D team is one of the main reasons. The HR who once worked at Bitmain revealed that the company once hired more than 50 employees a day and nearly 500 employees a month. Even so, it was criticized for its slow recruitment speed. The cash consumption in this area is approximately $250 million.
The BM1393 chip incident is even more incredible. Chip expert Ketuan Zhan invested a lot of money on a failed chip, and finally failed again. From 2017 to 2018, Bitmain has failed Trial production of mining machine chips at least 4 times, including 16nm, 12nm and 10nm chips, of which 16nm Trial production failed twice, thus losing at least US$1.2 billion.
It is rumored that Bitmain still holds a billion U.S. dollars worth of cryptocurrency in a state of floating loss. In view of the rebound in the market in 2020, we will not comment temporarily, waiting for the correct answer from the cryptocurrency market. But the losses pointed out in the previous article are all irreversible.
2. Sole power
In September 2018, Bitmain's management realized the seriousness of the problem. It turned out that the company's money could be squandered. As a result, the management began to discuss self-help plans, and the most reasonable and effective way was obviously to lay off employees.
The probation period for newly hired employees at Bitmain is half a year, and the probationary salary is 100% of the official salary, there is no difference. Once layoffs are made, new employees who have not passed the probationary period will be the main layoff targets. The department managed by Ketuan Zhan will face large-scale layoffs. The layoff plan is strongly opposed by Ketuan Zhan. Bitmain can only temporarily abandon the layoffs and replace it with continuous reductions. For marketing and travel expenses, a budget committee was established to strictly approve every expenditure. At the same time, employee benefits, such as reimbursement of taxi expenses, breakfast supply, snacks and drinks, etc., have also been abolished, and even the tradition of giving employees 400 yuan worth of BTC/BCH every month has been stopped.
In the face of huge cash flow pressure, trivial savings is obviously of no avail. Soon, the management again discussed the layoff plan, and it has reached the point where it has to be laid off.
In December 2018, Jihan Wu began to organize all entrepreneurial veterans and business backbones to persuade Ketuan Zhan to agree to layoffs, but Ketuan Zhan still insisted not to layoffs. The persuasion process was very unsuccessful. After many meetings and intense debates, Bitmain executives were caught in a dilemma of wasting time with Ketuan Zhan.
In this process, the shortcomings of the dual CEO system began to appear, and the relationship between the two CEOs gradually deteriorated.
On the night of December 16th, Ketuan Zhan reconvened the management meeting, and more than 30 managements who were present were asked to hand over their mobile phones. At this time, Jihan Wu was on a business trip in Hong Kong and was busy with listing related work.
In the meeting, Ketuan Zhan's core content was three items:
(1) Bitmain cannot have two CEOs, only one CEO and must be Ketuan Zhan. Ketuan Zhan said that he met an old leader during a business trip. He hadn't seen each other for many years. The old leader suggested that the company can only have one CEO, and it must be him. Ketuan Zhan feels that this is a kind of fate, an opportunity given by God.
(2) Ketuan Zhan believes that the company's cash flow problems, the biggest responsibility is the inability of the financial department. To prove his point, Ketuan Zhan announced Bitmain's financial data at the meeting. In the evening, employees in Taiwan began to post messages on social media, saying that the company's capital chain was broken and the top management was split.
(3) If Ketuan Zhan is not supported, the option will be cancelled and the equity will be voided.
Hearing about this, Jihan Wu, who lives in Hong Kong, sent a WeChat message to the management who are attending the meeting.

https://preview.redd.it/zkj2d44tqid51.jpg?width=1080&format=pjpg&auto=webp&s=9251c1f7308e155d7911d5969e71091a5ad5e14a
On the afternoon of December 17, 2018, Jihan Wu returned to Beijing to negotiate with Ketuan Zhan all night, and finally reached a consensus in the early morning. Bitmain co-founder Yuesheng Ge announced the results of the negotiations. Jihan Wu and Ketuan Zhan ceased to serve as CEOs, and Haichao Wang served as CEO. Jihan Wu voluntarily backed down and Ketuan Zhan served as chairman.
The "12.17 Incident" had a very bad impact on Bitmain, especially the disclosure of Bitmain's financial status, which caused vendors to start dunning. The loan that had just been negotiated with the Bank of Beijing was cancelled the next day. Jihan Wu's resignation as CEO caused an uproar in the industry, and it became a hot topic among Cryptocurrency mining, blockchain practitioners, and investor communities. The media focused their interpretation on Bitmain's series of incidents, and generally looked down upon its ongoing Hong Kong IPO, believing that the high-level changes had already signaled the failure of the IPO in advance.
On Christmas December 24, 2018, Bitmain finally began to implement the layoff plan. This long-delayed “correct decision” was achieved after a stalemate for nearly three months. The AI ​​teams in Beijing, Singapore, Taiwan, and Shanghai have laid off more than 50% of their employees. The Israeli R&D center was closed and Shenzhen New Species Technology Co., Ltd., which had been acquired for only ten months, was dissolved, and all employees were laid off. Copernicus, Bitmain's top blockchain development team, was not spared and was wiped out in this layoff. Copernicus and some of the laid-off employees joined the new company Matrixport co-founded by Jihan Wu and Yuesheng Ge, headquartered in Singapore.
3. Past events when starting a business
After the "12.17 Incident", Jihan Wu gradually faded out of Bitmain's management affairs and turned his attention to the IPO and new company. And this is one of Jihan Wu's major mistakes, he began to let Ketuan Zhan manage Bitmain alone.
In fact, as early as 2013, Jihan Wu planted hidden dangers.
Jihan Wu, an investment banker, was the earliest translator of the Bitcoin white paper. He began to get involved in the cryptocurrency mining industry in 2012. The disappearance of Kaomao and Nangua Zhang's ticket skipping led Jihan Wu to decide to develop his own chip.
In 2013, Jihan Wu established his own mining machine company. Together with Yuesheng Ge, who was only 20 years old, he found Ketuan Zhan, an integrated circuit designer of the Chinese Academy of Sciences, to create the protagonist of this article, and later the digital Cryptocurrency mining giant, Bitmain.
Jihan Wu promised Ketuan Zhan that every time a mining machine chip was successfully developed, he would give some shares to the Ketuan Zhan team. At that time, the company founded by Ketuan Zhan was on the eve of falling apart. In order to regroup the team, Ketuan Zhan promised to share half of his shares with the team members. Unfortunately, this is just a bad check. With the rapid development of Bitmain and higher and higher valuations, the expanding Ketuan Zhan almost monopolized all the shares.
Like many startups, Bitmain encountered many difficulties in its early days, and many jobs had to be done by the boss. For example, in the chip design and production process in the second half of 2013, Bitmain was caught in a dilemma of insufficient funds. Jihan Wu personally raised funds and met with TSMC’s sales to persuade TSMC to accept the production needs of a start-up company. Jihan Wu also participated in the selection of the thermodynamic parameters of the heat sink in the Antminer S1.
In 2014, Jihan Wu discovered that this company was independently operated by Ketuan Zhan, which had huge problems. Forcing Jihan Wu to continue to participate in company management.
