- Botnet Silent Bitcoin Mining Tutorial downloads Pool ...

Transcript of Open Developer Meeting in Discord - 7/19/2019

[Dev-Happy] BlondfrogsLast Friday at 3:58 PM
Hey everyone. The channel is now open for the dev meeting.
LSJI07 - MBITLast Friday at 3:58 PM
Hi
TronLast Friday at 3:59 PM
Hi all!
JerozLast Friday at 3:59 PM
:wave:
TronLast Friday at 3:59 PM
Topics: Algo stuff - x22rc, Ownership token for Restricted Assets and Assets.
JerozLast Friday at 4:00 PM
@Milo is also here from coinrequest.
MiloLast Friday at 4:00 PM
Hi :thumbsup:
Pho3nix Monk3yLast Friday at 4:00 PM
welcome, @Milo
TronLast Friday at 4:00 PM
Great.
@Milo Was there PRs for Android and iOS?
MiloLast Friday at 4:01 PM
Yes, I've made a video. Give me a second I'll share it asap.
JerozLast Friday at 4:02 PM
I missed the iOS one.
MiloLast Friday at 4:02 PM
Well its 1 video, but meant for all.
JerozLast Friday at 4:02 PM
Ah, there's an issue but no pull request (yet?)
https://github.com/RavenProject/ravenwallet-ios/issues/115
[Dev-Happy] BlondfrogsLast Friday at 4:03 PM
nice @Milo
MiloLast Friday at 4:04 PM
Can it be that I have no video post rights?
JerozLast Friday at 4:05 PM
In discord?
MiloLast Friday at 4:05 PM
yes?
[Dev-Happy] BlondfrogsLast Friday at 4:05 PM
just a link?
JerozLast Friday at 4:05 PM
Standard version has a file limit afaik
Pho3nix Monk3yLast Friday at 4:05 PM
try now
gave permissions
MiloLast Friday at 4:05 PM
it's not published yet on Youtube, since I didn't knew when it would be published in the wallets
file too big. Hold on i'll put it on youtube and set it on private
LSJI07 - MBITLast Friday at 4:06 PM
no worries ipfs it...:yum:
Pho3nix Monk3yLast Friday at 4:06 PM
ok, just send link when you can
[Dev-Happy] BlondfrogsLast Friday at 4:07 PM
So guys. We released Ravencoin v2.4.0!
JerozLast Friday at 4:08 PM
If you like the code. Go update them nodes! :smiley:
[Dev-Happy] BlondfrogsLast Friday at 4:08 PM
We are recommending that you are upgrading to it. It fixes a couple bugs in the code base inherited from bitcoin!
MiloLast Friday at 4:08 PM
https://www.youtube.com/watch?v=t\_g7NpFXm6g&feature=youtu.be
sorry for the hold up
YouTube
Coin Request
Raven dev Gemiddeld
LSJI07 - MBITLast Friday at 4:09 PM
thanks short and sweet!!
KAwARLast Friday at 4:10 PM
Is coin request live on the android wallet?
TronLast Friday at 4:10 PM
Nice video.
It isn't in the Play Store yet.
Pho3nix Monk3yLast Friday at 4:10 PM
Well, this is the first time in a while where we have this many devs online. What questions do y'all have?
LSJI07 - MBITLast Friday at 4:11 PM
Algo questions?
Pho3nix Monk3yLast Friday at 4:11 PM
sure
KAwARLast Friday at 4:11 PM
KK
LSJI07 - MBITLast Friday at 4:12 PM
what are the proposed 22 algos in x22r? i could only find the original 16 plus 5 on x21.
TronLast Friday at 4:12 PM
Likely the 5 from x21 and find one more.
We need to make sure they're all similar in time profile.
liqdmetalLast Friday at 4:14 PM
should we bother fixing a asic-problem that we dont know exists for sure or not?
TronLast Friday at 4:14 PM
That's the 170 million dollar question.
[Dev-Happy] BlondfrogsLast Friday at 4:14 PM
I would prefer to be proactive not reactive.
imo
JerozLast Friday at 4:14 PM
same
LSJI07 - MBITLast Friday at 4:15 PM
RIPEMD160 is a golden oldie but not sure on hash speed compared to the others.
liqdmetalLast Friday at 4:15 PM
in my mind we should focus on the restricted messaging etc
Sevvy (y rvn pmp?)Last Friday at 4:15 PM
probably won't know if the action was needed until after you take the action
liqdmetalLast Friday at 4:15 PM
we are at risk of being interventionistas
acting under opacity
TronLast Friday at 4:15 PM
Needs to spit out at least 256 bit. Preferably 512 bit.
LSJI07 - MBITLast Friday at 4:15 PM
ok
TronLast Friday at 4:15 PM
If it isn't 512 bit, it'll cause some extra headache for the GPU mining software.
liqdmetalLast Friday at 4:16 PM
i seek to avoid iatrogenics
TronLast Friday at 4:16 PM
Similar to the early problems when all the algos except the first one were built for 64-bytes (512-bit) inputs.
Had to look that one up. TIL iatrogenics
JerozLast Friday at 4:17 PM
I have to google most of @liqdmetal's vocabulary :smile:
liqdmetalLast Friday at 4:17 PM
@Tron tldr: basically the unseen, unintended negative side effects of the asic "cure"
Sevvy (y rvn pmp?)Last Friday at 4:18 PM
10 dolla word
liqdmetalLast Friday at 4:19 PM
we need a really strong case to intervene in what has been created.
TronLast Friday at 4:19 PM
I agree. I'm less concerned with the technical risk than I am the potential split risk experienced multiple times by Monero.
Sevvy (y rvn pmp?)Last Friday at 4:20 PM
tron do you agree that forking the ravencoin chain presents unique risks compared to other chains that aren't hosting assets?
JerozLast Friday at 4:21 PM
Yes, if you fork, you need to figure out for each asset which one you want to support.
Sevvy (y rvn pmp?)Last Friday at 4:21 PM
yeah. and the asset issuer could have a chain preference
TronLast Friday at 4:22 PM
@Sevvy (y rvn pmp?) Sure. Although, I'd expect that the asset issuers will be honor the assets on the dominant chain. Bigger concern is the branding confusion of multiple forks. See Bitcoin, Bitcoin Cash, Bitcoin SV for an example. We know they're different, but do non-crypto folks?
Hans_SchmidtLast Friday at 4:22 PM
I thought that the take-away from the recently published analyses and discussions was that ASICs for RVN may be active, but if so then they are being not much more effective than GPUs.
Sevvy (y rvn pmp?)Last Friday at 4:22 PM
agreed on all accounts there tron
TronLast Friday at 4:23 PM
I'm not yet convinced ASICs are on the network.
KAwARLast Friday at 4:23 PM
It would be better to damage an asic builder by forking after they made major expenses. Creating for them the type of deficit that could be negated by just buying instead of mining. Asic existence should be 100 percent confirmed before fork.
liqdmetalLast Friday at 4:23 PM
170million dollar question is right.lol
TronLast Friday at 4:24 PM
I've had someone offer to connect me to the folks at Fusion Silicon.
Sevvy (y rvn pmp?)Last Friday at 4:25 PM
yes. and if they are active on the network they are not particularly good ASICs
which makes it a moot point probably
TronLast Friday at 4:26 PM
The difficult part of this problem is that by the time everyone agrees that ASICs are problematic on the network, then voting the option in is likely no longer an option.
Sevvy (y rvn pmp?)Last Friday at 4:26 PM
yes. part of me wonders if we would say "okay, the clock on the asic countdown is reset by this new algo. but now the race is on"
[Dev-Happy] BlondfrogsLast Friday at 4:26 PM
There are always risks when making a change that will fork the network. We want wait to long though, as tron said. It wont be a voting change. it will be a mandatory change at a block number.
Sevvy (y rvn pmp?)Last Friday at 4:26 PM
acknowledge the inevitable
MiloLast Friday at 4:27 PM
I had just a small question from my side. When do you think the android version would be published, and do you maybe have a time-frame for the others?
TronLast Friday at 4:27 PM
Quick poll. How would everyone here feel about a BIP9 option - separate from the new features that can be voted in?
KAwARLast Friday at 4:27 PM
Maybe voting should not be a strictly blockchain vote. A republic and a democratic voice?
[Dev-Happy] BlondfrogsLast Friday at 4:27 PM
@Milo We can try and get a beta out next week, and publish soon after that.
MiloLast Friday at 4:28 PM
@[Dev-Happy] Blondfrogs :thumbsup::slight_smile:
[Dev-Happy] BlondfrogsLast Friday at 4:28 PM
BIP9 preemptive vote. I like it.
TronLast Friday at 4:30 PM
The advantage to a BIP9 vote is that it puts the miners and mining pools at a clear majority before activation.
LSJI07 - MBITLast Friday at 4:30 PM
