Mining With Dedicated Server - Bitcoin Miner

IOTA node sharing

This subreddit is dedicated to the IOTA community to help people set up full nodes and add neighbor nodes.
[link]

Digital Currency for a Digital Age

[Digitalcoin](http://digitalcoin.tech/) is a diligently maintained cryptocurrency intent on market stability, making it ideal for commerce and saving. Possible changes to Digitalcoin's parameters can be implemented upon community rule.
[link]

Security help: We found a bitcoin mining prog / Email server running on our dedicated server!

We saw that load spiked on one of Ubuntu servers yesterday and found this on the proc list using all our cores:
statd 7680 690 0.0 743976 58492 ? Sl Nov26 20914:53 ./yam -c 1 -M stratum+tcp://binyu.crypto%40gmail.com:[email protected]:45660/xmr
This was running under the statd user.
What do we do? We checked firewall, SSH, all seem OK. How do we go about investigating this breach?
Do help!
submitted by reddoxster to security [link] [comments]

Bitcoin mentioned around Reddit: Security help: We found a bitcoin mining prog / Email server running on our dedicated server! /r/security

Bitcoin mentioned around Reddit: Security help: We found a bitcoin mining prog / Email server running on our dedicated server! /security submitted by BitcoinAllBot to BitcoinAll [link] [comments]

With the price of bitcoin. Is it worth it to dedicate a server to bitcoin mining? /r/Bitcoin

With the price of bitcoin. Is it worth it to dedicate a server to bitcoin mining? /Bitcoin submitted by BitcoinAllBot to BitcoinAll [link] [comments]

Can I mine bitcoins on my spare dedicated servers?!

We are small Server provider, currently having several dedicated servers in different countries among the Europe and the US. Right now, We have 2×Dedicated servers, each with Dual X5670 CPUs and 96GB of ram which have been rented to anyone. My question is, can we set up bitcoin mining on these servers so that it could at least make its own monthly cost?! I appreciate those, who will take time and answer this.
submitted by GHZ96 to BitcoinMining [link] [comments]

Can I mine bitcoins on my spare dedicated servers?! /r/BitcoinMining

Can I mine bitcoins on my spare dedicated servers?! /BitcoinMining submitted by BitcoinAllBot to BitcoinAll [link] [comments]

Zano Newcomers Introduction/FAQ - please read!

Welcome to the Zano Sticky Introduction/FAQ!

https://preview.redd.it/al1gy9t9v9q51.png?width=424&format=png&auto=webp&s=b29a60402d30576a4fd95f592b392fae202026ca
Hopefully any questions you have will be answered by the resources below, but if you have additional questions feel free to ask them in the comments. If you're quite technically-minded, the Zano whitepaper gives a thorough overview of Zano's design and its main features.
So, what is Zano? In brief, Zano is a project started by the original developers of CryptoNote. Coins with market caps totalling well over a billion dollars (Monero, Haven, Loki and countless others) run upon the codebase they created. Zano is a continuation of their efforts to create the "perfect money", and brings a wealth of enhancements to their original CryptoNote code.
Development happens at a lightning pace, as the Github activity shows, but Zano is still very much a work-in-progress. Let's cut right to it:
Here's why you should pay attention to Zano over the next 12-18 months. Quoting from a recent update:
Anton Sokolov has recently joined the Zano team. ... For the last months Anton has been working on theoretical work dedicated to log-size ring signatures. These signatures theoretically allows for a logarithmic relationship between the number of decoys and the size/performance of transactions. This means that we can set mixins at a level from up to 1000, keeping the reasonable size and processing speed of transactions. This will take Zano’s privacy to a whole new level, and we believe this technology will turn out to be groundbreaking!
If successful, this scheme will make Zano the most private, powerful and performant CryptoNote implementation on the planet. Bar none. A quantum leap in privacy with a minimal increase in resource usage. And if there's one team capable of pulling it off, it's this one.

What else makes Zano special?

You mean aside from having "the Godfather of CryptoNote" as the project lead? ;) Actually, the calibre of the developers/researchers at Zano probably is the project's single greatest strength. Drawing on years of experience, they've made careful design choices, optimizing performance with an asynchronous core architecture, and flexibility and extensibility with a modular code structure. This means that the developers are able to build and iterate fast, refining features and adding new ones at a rate that makes bigger and better-funded teams look sluggish at best.
Zano also has some unique features that set it apart from similar projects:
Privacy Firstly, if you're familiar with CryptoNote you won't be surprised that Zano transactions are private. The perfect money is fungible, and therefore must be untraceable. Bitcoin, for the most part, does little to hide your transaction data from unscrupulous observers. With Zano, privacy is the default.
The untraceability and unlinkability of Zano transactions come from its use of ring signatures and stealth addresses. What this means is that no outside observer is able to tell if two transactions were sent to the same address, and for each transaction there is a set of possible senders that make it impossible to determine who the real sender is.
Hybrid PoW-PoS consensus mechanism Zano achieves an optimal level of security by utilizing both Proof of Work and Proof of Stake for consensus. By combining the two systems, it mitigates their individual vulnerabilities (see 51% attack and "nothing at stake" problem). For an attack on Zano to have even a remote chance of success the attacker would have to obtain not only a majority of hashing power, but also a majority of the coins involved in staking. The system and its design considerations are discussed at length in the whitepaper.
Aliases Here's a stealth address: ZxDdULdxC7NRFYhCGdxkcTZoEGQoqvbZqcDHj5a7Gad8Y8wZKAGZZmVCUf9AvSPNMK68L8r8JfAfxP4z1GcFQVCS2Jb9wVzoe. I have a hard enough time remembering my phone number. Fortunately, Zano has an alias system that lets you register an address to a human-readable name. (@orsonj if you want to anonymously buy me a coffee)
Multisig
Multisignature (multisig) refers to requiring multiple keys to authorize a Zano transaction. It has a number of applications, such as dividing up responsibility for a single Zano wallet among multiple parties, or creating backups where loss of a single seed doesn't lead to loss of the wallet.
Multisig and escrow are key components of the planned Decentralized Marketplace (see below), so consideration was given to each of them from the design stages. Thus Zano's multisig, rather than being tagged on at the wallet-level as an afterthought, is part of its its core architecture being incorporated at the protocol level. This base-layer integration means months won't be spent in the future on complicated refactoring efforts in order to integrate multisig into a codebase that wasn't designed for it. Plus, it makes it far easier for third-party developers to include multisig (implemented correctly) in any Zano wallets and applications they create in the future.
(Double Deposit MAD) Escrow
With Zano's escrow service you can create fully customizable p2p contracts that are designed to, once signed by participants, enforce adherence to their conditions in such a way that no trusted third-party escrow agent is required.
https://preview.redd.it/jp4oghyhv9q51.png?width=1762&format=png&auto=webp&s=12a1e76f76f902ed328886283050e416db3838a5
The Particl project, aside from a couple of minor differences, uses an escrow scheme that works the same way, so I've borrowed the term they coined ("Double Deposit MAD Escrow") as I think it describes the scheme perfectly. The system requires participants to make additional deposits, which they will forfeit if there is any attempt to act in a way that breaches the terms of the contract. Full details can be found in the Escrow section of the whitepaper.
The usefulness of multisig and the escrow system may not seem obvious at first, but as mentioned before they'll form the backbone of Zano's Decentralized Marketplace service (described in the next section).

What does the future hold for Zano?

The planned upgrade to Zano's privacy, mentioned at the start, is obviously one of the most exciting things the team is working on, but it's not the only thing.
Zano Roadmap
Decentralized Marketplace
From the beginning, the Zano team's goal has been to create the perfect money. And money can't just be some vehicle for speculative investment, money must be used. To that end, the team have created a set of tools to make it as simple as possible for Zano to be integrated into eCommerce platforms. Zano's API’s and plugins are easy to use, allowing even those with very little coding experience to use them in their E-commerce-related ventures. The culmination of this effort will be a full Decentralized Anonymous Marketplace built on top of the Zano blockchain. Rather than being accessed via the wallet, it will act more as a service - Marketplace as a Service (MAAS) - for anyone who wishes to use it. The inclusion of a simple "snippet" of code into a website is all that's needed to become part a global decentralized, trustless and private E-commerce network.
Atomic Swaps
Just as Zano's marketplace will allow you to transact without needing to trust your counterparty, atomic swaps will let you to easily convert between Zano and other cyryptocurrencies without having to trust a third-party service such as a centralized exchange. On top of that, it will also lead to the way to Zano's inclusion in the many decentralized exchange (DEX) services that have emerged in recent years.