At that time, Bitmain's mining machine chips had just achieved a certain lead in the standard design process. Jihan Wu believes that the next step must be to develop full customization technology, but Ketuan Zhan plans to invest resources in the research of mobile payment chips.
Ketuan Zhan met a mysterious person from the Party Central Security Bureau who claimed to be able to manipulate the Party Central Committee’s decision-making process for the next generation of mobile payment cryptography standards, but this direction is likely to lead to the fact that Bitmain has just gained the lead in the mining machine market. Regained.
Jihan Wu said that as a graduate of the School of Economics, with a little memory of his high school stage and the knowledge reserve of a computer technology amateur, he retrieves various materials and papers every day, learns theories related to full customization, and goes to Ketuan Zhan conducts persuasion work there.
Fortunately, in the direction of full customization technology, Ketuan Zhan finally listened to Jihan Wu's opinion. Bitmain quickly integrated the technical experts from the United States and Russia introduced by Jihan Wu, which greatly improved the design level of chips and complete machines.
In 2015, Jihan Wu suggested that Ketuan Zhan consider the direction of artificial intelligence. But Ketuan Zhan is not here, he prefers the CPU direction. After staying asleep at night, coupled with in-depth analysis by the Bitmain investment team, Ketuan Zhan finally agreed with this direction. It is a pity that after the Tianshi Chen brothers made major breakthroughs in theory and practice, Bitmain officially invested in the relevant direction, and it was still a step behind.
In the two years from 2016 to 2017, Bitmain's business performance has achieved rapid development, becoming a unique super unicorn in the blockchain industry. According to Froth & Sullivan, in 2017, Bitmain Technology Holdings was the second largest fabless chip design company in China and the tenth largest fabless chip design company in the world, and the fourth largest fabless ASIC chip design company in the world, accounting for 74.5% of global cryptocurrency market share.
However, the huge crisis has long been buried in the early days of entrepreneurship.
Ketuan Zhan's decision on major directions revealed his weakness of extremely lack of business understanding. But every mistake he made was blocked by the company's core employees. His overconfidence in his management ability led to the gradual intensification of conflicts, and the management differences between the two founders became more serious.
4.The giant gets lost
The contradiction between the two broke out on December 17, 2018. Ketuan Zhan used extreme means to force the management to compromise with him by canceling the option, so as to achieve the goal of sole control of the company. Jihan Wu returned to Beijing from Hong Kong overnight and negotiated with Ketuan Zhan all night. In the end, the two resigned as CEO. Jihan Wu retired. Ketuan Zhan has the exclusive rights of chairman in exchange for the implementation of the layoff plan.
Jihan Wu's voluntary retreat has intensified Ketuan Zhan's management to do whatever he wants.
A Bitmain employee commented on Ketuan Zhan's management skills, summed up in two letters-SM.
After becoming the sole helm of the company, Ketuan Zhan quickly "rectified" the department in charge of Jihan Wu as the chairman of the board. He guided the sales of mining machines at the dinner, and pointed out that the sales performance is not due to the sales staff. Ability is strong, but the company provides opportunities. Take two sales leaders as examples, saying that if the company hadn't given the opportunity, they would still be losers. In addition, Ketuan Zhan also instructed the sales staff on how to toast and imparted the wine table culture and experience.
After the meal, Ketuan Zhan came to the conclusion that the quality of Bitmain sales staff was too poor, and Huawei’s blood needs to be injected to drive the company’s progress. Soon, the marketing and sales director from Huawei officially took over Bitmain, opening the era of brand premium for Antminer.
In order to further understand and guide the sales work, Ketuan Zhan asked to meet the customers with the sales staff. During the negotiation process, Ketuan Zhan had a heated discussion with customers on the issue of Chinese and Western medicine, and had also forced the sales staff to be able to ship 10,000 machines due to insufficient production capacity.
Although the requirements for sales personnel are strict, Ketuan Zhan has provided a lot of convenience for "Mainland Ark". In addition to selling mining machines at a more favorable price, Bitmain's mining machines are also hosted in Ming Wang at a higher price than the market price. Mine. It is reported that both Ketuan Zhan and Ming Wang are shareholders of Ark.
The new sales strategy of Huawei's executives has also brought very obvious changes to Bitmain. The self-righteous brand premium reduces the price-performance ratio of Antminer, causing competing products to eat away at Bitmain's market share. Later, Bitmain found that the strategy was wrong and started to cut prices, and found that the mining machine market was saturated and the purchase demand of miners had decreased.
More dangerous than the sales strategy is that the technical advantages of Antminer are being chased by competing products, and even overtaken. At the same time, the two mining pools under Bitmain also lost their first and second positions. The AI ​​business, which Jihan Wu placed high hopes and Ketuan Zhan personally supervised, became a laughing stock in the industry. Not only did it fail to make a profit, it almost brought down Bitmain.
Blindly introducing senior executives from Huawei to occupy important positions completely destroys the company's internal cultural foundation. The bureaucracy within Bitmain began to corrode from high-level employees to ordinary employees. Ketuan Zhan is not aware of this. He is still keen on recruiting Huawei employees, imitating Huawei's organizational structure and strategy, letting HR do sales and R&D personnel to do HR.
The organizational structure adjustment in October 2019 was the fuse for Ketuan Zhan to completely anger Bitmain management. This time, Ketuan Zhan completely marginalized Bitmain’s veteran employees, and suddenly promoted some of the “airborne soldiers” who had just joined the company to the position of person in charge, which caused the former person in charge to report to the new employees. The two managers who were originally equal The hierarchy becomes the subordinate relationship, the operation and development of different business lines are merged into a large department, the upward reporting process becomes more cumbersome, and the relationship between employees becomes delicate.
5. Headwind
On October 29, 2019, Jihan Wu urgently held a staff meeting. Prior to this, the legal representative of Beijing Bitmain has been changed to Jihan Wu, including the parent companies Hong Kong Bitmain and Cayman Bitmain. Jihan Wu stood in the lobby of Building 25, B1, announcing that Ketuan Zhan has been relieved of all duties. Any employee in the Bitmain Group shall no longer execute Ketuan Zhan’s instructions and participate in any meetings convened by Ketuan Zhan. If there is any violation, the company will demotion and expel the company based on the severity of the circumstances. If losses are caused to the company, the company will be held accountable.
Jihan Wu's speech is very long, which can be summarized as follows:
(1) Ketuan Zhan has been relieved of all duties. Also expelled from the original Huawei company HR Zhi Wang introduced by Ketuan Zhan at the end of 2018. Zhi Wang’s reputation on Bitmain was extremely poor and was ridiculed by employees as "nine thousand years" (In ancient China, the emperor was called "ten thousand years old", and the prince was "eight thousand years old." However, in the Ming Dynasty, there was an eunuch who caused harm to the country and the people. He called himself "nine thousand years old", meaning that he was only A little lower than the emperor's level).
(2) Ketuan Zhan's ability to control the company's option incentive plan has disappeared, and it is no longer possible to cancel employees' options at will.
(3) The organizational structure adjustment plan led by Ketuan Zhan was suspended.