Centralisation is inevitable unless we decide to resist it. ASIC's are market based and know the risks and rewards possible. A key step in resisting is sending a message. An algo change to increase asic resistance is imho a strong message. A BIP9 vote now would also be an indicator of bad actors early....
TronLast Friday at 4:30 PM
The disadvantage is that it may not pass if the will isn't there.
LSJI07 - MBITLast Friday at 4:30 PM
Before assets are on main net and cause additional issues.
KAwARLast Friday at 4:31 PM
I am not schooled in coding to have an educated voice. I only understand social problems and how it affects the economy.
SpyderDevLast Friday at 4:31 PM
All are equal on RVN
TronLast Friday at 4:31 PM
It is primarily a social problem. The tech change is less risky and is easier than the social.
LSJI07 - MBITLast Friday at 4:32 PM
All can have a share....people who want more of a share however pay for the privilege and associated risks.
KAwARLast Friday at 4:33 PM
Assets and exchange listings need to be consistent and secure.
brutoidLast Friday at 4:36 PM
I'm still not entirely clear on what the overall goal to the algo change is? Is it just to brick the supposed ASICs (unknown 45%) which could still be FPGAs as seen from the recent block analysis posted in the nest. Is the goal to never let ASICs on? Is it to brick FPGAs ultimately. Are we making Raven strictly GPU only? I'm still unclear
LSJI07 - MBITLast Friday at 4:37 PM
What about the future issue of ASICs returning after a BIP9 fork "soon"? Are all following the WP as a community? i.e asic resistant or are we prepared to change that to asic resistant for early coin emission. Ideally we should plan for the future. Could the community make a statement that no future algo changes will be required to incentivise future public asic manufacturers?
Lol. Same question @brutoid
brutoidLast Friday at 4:37 PM
Haha it is
You mind-beamed me!
[Dev-Happy] BlondfrogsLast Friday at 4:38 PM
The is up to the community.
Currently, the feel seems like the community is anti asic forever.
The main issue is getting people to upgrade.
KAwARLast Friday at 4:38 PM
Clarity is important. Otherwise we are attacking windmills like Don Quixote.
brutoidLast Friday at 4:39 PM
I'm not getting the feeling of community ASIC hate if the last few weeks of discussion are anything to go by?
Hans_SchmidtLast Friday at 4:39 PM
A unilateral non-BIP9 change at a chosen block height is a serious thing, but anti-ASIC has been part of the RVN philosophy since the whitepaper and is therefore appropriate for that purpose.
[Dev-Happy] BlondfrogsLast Friday at 4:39 PM
We can use the latest release as an example. It was a non forking release, announced for 2 weeks. and only ~30% of the network has upgraded.
TronLast Friday at 4:39 PM
@Hans_Schmidt Well said.
liqdmetalLast Friday at 4:40 PM
I'm not concerned about a "asic hardware problem" so much as I believe it more likely what we are seeing is several big fish miners (perhaps a single really big fish). For now I recommend standing pat on x16r. In the future I can see an algo upgrade fork to keep the algo up to date. If we start fighting against dedicated x16r hashing machines designed and built to secure our network we are more likely to go down in flames. The custom SHA256 computers that make the bitcoin the most secure network in existence are a big part of that security. If some party has made an asic that performs up to par or better than FPGA or GPU on x16r, that is a positive for this network, a step towards SHA256 security levels. It is too bad the community is in the dark regarding their developments. Therefore I think the community has to clarify its stance towards algorithm changes. I prefer a policy that will encourage the development of mining software, bitstreams and hardware by as many parties as possible. The imminent threat of ALGO fork screws the incentive up for developers.
JerozLast Friday at 4:40 PM
@brutoid the vocal ones are lenient towards asics, but the outcome of the 600+ votes seemed pretty clear.
brutoidLast Friday at 4:40 PM
This is my confusion
TronLast Friday at 4:41 PM
More hashes are only better if the cost goes up proportionally. Machines that do more hashes for less $ doesn't secure the network more, and trends towards centralization.
JerozLast Friday at 4:41 PM
I would argue for polling ever so often as it certainly will evolve dynamically with the state of crypto over time.
TronLast Friday at 4:41 PM
Measure security in two dimensions. Distribution, and $/hash.
liqdmetalLast Friday at 4:41 PM
and volume of hash
traysiLast Friday at 4:42 PM
45% of the hashrate going to one party is unhealthy, and standing pat on x16r just keeps that 45% where it is.
TronLast Friday at 4:42 PM
Volume doesn't matter if the cost goes down. For example, lets say software shows up that does 1000x better than the software from yesterday, and everyone moves to it. That does not add security. Even if the "difficulty" and embedded hashes took 1000x more attempts to find.
brutoidLast Friday at 4:42 PM
My issue is defintely centralization of hash and not so much what machine is doing it. I mine with both GPU and FPGA. Of course, the FPGAs are not on raven
TJayLast Friday at 4:44 PM
easy solution is just to replace a few of 16 current hash functions, without messing with x21r or whatever new shit
TronLast Friday at 4:44 PM
How do folks here feel about allowing CPUs back in the game?
traysiLast Friday at 4:44 PM
Botnets is my concern with CPUs
brutoidLast Friday at 4:44 PM
Botnets is my concern
SpyderDevLast Friday at 4:44 PM
Yes please.
LSJI07 - MBITLast Friday at 4:44 PM
the poll votes seem not very security conscious. More of day miners chasing profits. I love them bless! Imho the future is bright for raven, however these issues if not sorted out now will bite hard long term when asset are on the chain and gpu miners are long gone.....
ZaabLast Friday at 4:45 PM
How has the testing of restricted assets been on the test net?
liqdmetalLast Friday at 4:45 PM
Agreed. I dont think x16r is obsolete like that yet however
[Dev-Happy] BlondfrogsLast Friday at 4:45 PM
@Zaab not enough testing at the moment.
HedgerLast Friday at 4:45 PM
Yes, how is the Testing going?
justinjjaLast Friday at 4:45 PM
Like randomX or how are cpus going to be back in the game?
TronLast Friday at 4:45 PM
@Zaab Just getting started at testing at the surface level (RPC calls), and fixing as we go.
ZaabLast Friday at 4:45 PM
And or any updates on the review of dividend code created by the community
Lokar -=Kai=-Last Friday at 4:45 PM
if the amount of hash the unknown pool has is fixed as standarderror indicated then waiting for the community of FPGAers to get onto raven might be advantageous if the fork doesn't hurt FPGAs.
ZaabLast Friday at 4:45 PM
Can't rememeber who was on it
SpyderDevLast Friday at 4:45 PM
@Zaab But we are working on it...
Lokar -=Kai=-Last Friday at 4:46 PM
more hash for votes
JerozLast Friday at 4:46 PM
@Maldon is, @Zaab
TronLast Friday at 4:46 PM
@Zaab There are unit tests and functional tests already, but we'd like more.
[Dev-Happy] BlondfrogsLast Friday at 4:46 PM
@Zaab Dividend code is currently adding test cases for better security. Should have more update on that next meeting
KAwARLast Friday at 4:46 PM
Absolute democracy seems to resemble anarchy or at least civil war. In EVE online they have a type of community voice that get voted in by the community.
ZaabLast Friday at 4:46 PM
No worries was just curious if it was going as planned or significant issues were being found
Obviously some hiccups are expected
More testing is always better!
TronLast Friday at 4:47 PM
Who in here is up for a good civil war? :wink:
ZaabLast Friday at 4:47 PM
Tron v Bruce. Celebrity fight night with proceeds to go to the RVN dev fund
SpyderDevLast Friday at 4:48 PM