Where can I buy Zano?

Zano's currently listed on the following exchanges:
https://coinmarketcap.com/currencies/zano/markets/
It goes without saying, neither I nor the Zano team work for any of the exchanges or can vouch for their reliability. Use at your own risk and never leave coins on a centralized exchange for longer than necessary. Your keys, your coins!
If you have any old graphics cards lying around(both AMD & NVIDIA), then Zano is also mineable through its unique ProgPowZ algorithm. Here's a guide on how to get started.
Once you have some Zano, you can safely store it in one of the desktop or mobile wallets (available for all major platforms).

How can I support Zano?

Zano has no marketing department, which is why this post has been written by some guy and not the "Chief Growth Engineer @ Zano Enterprises". The hard part is already done: there's a team of world class developers and researchers gathered here. But, at least at the current prices, the team's funds are enough to cover the cost of development and little more. So the job of publicizing the project falls to the community. If you have any experience in community building/growth hacking at another cryptocurrency or open source project, or if you're a Zano holder who would like to ensure the project's long-term success by helping to spread the word, then send me a pm. We need to get organized.
Researchers and developers are also very welcome. Working at the cutting edge of mathematics and cryptography means Zano provides challenging and rewarding work for anyone in those fields. Please contact the project's Community Manager u/Jed_T if you're interested in joining the team.
Social Links:
Twitter
Discord Server
Telegram Group
Medium blog
I'll do my best to keep this post accurate and up to date. Message me please with any suggested improvements and leave any questions you have below.
Welcome to the Zano community and the new decentralized private economy!
submitted by OrsonJ to Zano [link] [comments]

Multiple DHT22 Sensors

Hello all, first thing first, I am a computer repair technician at a Bitcoin mining facility. We have about 20,000 bitcoin miners that me and my coworkers are in charge of monitoring and repairing. So with that being said I am pretty much lost when it comes to python and servers and things of that sort.Everyone that has dealt with computers/electronics know that heat is a huge issue. And heat is a killer to bitcoin miners,so monitoring the temperature and humidity in the facility is crucial so we can control the waterwalls and such as needed .I have successfully set up 14 raspberry pis with DHT22 sensors by copying and pasting scripts that I found online. They are reporting to a website through POST method. The readings are shown on a barchart,but is not dynamic so it only shows 1 reading at a time. I have been tasked with setting up a way to get all the sensors reading to a single server,then pulling the data from the server onto a D3.js grouped bar chart . Now, there is 14 Pis and each is set to read every mintue. These will be running 24/7 so there will be alot of readings. My question,actually a few questions is I am needing to set up 1 Pi as a dedicated server receiving all the readings. 1)What would be the best way to set that up,I have read that a MQTT server is the easiest but cant handle a lot of data(which I will have)I was thinking about a MySql. 2)Would I need to attach extra storage to this Pi to handle all the data. 3) How do I send all the readings to the server Pi(NOTE: they will all be on the same network) 4) How would I pull all this information from the server and input it into a D3.js grouped bar chart. Do I need to have a web server installed on the Pi?. I'm not expecting a step by step answer, and I am on a timeline and honestly dont have time to learn pythhon,html,php,sql or whatever is needed for this. All I am asking is for is a step in the right direction, thanks to all that read this and any information will be greatly appreciated
submitted by AbsentGalaxy to RASPBERRY_PI_PROJECTS [link] [comments]

Technical Questions: Mac Nodes & Servers

Hi guys, I posted this over at BitcoinBeginners but it hasn’t received a lot of useful input. I’ve read the FAQ there and searched around the web for answers, but could really use your help.
I have a dedicated 2011 MacBook Pro running High Sierra that I’d like to use in support of Bitcoin. So far, I have installed and verified GPG Suite and Bitcoin Core following instructions from bitcoin.orf. It is now synced, and I hope to add block explorer, a lightning node, and an electrum server. Once complete, I’d like to create some tutorials and guides to help others who have old Macs, since there is already a lot of good info for Windows and Linux.
I found this guide on Medium talking about Power Node Launcher, but it’s doesn’t have the same emphasis on security as the other tools I’ve setup. Before taking next steps, I’d like input from the community on the order of steps and trusted sources for installing the aforementioned programs.
If there is anything else I can do with my computer and bandwidth to help Bitcoin, please let me know. Specifically, if I am able to setup a lightning node, would it help if I stored some bitcoin on it to support transactions? Should I setup a slow simple mining program or run an older ASIC miner that is not part of a pool just to help diversify the network? Should I setup a satellite connection as Andreas suggested in one of his older videos? Thanks for your input.
submitted by itfwg to Bitcoin [link] [comments]