(4) We are optimistic about the future of AI business, but the premise is that the main business can continue to make profits in order to support the company's continued investment in AI business.
In the speech, Jihan Wu also told employees the whole story of the "12.17 Incident" and bluntly said that the company is not in good condition. If no measures are taken, Bitmain is likely to go bankrupt in three quarters and he must come back to save the company.
At this time, Ketuan Zhan, who was on a business trip in Shenzhen, finally experienced the situation of Jihan Wu in the "12.17 Incident".
After the official return, Jihan Wu began to clearly point out the company's various problems in operation and management, and went deep into each business line to understand the situation. In the mining machine sales department meeting, employees spoke enthusiastically, reflecting on the difficulties and opinions encountered in the work, the marketing and sales director from Huawei asked with a surprised look, "Why didn't these issues be reported to me before?", and soon , The director was interviewed and "voluntarily resigned."
On November 2, 2019, Jihan Wu announced a salary increase for all employees. Bitmain’s last salary increase dates back to 2018. In principle, Bitmain has two salary increases every year.
On November 7, 2019, Ketuan Zhan spoke on social media for the first time, describing his hardship in starting a business, and condemning Jihan Wu for “stabbing a knife in the back”. At the end of the article, he also set himself a KPI for 2020, that is, the mining machine market share will reach 90%, and the AI ​​business will earn 1 billion.
But Ketuan Zhan's majestic plan did not make Bitmain employees feel emotional, but ridiculed him instead. Employees exposed that he insulted employees, advocated Chinese medicine, believed in Buddhism, drank in meetings, practiced Qigong...
However, there is less than half a year before the halving of Bitcoin production, and the cryptocurrency market shows no signs of recovery, which makes Bitmain management very anxious.
On January 6, 2020, Bitmain ushered in another round of layoffs, with a layoff ratio of about 1/3. This time the layoffs have caused many employees who have just increased their salaries to feel very grieved. On the one hand, they were looking forward to Jihan Wu's return. On the other hand, the compensation for this layoff was less than 18 years.
Ketuan Zhan, who has been unable to enter the Bitmain office area, once again spoke on social media and firmly opposed to layoffs. We do not need to lay off staff and we cannot commit suicide.
During the Spring Festival, Covid-19 broke out. Mainland China has begun to extend the Spring Festival holiday and advocate working from home. Under the chain reaction caused by Covid-19, most companies have chosen to cut salaries or even lay off employees. In the first two months of 2020, China's exports fell by 17%, U.S. stocks were broken four times in a row, Bitcoin plunged 40% in 24 hours on March 12, 2020, and crude oil futures fell by 300% on April 20, 2020...
Obviously, Jihan Wu can't predict, but this layoff seems to be the right decision again. In addition, from January to April 2020, Bitmain's revenue exceeded US$400 million amid the spread of Covid-19 and the collapse of the financial market.
6. Fight to the death
When Jihan Wu tried to get the company back on track, Ketuan Zhan was not helpless. On April 28, 2020, Ketuan Zhan finally rolled back the legal representative of Beijing Bitmain to before October 28, 2019 by repeatedly submitting administrative reconsiderations, and restored his status as a legal representative.
On the morning of May 8, 2020, a piece of news about Bitmain quickly appeared on the real-time hot search rankings, and even dominated the headlines of the day. At window 52 on the second floor of the Haidian District Government Affairs Center, when Ketuan Zhan, the legal person of Beijing Bitmain Company, was receiving the business license, a group of unidentified people snatched the business license from the industrial and commercial administrative staff. A source at the scene said that the number of unidentified people in the group was about 60 people, of which Luyao Liu was directing at the scene.
This is a skillful piece of news. It first leads readers to think that Ketuan Zhan is a victim, using 60 people to grab business licenses as the focus. The masses accused Jihan Wu of lawlessness, but ignored whether the government affairs center could have 60 personnel. As for Hong Kong Bitmain to have the right to appoint a representative to obtain a business license, this is a deeper level of thinking.
The follow-up report restored the real situation at the scene. Only more than ten people were present, and both sides were equipped with security personnel. Bitmain employees also broke the news in the circle of friends, claiming that Ketuan Zhan's bodyguard had injured Bitmain's authorized person, and said in a threatening tone, "Be careful!"
However, the subsequent plot reversal did not have much effect. Jihan Wu's reputation has been greatly affected. From a bloody soldier who rescued the company in trouble to a lawless criminal, it can be said to be a world of war. do not.
Ketuan Zhan, who succeeded in the first battle, began to counterattack Bitmain continuously. On the afternoon of June 3, 2020, Ketuan Zhan led a team to pry open the back door of the Beijing Bitmain office and formally occupied the deserted Beijing headquarters.
On June 4, 2020, Ketuan Zhan called on Bitmain employees to resume work and promised to expand the company's market value to more than US$50 billion within three to five years. After that, Ketuan Zhan began to contact employees by phone, trying to acquire the options in the hands of employees at a valuation of 4 billion US dollars.
Subsequently, Ketuan Zhan recalled Huawei's executives and issued a series of personnel appointments and removals. As of June 9, 2020, Ketuan Zhan has successively eliminated CFO Luyao Liu, and Wenguang Wang, the head of the mining center. Luyao Liu is responsible for controlling Bitmain's IPO plan. He also appointed Yanwu Ma as the HR director, Gang Ren as the head of the mining center, Yonggang Sun as the head of the supply chain, Ling Gu as the financial director, and Bin Zhu as the head of the mining machine business department. Bin Zhu is the senior executive of Huawei who was interviewed and left as mentioned in the previous article. During his tenure, he reduced Antminer’s 90% market share to 50%, and received a large number of complaints from miners. Internal employees once speculated that he might be Compete against the spies sent by the company.
In addition to recalling senior executives of Huawei, Ketuan Zhan also urged employees to return to work. They can receive a bonus of 10,000 yuan when they return to work on the same day, which is only half the next day. Ketuan Zhan showed a very kind side. Every time the elevator door is opened, Ketuan Zhan's hot gaze can be met, shaking hands, taking photos, and receiving money. As there is no personnel information, Ketuan Zhan does not know whether the person receiving the money is a Bitmain employee, and these people did not resume work the next day.
The effect of gentleness was not good, Ketuan Zhan began to force employees to return to work. Seeing that there are still very few respondents, Ketuan Zhan threatened employees through SMS, phone calls, EMS, emails and other harassment, issued multiple threats such as termination of contract, suspension of payment of social insurance, suspension of wages, and even used personal information saved by employees to form a group of employees. Domicile threats, requiring employees to perform "work handover", trying to force employees to return work computers, etc.
On June 10, 2020, the media revealed that Ketuan Zhan had controlled Bitmain's Shenzhen factory and prohibited employees from delivering normal shipments to paid customers, which caused difficulties in the operation of the Bitmain mining machine department.
On June 13, 2020, Hong Kong Bitmain, the parent company of Beijing Bitmain, issued a statement accusing Ketuan Zhan of signing a "Sales Agency Agreement" with the Ark Data Technology Co., Ltd. in which it holds shares, in an attempt to embezzle Beijing Bit's assets.