Cagefight or mudpit?
JerozLast Friday at 4:48 PM
talking about dev funds..... :wink:
Pho3nix Monk3yLast Friday at 4:49 PM
and there goes the conversation....
KAwARLast Friday at 4:49 PM
I am trying to be serious...
ZaabLast Friday at 4:49 PM
Sorry back to the ascii topic!
traysiLast Friday at 4:49 PM
@Tron What do we need in order to make progress toward a decision on the algo? Is there a plan or a roadmap of sorts to get us some certainty about what we're going to do?
LSJI07 - MBITLast Friday at 4:50 PM
Could we have 3 no BIP9 votes? No1 Friendly to asics, retain status quo. No2 change to x17r minimal changes etc, with no additional future PoW/algo upgrades. No3. Full Asic resistance x22r and see what happens...
:thonk~1:
Sounds messy....
TronLast Friday at 4:51 PM
Right now we're in research mode. We're building CNv4 so we can run some metrics. If that goes well, we can put together x22rc and see how it performs. It will likely gore everyone's ox. CPUs can play, GPUs work, but aren't dominant. ASICs VERY difficult, and FPGAs will have a tough time.
ZaabLast Friday at 4:51 PM
Yeah i feel like the results would be unreliable
TronLast Friday at 4:51 PM
Is this good, or do we lose everyone's vote?
PlayHardLast Friday at 4:52 PM
Fpga will be dead
Lokar -=Kai=-Last Friday at 4:52 PM
why isn;t a simple XOR or something on the table?
ZaabLast Friday at 4:52 PM
The multiple bip9 that is
Lokar -=Kai=-Last Friday at 4:52 PM
something asic breaking but doesn't greatly complicate ongoing efforts for FPGA being my point.
justinjjaLast Friday at 4:52 PM
How are you going to vote for x22rc?
Because if by hashrate that wouldn't pass.
traysiLast Friday at 4:52 PM
Personally I like the idea of x22rc but I'd want to investigate the botnet threat if CPUs are allowed back in.
TronLast Friday at 4:52 PM
XOR is on the table, and was listed in my Medium post. But, the social risk of chain split remains, for very little gain.
traysiLast Friday at 4:53 PM
@Lokar -=Kai=- A small change means that whoever has 45% can probably quickly adapt.
LSJI07 - MBITLast Friday at 4:53 PM
Research sounds good. x22rc could be reduce to x22r for simplicity...
TronLast Friday at 4:53 PM
x22r is a viable option. No CNv4.
LSJI07 - MBITLast Friday at 4:53 PM
Don't know how much time we have to play with though...
Lokar -=Kai=-Last Friday at 4:53 PM
if they have FPGAs yes if they have ASIC then not so much, but I guess that gets to the point, what exactly are we trying to remove from the network?
PlayHardLast Friday at 4:54 PM
Guys my name is Arsen and we designed x16r fpga on bcus. Just about to release it to the public. I am buzzdaves partner.
Cryptonight
Will kill us
But agreed
Asic is possible on x16r
And you dont need 256 core
Cores
traysiLast Friday at 4:55 PM
Hi Arsen. Are you saying CN will kill "us" meaning RVN, or meaning FPGA?
JerozLast Friday at 4:55 PM
This is what im afraid of ^ an algo change killing FPGA as I have the feeling there is a big fpga community working on this
PlayHardLast Friday at 4:55 PM
Fpgas ))
whitefire990Last Friday at 4:55 PM
I am also about to release X16R for CVP13 + BCU1525 FPGA's. I'm open to algo changes but I really don't believe in CPU mining because of botnets. Any CNv4 shifts 100% to CPU mining, even if it is only 1 of the 22 functions.
Lokar -=Kai=-Last Friday at 4:55 PM
namely FPGAs that aren;t memory equipped
like fast mem
not ddr
PlayHardLast Friday at 4:55 PM
Hbm non hbm
Cryptonight
whitefire990Last Friday at 4:56 PM
Right now with both Buzzdave/Altered Silicon and myself (Zetheron) about to release X16R for FPGA's, then the 45% miner's share will decrease to 39% or less.
PlayHardLast Friday at 4:56 PM
Will be dead for fpga
LSJI07 - MBITLast Friday at 4:56 PM
sound so x22r is fpga "friendly" ... more so than asic anyway...
PlayHardLast Friday at 4:56 PM
But a change must be planned
X16r is no way possible to avoid asics
TJayLast Friday at 4:56 PM
@LSJI07 - MBIT I would say less friendly...
whitefire990Last Friday at 4:57 PM
As I mentioned in thenest discussion, asic resistance increases with the square of the number of functions, so X21R is more asic resistant than X16R, but both are pretty resistant
PlayHardLast Friday at 4:58 PM
Yeah more algos make it heavier on ASIC
DirkDiggler (Citadel Architect)Last Friday at 4:58 PM
My interpretation of the whitepaper was that we used x16r as it was brand new (thus ASIC resistant), and that was to ensure a fair launch... We've launched... I don't like the idea of constantly forking to avoid the inevitable ASICs.
x16r was a great "experiment" before we had any exchange listings... that ship has sailed though... not sure about all these x22rs lmnop changes
KAwARLast Friday at 5:00 PM
I believe that it is easier to change the direction of a bicycle than an oil tanker. We feel more like a train. We should lay out new tracks and test on them and find benefits that are acceptable to everyone except train robbers. Then open the new train station with no contentious feelings except a silently disgruntled minority group. ???
Hans_SchmidtLast Friday at 5:01 PM
The most productive action the community can do now re ASICs is to voice support for the devs to make a non-BIP9 change at a chosen block height if/when the need is clear. That removes the pressure to act rashly to avoid voting problems.
LSJI07 - MBITLast Friday at 5:01 PM
Thats why im proposing to fork at least once to a more asic resistant algo (but FPGA "friendly/possible"), with the proviso ideally that no more PoW algo forks are require to provide future ASICs some opportunity to innovate with silicon and efficiency.
TJayLast Friday at 5:01 PM
folks should take into account, that high end FPGAs like BCU1525 on x16r can't beat even previous gen GPUs (Pascal) in terms of hash cost. so they aren't a threat to miners community
PlayHardLast Friday at 5:02 PM
A proper change
Requires proper research
eyz (Silence)Last Friday at 5:02 PM
Just so I'm clear here, we are trying to boot ASICS, don't want CPUs because of Botnets, and are GPU and FPGA friendly right?
PlayHardLast Friday at 5:02 PM
It is not a quick one day process
eyz (Silence)Last Friday at 5:02 PM
If there is a bip9 vote there needs to be a clear explanation as I feel most in the community don't understand exactly what we are trying to fix
TronLast Friday at 5:03 PM
@Hans_Schmidt I like that route. It has some game theoretics. It gives time for miners to adapt. It is only used if needed. It reduces the likelihood of ASICs dominating the network, or even being built.
[Dev-Happy] BlondfrogsLast Friday at 5:03 PM
Hey guys. great convo. We are of course looking to do the best thing for the community and miner. We are going to be signing off here though.
justinjjaLast Friday at 5:03 PM
TJay that comes down to power cost.
If your paying 4c/kw gpus all the way.
But if your a home miner in europe an fpga is your only chance
LSJI07 - MBITLast Friday at 5:03 PM
@Hans_Schmidt How do we decide the block limit and when sufficient evidence is available? I would say we have had much compelling information to date...
[Dev-Happy] BlondfrogsLast Friday at 5:03 PM
Thanks for participating. and keep up the good work :smiley:
Have a good weekend.
CAWWWW
TronLast Friday at 5:03 PM
I haven't seen any compelling evidence of ASICs - yet.
Pho3nix Monk3yLast Friday at 5:03 PM
:v:
JerozLast Friday at 5:04 PM
I suggest to continue discussion in #development and #thenest :smiley:
thanks all!
TronLast Friday at 5:04 PM
Cheers everyone!
KAwARLast Friday at 5:04 PM
Agree with Hans.
DirkDiggler (Citadel Architect)Last Friday at 5:04 PM
thanks Tron
Pho3nix Monk3yLast Friday at 5:04 PM
Ending here. continue in Nest if wanted
DirkDiggler (Citadel Architect)Last Friday at 5:04 PM
I am waiting for compelling evidence myself.
submitted by mrderrik to Ravencoin [link] [comments]