Why aelf will be the DeFi leader among major public chains

Why aelf will be the DeFi leader among major public chains

https://preview.redd.it/aiyk2e8rhpo51.png?width=512&format=png&auto=webp&s=780252104b73543a9a4764f01f9bdad2e904747d
aelf has in fact been making its own plans and strategies for DeFi quite early on.
aelf has clearly sensed the status quo and future of DeFi. Based on this, aelf is striving to be the most thorough innovator and leader in the industry:
In the first stage, DeFi mainly focuses on lending.
In the second stage, DeFi mainly focuses on automated market makers and liquidity mining.
And the most critical and important move is the third stage that will usher in an era of DeFi and CrossFi dominated by large public chain projects who develop DeFi functionalities benefiting all blockchain ecosystems and enabling value transfer between aelf and other blockchains.
People have discovered that these existing Ethereum-based DeFi projects have no lasting potential, because of the limitations of Ethereum’s protocol. Anyone who uses Ethereum to transfer assets or execute contracts knows that transaction fee on Ethereum is really high (in comparison, TRON is much cheaper, aelf is almost 0), and confirmation time of three minutes requires at least 2 USD as gas, which is a big problem for small transactions, especially when you find that you have to deposit the same amount of stablecoins in the trading pool. As for me, I don’t like transferring USDT based on ERC20 back and forth between wallets; in addition, on Ethereum, all transactions are verified by all nodes, and with thousands of production nodes, the time that transactions are broadcasted to each node is much longer. If there are high-frequency transactions and computation on Ethereum, for example, Cryptokitty occupied about 11% of the resources at the peak, then the performance of the entire Ethereum will become worse, and more and more transactions have to queue up for execution, forcing transaction senders to continuously increase gas fees hoping that their transactions can be processed first. This also the exacerbate the transaction fee problem of the Ethereum Mainnet, and the size of the Ethereum block cannot be easily changed because it will not only worsen the performance, but also split the community. Even Vitalik is trying his best to solve the scaling problem of Ethereum.
And what is CrossFi? CrossFi is DeFi with cross-chain function. The industry has reached consensus that cross-chain financial communication between blockchains will become a new demand and new trend, so a new era of CrossFi (Cross-Chain + DeFi) has come.
Because of these two big pain points, public chain projects are given a new lease of life after the 2017 ICO and DApp craze.
The aelf project, which started in 2017, is fundamentally different from other public chain projects in terms of technology.
We are always stressing that we have written every single line of code of aelf’s underlying protocol from scratch, which has solved all kinds of problems that plagued large public chains from the beginning.
Infinite scalability: Since the very beginning, aelf has been aiming to solve the scaling problem of large public blockchains. aelf uses the underlying consensus mechanism of AEDPoS, which greatly reduces the number of block production nodes, and solves the plotting problem that has plagued DPoS for a long time through the real random number generation mechanism; on this basis, aelf’s production nodes are themselves Cloud computing data centers, and the computing power of cloud computing and the performance of the data center are positively correlated. Therefore, theoretically, from the perspective of cloud computing alone, the scalability of aelf is already unlimited; but this is not the whole story, aelf also uses the technology of transaction sharding on the protocol level, which makes it possible to process transactions in parallel, further enhancing the scalability of the aelf blockchain.
Cross-chain at protocol level: In the design of the underlying protocol, aelf wrote the cross-chain functionality as one of the base contracts, which is to fully support the value transfer between any other blockchains, regardless of the chains being compatible with each other or not. On top of this, it is easy to design various dedicated protocols when implemented in upper-level applications. For example, aelf has launched a protocol dedicated to cross-chain token transfer and asset transfer, namely, the Cross-Chain Transfer Protocol (CCTP).
Multi-layer side chain: aelf invented the side chain logic architecture all by itself and formed a multi-layer side chain model for highly vertical business scenarios. This functionality is also one of the basic contracts of the aelf protocol. Enterprise users only need to start a new side chain and apply for cloud computing resources to deploy the smart contracts of their own business, so that business data in different fields will not be mixed together. It will not occupy the computing resources of the main chain, and will also realize the on-chain governance of its own community by defining the tokens belonging to its own community. In addition, the side chain can not only be related to the main chain, but also to the side chain of another sub-category. This is in perfectly accordance with the logical tree structure on the taxonomy. And this fully decouples and separates different business scenarios and communities, achieving the most efficient performance and governance.
These technical advantages of aelf will surely have an impact on the DeFi field.
Nearly ZERO transaction fees: aelf’s underlying infrastructure breaks the scalability barriers of the blockchain, enabling transactions to be executed at a performance comparable to an off-chain server. There will be no more queueing for transactions to be verified, thus nobody has to push up the gas price for their transaction to be first executed (time is money!). In addition, aelf launched an automated market maker called AESwap, which is based entirely on the aelf blockchain. When we swap, the transaction fee is also designed to be relatively low. In contrast, in the Curve project, the transaction fee for a single swapping operation could easily amount to 40–50 USD!
Fast cross-chain speed: The cross-chain function is the core part of the new era of CrossFi. The performance of cross-chain transactions will directly determine the survival of the project. aelf uses vanilla code to realize the index-based cross-chain design, thus making transactions being processed really fast. Fast execution, coupled with the confirmation of aelf’s fewer production nodes, makes aelf’s cross-chain a perfect experience. No one wants to wait as long as 10 minutes for a cross-chain transfer, but this is always happening! Since asset prices fluctuate frequently, if we have to wait for such a long time for our swapping or providing liquidity, we could face unexpected high loss, let alone cross-chain DeFi. The cross-chain token flow is crucial to increasing the participation of large public blockchains.
Unleash potential of entire ecosystem: On top of the two technical advantages, the value potential of the tokens will be unleashed if we liquidate any of these two types of tokens in pairs for swapping, be it tokens that belong to main chain or side chain of the aelf blockchain itself, or that on other blockchains, especially Ethereum, Bitcoin and EOS. In the future, any blockchain users can directly use the various DApps on the aelf ecosystem without any obstacles.
Therefore, aelf, with a variety of independent research and development technologies, will not only become the star leader of DeFi and CrossFi in the public blockchain field, but also enable the price of its token ELF to achieve new highs! There’s a lot more to expect from aelf!
submitted by Floris-Jan to aelfofficial [link] [comments]