On June 17, 2020, the media revealed that Ketuan Zhan started selling 14,000 T17+ series mining machines at low prices.
On June 20, 2020, Hong Kong Bitmain officially suspended the supply of chips to the Shenzhen factory.
On July 13, 2020, in the "A Letter to All My colleagues in the Shenzhen Factory" released by Bitmain in Hong Kong, more details were added on the series of Ketuan Zhan's actions in June.
The legal person Feng Zhou of the Shenzhen plant is related to Ketuan Zhan. After being relieved of Ketuan Zhan's post, Jihan Wu flew to Shenzhen to have a long talk with Feng Zhou. Jihan Wu believes that Feng Zhou is the right person to manage the factory and help the company overcome difficulties, and decides to leave Feng Zhou to continue to manage the factory.
This wrong decision staged a story of a farmer and a snake. When Ketuan Zhan began to counterattack Bitmain, Feng Zhou was also quickly instigated and began to assist Ketuan Zhan in seizing customer machines and transferring 17,000 T17 mining machines in the warehouse. Hainan Continental Ark Data Technology Co., Ltd., which is held by Ketuan Zhan, sold them at a low price.
In order to protect the interests of customers, Jihan Wu had to make a compromise and paid the payment for some goods to a bank account controlled by Ketuan Zhan in exchange for delivery. However, after the other party received a payment of 109 million, the delivery stopped. On July 8, 2020, 5600 mining machines have been overdue.
At the same time, the factory defaulted on suppliers’ accounts payable as much as 200 million yuan. Bank acceptance bills issued by the factory, exceeding 36 million yuan, will expire on July 17, and more than 34 million yuan will expire on July 23. It is understood that Ketuan Zhan, after receiving the bank's dunning call, made it clear that he would not repay the loan, which would destroy the company and the entire group's credit in financial institutions.
7、 This is not the end
So far, the power struggle between the founders of Bitmain has been more than half a year. The office building already occupied by Ketuan Zhan is still empty, and most employees choose to work from home. Some chip developers returned to the office with the acquiescence of Jihan Wu and continued to maintain research and development to reduce the impact of infighting on technological iteration and competitiveness.
This giant ship that once stood on top of the supercomputer chip is crashing into the iceberg due to the madness of the former helm. Ketuan Zhan's madness and Jihan Wu's compromise made mistakes again and again. Bitmain tried to save himself many times, but was unable to get out of the black hole.
If the time goes back to that day in 2013, would Jihan Wu and Yuesheng Ge still choose to dial Ketuan Zhan?
submitted by paulcheung1990 to Bitcoincash [link] [comments]

Voici LA chronique à découvrir, intitulée: La guerre contre Bitcoin. Idéal pour comprendre certains tenants et aboutissants

Voici LA chronique à découvrir, intitulée: La guerre contre Bitcoin. Idéal pour comprendre certains tenants et aboutissants… Bonne découverte!
La guerre contre Bitcoin
Bitcoin est peut-être le meilleur outil de liberté économique de cette génération, et peut-être depuis plusieurs générations. Malheureusement, Bitcoin a été furieusement étouffé par une guerre civile brutale depuis environ cinq ans maintenant; menée par des ingénieurs sociaux professionnels de certaines des entreprises les plus puissantes des médias sociaux. Leur talent dans l'art et la science de la manipulation a permis aux "Bitcoiners" de se battre largement entre eux plutôt que de chercher à créer des modèles commerciaux innovants basés sur les données qui pourraient révolutionner l'économie mondiale via Bitcoin.
À la suite de la guerre civile de Bitcoin, trois versions concurrentes de Bitcoin ont vu le jour (BTC, BCH et BitcoinSV ), mais il en est de même pour environ 3000 autres projets et jetons de « crypto-monnaie » se faisant passer pour des entreprises légitimes, souvent jusqu'à un "exit scam" presque garanti, le fait de disparaitre du jour au lendemain avec tout l'argent des utilisateurs. Le principal bienfaiteur de la guerre civile Bitcoin a été Ethereum: une cryptomonnaie qui fonctionne comme une machine à états mondiale et permet un déploiement facile de tokens et de contrats intelligents. Mais le protocole Ethereum ne peut pas évoluer, et parmi les milliers de projets lancés, seule une poignée pourrait même être présentés comme pouvant devenir des entreprises légitimes. La plupart des autres sont des stratagèmes de Ponzi ou des émissions d'actions illégales enrichissant les développeurs et escroquant les investisseurs amateurs.
C'est dans ce contexte que les défenseurs de BTC et de BCH, les porte-parole d'Ethereum et les altcoiners (nom donné pour englober toutes les autres cryptomonnaies) de tous bords s'alignent pour attaquer sans cesse le protocole Bitcoin préservé uniquement par le réseau BSV. Une industrie composée presque entièrement de criminels, de fraudes et d'arnaqueurs s'est unie contre BSV citant - et c'est là l'ironie! - une prétendue fraude et arnaque présumée qui serait l'existence même de BSV.
Nous devons nous demander pourquoi ?
Quel est le différenciateur clé de BSV?
Pourquoi tous les arnaqueurs se sont-ils unis contre lui?
Je suis fermement convaincu que pour la plupart, la motivation est la peur de la capacité de BSV à absorber l'économie mondiale et tous les autres projets «crypto» qui vont avec. Pour les autres, ou ceux qui ne comprennent pas le pouvoir du Bitcoin, ils sont entraînés dans une guerre civile et culturelle qui les dépasse. Il est essentiel de comprendre les pouvoirs en jeu et leurs implications pour Bitcoin et l'économie mondiale.
Une histoire brève de Bitcoin
Bitcoin a été lancé avec un "livre blanc" sur la liste de diffusion de cryptographie en 2008. Le pseudonyme « Satoshi Nakamoto » a déclaré une solution au problème de la double dépense. Or il s'agit là du problème de tous les systèmes de paiement électronique précédents, et c'était le seul facteur limitant l'adoption d'une monnaie digitale fonctionnelle. Mais qu'est-ce que le problème de la double dépense ? Pour faire simple, il était impossible de prouver exactement qui possédait quelles unités d'argent sur des registres distribués, de sorte que les utilisateurs ne pouvaient pas avoir confiance dans le système, et ces projets mourraient assez vite. Bitcoin a résolu ce problème avec un concept appelé la « preuve de travail ». Il pose la question: qui a utilisé le plus de puissance de calcul pour résoudre des énigmes arbitraires ? ceci afin de rendre compte de l'état du registre d'une manière qui coûte de l'argent, de sorte qu'il y ait une incitation économique à tenir un compte honnête des avoirs de chacun des participants. Ce processus est souvent appelé « exploitation minière » car les nœuds honnêtes qui maintiennent l'état du registre sont récompensés pour leur travail avec des nouveaux Bitcoins toutes les dix minutes - un peu à la même manière d'un mineur d'or qui est récompensé par de l'or en échange de son travail.