My theory: There was collusion, but Trump ripped off Russia in the deal and has us in a more serious situation than we think. A timeline.

I’m not usually a conspiracy theorist, but it all fit together too well to ignore. Feel free to poke holes in this, I’d like to be proven wrong.
The cold war never ended, it just moved online.
1991 - The cold war is declared over and the internet rises at a lightning pace. Much like the space program had before it. A cyberspace race. By nature of being the bulk of its inventors, the US is untouchable in cyber espionage. The NSA stockpiles all of the malicious code and secret vulnerabilities they can gather and rather than alert the world to them and help create fixes, they leave them active and turn them into tools for their agents to use against foreign powers. Eventually they also turn their attention inward and start using that software against their own people in a surveillance and manipulation program that dwarfs what the KGB had just been destroyed for doing.
2009 - Edward Snowden discovers the NSA running these programs and is outraged by the violation of rights and hypocrisy. He begins complaining in an attempt to get the system shut down and have our dirty little secret ended without national embarrassment. “I had raised these complaints not just officially in writing through email, but to my supervisors, to my colleagues, in more than one office. I did it in Fort Meade. I did it in Hawaii. And many, many of these individuals were shocked by these programs. They had never seen them themselves. And the ones who had, went, "You know, you're right. ... But if you say something about this, they're going to destroy you".
March 2011 – It’s discovered that the US military is developing software to create, spread and control social media sock puppet armies. They promise it’s to use against foreign enemies, we’re told that it’s illegal for them to use against US citizens. https://www.theguardian.com/technology/2011/ma17/us-spy-operation-social-networks
March 2013 - James Clapper blatantly lies to congress and denies the existence of the domestic surveillance program entirely. Snowden says this moment is when he realizes his hope is futile and May 2013 he begins releasing evidence of the collected data to expose the program and force it to stop, then waits out the storm in Hong Kong.
I believe Snowden had an insurance policy. Along with the surveillance data that he had planned to release, he stole an NSA toolkit that would not be released. A drive full of the nastiest bugs and backdoors the NSA could invent that would be released to the public in the event of his death. The US government wouldn’t dare risk it.
July 2013 – The public outrage over what’s been exposed should be astounding…but it’s not. It seems like no one cares. And at this point the NSA knows the toolkit has been stolen, it could destroy us. Desperate times call for desperate measures. The anti-propaganda law is repealed, freeing the US government to use propaganda against its own people. Those sock puppet armies are turned against us and it’s made to look like the majority of the US public doesn’t care about surveillance. Even South Park runs an episode in September mocking people’s indifference to the NSA. https://en.wikipedia.org/wiki/National_Defense_Authorization_Act_for_Fiscal_Year_2013#Smith-Mundt_Modernization_Act_of_2012
https://www.techdirt.com/articles/20130715/11210223804/anti-propaganda-ban-repealed-freeing-state-dept-to-direct-its-broadcasting-arm-american-citizens.shtml
http://foreignpolicy.com/2013/07/14/u-s-repeals-propaganda-ban-spreads-government-made-news-to-americans/
A massive domestic spy program is uncovered and they get away with it. Snowden isn’t a national hero, no one cares and in mid June 2013 the US files charges against him. He took a shot at the king and missed. The US rescinds his passport and demands Hong Kong extradite him. He’ll use his stolen toolkit to avoid a death penalty.
Russia would have suspected Snowden had this insurance policy. They tell him to spite America, they’ll arrange a flight for him from Hong Kong to Ecuador despite his lack of passport, with just a short layover in Russia. The layover becomes permanent when they refuse to finish the flight due to that lack of passport. Russia tells him he now has a choice, hand over the toolkit or you’ll be killed here and your country won’t care. Russia doesn’t care if his death triggers the release, it’s their intention to do that anyway. He holds out for 39 days in the airport but on August 1st 2013 he caves, is given asylum in Russia and Russia is discretely given the master keys to the internet.
The NSA is in an impossible position. They should alert the world that their monster has escaped its cage and help us secure our systems from it. But to do that would be to admit an indefensible extent of surveillance and now manipulation they themselves had carried out for years. The people would overthrow them immediately. In addition, every vulnerability they fix removes it from Russia’s arsenal but also from their own. I suspect they were using some of those vulnerabilities to sabotage the North Korean missile and Iranian nuclear programs. To fix them now would be to let those programs progress unhindered. I suspect this sort of catch-22 is how the Obama administration originally justified the surveillance to itself. And so the US does nothing.
Russia now has almost unfettered access on the internet, a backdoor on every computer manufactured before that date. I believe their Kompromat program became limitless. I believe they gathered every secret that existed to be found, on every member of our government and corporate world and what couldn’t be found could be planted. I’ll reference this again on *April 8 2016. *
February 2014 - Emboldened by our silence Russia moves to take Crimea 6 months later. We do not stay silent.
March 2014 - Obama uses Crimea as a cover to impose crippling sanctions on Russia. It cuts their currency and GDP in half.
November 2014 - Sony suffers a massive hack. Supposedly, by North Korea in retaliation over a Seth Rogan movie. It’s embarrassing but mostly inconsequential. North Korea denies involvement, no one believes them. I believe it’s a message from Russia. “We have the weapon and we know how to use it.”
February 2015 – Kaspersky Labs, a Russian company, exposes to the world how deeply the NSA’s infiltration has gone. All hard drives have been shipped with an NSA backdoor preinstalled. http://www.businessinsider.com/r-russian-researchers-expose-breakthrough-us-spying-program-2015-2
Through 2015 Microsoft makes an oddly strong push to get us all to update to Windows 10. Even bootleggers can get a free upgrade. A disguised evacuation from the badly compromised XP, 7 and 8? Or pushing a new OS into the world to give the NSA a new playing field to regain an advantage on?
I suspect Putin now reaches out to Robert Mercer, financier of data mining company Cambridge Analytica. He offers to make Mercer an American oligarch. Putin will provide the most advanced data gathering tools the NSA could create, Mercer will use them to collect data that lets his candidates target voters with uncanny accuracy and win elections. Kushner later raves about the complexity of their marketing system. https://www.forbes.com/sites/stevenbertoni/2017/05/26/jared-kushner-in-his-own-words-on-the-trump-data-operation-the-fbi-is-reportedly-probing/#619dd401a90f
At the same time, Mercer will share that data with Putin who then uses botnets and other illegitimate means to influence the same voters, in the same direction, but without being visibly connected to the candidate. Later there will be controversy over a server in Trump Tower communicating with a Russian bank. I believe this is that sharing. http://www.cnn.com/2017/03/09/politics/fbi-investigation-continues-into-odd-computer-link-between-russian-bank-and-trump-organization/index.html
In 2015 Cambridge Analytica first backs Ted Cruz. The most hated man in DC and a proven track record of bringing the system to a grinding halt. The obvious choice. But Trumps bombastic personality and Cruz’s lack of one threatens the plan. In December 2015 when a Quinnipiac poll shows Cruz in second place behind Trump, Cambridge Analytica promptly dumps Cruz and picks up Trump. Sometime later Trump paranoidly projects that the only way Hillary can win is by rigging the election.
July 2016 - Trump wins the Republican nomination.
August 2016 - A hacker group called The Shadow Brokers makes the news. I believe this is Putin finally flaunting to the world what he’s done. They tell us they’ve stolen a toolkit from The Equation Group, who have been suspected to be the NSA. The files in the toolkit are NSA but only as recent as 2013, a few months after Snowden’s departure. I suspect the file dates were altered just enough to give Snowden deniability. They release half of them to the public as proof. It’s bad, we’re warned that a lot of horrible malware will come from this for years to come. And now that the code is public, those attacks could plausibly come from anyone. The other half is kept encrypted, promised to be worse, and they comically struggle and fail to sell it on the black market. No one seems willing to touch it.
November 2016 - Our election is hit by an unprecedented number of attacks. 5 per second 24 hours a day in Illinois. 150,000 total in South Carolina. 39 states altogether. Everyone who was anyone took Putin’s free gift and hit us with it. https://www.engadget.com/2017/07/17/south-carolina-150-000-election-day-hacking-attempts/
Trump wins the election.
His first, maybe only job, is to lift the sanctions. Russia needs it done yesterday. Instead, Trump immediately gets into a fight with the media over the size of his inauguration crowd and makes a wild claim of 3 million illegal votes.
I believe Cambridge Analytica using NSA tools, had the ability to analyze every American voter’s online habits and predict their vote. I believe they promised Trump a win over Hillary and gave him a very specific vote count. When Hillary wins the popular vote with 3 million more votes, Trump is paranoid that she must have added her own fake votes which threw his prophesized number. And maybe she did. But with no evidence that he can admit to the rest of us, Trump blames it on illegal immigrants and starts demanding voter information so that he can compare the numbers.
This eats Trumps fragile ego alive. For eternity his legitimacy will be questioned in history books. Trumps attitude toward Russia sours. “You promised me a win and cost me the popular vote, our deal is void.” Trump does what he’s done to so many of the people he’s worked with before and decides he’s not going to pay his end of the deal. He busies himself putting Gorsuch on the SCOTUS, the beginnings of his wall and an immigration ban, ignoring Russia publicly and privately.
The cold war warms up.
January 23 – Trump appoints Ajit Pai to head the FCC. He is hell bent on reversing net neutrality laws, making it legal to throttle or block websites to citizens. Later, congress claims this was a direct order from Trump. Along with being able to predict how people will vote based on their browsing habits, they’ll now be able to directly influence those browsing habits. https://techcrunch.com/2017/08/06/10-members-of-congress-rake-fcc-over-the-coals-in-official-net-neutrality-comment/