[ANN][ANDROID MINING][AIRDROP] NewEnglandcoin: Scrypt RandomSpike

New England
New England 6 States Songs: https://www.reddit.com/newengland/comments/er8wxd/new_england_6_states_songs/
NewEnglandcoin
Symbol: NENG
NewEnglandcoin is a clone of Bitcoin using scrypt as a proof-of-work algorithm with enhanced features to protect against 51% attack and decentralize on mining to allow diversified mining rigs across CPUs, GPUs, ASICs and Android phones.
Mining Algorithm: Scrypt with RandomSpike. RandomSpike is 3rd generation of Dynamic Difficulty (DynDiff) algorithm on top of scrypt.
1 minute block targets base difficulty reset: every 1440 blocks subsidy halves in 2.1m blocks (~ 2 to 4 years) 84,000,000,000 total maximum NENG 20000 NENG per block Pre-mine: 1% - reserved for dev fund ICO: None RPCPort: 6376 Port: 6377
NewEnglandcoin has dogecoin like supply at 84 billion maximum NENG. This huge supply insures that NENG is suitable for retail transactions and daily use. The inflation schedule of NengEnglandcoin is actually identical to that of Litecoin. Bitcoin and Litecoin are already proven to be great long term store of value. The Litecoin-like NENG inflation schedule will make NewEnglandcoin ideal for long term investment appreciation as the supply is limited and capped at a fixed number
Bitcoin Fork - Suitable for Home Hobbyists
NewEnglandcoin core wallet continues to maintain version tag of "Satoshi v0.8.7.5" because NewEnglandcoin is very much an exact clone of bitcoin plus some mining feature changes with DynDiff algorithm. NewEnglandcoin is very suitable as lite version of bitcoin for educational purpose on desktop mining, full node running and bitcoin programming using bitcoin-json APIs.
The NewEnglandcoin (NENG) mining algorithm original upgrade ideas were mainly designed for decentralization of mining rigs on scrypt, which is same algo as litecoin/dogecoin. The way it is going now is that NENG is very suitable for bitcoin/litecoin/dogecoin hobbyists who can not , will not spend huge money to run noisy ASIC/GPU mining equipments, but still want to mine NENG at home with quiet simple CPU/GPU or with a cheap ASIC like FutureBit Moonlander 2 USB or Apollo pod on solo mining setup to obtain very decent profitable results. NENG allows bitcoin litecoin hobbyists to experience full node running, solo mining, CPU/GPU/ASIC for a fun experience at home at cheap cost without breaking bank on equipment or electricity.
MIT Free Course - 23 lectures about Bitcoin, Blockchain and Finance (Fall,2018)
https://www.youtube.com/playlist?list=PLUl4u3cNGP63UUkfL0onkxF6MYgVa04Fn
CPU Minable Coin Because of dynamic difficulty algorithm on top of scrypt, NewEnglandcoin is CPU Minable. Users can easily set up full node for mining at Home PC or Mac using our dedicated cheetah software.
Research on the first forked 50 blocks on v1.2.0 core confirmed that ASIC/GPU miners mined 66% of 50 blocks, CPU miners mined the remaining 34%.
NENG v1.4.0 release enabled CPU mining inside android phones.
Youtube Video Tutorial
How to CPU Mine NewEnglandcoin (NENG) in Windows 10 Part 1 https://www.youtube.com/watch?v=sdOoPvAjzlE How to CPU Mine NewEnglandcoin (NENG) in Windows 10 Part 2 https://www.youtube.com/watch?v=nHnRJvJRzZg
How to CPU Mine NewEnglandcoin (NENG) in macOS https://www.youtube.com/watch?v=Zj7NLMeNSOQ
Decentralization and Community Driven NewEnglandcoin is a decentralized coin just like bitcoin. There is no boss on NewEnglandcoin. Nobody nor the dev owns NENG.
We know a coin is worth nothing if there is no backing from community. Therefore, we as dev do not intend to make decision on this coin solely by ourselves. It is our expectation that NewEnglandcoin community will make majority of decisions on direction of this coin from now on. We as dev merely view our-self as coin creater and technical support of this coin while providing NENG a permanent home at ShorelineCrypto Exchange.
Twitter Airdrop
Follow NENG twitter and receive 100,000 NENG on Twitter Airdrop to up to 1000 winners
Graphic Redesign Bounty
Top one award: 90.9 million NENG Top 10 Winners: 500,000 NENG / person Event Timing: March 25, 2019 - Present Event Address: NewEnglandcoin DISCORD at: https://discord.gg/UPeBwgs
Please complete above Twitter Bounty requirement first. Then follow Below Steps to qualify for the Bounty: (1) Required: submit your own designed NENG logo picture in gif, png jpg or any other common graphic file format into DISCORD "bounty-submission" board (2) Optional: submit a second graphic for logo or any other marketing purposes into "bounty-submission" board. (3) Complete below form.
Please limit your submission to no more than two total. Delete any wrongly submitted or undesired graphics in the board. Contact DISCORD u/honglu69#5911 or u/krypton#6139 if you have any issues.
Twitter Airdrop/Graphic Redesign bounty sign up: https://goo.gl/forms/L0vcwmVi8c76cR7m1
Milestones
Roadmap
NENG v1.4.0 Android Mining, randomSpike Evaluation https://github.com/ShorelineCrypto/NewEnglandCoin/releases/download/NENG_2020_Q3_report/NENG_2020_Q3_report.pdf
RandomSpike - NENG core v1.3.0 Hardfork Upgrade Proposal https://github.com/ShorelineCrypto/NewEnglandCoin/releases/download/2020Q1_Report/Scrypt_RandomSpike_NENGv1.3.0_Hardfork_Proposal.pdf
NENG Security, Decentralization & Valuation
https://github.com/ShorelineCrypto/NewEnglandCoin/releases/download/2019Q2_report/NENG_Security_Decentralization_Value.pdf
Whitepaper v1.0 https://github.com/ShorelineCrypto/NewEnglandCoin/releases/download/whitepaper_v1.0/NENG_WhitePaper.pdf
DISCORD https://discord.gg/UPeBwgs
Explorer
http://www.findblocks.com/exploreNENG http://86.100.49.209/exploreNENG http://nengexplorer.mooo.com:3001/
Step by step guide on how to setup an explorer: https://github.com/ShorelineCrypto/nengexplorer
Github https://github.com/ShorelineCrypto/NewEnglandCoin
Wallet
Android with UserLand App (arm64/armhf), Chromebook (x64/arm64/armhf): https://github.com/ShorelineCrypto/NewEnglandCoin/releases/tag/v1.4.0.5
Linux Wallet (Ubuntu/Linux Mint, Debian/MX Linux, Arch/Manjaro, Fedora, openSUSE): https://github.com/ShorelineCrypto/NewEnglandCoin/releases/tag/v1.4.0.3
MacOS Wallet (10.11 El Capitan or higher): https://github.com/ShorelineCrypto/NewEnglandCoin/releases/tag/v1.4.0.2
Android with GNUroot on 32 bits old Phones (alpha release) wallet: https://github.com/ShorelineCrypto/NewEnglandCoin/releases/tag/v1.4.0
Windows wallet: https://github.com/ShorelineCrypto/NewEnglandCoin/releases/tag/v1.3.0.1
addnode ip address for the wallet to sync faster, frequently updated conf file: https://github.com/ShorelineCrypto/cheetah_cpumineblob/mastenewenglandcoin.conf-example
How to Sync Full Node Desktop Wallet https://www.reddit.com/NewEnglandCoin/comments/er6f0q/how_to_sync_full_node_desktop_wallet/
TWITTER https://twitter.com/newenglandcoin
REDDIT https://www.reddit.com/NewEnglandCoin/
Cheetah CPU Miner Software https://github.com/ShorelineCrypto/cheetah_cpuminer
Solo Mining with GPU or ASIC https://bitcointalk.org/index.php?topic=5027091.msg52187727#msg52187727
How to Run Two Full Node in Same Desktop PC https://bitcointalk.org/index.php?topic=5027091.msg53581449#msg53581449
ASIC/GPU Mining Pools Warning to Big ASIC Miners Due to DynDiff Algo on top of Scrypt, solo mining is recommended for ASIC/GPU miners. Further more, even for mining pools, small mining pool will generate better performance than big NENG mining pool because of new algo v1.2.x post hard fork.
The set up configuration of NENG for scrypt pool mining is same as a typical normal scrypt coin. In other word, DynDiff on Scrypt algo is backward compatible with Scrypt algo. Because ASIC/GPU miners rely on CPU miners for smooth blockchain movement, checkout bottom of "Latest News" section for A WARNING to All ASIC miners before you decide to dump big ASIC hash rate into NENG mining.
(1) Original DynDiff Warning: https://bitcointalk.org/index.php?topic=5027091.msg48324708#msg48324708 (2) New Warning on RandomSpike Spike difficulty (244k) introduced in RandomSpike served as roadblocks to instant mining and provide security against 51% attack risk. However, this spike difficulty like a roadblock that makes big ASIC mining less profitable. In case of spike block to be mined, the spike difficulty immediately serve as base difficulty, which will block GPU/ASIC miners effectively and leave CPU cheetah solo miners dominating mining almost 100% until next base difficulty reset.
FindBlocks http://findblocks.com/
CRpool http://crpool.xyz/
Cminors' Pool http://newenglandcoin.cminors-pool.com/
SPOOL https://spools.online/
Exchange
📷
https://shorelinecrypto.com/
Features: anonymous sign up and trading. No restriction or limit on deposit or withdraw.
The trading pairs available: NewEnglandcoin (NENG) / Dogecoin (DOGE)
Trading commission: A round trip trading will incur 0.10% trading fees in average. Fees are paid only on buyer side. buy fee: 0.2% / sell fee: 0% Deposit fees: free for all coins Withdraw fees: ZERO per withdraw. Mining fees are appointed by each coin blockchain. To cover the blockchain mining fees, there is minimum balance per coin per account: * Dogecoin 2 DOGE * NewEnglandcoin 1 NENG
Latest News Aug 30, 2020 - NENG v1.4.0.5 Released for Android/Chromebook Upgrade with armhf, better hardware support https://bitcointalk.org/index.php?topic=5027091.msg55098029#msg55098029
Aug 11, 2020 - NENG v1.4.0.4 Released for Android arm64 Upgrade / Chromebook Support https://bitcointalk.org/index.php?topic=5027091.msg54977437#msg54977437
Jul 30, 2020 - NENG v1.4.0.3 Released for Linux Wallet Upgrade with 8 Distros https://bitcointalk.org/index.php?topic=5027091.msg54898540#msg54898540
Jul 21, 2020 - NENG v1.4.0.2 Released for MacOS Upgrade with Catalina https://bitcointalk.org/index.php?topic=5027091.msg54839522#msg54839522
Jul 19, 2020 - NENG v1.4.0.1 Released for MacOS Wallet Upgrade https://bitcointalk.org/index.php?topic=5027091.msg54830333#msg54830333
Jul 15, 2020 - NENG v1.4.0 Released for Android Mining, Ubuntu 20.04 support https://bitcointalk.org/index.php?topic=5027091.msg54803639#msg54803639
Jul 11, 2020 - NENG v1.4.0 Android Mining, randomSpike Evaluation https://bitcointalk.org/index.php?topic=5027091.msg54777222#msg54777222
Jun 27, 2020 - Pre-Announce: NENG v1.4.0 Proposal for Mobile Miner Upgrade, Android Mining Start in July 2020 https://bitcointalk.org/index.php?topic=5027091.msg54694233#msg54694233
Jun 19, 2020 - Best Practice for Futurebit Moonlander2 USB ASIC on solo mining mode https://bitcointalk.org/index.php?topic=5027091.msg54645726#msg54645726
Mar 15, 2020 - Scrypt RandomSpike - NENG v1.3.0.1 Released for better wallet syncing https://bitcointalk.org/index.php?topic=5027091.msg54030923#msg54030923
Feb 23, 2020 - Scrypt RandomSpike - NENG Core v1.3.0 Relased, Hardfork on Mar 1 https://bitcointalk.org/index.php?topic=5027091.msg53900926#msg53900926
Feb 1, 2020 - Scrypt RandomSpike Proposal Published- NENG 1.3.0 Hardfork https://bitcointalk.org/index.php?topic=5027091.msg53735458#msg53735458
Jan 15, 2020 - NewEnglandcoin Dev Team Expanded with New Kickoff https://bitcointalk.org/index.php?topic=5027091.msg53617358#msg53617358
Jan 12, 2020 - Explanation of Base Diff Reset and Effect of Supply https://www.reddit.com/NewEnglandCoin/comments/envmo1/explanation_of_base_diff_reset_and_effect_of/
Dec 19, 2019 - Shoreline_tradingbot version 1.0 is released https://bitcointalk.org/index.php?topic=5121953.msg53391184#msg53391184
Sept 1, 2019 - NewEnglandcoin (NENG) is Selected as Shoreline Tradingbot First Supported Coin https://bitcointalk.org/index.php?topic=5027091.msg52331201#msg52331201
Aug 15, 2019 - Mining Update on Effect of Base Difficulty Reset, GPU vs ASIC https://bitcointalk.org/index.php?topic=5027091.msg52169572#msg52169572
Jul 7, 2019 - CPU Mining on macOS Mojave is supported under latest Cheetah_Cpuminer Release https://bitcointalk.org/index.php?topic=5027091.msg51745839#msg51745839
Jun 1, 2019 - NENG Fiat project is stopped by Square, Inc https://bitcointalk.org/index.php?topic=5027091.msg51312291#msg51312291
Apr 21, 2019 - NENG Fiat Project is Launched by ShorelineCrypto https://bitcointalk.org/index.php?topic=5027091.msg50714764#msg50714764
Apr 7, 2019 - Announcement of Fiat Project for all U.S. Residents & Mobile Miner Project Initiation https://bitcointalk.org/index.php?topic=5027091.msg50506585#msg50506585
Apr 1, 2019 - Disclosure on Large Buying on NENG at ShorelineCrypto Exchange https://bitcointalk.org/index.php?topic=5027091.msg50417196#msg50417196
Mar 27, 2019 - Disclosure on Large Buying on NENG at ShorelineCrypto Exchange https://bitcointalk.org/index.php?topic=5027091.msg50332097#msg50332097
Mar 17, 2019 - Disclosure on Large Buying on NENG at ShorelineCrypto Exchange https://bitcointalk.org/index.php?topic=5027091.msg50208194#msg50208194
Feb 26, 2019 - Community Project - NewEnglandcoin Graphic Redesign Bounty Initiated https://bitcointalk.org/index.php?topic=5027091.msg49931305#msg49931305
Feb 22, 2019 - Dev Policy on Checkpoints on NewEnglandcoin https://bitcointalk.org/index.php?topic=5027091.msg49875242#msg49875242
Feb 20, 2019 - NewEnglandCoin v1.2.1 Released to Secure the Hard Kork https://bitcointalk.org/index.php?topic=5027091.msg49831059#msg49831059
Feb 11, 2019 - NewEnglandCoin v1.2.0 Released, Anti-51% Attack, Anti-instant Mining after Hard Fork https://bitcointalk.org/index.php?topic=5027091.msg49685389#msg49685389
Jan 13, 2019 - Cheetah_CpuMiner added support for CPU Mining on Mac https://bitcointalk.org/index.php?topic=5027091.msg49218760#msg49218760
Jan 12, 2019 - NENG Core v1.1.2 Released to support MacOS OSX Wallet https://bitcointalk.org/index.php?topic=5027091.msg49202088#msg49202088
Jan 2, 2019 - Cheetah_Cpuminer v1.1.0 is released for both Linux and Windows https://bitcointalk.org/index.php?topic=5027091.msg49004345#msg49004345
Dec 31, 2018 - Technical Whitepaper is Released https://bitcointalk.org/index.php?topic=5027091.msg48990334#msg48990334
Dec 28, 2018 - Cheetah_Cpuminer v1.0.0 is released for Linux https://bitcointalk.org/index.php?topic=5027091.msg48935135#msg48935135
Update on Dec 14, 2018 - NENG Blockchain Stuck Issue https://bitcointalk.org/index.php?topic=5027091.msg48668375#msg48668375
Nov 27, 2018 - Exclusive for PC CPU Miners - How to Steal a Block from ASIC Miners https://bitcointalk.org/index.php?topic=5027091.msg48258465#msg48258465
Nov 28, 2018 - How to CPU Mine a NENG block with window/linux PC https://bitcointalk.org/index.php?topic=5027091.msg48298311#msg48298311
Nov 29, 2018 - A Warning to ASIC Miners https://bitcointalk.org/index.php?topic=5027091.msg48324708#msg48324708
Disclosure: Dev Team Came from ShorelineCrypto, a US based Informatics Service Business offering Fee for service for Coin Creation, Coin Exchange Listing, Blockchain Consulting, etc.
submitted by honglu69 to NewEnglandCoin [link] [comments]