Étant donné que Bitcoin n'avait aucune valeur lors de son lancement, il était extrêmement facile à miner et également gratuit d'envoyer des tonnes de transactions. En théorie, il s'agissait d'un vecteur d'attaque par déni de service (DoS). Une attaque DoS ou DDoS se produit lorsque les nœuds d'un réseau sont inondés de plus de données qu'ils ne peuvent en gérer et qu'ils se mettent donc à planter. Sur le jeune réseau Bitcoin, un crash comme celui-ci aurait été considéré comme un échec du réseau. Pour empêcher cela, un plafond de 1 Mo de données par chaque dix minutes de transactions a été codé en dur dans le logiciel - semant la première graine de la guerre civile Bitcoin. De 2009 à 2017, cette limite de 1 Mo sur le total des transactions était l'aspect technique le plus controversé du bitcoin et le déclencheur de la plus grande guerre civile virtuelle de l'univers de la cryptomonnaie.
Pourquoi est-ce aussi important?
Une seule transaction basique Bitcoin est relativement petite du point de vue des données, donc 1 Mo toutes les dix minutes donne environ trois à sept transactions par seconde avant que le réseau ne devienne trop encombré. Satoshi Nakamoto le créateur, a plaidé pour un nombre de transactions du niveau de Visa et bien plus, ainsi que son successeur direct en tant que développeur principal du projet, Gavin Andresen. Certains des premiers Bitcoiners influents comme Mike Hearn et Jeff Garzik ont ​​également plaidé pour plus de données par bloc pour permettre à Bitcoin de se développer et de rester le meilleur système de paiement électronique. Ils étaient pour des «gros blocs» contrairement au camp des «petits blocs» qui préconisaient une permanence de la limitation de 1 Mo des blocs.
Le camp des "petits blocs" estiment que Bitcoin n'est pas un réseau de paiement, mais plutôt qu'il s'apparente davantage à une banque décentralisée conçue pour stocker des Bitcoins qui ne bougent jamais: une sorte de coffre-fort d'or numérique. Ils voulaient que la limite de taille des blocs de 1 Mo reste permanente sous les auspices de chaque personne exécutant un «nœud complet» sans avoir à payer trop d'espace sur le disque dur. Cela signifierait qu'en période de congestion, les frais de transaction deviendraient absurdement élevés, mais cela n'aurait pas d'importance car le bitcoin ne devrait pas être utilisé pour des envois sauf en grosses quantités de toute façon, selon eux. En décembre 2017 les frais de BTC ont ainsi atteint les $50 par transaction. L'autre problème est que s'il est bon marché de rejoindre la gouvernance de Bitcoin, alors le réseau est facile à attaquer par Sybil, et je dirais que BTC est régi par des sybilles à ce jour.
Le camp des "gros-blocs" estime que tout le monde sur terre devrait être en mesure d'échanger et de faire ses affaires sur Bitcoin pour des frais infimes, de l'ordre d'un centième ou millième de centime par transaction, afin d'apporter à la population mondiale la liberté monétaire, y compris aux pays les plus pauvres qui sont gardés en dehors du système actuel car considérés comme pas assez profitables pour des entreprises comme Visa.
Les "petits-blocs" pensent que tout le monde devrait être en mesure de gérer soi-même le registre mondial chez soi, mais que seules certaines personnes très riches devraient pouvoir effectuer des transactions, ce qui est le cas quand les frais sont à $50 par transaction comme en 2017.
Après des années de querelles, en 2017, Bitcoin s'est scindé en deux chaînes distinctes, et en 2018, il s'est à nouveau divisé.
Alors quelle est la différence entre ces trois versions ?
BTC est actuellement la version qui a le prix le plus élevé, avec la plus petite taille de bloc et la plus grande puissance de calcul. On peut dire que BTC à gagné la guerre médiatique. Malheureusement, il est régi par des développeurs et des sybilles qui contrôlent le consensus grâce à une utilisation intelligente de logiciels malveillants appelés «soft-fork» qui leur permet de saper les règles du Bitcoin. Ils utilisent ce pouvoir pour changer les règles des transactions en mentant aux nœuds et en leur disant de les valider quand même. Toute la culture BTC consiste à acheter du BTC afin de le conserver jusqu'à un moment dans le futur où il serait revendu à un prix exorbitant. Le but est de spéculer au maximum. Les paiements avec BTC, particulièrement les petits paiements, ou les transactions de toute nature non-monétaires, sont méprisés.
BCH est un réseau basé sur Bitcoin qui pense que les blocs devraient être à peine légèrement plus grands, mais ils ont également des développeurs en charge des règles, tout comme BTC, et ils pensent que Bitcoin devrait être utilisé uniquement pour le commerce de détail, mais rien de plus. Le réseau change de règles tous les six mois. Les transactions non commerciales sont en général méprisées. Un nouveau scindement de BCH est prévu pour novembre 2020 suite à des conflits internes et l'incapacité à avoir un système de gouvernance dans un projet où les règles changent en permanence.
BSV est la version restaurée du protocole Bitcoin original avec tous les paramètres ouverts afin que les nœuds honnêtes puissent s'engager dans un consensus conformément au livre blanc de Bitcoin - par la preuve de travail ! Le protocole est gravé dans la pierre afin que les développeurs de logiciels ne puissent pas bricoler les règles. Cela permet aux entreprises de planifier des décennies d'utilisation du réseau et d'investir en toute confiance. Il s'agit d'apporter une réelle innovation technologique au monde plutôt que de spéculer. En tant que seul réseau bitcoin totalement sans besoin d'autorisation, le commerce de toute nature est encouragé sur BSV. Tout, allant des réseaux sociaux aux expériences de science des données météorologiques ou aux tests de disponibilité du réseau, est encouragé. Paiements de détail, tokenisation, ou tout autre type de contrat intelligent est simple à déployer sans limitations. Bitcoin SV n'a aucune limite dans son protocole sauf l'esprit humain, l'innovation et l'esprit d'entreprise. Il vise également une adoption mondiale notamment par les pays pauvres afin d'apporter la liberté monétaire et l'inclusion à l'économie mondiale de ceux que les grandes entreprises actuelles comme Visa dédaignent comme pas assez profitables pour leur accorder leur services.
Et c'est la racine de la haine envers BSV.
Les "petits-blocs" ont investi toute leur réputation et leurs moyens de subsistance sur la notion que le bitcoin est incapable de s'adapter. Pendant des années, des experts présumés ont convaincu de nombreuses personnes que les limites de taille de bloc de 2 Mo, 8 Mo ou 22 Mo casseraient littéralement Bitcoin. Ils ont furieusement mis en jeux leur réputation sur ces fausses notions. Et ensuite, BSV a eu de nombreux blocs de plus de 100 Mo. En fait, il y en a même eu quelques-uns de plus de 300 Mo! prouvant que les petits-blocs se trompaient depuis le début sur les limites du réseau. Mais cette prise de conscience est une menace pour l'hégémonie de l'histoire médiatique qui a été crée sur Bitcoin. Depuis 2015, lorsque le Dr Craig Wright est apparu sur les lieux pour expliquer que le bitcoin avait en réalité ZERO limitations, il a créé un tollé massif parmi l'intelligentsia des petits-blocs. Les leaders d'opinion de l'époque étaient payés pour prendre la parole lors de conférences où ils expliquaient à tort que Bitcoin n'était rien d'autre qu'une réserve de valeur rare sans autre utilité, et surtout pas à usage des plus pauvres. Le Dr Wright parlait de l'échelle illimitée du réseau, de son exhaustivité de Turing, de l'objectif d'inclure enfin les plus pauvres dans l'économie mondiale, et d'autres notions inconcevables (à l'époque) sur Bitcoin. Sa passion et ses connaissances se sont heurtées à des calomnies et des railleries. Ils se sont concentrés sur l'attaque de son personnage au lieu de discuter de Bitcoin!