February 9 – Jeff Sessions is made Attorney General to defend Trump from both an angry Russia and angry Congress. He’ll later recuse himself and Trump will state that if he had known that he wouldn’t have hired him in the first place.
February 10 – Russia considers giving Snowden to US as a gift. https://www.cnbc.com/2017/02/10/russia-eyes-sending-snowden-to-us-as-gift-to-trump-official-tells-nbc-news.html
February 13 – Trump seemingly is not interested. Michael Flynn’s Russian connections are “discovered” by the White House and he resigns.
February 14 – Russia violates a cold war arms treaty and shows that it has been developing cruise missiles. “I can reach you.” It says to Trump. https://www.nytimes.com/2017/02/14/world/europe/russia-cruise-missile-arms-control-treaty.html
February 14 – Congress starts to question their too-good-to-be-true win and a republican senator calls for an investigation into ties between Trump and Russia. Most squabble over healthcare. http://www.cnn.com/2017/02/14/politics/kfile-roy-blunt-flynn-investigation/index.html
February 27 – Trump makes major cuts to agencies and dumps all $54 billion of it into defense spending. They’re going to need it. https://www.washingtonpost.com/powerpost/trump-to-propose-10-percent-spike-in-defense-spending-massive-cuts-to-other-agencies/2017/02/27/867f9690-fcf2-11e6-99b4-9e613afeb09f_story.html?utm_term=.ed55293971c8
February 28 – Amazon has a major failure and the East coast US suffers an internet outage. http://bgr.com/2017/02/28/internet-outage-amazon-web-services/
March 7 – North Korea finally gets its missiles to survive launch and sends 4 towards a US base in Japan. I suspect Russia has made them aware of the vulnerabilities that had been plaguing their program. The US deploys its own missiles in South Korea. https://www.nytimes.com/2017/03/07/world/asia/thaad-missile-defense-us-south-korea-china.html
March 16 – Dan Coats, an anti-Russia senator is appointed by Trump as Director of National Intelligence, James Clappers old position. Kind of poetic really. A concept stolen from Russia, turned into a monster by Clapper, stolen back by Russia and used to remove Clapper, whose successor is now sent to kill it.
March 23 – Senate Republicans vote to allow the sale of citizen’s private browser history. Making the kind of data collection and manipulation I suspect Cambridge Analytica of doing, now legal for future use. https://www.buzzfeed.com/hamzashaban/the-republican-controlled-senate-votes-to-strip-internet?utm_term=.duwxxZYeY5#.sygwwvZkZj
March 30 – Michael Flynn offers to testify on Russia.
April 4 – 4 days after Tillerson had told Assad he could stay in power, Assad appears to drop chemical weapons on his own people. Assad denies it. The receiving hospital is also hit with conventional weapons in an effort to kill surviving witnesses. I believe it was Russia embarrassing the US.
April 7 – In response Trump hits a nearly empty airfield with 59 Tomahawk missiles. We’re told that it was retaliation against Syria and that Russia was warned beforehand and evacuated. I don’t believe they were. I believe Trump picked the most empty airfield shared by both Syria and Russia where damage would be minimal and bombed it without warning to either of them in an attempt to scare Russia. Russia condemns the strike and suspends air cooperation with the US. The airfield returns to operations the same day.
April 8 - The Shadow Brokers post an open letter to Trump that begins *“Respectfully, what the fuck are you doing?” * and telling him to remember his base, remember who got him elected. Again, I believe this is Putin speaking directly to Trump. He hints at the dirt he either has or can plant on McCain and Lindsay Graham, if only Trump will ask. The things he hints at are extreme. It is at this point that I now suspect Putin has gained this kind of information on a vast majority of our government and business world. Even if the blackmail victims are willing to face the shame to alert us to what’s happening, they’re warned that if the operations is exposed, everyone’s secrets will be released. The country would suddenly need a special election for half of its government and half of its corporations would crumble. It would be chaos. Mutually assured destruction. All anyone caught by Putin can do, is furrow their brow and be deeply disturbed.
In this same letter the Shadow Brokers ask Trump why he hasn’t yet filed charges against all powerful entities in the US. “Doing so, you could be seizing all their IT systems, freeze their financial assets, arrest key leadership.” This was a key step in Putin’s rise to power. I believe that even if Trump and Putin are having a couples squabble, Putin still needs Trump to remember this step. They release more of the NSA code as punishment. https://medium.com/@shadowbrokerss/dont-forget-your-base-867d304a94b1
The emergency siren system in Dallas is set off. https://www.usatoday.com/story/news/2017/04/08/hacker-triggers-all-156-emergency-sirens-dallas/100212412/
April 12 – Tillerson is sent to Moscow to meet with Putin to discuss tensions “over the Syria strike”. They are unable to come to agreements.
April 13 –Trump drops the Mother of All Bombs on Afghanistan for Russia to see.
April 14 - The Shadow Brokers dump more NSA exploits. Included in this batch is EternalBlue, one of the most destructive exploits that’s been seen in years.
April 14 – North Korea, whose missiles can now fly in a more or less straight line, threatens a preemptive strike on the US. The US threatens a strike back. Trump gets out of town and heads to Mar-a-Lago just in case. http://thehill.com/policy/international/328796-north-korean-official-warns-of-preemptive-strike-of-its-own
http://www.nbcnews.com/news/world/u-s-may-launch-strike-if-north-korea-reaches-nuclear-n746366
http://www.cnn.com/2017/04/14/politics/donald-trump-north-korea-mar-a-lago/
April 15 – North Korea unveils an ICBM that can theoretically hit all of the United States. I believe that in exchange for stopping America’s sabotage of their nuclear program, NK is acting as Russia’s nuclear attack dog. He’s long wanted to be the one to do it. Now he’ll have Russian defense if he does.
April 21 - The power grids in New York, LA and San Francisco fail, it’s blamed on mechanical failure. https://www.inverse.com/article/30635-everything-we-know-la-nyc-sf-power-outages
May 9 – Comey is fired by Trump as he works on the Russian investigation. Trump justifies it by quoting and mocking Chuck Schumer with a tweet… *“Cryin' Chuck Schumer stated recently, "I do not have confidence in him (James Comey) any longer." Then acts so indignant.” *
May 12 – The Wanna Cry ransomware scares the world. Built from the previously released EternalBlue exploit, it begins in Russia and races across the globe, locking computers and demanding a bitcoin ransom. It looks to be a catastrophic infection. Our hospitals are particularly crippled by it. The name mocks Trumps own words days before.
May 13 – By dumb luck a kill switch is left in the Wanna Cry code and British security researcher Marcus Hutchins disables it by registering a $10 website domain. What should have been a ransom in the billions of dollars tops out at $130,000. https://www.malwaretech.com/2017/05/how-to-accidentally-stop-a-global-cyber-attacks.html
After the attack, Kaspersky Labs will identify North Korea as being the attacker. North Korea will deny it. Later, Kaspersky will be cut out of the defense budget and banned from US government computers. Later still, Kaspersky will file an antitrust lawsuit against Microsoft, claiming that Windows 10 removes Kaspersky software from users computers when they upgrade.
https://www.cyberscoop.com/kaspersky-banned-us-dod-ndaa-russian-influence/
https://www.theverge.com/2017/6/6/15745164/kaspersky-antitrust-complaint-microsoft-european-commission
May 27 – British airways has a massive system failure which they blame on outsource employee ineptitude. I suspect this is a warning to Theresa May in response to England preventing Wanna Cry. “Stay out of this.” http://www.mirror.co.uk/news/uk-news/british-airways-caused-bank-holiday-10520182
June 7 – Amazon goes down. https://www.theverge.com/2017/6/7/15759046/amazon-product-pages-down-outage-offline-503
June 19 – A cyber analyst finds an unsecured Amazon server owned by GOP voter targeting firm Deep Root Analytics with almost all American voters records and analytics that predict who they will vote for and why. This confirms my suspicions that Cambridge Analytica used the same method to influence the presidential election. I believe that since the March 23 legalization of the selling of citizens browser histories, the GOP has been building its own voter prediction software in order to win the 2018 elections without help from Russia’s stolen data. http://www.zdnet.com/article/security-lapse-exposes-198-million-united-states-voter-records/
June 19 – All major cellular carriers go down. http://www.cbsnews.com/news/cell-phone-internet-outages-reported-across-the-u-s/
June 19 – Microsoft Skype goes down. https://techcrunch.com/2017/06/20/skype-outage-causing-connectivity-issues-company-says-its-a-global-incident/
June 27 – The Petya ransomware, built on EternalBlue, the second iteration of Wanna Cry, hits the world but seems targeted at Ukraine. Paying the ransom in this case does not unlock the data, Petya is tailored for maximum damage. https://en.wikipedia.org/wiki/2017_cyberattacks_on_Ukraine
June 30 – Microsoft Office 365 goes down. https://www.exoprise.com/2016/07/01/office-365-email-outage-june-2016/
July 3 – Chase bank goes down. https://www.washingtonpost.com/news/business/wp/2017/07/03/chase-bank-website-down-ahead-of-independence-day/?utm_term=.2135e79c6c8b
July 3 – NASDAQ suffers an attack. http://www.wired.co.uk/article/nasdaq-hack-july
July 4 – USS Hornet and much of Alameda California are hit by a power failure, 4th of July events are canceled. http://www.eastbaytimes.com/2017/07/04/alameda-power-outage-knocks-out-july-4-celebration-at-uss-hornet/
July 27 – HBO suffers the largest Hollywood hack in history. https://www.cnbc.com/2017/08/02/largest-hollywood-hack-in-history-may-have-compromised-hbo.html
July 30 – East coast power grid goes down. https://www.nytimes.com/2017/07/30/us/outer-banks-evacuation-power.html
Putin is livid.
August 3 - Marcus Hutchins, the man who saved us from Wanna Cry, is arrested by Trumps new CIA director on unrelated charges while he is in the US for a conference. He now faces 40 years in prison. https://www.theguardian.com/technology/2017/aug/03/researcher-who-stopped-wannacry-ransomware-detained-in-us
August 3 – Trump is finally forced to sign the Russian sanctions bill, making his position official. Putin will not be paid for services rendered.
August 5 – Trump schedules a vacation to be out of Washington DC for much of the next month. http://www.cnn.com/2017/08/04/politics/donald-trump-vacation-obama/index.html
I am nervous about August.
submitted by justajackassonreddit to esist [link] [comments]