IoT Attacks, Hacker Motivations, and Recommended Countermeasures

IoT Attacks, Hacker Motivations, and Recommended Countermeasures


Illustration: © IoT For All
Businesses worldwide spent $1.5 billion on IoT security in 2019. When it comes to connecting devices via cellular IoT, the selling-point is typically the data and derived insights–this is where the customer sees real value, more so than in any security benefits. That said, IoT solution providers not taking security measures into consideration are risking significant revenue and reputation loss in the event of a security breach–both for their own business as well as their customer’s business.
In the worst cases, the harm done from one security breach will far outweigh any previously created customer value. IoT connectivity providers that can explain and demonstrate their security concepts will gain a competitive advantage.

Why Are Hackers Focused on IoT?

IoT attacks increased by 900% in 2019. So, why are hackers increasingly targeting IoT devices? There are several explanations:
  1. Lack of security software on the devices: Opposed to regular computers, IoT devices do not have a firewall or virus scanner.
  2. Less experienced device producers: The businesses usually come from the industry vertical and often are lacking the IT security expertise of servecomputer manufacturers.
  3. Multiple devices with the same security mechanisms: Once an attack works with one device it will work with thousands.
  4. IoT devices are out of reach: device owners deploy their machines remotely. Often an owner won’t realize that the devices have been compromised until it is too late. Once an attacker has control over a device, it could run all day long before being physically shut down by the owner.

Who Are the Attackers and What Motivates Them?

  • Amateur hackers and script kiddies – usually their objective is fame among their peers, either by targeting a high-profile victim or by demonstrating an ability to infect many devices in a single attack.
  • Governments/Intelligence organizations – acting in the safety of their citizens, intelligence agencies attempt to secure access to important information.
  • Political interest groups – they attack organizations that they think are morally corrupt. Examples are groups like anonymous.
  • Criminal businesses – organizations that take advantage of vulnerabilities within the target to generate revenue for themselves.
The criminal businesses mentioned above are typically set up as ordinary businesses and are especially relevant in the IoT domain. Their objective is to gain control over a large number of IoT devices and make money out of them, often in one of the following ways:
  • Selling Distributed Denial of Service attacks – like webstresser.org (more information via Forbes)
  • Using devices for Bitcoin mining (more information via CNBC)
  • Blocking the device operation until the owner pays a ransom (ransomware)

How Do IoT Attacks Work?

Mirai

The most common IoT attack today is the Mirai malware, which originated in 2016. The malware scans the public internet for IoT devices and tries to establish a remote telnet connection using a list of common factory default usernames and passwords. As soon as one device is infected, the malware begins scanning for more victims. All devices become part of the Mirai botnet which is then steered through the attacker’s command and control center. The attackers then execute a DDoS attack, on behalf of their customers, to a target destination in order to take down the servers of the victims.

Stuxnet

The Stuxnet computer worm was first uncovered in 2010. The malware first injects Microsoft Windows machines exploiting zero-day exploit or outdated OS versions; initially it spread over USB flash drives. On the Windows machine it looks for the Siemens Step7 software that controls the Siemens programmable logic controller (PLC). With the Step7 software it then installs itself on the IoT device and takes over control. Stuxnet once targeted Iranian facilities and reportedly severely harmed the Iranian atomic program.

Silex/Brickerbot

While Brickerbot was discovered in 2017 and Silex appeared in 2019, they have a common attack pattern. Like Mirai, the software scans the public internet and tries to log in to the IoT device with default and weak login and password combinations. After infection, the software overwrites all data and deletes the network configuration, which makes the IoT device unusable, unless someone can physically get a hand on the device.