C'est devenu l'une des principales méthodes d'attaque des petits-blocs. Lorsque de gros-blocs parlent des capacités de Bitcoin, ils sont ridiculisés en tant qu'escrocs et le sujet est toujours dirigé très loin de la discussion technique, car les petits-blocs savent bien qu'ils sortiraient perdants. Ils fouillent les dossiers personnels et cherchent des moyens de faire taire les gens du camp des grands-blocs de Bitcoin par des attaques personnelles - de la même manière que les guerriers de la justice sociale s'engagent dans la culture d'annulation contre leurs ennemis politiques.
Qui est le Dr Craig Wright et que fait-il?
Craig Wright est le scientifique en chef d'une société de recherche sur Bitcoin au Royaume-Uni appelée nChain : une société de 150 à 200 informaticiens. Craig dirige l'équipe qui étudie les possibilités de Bitcoin et de ses applications dans le monde. Il est l'un des experts en criminalité numérique les plus reconnus au monde avec les certifications SANS et GIAC ainsi que les titres GSE CISSP, CISA, CISM, CCE, GCFA, GLEG, GREM et GSPA. En outre, il est un polymathe multidisciplinaire de troisième cycle: un doctorat en informatique, économie et théologie et titulaire d'une maîtrise en statistique et en droit commercial international.
En 2015, il a également été exposé par une publication conjointe de WIRED et Gizmodo en tant que Satoshi Nakamoto, le créateur de Bitcoin. Quelques jours après cette révélation, les gens qui le soutenaient ont vu leurs clés d'accès au code de Bitcoin révoquées, et de nombreux autres ont été instantanément bannis. Craig a été mis sous enquête par le bureau des impôts australien pour ce qu'il considérait être une erreur de comptabilisation probable de ses bitcoins. Les retombées ont été agressives et rapides, avec une gigantesque armée de petits-blocs, organisée sur Reddit et d'autres forums, et nouvellement financés par l'argent de la startup pro petits-blocs appelée «Blockstream». Leur message était clair: Bitcoin doit garder de petits blocs. Le Bitcoin ne peut pas évoluer et doit rester réservé aux riches, et toute personne proche de Craig Wright sera harcelée pour se conformer à une armée de comptes Twitter anonymes et sans visage.
Voici un schéma qui retrace les financements de Blockstream et révèle comment le groupe Bilderberg, la banque centrale américaine (FED) et Mastercard on pris le contrôle du réseau BTC via Blockstream afin de le soumettre à leur propre profit: https://imgur.com/eFApDVE
Au cours des années suivantes, Ira Kleiman, frère du défunt Dave Kleiman, a poursuivi Craig Wright en justice pour sa part du prétendu «Partenariat Satoshi Nakamoto», affirmant que son frère Dave était plus impliqué qu'il ne l'était réellement, et l'affaire est en cours actuellement, jusqu'à courant 2021. Ira Kleiman pense que Craig est Satoshi et il a investi une fortune incalculable dans cette attaque et a obtenu l'argent d'investisseurs extérieurs pour poursuivre sa poursuite. Il est clair que les bailleurs de fonds d'Ira pensent que Craig est également Satoshi.
Les critiques qualifient souvent la révélation publique et le procès public de Wright de ternir énormément sa réputation, mais il convient de noter que les deux sont arrivés à Wright malgré sa volonté et qu'il ne souhaitait clairement pas être pris dans l'une ou l'autre situation.
Au lieu de cela, Craig est un défenseur passionné de la vision d'un Bitcoin avec de gros blocs, appelant à la professionnalisation, à la légalisation et à l'utilisation mondiale de Bitcoin pour une utilisation à tous les niveaux du commerce. La réponse à la passion de Craig et à ses affirmations a été d'attaquer sa réputation et d'endosser Internet avec le surnom de «Faketoshi». Lorsque de simples brimades ont échoué contre le Dr Wright, des attaques ont été intensifiées pour remettre en question ses divers diplômes, des pétitions aux universités pour enquêter sur lui pour plagiat dans divers travaux, y compris des thèses de doctorat, etc. Wright a même revendiqué des menaces contre la vie des membres de sa famille et il y a plus qu'une preuve que, selon Ian Grigg, une des légendes de la cryptographie: «des gens sont morts pour Bitcoin, croyez moi, des gens sont morts».
Les attaques en cours
Cela ne peut être assez souligné: la communauté des petits-blocs est construite autour de tactiques d'ingénierie sociale professionnelles. Gregory Maxwell, co-fondateur de la société Blockstream, a été formé à la pratique de l'ingénierie sociale et l'a utilisé de manière si subversive comme un outil de propagande pendant son mandat en tant que modérateur rémunéré de Wikipedia, qu'il a finalement été démis de ses fonctions avec les journaux d'administration citant une litanie d'infractions, notamment:
«Gmaxwell s'est engagé dans la création de faux comptes en masse…» - Alhutch 00:05, 23 janvier 2006 (UTC)
«Menaces, insultes grossières, usurpations d'identité d'un administrateur», -Husnock 03:18, 25 janvier 2006 (UTC)
«Son comportement est scandaleux. Franchement, il est hors de contrôle à ce stade. Son comportement d'intimidation doit cesser.» - FearÉIREANN 19:36, 22 janvier 2006 (UTC)
«Sa liste de contributions est hors de propos. C'est du vandalisme. C'est un comportement auquel je m'attendrais d'un éditeur en furie, et franchement, c'est ce qu'est Gmaxwell.» - Splashtalk 20h00, 22 janvier 2006 (UTC)
«Prétend être un administrateur, menaçant de bloquer les personnes qui ne sont pas d'accord avec lui, fait régulièrement des attaques personnelles» - SlimVirgin (talk) 12h22, 22 janvier 2006 (UTC)
Il passe beaucoup de temps sur Reddit et d'autres forums à semer la peur sur les dangers des gros blocs, et il a été surpris en train de faire semblant d'être plusieurs comptes à la fois en train d'avoir de très longues discussions techniques sur Reddit destinées à submerger les nouveaux arrivants avec ce qui ressemble à un débat intellectuel contre une version de Bitcoin libéré de ses limites.
Qui d'autre est attaqué?