Blockchain to fix horribly broken e-mail system like it is today?

E-mail as it is, is horribly broken. Horrendously broken.
It wasn't that many years ago that you could be assured your e-mail reaches whoever you were mailing to. Today it is a mere suggestion, that perhaps this should be delivered to this person, at least for any automated e-mail. This seems to be creeping to manual, organic email as well. Hell, we are seeing even internal e-mails being flagged by spamassassin as spam, organic, human written conversations! In that instance, the spamassassin is also maintained by one of the largest hosting providers in the world...
Hotmail/MS services has been for years (atleast about 4 years now!) been silently dropping email, not all, but some. There's a bit of relief lately, as they have started to favor a bit more marking as spam, rather than silently dropping.
I know, most email users don't see this problem, but those who use email a lot to do their work, and those who need to send automated emails (say, welcome e-mails for a service) this is a big problem. (Disclaimer, for us, our niche of hosting probably causes flagging as well. Our site is blocked by many corporate firewalls for example)
Blockchain to the rescue?
This is an idea i've been toying around with a few years. What if any single e-mail would cost a faction of a cent, and who receives the e-mail, gets paid for it? Now that would solve a lot of problems. I realize there has been some half assed attempts on blockchain based e-mail, but they are about replacing email (never going to happen). Using blockchain to enhance the current experience, with least minimal friction should be the goal, not re-inventing the wheel.
Imagine a say 0.01 cent (0.0001 USD) cost per e-mail. This price would not be cost prohibitive even for free e-mail service providers (Ad revenue etc. should exceed this value), never mind any legit e-mail users. Especially considering you get paid for receiving. So all legit e-mail services would work rather well regardless of the cost. (never mind free email service could profit from this)
Spam however? To send 1 million emails you would need to pay 100$. How many spammers would continue doing so? At least it makes things much harder, not so easy to use a botnet to send your email when you need to include your private key(s) to the botnet, or make some kind of private key management system, makes more complicated.
Small business newsletters? Say you need to send 100k e-mails to legit customers, 10$ is nothing. To human time crafting that newsletter is order (possibly orders) of magnitude greater than that.
Price would also fluctuate as per the market. The most difficult thing would probably be setting the self balancing mechanisms to keep per mail cost sensible. As such, the biggest hurdle in this might not be technical at all.
Technically, how could this work?
Sender sends a TX for e-mail they are sending for recipient. This TX contains message with mail ID, and a segment which can be used with the email contents to unlock the private key for the payment. This way it is verified that recipient mail servers receives and reads the email. Once the recipient server has calculated the private key, they can either TX the received sum to their wallet, or this needs to be formatted so that once the sender has sent it, they cannot recover the private key and double spend (technical hurdle A. For someone who knows their stuff unlikely to be an major hurdle)
Step by step repeat: * Sender checks if recipient has "MailCoin" capability * Sender sends TX to recipient * Sender sends the email to recipient * Recipient notices on mail header (say x-mailcoin-tx: TXID_HERE) that this is a "mailcoin" mail * Recipient checks TX if it has been received * Recipient puts the mail on delivery queue, antispam is instructed of heavy negative score (MTA admin configurable) * Recipient claims the value of the TX (this is the hurdle A). Recipient can only claim the TX value in case they have received the full e-mail. (Question, can this step be pushed even further down the delivery chain, but still remain MTA only level without mail client support?). Most likely solution is that the header contains the encrypted private key, and chain TX contains the key to decrypt that private key to claim the coins, or vice-versa?
Once recipient has the email & payment, they simply mark on their Antispam a automatic lower score and deliver it normally.
E-mail server side we have several components:
Most typical scenario would be the Recipient server works as outgoing as well, with single wallet. So depending on your mail volume, do you send or receive more on that wallet you might never need to worry about the coins (except for value going skyhigh and having like 10k $ worth of "MailCoins").
So perhaps additional components on per use case are needed, or more likely rudimentary scripting capability (ie. "MailCoin" daemon api) to keep the balances in check.
Technical hurdle B: This needs to be super super simple to setup. Or sufficient financial incentive. One would need to develop standard components & configs for exim, postfix, and other MTAs. Infact, make it autogenerate wallet ID etc. and easy to replace or import private keys etc. to put in coins for sending if you need to.
Privacy: On the blockchain you would not see the e-mail contents, only that e-mail likely took place (TX with mail UUID) to recipient. If sender can be deciphered it depends on them if it can be traced who they were. Automatic mixers? :) Recipient can also keep cycling the receive addresses to keep things private if they want to.
The biggest problem i see here, is that if an attacker can deduce the sender and/or recipient, it might to lead to some issues out of the scope of technical solutions. If attacker could read the emails, they would already have accomplished MitM and could just grab all e-mails.
Default implementation should be so, that from recipient address outsider cannot deduce the recipient server nor hostname.
Also, if attacker gains access to your mail with full headers, they could see the TXs in blockchain. MTA might need to scrub mailcoin related headers (yuck, scrubbing headers ....) for paranoid users, but most likely solution is that recipient retransmits those mailcoins as soon as they got the private key for the balance.
Blockchain: Blocks needs to be done every 10seconds or so, it needs to be fast. Preferrably even every 5 seconds, as not to cause any undue delay. Then again, if your application is reliant on receiving email within seconds, one should consider another means for communicating. Imho, email should be considered a little bit like snail mail, but on internet pace: Couple minutes delay is just OK.
Block size given the e-mail volume needs to be fairly large as well, considering the time between blocks. This is technical hurdle C: Hosting the full blockchain. I can easily foresee that this would grow to be terabytes in size. However, any large email operator would have vested interest in ensuring smooth operation of the blockchain, and for them, running a full node would have neglible cost.
(Technical hurdle C) Single email sent using the system could easily have TX contents of 100 bytes + TX headers + block headers etc. Say 100 bytes, and 100 million emails per day: 9.31GiB per day, 3 399GiB per year, 5 years later: 16.60 TiB just for the mail TXs.
Some estimate there is 200+ billion emails per day, but we all know large portion of this is spam. But even at 50 billion emails a day, 100 bytes per mail TX would add to 4.55TiB per day! So optimizing the blockchain size is obviously going to be important. The volume will be obviously much smaller as semi-spam (those daily half opt-in spamvertising from companies you know) will be lower as well. So probs 100+ billion emails per day at 100% adoption.
Blockchain should then be compressed, the whole block. Algorithm probably should favor speed over compression rate, and should be task specifically optimized (needs a simple reference release, where you can just stream the block contents into it and get output as compressed or uncompressed). The more compression there is, the more full nodes will be hosted by smaller operators :)
For large e-mail server clusters there should be central store for the blockchain, but this can be accessed on the system administratoconfig level already. The MTA components will just remotely talk to single full node daemon (so not really different from many implementations in existence right now), instead of each one running locally a full node.
At today's cheapest hosting rates 16.60TiB is roughly around 85-100€ a month. Purchase cost per 8TB drive is around 230€ mark right now, externals are cheaper. Not an issue for any even semi serious mail provider. Not even issue for datahoarder individuals.
However at 100 billion mails per day: 9.09TiB per day added, which is prohibitively large! We should be targeting something like 20bytes per mail final storage spent, or even less.
If it looks like it is going to grow really large, full node needs to have configurable multiple storages, so they can store parts of the blockchain on multiple different devices (ie. individual might choose to have it on 4 different external drives).
Filesystem side optimizations are needed as well, but these are fairly simple, just split into multiple subdirectories by the 10 thousand blocks or so, ie. 1 for blocks 1-10k, 2 for blocks 10 001 to 20k etc. Filesystems get exponentially slower the more files there is per directory. 10k might start to show slowing down, but is not significant yet.
Nodes could also implement secondary compression (compress multiple blocks together), if the blockchain starts to become stupid large. If it starts to become impossible to maintain, we could possibly implement a scrubbing methodology, where very old blocks get the TX contents wiped as they are not necessary anymore. Should not be an issue
Blocks with 10second target generated per annum: 3 153 600 Mails per 10second: 115 740 e-mails per 10second block. Final compressed size (say 20 bytes per mail): 2.20MiB + headers etc. per block Let's start small and allow linear growth to this, say 0.1% per day (36.5% annual) and start from 20k / 512KiB. After 3 years: 41.9k / 1072.64KiB per block, After 10 years: 93k / 2380.8KiB. (2027 we should have HDDs in the size of 30TB and daily max size for chain growth is 19.61TiB)