Countermeasures to Guard Against Attacks

As seen in the Stuxnet attack, IoT devices in the same network as other machines can be impacted by the vulnerabilities of those other machines. To avoid this, using a dedicated network infrastructure is recommended, instead of using shared LAN or Wi-Fi networks. Alternatively, using cellular communication that separates the communication of the different machines is also preferred.
The Mirai and Silex / Brickerbot malware show the value of having random and unique log-in credentials for the different devices – this could have prevented the above-mentioned attack. While the devices allowed for remote access by their owners, the access was granted via the unsecured public internet. A more secure way to get remote access to IoT devices is to use IPSec or Intra-Cloud Connect, avoiding the exposure of public Internet.
One way to prevent attempts to steal remote access to IoT devices, as well as completely block attacks, is to use a cellular firewall. With a cellular firewall, devices are only permitted to communicate with a defined subset of IP addresses. The firewall itself is not located on the individual devices, rather on the cellular connection – out of the attacker’s control.

Key Takeaway: Security First

While the excitement surrounding the brimming potential of IoT connectivity is understandable–and warranted–overlooking IoT device security can prove catastrophic. A robustly secured IoT solution is one that can safely scale globally, enable groundbreaking solutions, and last for years to come.
Originally published by EMnify -| August 12, 2020 iot for all
submitted by kjonesatjaagnet to JAAGNet [link] [comments]

A Management game where you manage a Dedicated Server

Hello, I've been looking for a Management game where you Manage the Hardware/Network/ Infrastructure of a Dedicated Server, but the only thing i got close to this was "Startup Company" and Hardware it is not the main focus of it. The game is more like a "IDLE Tycoon" instead of a "Server Tycoon"
The closest i got was https://www.servertycoon.com/ however it was canceled.
There is also "Bitcoin Tycoon" on Steam, although the game is not focused only on Hardware, it has the type of gameplay i imagined. However the game is abandoned, and some people suspect it has a Bitcoin Mining Software...
EDIT: i did found https://haxor1337.itch.io/hardware-tycoon and "Computer Tycoon" on Steam, however i want something that focus more on the Hardware/Infrastructure part, not a "Cookie Clicker Incremental"
submitted by japa4551 to gamingsuggestions [link] [comments]

A Software Engineer's Explanation of Server Ticks/FPS, the Message Pump, and Server Meshing

Since people liked my last post about the SQ42 report, I thought I would do another about the recent comment about server ticks https://robertsspaceindustries.com/spectrum/community/SC/forum/50259/thread/end-goal-server-tick-rate/2872293
To understand how this works, you must first understand the Message Pump. This is basically the heart beat of an application. It is a loop from which there is no escape, so long as the application runs. All applications have an "entry point" that initially gets called. If you've ever taken Computer Science 101, it would be your "main" function. For a console application, you enter main, it does some things, and then when it leaves main, the application closes. In an application with a graphical user interface, that loop has to regularly call a Render or Draw function that draws the UI. This happens on the Render Thread. In a regular client application your Message Pump will look something like this:
while(IsApplicationRunning) { //loop while application is meant to run HandleKeyboardInputs(); //check to see if any keyboard events have occured HandleMouseInputs(); //check to see if any mouse events have occurred, hittest children HandleSizeChanges(); //check if the window has resized, resize children to fit Render(); //recursively render all child controls } 
Each function call within the loop will call entire hierarchies of functionality. This same basic principal applies to a server as well. I am using my imagination, as I have never audited the Star Citizen codebase, but its message pump would look something like
while(IsServerOnline) { //loop while server is meant to run HandleOrbitalRotation(); //update position of all planets around the sun HandleNPCRoutines(); //update position/animations of all NPCs SynchronizePlayerLocations(); //receive player location packets and update //internal locations CheckForIssues(); //check all object positions and ensure no conflicts UpdatePlayerLocations(); //send new location data of all objects to connected //players } 
This is only the most basic sort of functionality, that doesn't factor in things like Server Object Container Streaming or Meshing or object persistence.
Each iteration of the Message Pump is a frame. These frames are calculated by having a Stopwatch and taking averages of how long it takes each frame to complete across a defined sample size. If you have a target frame rate, like 30fps for instance, subroutines can be prioritized to try to either run on the current frame, or be skipped, based on how much load is put on the servers.
My current understanding, based on Star Citizen's published material, is that there is presently one server for every 50 players, and that server handles an entire star system. Having one server for every 50 players right now is fine, and that number can hopefully be increased as optimizations happen within the code.
The important part is modifying the server code so that they can separate different Object Containers to separate physical server hardware. This would allow them to, for instance, have one server, with its own message pump, handle Port Olisar, for up to 50 players. For v0 of server meshing, I would imagine that, when the 51st player comes to PO, they would have to spin up a new server for that person of PO, and they would be on their own. When the player count goes back below 50, that server can go back to sleep and is available to be repurposed for whatever other area needs it, dynamically. As players leave PO, and go into space, each part of space could have dedicated servers for that area. The same goes for planets, or cities. Each would be its own Object Container, each Object Container could contain smaller Object Containers, so that as players move around, servers would seamlessly spin up or down to host content for the players. Technically, one server could even host multiple separate Object Containers if they both have low player counts.
This would go a very long way towards making the universe feel full and connected. To start out with, you might still only find a maximum of 50 people on Daymar, but you might also find 50 people on Yela, or ArcCorp. Each place could be full, with the game client switching servers when going to different areas. Server Object Container Streaming is what enables this. It is just a matter of handling the trade off between servers, and keeping everything synchronized. I recognize that the posts that CIG makes on the subject are often hard to understand for laymen, but these posts make me feel confident that they are making progress and heading in a meaningful direction toward the end goal of having us seamlessly switch between servers on the fly.
One thing that I have no heard anything about is the transition towards specialized physical hardware for handling some of these large-scale server-side operations. If they are using regular CPU/GPU operations, performance could be *vastly* improved by creating FPGAs or ASICs that could perform calculations with greater alacrity than a GPU could ever hope to. This is the type of hardware used in medical devices, data centers, or bitcoin mining.
I wrote this up purely to help people understand some aspects of software engineer, and no part of it is meant to be so specific that you should interpret it to be exactly how something works. I am trying to provide a high level, easy to understand, idea of some very complex concepts.
If there is any other part of development that you would like me to comment on feel free to @ me with VerdantNonsense :) Stay safe out there.
submitted by VerdantNonsense to starcitizen [link] [comments]

DFINITY Research Report

DFINITY Research Report
Author: Gamals Ahmed, CoinEx Business Ambassador
ABSTRACT
The DFINITY blockchain computer provides a secure, performant and flexible consensus mechanism. At its core, DFINITY contains a decentralized randomness beacon, which acts as a verifiable random function (VRF) that produces a stream of outputs over time. The novel technique behind the beacon relies on the existence of a unique-deterministic, non-interactive, DKG-friendly threshold signatures scheme. The only known examples of such a scheme are pairing-based and derived from BLS.
The DFINITY blockchain is layered on top of the DFINITY beacon and uses the beacon as its source of randomness for leader selection and leader ranking. A “weight” is attributed to a chain based on the ranks of the leaders who propose the blocks in the chain, and that weight is used to select between competing chains. The DFINITY blockchain is layered on top of the DFINITY beacon and uses the beacon as its source of randomness for leader selection and leader ranking blockchain is further hardened by a notarization process which dramatically improves the time to finality and eliminates the nothing-at-stake and selfish mining attacks.
DFINITY consensus algorithm is made to scale through continuous quorum selections driven by the random beacon. In practice, DFINITY achieves block times of a few seconds and transaction finality after only two confirmations. The system gracefully handles temporary losses of network synchrony including network splits, while it is provably secure under synchrony.