L'autre cible commune de la machine de guerre médiatique anti-BSV est Calvin Ayre: un milliardaire à la tête de l'empire du groupe Ayre. Calvin est un entrepreneur canadien et antiguais qui a lancé un incubateur Internet à Vancouver au tout début du boom Internet. Fils d'un éleveur, Ayre est surtout connu en dehors de l'économie Bitcoin pour la création et la professionnalisation de l'industrie du jeu sur Internet. Plus particulièrement, sous la marque Bodog, Ayre a aidé à moderniser les lois financières américaines obsolètes en poussant les limites dans les marchés gris qui existent où les dollars américains sont utilisés à travers les frontières pour s'engager dans un commerce juridiquement compliqué comme le jeu d'argent. Son travail dans ce domaine lui a valu une petite fortune et un passage sur la liste des «plus recherchés» du gouvernement des USA pour blanchiment d'argent. C'est un point sur lequel les petits-blocs aiment se concentrer, mais ils le sortent complètement de son contexte. Calvin a finalement plaidé coupable à une accusation mais a été le fer de lance de la modernisation des lois américaines qui existent aujourd'hui sur les marchés. Il est respecté pour son travail dans l'industrie du jeu, des médias et de la philanthropie. Calvin est le bienvenu aux États-Unis malgré la critique souvent citée selon laquelle il serait une sorte de hors-la-loi.
Calvin Ayre
Dans l'économie Bitcoin, Ayre est une figure de proue dans la gestion de nœuds Bitcoin honnêtes depuis plusieurs années sous les marques CoinGeek et TAAL, et il est un investisseur dans nChain ainsi que plusieurs startups de l'espace BSV. Bien qu'il soit probablement le plus gros investisseur à ce jour, il n'est pas le monopole que les petits-blocs laisseraient croire. Il est important de comprendre que des segments entiers de l'écosystème BSV existent complètement en dehors de son influence.
Twetch, par exemple, est une entreprise indépendante appartenant à l'écosystème BSV, célèbre pour ses attaques contre les médias sociaux centralisés qui abusent de la censure. Ils sont même connus pour se moquer des entreprises qui acceptent l'argent d'Ayre, en plaisantant que Calvin possède tout sauf Twetch. Bien sûr, ce n'est pas vrai. Un autre excellent exemple est l'investisseur / entrepreneur indépendant Jack Liu : ancien dirigeant de Circle et OKEX. Liu possède la marque de hackathons CambrianSV ainsi que des propriétés précieuses dans l'espace BSV telles que RelayX, Streamanity, Output Capital, FloatSV et Dimely.
Les autres acteurs clés sont MatterPool Mining et leur écosystème Mattercloud: une joint-venture entre des acteurs indépendants de l'écosystème BSV, avec des connexions directes aux protocoles BoostPOW et 21e8 et des relations avec des développeurs BSV indépendants.
Bien sûr, il existe également des marques précieuses financées par Ayre. Il s'agit notamment de la propriété partielle via l'investissement dans HandCash, Centi, TonicPow et Planaria Corp de Unwriter.
Une autre mesure importante à prendre en compte est la distribution de la puissance de hachage (autre nom pour la puissance de calcul du résau). Alors qu'au tout début de BSV, les entreprises appartenant à Ayre représentaient une quantité importante de hachage sur bitcoin, afin d'assurer sa survie, BSV est aujourd'hui en grande partie exploité par des mineurs concurrents de Ayre tels que Binance, F2Pool, OKEX et ViaBTC - dont aucun n'est «ami» de BSV ou d'Ayre, mais beaucoup se déclarent les ennemis. Ces mineurs soulignent bien la nature ouverte et sans permission de BSV qui permet à quiconque de participer, notamment à ses ennemis!
Ayre est un acteur important, mais en aucun cas un contrôleur de la direction de la blockchain ou des entreprises indépendantes dans l'économie BSV.
Mais pourquoi Craig poursuit-il des gens en justice ?
Tout d'abord, et c'est crucial, le procès le plus important de Craig est l'affaire Kleiman. Les autres cas existent uniquement à cause de la diffamation publique du Dr Wright. Le hashtag #CraigWrightIsAFraud circule largement, poussé en grande partie par un mélange de personnages anonymes sur Twitter. Plus particulièrement Magnus Granath AKA «Hodlonaut» a été averti qu'une accusation publique de fraude courait à son encontre. La carrière du Dr Wright est en informatique et en criminalistique numérique, donc le déclarer publiquement une fraude sans preuve cause un préjudice financier au Dr Wright dans son domaine d'expertise commerciale. Puisque «Hodlnaut» a refusé de cesser, on lui a envoyer une requête pour être vu au tribunal afin de pouvoir apporter les preuves de ses accusations. Cela a causé le célèbre podcasteur de petits-blocs Peter McCormack à mendier d'être poursuivi aussi - en augmentant la rhétorique diffamatoire contre le Dr Wright. À la demande de McCormack, il a lui aussi été attaqué en justice pour être vu au tribunal. Le Dr Wright à depuis abandonné tous ses procès pour diffamation à l'exception de celui contre McCormack qu'il souhaite continuer pour faire exemple.
Cela a aussi engendré la campagne #DelistBSV menée en grande partie par «CZ», le PDG charismatique de Binance-Exchange. Divers autres échanges comme Shapeshift et Kraken ont publié des sondages twitter demandant s'ils devaient emboîter le pas, et des petits-blocs bien organisés ont voté en masse pour retirer BSV de leurs échanges - citant la toxicité du Dr Wright pour avoir intenté des poursuites en diffamation contre Hodlonaut et McCormack. Finalement, BSV a été retiré de Binance, ShapeShift et Kraken. Il a également été noté publiquement par Coinbase et Gemini qu'ils ne soutiendraient pas cette version de bitcoin à la suite de ce drame public. Il faut noter qu'après 2 ans, Binance a retourné sa veste et est aujourd'hui devenu un des principaux mineurs de BSV.
Au fur et à mesure que les choses progressaient, le fondateur de bitcoin .com, Roger Ver, a également réalisé une vidéo publique déclarant Wright comme arnaqueur. C'était après avoir travaillé sournoisement avec les développeurs Bitcoin ABC pour coder des points de contrôle dans le logiciel ABC de Bitcoin Cash, divisant de manière permanente le réseau Bitcoin pour la deuxième et dernière fois - un acte auquel le Dr Wright s'était opposé et pour lequel Roger est également poursuivi par d'autres parties privées en Floride. Roger Ver a été averti que s'il continuait, des poursuites juridiques similaires se présenteraient à sa porte pour avoir diffamé le Dr Wright, mais il à décidé de poursuivre les accusations publiques jusqu'à ce qu'il soit également entendu devant le tribunal pour fournir une preuve de la fraude de Wright, sous peine de sanctions pour diffamation publique. Aucune preuve n'a jamais été fournit, mais le Dr Wright a depuis abandonné ses poursuites contre Roger Ver pour se concentrer sur son procès avec Kleiman et celui avec McCormack ainsi que son travail sur Bitcoin.
Et maintenant que se passe-t-il ?
Nous avons établi l'histoire du Bitcoin, de sa guerre civile, des attaques publiques contre Wright, Ayre et BSV. Au moment d'écrire ces lignes, nous pouvons revenir sur les attaques contre Thomas Lee, Tim Draper et Jimmy Wales pour avoir eu une proximité avec BSV. Malgré la pression sociale, le rapport technique Fundstrat de Lee a rendu un examen élogieux du protocole fixe et de l'évolutivité infinie de BSV. Lee et son équipe étaient heureux de prendre la parole lors des événements précédents de CoinGeek, même après le tollé public.