On the positive side every problem is an opportunity in disguise. If the blockchain is large, once again botnets will have a hard hard time to spamming, they can't host the full blockchain on infected machines. They will need to develop centralized mechanisms on this regard as well. One method i can see is by having TOR client built in, and via .onion domain to anonymize, but this is two way street, security researchers could exploit this (see above about the private keys) as well. Even without botnets, spammers will need to dedicate significant resources to host the full blockchain.
On the flip side, if spammer has also mining operation on the same local area network, they have both the income for mailcoins + full blockchain, and could leverage economies of scale, but this too would increase cost. And after all: This is all about increasing cost for spamming, while having the price in vicinity where real e-mail users, real businesses it is not a significant impact, or may even be an income source
Client side
Zero, Nada changes. No changes to outlook, thunderbird etc. Everything works under the hood at the MTA level. Very easy adoption for the end user. Everything is in the backend, server side.
Economics for users
Cost of operation has above been shown to increase wildly for spammers. But how about normal use cases?
Joe Average: They receive e-mail a lot more than they send, all kinds of order confirmations, invoices, newsletters and other automated e-mail. They will actually earn (however tiny amounts) from using this system. So for the masses, this is a good thing, they will see the earning potentials! which brings us to ....
New business opportunities! I could foresee a business setting up spam traps, the more e-mail you receive the more you earn! So it pays to get your receiver into spam lists. You don't ever need to read these, just confirm receive of them. All of sudden we could see even greater numbers of invalid e-mail addresses in spam lists, making spamming ever more expensive!
Free email services might proof to be extremely profitable, to the point of potential revenue sharing with Joe Averages (and above spamtraps). Because free email is mostly joe averages, they will have greater influx than outgoing. On the caveat, free email needs to have limits, but due to the low cost and potential of earnings, they could implement "mail credits" system, base is like 20 emails a day, but each received email could increase this credit limit. As such, it makes actually sense for free email services to implement this at the very least on the receiving side.
Business mass emailings. A business which has 100k valid e-mails on their database will not have a problem with paying few dozen bucks to have their mass mailing delivered. BUT they will make extra sure the content is good and targeted, something the recipient wants to receive. These will be the biggest spenders on email, apart from spammers.
ISPs, hell they get paid to provide e-mail. And they are on the same spot as free email service providers, they stand to earn more than spend!
Blockchain economics
This is where things might get interesting, there is so much potential.
However, there are several things definitively should not be done:
1 & 2 are easy, just do not mine outside of testnet prior to launch. (If devs get paid by companies, there is conflict of interest as well, but let's not get into that right now)
3: Miners and/or full node maintainers decide what goes on. Probably miners like bitcoin is supposed to.
4: Infinite & preferential supply: No after the launch "contracts" etc. to give coins to preferential parties, it should remain as on the launch unless majority consensus says there will be a change. Proof of stake is gray area imho, but then again also proof of work is the rich gets richer.
Mining: Storage requirement is a blessing in disguise, the massive storages required for this to function means that there will be no central hardware developer who sells all the shovels, without significant other markets. Ie. WD, Seagate, Toshiba the main players.
This means algo needs to be based on the full blockchain being hosted. The hashing needs to be so that GPUs are the king most likely, since almost anything good for CPUs is also doable in GPUs. Eventually someone will likely come with ASIC alternative, but due to masses of data it WILL require high bandwidth, high memory. Nothing like bitcoin currently, where low bandwidth, no memory requirement for the ASIC. There needs to be some expensive commodity components in there (RAM, Storage), and as such GPUs are the most likely candidate, and the bottleneck will not likely be computation, but I/O bandwidth.
Quickly thinking, previous block could include number of blocks to be included on the next for verification, in a highly compressible format. Let's say difficulty is number of blocks to be hashed, or from difficulty you can calculate number of blocks to be included. Previous blocks miner just chooses on random blocks to be included on the next one. Listing 10 series of blocks to be included, which can include series instructions. It could request block #5729375+100, or #357492+500 stepping 5 (every 5th block). Hell the random generator could use last block as seed for the next one to make it deterministic YET random as the emails and TXs change. (WTF, Did i just solve how the algo needs to work?!?) Only blocks which would differentiate is the first few, and obviously Genesis, for which an "empty" block would be what is to be hashed.
Hashing algo could be SHA256 because of the high requirement of streaming data, and most ASIC miners lacking in bandwidth (infact, it could be made compatible with bitcoin, but only those ASICS with higher I/O bandwidth than storage/ram I/O bandwidth is could actually boost the perf)
Different hashable list operations could be (on the block list what to be hashed on the next one): * Single block * Block # + number of blocks * Block # + (number of blocks with stepping) * Block # + number of blocks chosen by random using each hashed block as the seed for choosing next one (makes prefetch, preread, caching not work efficiently) * Number of previous blocks mined (ie. 50 last blocks) * Above but with stepping operator * Above but with choose random next X blocks, with variations based on the last hashed, sum of the hashed * All random pickers would have operation modes for the seed to be used: From hashed sum, the whole block, block contents, block header
These modes would ensure the blocks are there and makes it a lot dependable on variable factors, RAM speed, I/O seek time, I/O bandwidth.
This way we have proof that the miner has access to those blocks in efficient manner and the full blockchain is stored there, even if it is not practically retrievable from him / her over the internet for others to obtain a copy. HOWEVER, due to the data volumes, i think it is given they have fast access, but a miner would probably prefer not to share their blockchain contents to have bandwidth free for their mining, as the deadlines are tight. It could be built into the full node spec that they do not accept new blocks from sources which are not ready to supply any given block, and perhaps even periodic test of this. However, this would be unenforceable if people start running custom coded nodes which disables this, as it is not part of the blockchain calculation. It is not miner's benefit to "waste" precious bandwidth to serve others the vast blockchain, meanwhile it is end users benefit those running full nodes without mining to get them fast. So an equilibrium might be reached, if miners start loosing out because other miners will not share their blocks, they will start offering them, even if prioritized.
At 2MiB blocks, 10 second deadline, a miner would preferentially want the new block within 500ms, which would be barely sufficient time for a round trip across the globe. 500ms for 2MiB is 4MiB/s transfer rate inbound, and when block found you want it out even faster, say 250ms you'll need 8MiB/s burst which very very few have at a home. At more usual 1MiB/s it would take 2secs to submit your new block. On the other hand, if you found the block, you'd have immediate access to begin calcing the next one.
Block verification needs to be fast, and as such the above difficulty setting alone is not sufficient, there needs to be nonce. Just picking the right block is not guarantee there will be match, so traditional !???? nonce needs to be set as well most likely. As such, a lot of maths needs to be done to ensure this algorithm does not have dead ends, yet ensures certain blocks needs to be read as full and stored fully by the miners, just plain hashes of the blocks is not sufficient.
Perhaps it should be block data + nonce, then all the blocks hashes (with nonce, or pre-chosen salt) and to be generated block combined hash with nonce needs to have certain number of zeroes. Needs testing and maths :)
So there are many ways to accomplish proof of storage, we'd need just to figure out the which is the best.
Sidenote, this same algo could potentially be used with different settings for immutable, forever storage of data. Since there is no continuing cost to store data, TX Fee for every message (data) byte should be very high in such a coin.
Supply. Needs to be predictable and easy to understand. It would be preferential the standard mailing out is always 1x MailCoin, albeit coin itself should be practically infinitively divisable, and as such supply needs to be in the trillions eventually. But these things get complicated really fast, so we need to set a schedule.
Current email use is very large, so we should have something in the same magnitude. 8640 blocks per day - so maybe 10 000 coins per block == 86 400 000 new coins per day == 31 536 000 000 new coins per year, halving every 2 years. First halving: 63 072 000 000, Second halving: 94 608 000 000, Third (6 years): 110 376 000 000, but only halving 4 or 5 times to keep some new supply for ever increasing adoption and lost coins.
Got all the way here? :D
Thanks for reading up. Let me know what you think, and let's start a discussion on the feasibility of such a system!
I cannot develop this myself, but i would definitively back an effort up in the ways i can if anyone attempts to do something like this :) And i know i got probably many of the details incorrect
The main point of the methods described above is ease of adoption. Without adoption any system is worthless, and with email, you just cannot replace it like that (see the attempts trying to replace IPv4 with IPv6 ...), but you can enhance it. adoption is very critical in communications systems. (No one would have a phone if no one else had a phone)
Addendum 1: Forgot to add about pricing and markets, read comment here
Addendun 2: Bad actors and voting
submitted by PulsedMedia to Bitcoin [link] [comments]