1.INTRODUCTION

DFINITY is building a new kind of public decentralized cloud computing resource. The company’s platform uses blockchain technology which is aimed at building a new kind of public decentralized cloud computing resource with unlimited capacity, performance and algorithmic governance shared by the world, with the capability to power autonomous self-updating software systems, enabling organizations to design and deploy custom-tailored cloud computing projects, thereby reducing enterprise IT system costs by 90%.
DFINITY aims to explore new territory and prove that the blockchain opportunity is far broader and deeper than anyone has hitherto realized, unlocking the opportunity with powerful new crypto.
Although a standalone project, DFINITY is not maximalist minded and is a great supporter of Ethereum.
The DFINITY blockchain computer provides a secure, performant and flexible consensus mechanism. At its core, DFINITY contains a decentralized randomness beacon, which acts as a verifiable random function (VRF) that produces a stream of outputs over time. The novel technique behind the beacon relies on the existence of a unique-deterministic, non-interactive, DKG-friendly threshold signatures scheme. The only known examples of such a scheme are pairing-based and derived from BLS.
DFINITY’s consensus mechanism has four layers: notary (provides fast finality guarantees to clients and external observers), blockchain (builds a blockchain from validated transactions via the Probabilistic Slot Protocol driven by the random beacon), random beacon (provides the source of randomness for all higher layers like smart contract applications), and identity (provides a registry of all clients).
DFINITY’s consensus mechanism has four layers

Figure1: DFINITY’s consensus mechanism layers
1. Identity layer:
Active participants in the DFINITY Network are called clients. Where clients are registered with permanent identities under a pseudonym. Moreover, DFINITY supports open membership by providing a protocol for registering new clients by depositing a stake with an insurance period. This is the responsibility of the first layer.
2. Random Beacon layer:
Provides the source of randomness (VRF) for all higher layers including ap- plications (smart contracts). The random beacon in the second layer is an unbiasable, verifiable random function (VRF) that is produced jointly by registered clients. Each random output of the VRF is unpredictable by anyone until just before it becomes avail- able to everyone. This is a key technology of the DFINITY system, which relies on a threshold signature scheme with the properties of uniqueness and non-interactivity.

https://preview.redd.it/hkcf53ic05e51.jpg?width=441&format=pjpg&auto=webp&s=44d45c9602ee630705ce92902b8a8379201d8111
3. Blockchain layer:
The third layer deploys the “probabilistic slot protocol” (PSP). This protocol ranks the clients for each height of the chain, in an order that is derived determin- istically from the unbiased output of the random beacon for that height. A weight is then assigned to block proposals based on the proposer’s rank such that blocks from clients at the top of the list receive a higher weight. Forks are resolved by giving favor to the “heaviest” chain in terms of accumulated block weight — quite sim- ilar to how traditional proof-of-work consensus is based on the highest accumulated amount of work.
The first advantage of the PSP protocol is that the ranking is available instantaneously, which allows for a predictable, constant block time. The second advantage is that there is always a single highest-ranked client, which allows for a homogenous network bandwidth utilization. Instead, a race between clients would favor a usage in bursts.
4. Notarization layer:
Provides fast finality guarantees to clients and external observers. DFINITY deploys the novel technique of block notarization in its fourth layer to speed up finality. A notarization is a threshold signature under a block created jointly by registered clients. Only notarized blocks can be included in a chain. Of all RSA-based alternatives exist but suffer from an impracticality of setting up the thresh- old keys without a trusted dealer.
DFINITY achieves its high speed and short block times exactly because notarization is not full consensus.
DFINITY does not suffer from selfish mining attack or a problem nothing at stake because the authentication step is impossible for the opponent to build and maintain a series of linked and trusted blocks in secret.
DFINITY’s consensus is designed to operate on a network of millions of clients. To en- able scalability to this extent, the random beacon and notarization protocols are designed such as that they can be safely and efficiently delegated to a committee

1.1 OVERVIEW ABOUT DFINITY

DFINITY is a blockchain-based cloud-computing project that aims to develop an open, public network, referred to as the “internet computer,” to host the next generation of software and data. and it is a decentralized and non-proprietary network to run the next generation of mega-applications. It dubbed this public network “Cloud 3.0”.
DFINITY is a third generation virtual blockchain network that sets out to function as an “intelligent decentralised cloud,”¹ strongly focused on delivering a viable corporate cloud solution. The DFINITY project is overseen, supported and promoted by DFINITY Stiftung a not-for-profit foundation based in Zug, Switzerland.
DFINITY is a decentralized network design whose protocols generate a reliable “virtual blockchain computer” running on top of a peer-to-peer network upon which software can be installed and can operate in the tamperproof mode of smart contracts.
DFINITY introduces algorithmic governance in the form of a “Blockchain Nervous System” that can protect users from attacks and help restart broken systems, dynamically optimize network security and efficiency, upgrade the protocol and mitigate misuse of the platform, for example by those wishing to run illegal or immoral systems.
DFINITY is an Ethereum-compatible smart contract platform that is implementing some revolutionary ideas to address blockchain performance, scaling, and governance. Whereas
DFINITY could pose a credible threat to Ethereum’s extinction, the project is pursuing a coevolutionary strategy by contributing funding and effort to Ethereum projects and freely offering their technology to Ethereum for adoption. DFINITY has labeled itself Ethereum’s “crazy sister” to express it’s close genetic resemblance to Ethereum, differentiated by its obsession with performance and neuron-inspired governance model.
Dfinity raised $61 million from Andreesen Horowitz and Polychain Capital in a February 2018 funding round. At the time, Dfinity said it wanted to create an “internet computer” to cut the costs of running cloud-based business applications. A further $102 million funding round in August 2018 brought the project’s total funding to $195 million.
In May 2018, Dfinity announced plans to distribute around $35 million worth of Dfinity tokens in an airdrop. It was part of the company’s plan to create a “Cloud 3.0.” Because of regulatory concerns, none of the tokens went to US residents.
DFINITY be broadening and strengthening the EVM ecosystem by giving applications a choice of platforms with different characteristics. However, if DFINITY succeeds in delivering a fully EVM-compatible smart contract platform with higher transaction throughput, faster confirmation times, and governance mechanisms that can resolve public disputes without causing community splits, then it will represent a clearly superior choice for deploying new applications and, as its network effects grow, an attractive place to bring existing ones. Of course the challenge for DFINITY will be to deliver on these promises while meeting the security demands of a public chain with significant value at risk.

1.1.1 DFINITY FUTURE

  • DFINITY aims to explore new blockchain territory related to the original goals of the Ethereum project and is sometimes considered “Ethereum’s crazy sister.”
  • DFINITY is developing blockchain-based infrastructure to support a new style of the internet (akin to Ethereum’s “World Computer”), one in which the internet itself will support software applications and data rather than various cloud hosting providers.
  • The project suggests this reinvented software platform can simplify the development of new software systems, reduce the human capital needed to maintain and secure data, and preserve user data privacy.
  • Dfinity aims to reduce the costs of cloud services by creating a decentralized “internet computer” which may launch in 2020
  • Dfinity claims transactions on its network are finalized in 3–5 seconds, compared to 1 hour for Bitcoin and 10 minutes for Ethereum.

1.1.2 DFINITY’S VISION

DFINITY’s vision is its new internet infrastructure can support a wide variety of end-user and enterprise applications. Social media, messaging, search, storage, and peer-to-peer Internet interactions are all examples of functionalities that DFINITY plans to host atop its public Web 3.0 cloud-like computing resource. In order to provide the transaction and data capacity necessary to support this ambitious vision, DFINITY features a unique consensus model (dubbed Threshold Relay) and algorithmic governance via its Blockchain Nervous System (BNS) — sometimes also referred to as the Network Nervous System or NNS.