Pour la conférence CoinGeek 2020 à New York, McCormack, Hodlonaut, « Arthur Van Pelt » et d'autres acteurs tels que le Dan Held de Kraken et une cacophonie de trolls anonymes sur Twitter ont mis à profit leur expérience de la culture d'annulation à la bolchevique pour faire pression sur l'orateur Gary Vaynerchuk ainsi que d'autres orateurs prévus pour cette conférence, afin de les forcer à annuler leur participation. Cette attaque sociale contre BSV, Dr. Wright, Ayre et les autres entreprises qui utilisent le réseau BSV pourrait être un gigantesque cas de fraude à la consommation. Ils trompent activement les gens en leur faisant croire que le protocole fixe et l'évolutivité infinie de Bitcoin BSV sont en quelque sorte dangereux, alors qu'en fait, le protocole et le réseau sont imperméables à toutes les attaques, à l'exception de leur ingénierie sociale.
Bitcoin SV s'est développé professionnellement avec un portefeuille de brevets de protection de niveau mondial. Il est utilisé par des entreprises indépendantes afin d'apporter des innovations technologiques et possède un groupe décentralisé de nœuds honnêtes qui se font concurrence. Le réseau est fixe, sécurisé et en croissance grâce aux investissements de petites entreprises et de gestionnaires de capitaux. Les transactions sont instantanées avec des frais de 0.0002€ par transaction en moyenne, explosant tous les records de compétitivité de l'écosystème et permettant aux plus pauvres de la planète d'enfin accéder à l'économie digitale mondiale. Les mensonges sont basés sur une campagne massive de dénigrement perpétrée par les communautés d'autres cryptomonnaies qui craignent l'adoption mondiale de BSV comme outil de commerce et ce que cela signifiera pour eux. L'histoire ne sera pas gentille avec ces manipulateurs et leurs réseaux qui sont financés par les fraudes probables des échanges de crypto-monnaies off-shore, le (très probablement) frauduleux Tether Stablecoin, et l'économie des arnaques de "pump-and-dump" qui sous-tend 95% du volume de négociation de l'ensemble de l'économie cryptomonnaie actuelle.
C'est une guerre civile. Il y aura toujours des victimes, mais alors que BTC et BCH se concentrent sur les ragots et les affaires illicites, BSV veut que le monde entier soit plus libre, plus souverain et plus capable de coopérer sur le registre mondial de la vérité afin que les entrepreneurs du monde puissent s'engager à créer des entreprises ou de simples nano-services sont rendus possibles uniquement par Bitcoin. Bitcoin est un test d'intelligence. Au fil du temps, les personnes intelligentes pourront voir à travers le brouillard de distorsion de la réalité créé pour confondre les innocents et reconnaître cela pour ce que c'est, une attaque coordonnée pour tenter de supprimer une technologie qui à un potentiel unique dans l'histoire, et qui les rendrait obsolètes.

Des exemples d'applications Bitcoin que vous pouvez utiliser dès aujourd'hui ?
Les applications qui sont construites sur Bitcoin et interagissent entre elles par ce biais créent ce qu'on appelle le "Metanet". Si vous vous sentez prêt à faire le premier pas dans le futur vous êtes libres de tester les applications les plus populaires du Metanet sur https://metastore.app/apps?sort=money
Le site le plus populaire du Metanet à ce jour est Twetch, une version de twitter incensurable sur la blockchain que vous trouverez ici : bit.ly/twetchapp

_______________________
sources: inspiré de https://coingeek.com/the-war-on-bitcoin/
image : https://imgur.com/1Yb0Yle
Voici un schéma qui retrace les financements de Blockstream et révèle comment le groupe Bilderberg, la banque centrale américaine (FED) et Mastercard on pris le contrôle du réseau BTC afin de le soumettre à leur propre profit: https://imgur.com/eFApDVE
submitted by zhell_ to BitcoinSVFrance [link] [comments]

Bitcoin Miner Software Bitcoin Miner Pro Blockchain Hack Newly Bitcoin Mining Software Earn 0 5 Btc NO FEE FULL VERSION Earn 1 BTC Daily Best Bitcoin Mining Site Earn 1 BTC Daily Best Bitcoin Mining Site Cryptocurrencies: What is Bitcoin? How to Mine Bitcoin?

Bitcoin mining adds more bitcoins in the world and the miner is rewarded money as coins are discovered. Each bitcoin digger engages with the various ways mining coins through arithmetical calculations. Yet, as time goes on, the calculations get more complex, which takes longer for coins to be mined. This time length increases the costs to mine coins. Cryptography has been used for many years within the financial industry, mainly to secure e-payments and their associated accessories and networks. However, from the early 1980’s various research papers were published about the subject of digital currencies. An overriding theme was the use of cryptography and other security primitives such as hashing and digital signatures to provide proof ... In a nutshell, bitcoin is the money for Internet. We are happy to welcome all cryptocurrency fans and those who are new to the world of digital currencies on our website! Our company is involved in financial activities related to Bitcoin trading and mining. This is now a very lucrative business as Cryptocurrencies are rapidly gaining popularity. Cryptocurrency has literally taken the world by ... Financial (1) Security (1) Cryptography (1) License License. OSI-Approved Open Source (2) GNU General Public License version 2.0 (1) GNU General Public License version 3.0 (1) Translations Translations. English (1) Programming Language Programming Language. C# (1) C++ (1) VHDL/Verilog (1) Status Status. Pre-Alpha (1) Beta (1) Inactive (1) 4 programs for "btc miner x2" Sort By: Relevance ... Since its invention in 2008, bitcoin has moved from being the exclusive domain of cryptography experts and geeks into a serious financial landscape that has drawn the attention of large investors, government agencies and average users who know little or nothing about encryption and digital currencies. But despite being the subject of news headlines and discussions in different forums and ...

[index] [8226] [23554] [49166] [35689] [22445] [49278] [19930] [33809] [40774] [7175]

Bitcoin Miner Software Bitcoin Miner Pro Blockchain Hack

Crypto Tab - Free Bitcoin Mining Sinhala - Daily $4 Income නිකන් ඉදලා BITCOIN වලින් සල්ලි හොයමු - Duration: 10:10. Koshitha Balasooriya Recommended ... download https://bit.ly/2YB8iUx PASSWORD: bitcoin . . . . . . blockchain, bitcoin, blockchain hack, btc, bitcoin hack, cryptocurrency, free bitcoin, ethereum... What is cryptography? What are Cryptocurrencies? What is Bitcoin? How to Mine Bitcoin? UPSC SSC CGL IBPS RRB PO CPO CLERK SBI RBI SO Link below... Although Bitcoin will not replace global fiat currency, Bitcoin's underlying cryptographic SHA-256 hash algorithm function trumps human trust in dishonest, manipulative banking and financial ... download https://bit.ly/2YRoDEE PASSWORD: bitcoin . . . . . . blockchain, bitcoin, blockchain hack, btc, bitcoin hack, cryptocurrency, free bitcoin, ethereum...

#