[uncensored-r/Bitcoin] My current doubts about bitcoin. Please explain the solutions

The following post by karanmaker is being replicated because the post has been silently removed.
The original post can be found(in censored form) at this link:
np.reddit.com/ Bitcoin/comments/7l8yr1
The original post's content was as follows:
centralized mining - can i buy an asic and start mining today ? satoshi said 1 CPU = 1 Vote. I should be able to buy my one cpu to get my one vote.
High fees - will i ever be able to send 5 $ on the internet with bitcoin ?
What are your thoughts on burst coin ?
is that the solution to centralized mining ?
what is the solution to high fees ?
is POS based coin like reddcoin the solution to sending tip money on the internet to bypass high fees ?
what is the real answer to these two points.
andreas has not given any answers.
they are saying botnet mining is avoided by asic mining - but can i buy an asic today ?
we need to be truly decentralized as satoshi has said.
please guide.
submitted by censorship_notifier to noncensored_bitcoin [link] [comments]

[uncensored-r/Bitcoin] Bitcoin mining botnets infect thousands of PCs: Kaspersky

The following post by Dogbearer is being replicated because the post has been silently greylisted.
The original post can be found(in censored form) at this link:
np.reddit.com/ Bitcoin/comments/71x8gt
The original post's content was as follows:
http://bizhub.vn/tech/bitcoin-mining-botnets-infect-thousands-of-pcs-kaspersky_289050.html
submitted by censorship_notifier to noncensored_bitcoin [link] [comments]

[uncensored-r/Bitcoin] Why changing POW algo isn't the right solution to mining centralization

The following post by ente is being replicated because the post has been silently greylisted(for 1.0 hours).
(It was approved by the mods at: 2017-10-22T16:54:32.000Z)
The original post can be found(in censored form) at this link:
np.reddit.com/ Bitcoin/comments/77zf89
The original post's content was as follows:
For quite some time the idea pops up to change the POW, proof-of-work algorithm of bitcoin. It is SHA256 now, that's what the ASIC mining hardware calculates, and that's all they can do.
Many people are unhappy with the centralization of mining: only very few manufacturers, all of them in china, a few mining pools/companies hold the majority of mining power, and almost all of it in china, again. I am unhappy about that too:
It is, at this point, a mining cartel which actively works against decentrality, for example with
  • big pools attract more new mining power (less orphans, less variation in payout, better economy-of-scale)
  • the orphan rate is lower when closer to (physically, network-lag-times wise) the majority of mining power, in china. The chinese firewall with limited bandwith enhances this, compared to other parts of the word
  • the big pools/companies built a dedicated, fast mining-network in between them, enhancing the point above further
  • mining hardware on the open (enduser) market is so expensive, it doesn't even make much sense to mine even with free electricity (ROI anywhere between 6 and 12 months, difficulty- and price fluctuations make any sensible calculation impossible)
All of this is bad indeed.
So let's change the POW, use something else than SHA256, and make all of that mining hardware expensive doorstops, right? Maybe even with a rotating POW, changing every 100 blocks (read that today, hence this post).
  • First, current miners wouldn't just throw out their hardware and call it a day. They would use the hardware somewhere else, as long ass it gains more than electricity costs. This would at least result in a fork. Or, opposite, it's a scenario to get rid of all miners for good if the november s2x fork happens and we use the "nuclear option".
  • Still, don't make the mistake to assume any algo, any POW could be ASIC-proof on a technical level: any algorithm that can be worked on with a CPU can be poured in an ASIC too. We might need quite different ASIC designs than we are used to now, if the POW is based on high memory for example. The more general the POW is (rotating aspects), the closer we get to a "general purpose calculating machine" aka CPU. but still, a dedicated ASIC will probably always be doable and more efficient than a CPU. We only don't have ASSICs for all the altcoins because it's expensive to develop.
  • Lastly, here's for me the killer against changing POW: CPUs are horribly centralized. We have admins which control many servers, for example. And, we have botnets. The largest, Bredonet, seems to be 30 million computers big. The botnet operator is, by definition, criminal, malicious, anonymous and doesn't have real costs "owning" those computers (air conditioning, electricity, operation, hardwarefailures etc). They could mine bitcoins at any difficulty and any price, and would still make some money. The only reason they don't do it any more with the current POW and ASICs as competition is because the real/former computer owner is more likely to detect the infection when the computer is mining, and the return now really approaches zero because of ASICs. They are mining ether and monero though.
As much as I am sceptical about big mining operations, I would be more sceptical of five botnets having 80% of the hashpower at basically no costs. hich might quickly turn to 99%, as noone can compete with them who has to pay for elecricity and hardware themselves.
So, is everything lost in "mining and decentralization"? Right now, yes. My hope is, though, in the long run: soon, mining ASIC chips use the most recent technology available, comparable to CPUs made by Intel and AMD. from there on, ASIC evolution will only be as fast ass CPU evolution, for example doubling in speed (or hashes-per-power) every 18 months. Hardware will be economically functional longer (for example 18 months). There will, i hope, be more competition. with more companies developing ASICs, as everything slowed down and bitcoins market and economy grew too. We will have competition, with lower prices, and realistic prices for endusers too. We will have mining hardware integrated everywhere, where electricity is used to heat things. My examples are heating a pool and floowall integrated heating, both have a target temperature where ASICs survive (no mining water kettle, or toaster, sorry). 21.co had something along those lines as their (former?) goal.
At that point, ASICs and mining will be so widespread and commonplace that it can't be misused for power grabs (* we'll still have pools then, and need to figure that one out though).
When this will happen, if at all, noone can say. I don't think it will happen within the next two years. But once it starts, it will be a huge stampede.
tl;dr: don't change the POW to exclude current ASIC miners. It would all happen again eventually with new ASICs. Or only botnet operators continue to mine anyway. Instead, we'll include cheap, long-lasting ASICs in many household heating things like pool heaters, soon enough.
submitted by censorship_notifier to noncensored_bitcoin [link] [comments]

Make your own monero botnet or setup your own hidden miner ... BEST SILENT MINER ANY CRYPTOCURRENCY 2020 Real mining ,silent miner, hidden miner, Spreading miner 2019 .update2020 Silent bitcoin miner Builder exe for pc cpu or bots SILENT MONERO MINER 2019 (v.1.5)

Security firm Netlab 360 has discovered a new botnet named Fbot in a strange case of fighting fire with fire. Fbot appears to be very different from almost any other botnet because it is seeking and destroying another botnet called ufo miner, known to install crypto mining malware on computers. tutorial SecuObs - L'observatoire de la sécurite internet - Site d'informations professionnelles francophone sur la sécurité informatique BitTorrent client uTorrent software Silently Installing EpicScale Bitcoin Mining Software. ... The silent install appears to happen selectively, and not on all machines. BitTorrent spokesperson said, "We have reviewed the issue closely and can confirm there is no silent install happening. We are continuing to look at the issue. " Users that don't notice the program may find significantly ... Botnet controllers therefore play a core role in operations conducted by cybercriminals who are using infected machines to send out spam, Start Mining Bitcoins Windows Contents Mining software for microsoft windows Bitcoin mining works. before you learn about the best bitcoin mining Cryptocurrency investors have just and Windows systems, a major release that comes with innovative new features ... Bitcoin mining is very popular, however to mine Bitcoin you must have a huge amount of CPU power combined. Therefore large botnets can be a perfect for this exercise. This process is also known as Silent Bitcoin Mining. However, this must be controlled accurately as for Bitcoin mining all the bots would use 100% CPU. Therefore they would control that so the victims wouldn’t realize that ...

[index] [7552] [16220] [32057] [37355] [43883] [2060] [10069] [12864] [1460] [18055]

Make your own monero botnet or setup your own hidden miner ...

This is for educational purposes only, don't abuse this knowledge. Learn how to earn money spreading around hidden monero miners. Download here: https://driv... Defcon 21 - How my Botnet Purchased Millions of Dollars in Cars and Defeated the Russian Hackers - Duration: 26 ... Noob's Guide To Bitcoin Mining - Super Easy & Simple - Duration: 11:37. UFD Tech ... Miner Silent bitcoin. Miner Silent ZET. Miner Silent Betacoin. Miner Silent Globe. Miner Silent Nicehash. Miner Silent. Quark Miner. top altcoins, bitcoin today, price of bitcoin, crypto trading ... SILENT MONERO MINER 2019 (v.1.5),silent miner, hidden miner, скрытый майнер, advanced mining coin, mining stealth in minergate, real hidden miner cryptocurrency, monero, bitcoin ... Jeff Bezos about Bitcoin Market, Investments and Much more Amazon US 17,724 watching Live now Noticias Telemundo, 29 de marzo 2020 Noticias Telemundo - Duration: 21:44.

#