1.2 DFINITY COMMUNITY

The DFINITY community brings people and organizations together to learn and collaborate on products that help steward the next-generation of internet software and services. The Internet Computer allows developers to take on the monopolization of the internet, and return the internet back to its free and open roots. We’re committed to connecting those who believe the same through our events, content, and discussions.

https://preview.redd.it/0zv64fzf05e51.png?width=637&format=png&auto=webp&s=e2b17365fae3c679a32431062d8e3c00a57673cf

1.3 DFINITY ROADMAP (TIMELINE) February 15, 2017

February 15, 2017
Ethereum based community seed round raises 4M Swiss francs (CHF)
The DFINITY Stiftung, a not-for-profit foundation entity based in Zug, Switzerland, raised the round. The foundation held $10M of assets as of April 2017.
February 8, 2018
Dfinity announces a $61M fundraising round led by Polychain Capital and Andreessen Horowitz
The round $61M round led by Polychain Capital and Andreessen Horowitz, along with an DFINITY Ecosystem Venture Fund which will be used to support projects developing on the DFINITY platform, and an Ethereum based raise in 2017 brings the total funding for the project over $100 million. This is the first cryptocurrency token that Andressen Horowitz has invested in, led by Chris Dixon.
August 2018
Dfinity raises a $102,000,000 venture round from Multicoin Capital, Village Global, Aspect Ventures, Andreessen Horowitz, Polychain Capital, Scalar Capital, Amino Capital and SV Angel.
January 23, 2020
Dfinity launches an open source platform aimed at the social networking giants

2.DFINITY TECHNOLOGY

Dfinity is building what it calls the internet computer, a decentralized technology spread across a network of independent data centers that allows software to run anywhere on the internet rather than in server farms that are increasingly controlled by large firms, such as Amazon Web Services or Google Cloud. This week Dfinity is releasing its software to third-party developers, who it hopes will start making the internet computer’s killer apps. It is planning a public release later this year.
At its core, the DFINITY consensus mechanism is a variation of the Proof of Stake (PoS) model, but offers an alternative to traditional Proof of Work (PoW) and delegated PoS (dPoS) networks. Threshold Relay intends to strike a balance between inefficiencies of decentralized PoW blockchains (generally characterized by slow block times) and the less robust game theory involved in vote delegation (as seen in dPoS blockchains). In DFINITY, a committee of “miners” is randomly selected to add a new block to the chain. An individual miner’s probability of being elected to the committee proposing and computing the next block (or blocks) is proportional to the number of dfinities the miner has staked on the network. Further, a “weight” is attributed to a DFINITY chain based on the ranks of the miners who propose blocks in the chain, and that weight is used to choose between competing chains (i.e. resolve chain forks).
A decentralized random beacon manages the random selection process of temporary block producers. This beacon is a Variable Random Function (VRF), which is a pseudo-random function that provides publicly verifiable proofs of its outputs’ correctness. A core component of the random beacon is the use of Boneh-Lynn-Shacham (BLS) signatures. By leveraging the BLS signature scheme, the DFINITY protocol ensures no actor in the network can determine the outcome of the next random assignment.
Dfinity is introducing a new standard, which it calls the internet computer protocol (ICP). These new rules let developers move software around the internet as well as data. All software needs computers to run on, but with ICP the computers could be anywhere. Instead of running on a dedicated server in Google Cloud, for example, the software would have no fixed physical address, moving between servers owned by independent data centers around the world. “Conceptually, it’s kind of running everywhere,” says Dfinity engineering manager Stanley Jones.
DFINITY also features a native programming language, called ActorScript (name may be subject to change), and a virtual machine for smart contract creation and execution. The new smart contract language is intended to simplify the management of application state for programmers via an orthogonal persistence environment (which means active programs are
not required to retrieve or save their state). All ActorScript contracts are eventually compiled down to WebAssembly instructions so the DFINITY virtual machine layer can execute the logic of applications running on the network. The advantage of using the WebAssembly standard is that all major browsers support it and a variety of programming languages can compile down to Wasm (not just ActorScript).
Dfinity is moving fast. Recently, Dfinity showed off a TikTok clone called CanCan. In January it demoed a LinkedIn-alike called LinkedUp. Neither app is being made public, but they make a convincing case that apps made for the internet computer can rival the real things.

2.1 DFINITY CORE APPLICATIONS

The DFINITY cloud has two core applications:
  1. Enabling the re-engineering of business: DFINITY ambitiously aims to facilitate the re-engineering of mass-market services (such as Web Search, Ridesharing Services, Messaging Services, Social Media, Supply Chain, etc) into open source businesses that leverage autonomous software and decentralised governance systems to operate and update themselves more efficiently.
  2. Enable the re-engineering of enterprise IT systems to reduce costs: DFINITY seeks to re-engineer enterprise IT systems to take advantage of the unique properties that blockchain computer networks provide.
At present, computation on blockchain-based computer networks is far more expensive than traditional, centralised solutions (Amazon Web Services, Microsoft Azure, Google Cloud Platform, etc). Despite increasing computational cost, DFINITY intends to lower net costs “by 90% or more” through reducing the human capital cost associated with sustaining and supporting these services.
Whilst conceptually similar to Ethereum, DFINITY employs original and new cryptography methods and protocols (crypto:3) at the network level, in concert with AI and network-fuelled systemic governance (Blockchain Nervous System — BNS) to facilitate Corporate adoption.
DFINITY recognises that different users value different properties and sees itself as more of a fully compatible extension of the Ethereum ecosystem rather than a competitor of the Ethereum network.
In the future, DFINITY hopes that much of their “new crypto might be used within the Ethereum network and are also working hard on shared technology components.”
As the DFINITY project develops over time, the DFINITY Stiftung foundation intends to steadily increase the BNS’ decision-making responsibilities over time, eventually resulting in the dissolution of its own involvement entirely, once the BNS is sufficiently sophisticated.
DFINITY consensus mechanism is a heavily optimized proof of stake (PoS) model. It places a strong emphasis on transaction finality through implementing a Threshold Relay technique in conjunction with the BLS signature scheme and a notarization method to address many of the problems associated with PoS consensus.

2.2 THRESHOLD RELAY

As a public cloud computing resource, DFINITY targets business applications by substantially reducing cloud computing costs for IT systems. They aim to achieve this with a highly scalable and powerful network with potentially unlimited capacity. The DFINITY platform is chalk full of innovative designs and features like their Blockchain Nervous System (BNS) for algorithmic governance.
One of the primary components of the platform is its novel Threshold Relay Consensus model from which randomness is produced, driving the other systems that the network depends on to operate effectively. The consensus system was first designed for a permissioned participation model but can be paired with any method of Sybil resistance for an open participation model.
“The Threshold Relay is the mechanism by which Dfinity randomly samples replicas into groups, sets the groups (committees) up for threshold operation, chooses the current committee, and relays from one committee to the next is called the threshold relay.”
Threshold Relay consists of four layers (As mentioned previously):
  1. Notary layer, which provides fast finality guarantees to clients and external observers and eliminates nothing-at-stake and selfish mining attacks, providing Sybil attack resistance.
  2. Blockchain layer that builds a blockchain from validated transactions via the Probabilistic Slot Protocol driven by the random beacon.
  3. Random beacon, which as previously covered, provides the source of randomness for all higher layers like the blockchain layer smart contract applications.
  4. Identity layer that provides a registry of all clients.

2.2.1 HOW DOES THRESHOLD RELAY WORK?

Threshold Relay produces an endogenous random beacon, and each new value defines random group(s) of clients that may independently try and form into a “threshold group”. The composition of each group is entirely random such that they can intersect and clients can be presented in multiple groups. In DFINITY, each group is comprised of 400 members. When a group is defined, the members attempt to set up a BLS threshold signature system using a distributed key generation protocol. If they are successful within some fixed number of blocks, they then register the public key (“identity”) created for their group on the global blockchain using a special transaction, such that it will become part of the set of active groups in a following “epoch”. The network begins at “genesis” with some number of predefined groups, one of which is nominated to create a signature on some default value. Such signatures are random values — if they were not then the group’s signatures on messages would be predictable and the threshold signature system insecure — and each random value produced thus is used to select a random successor group. This next group then signs the previous random value to produce a new random value and select another group, relaying between groups ad infinitum and producing a sequence of random values.
In a cryptographic threshold signature system a group can produce a signature on a message upon the cooperation of some minimum threshold of its members, which is set to 51% in the DFINITY network. To produce the threshold signature, group members sign the message
individually (here the preceding group’s threshold signature) creating individual “signature shares” that are then broadcast to other group members. The group threshold signature can be constructed upon combination of a sufficient threshold of signature shares. So for example, if the group size is 400, if the threshold is set at 201 any client that collects that many shares will be able to construct the group’s signature on the message. Other group members can validate each signature share, and any client using the group’s public key can validate the single group threshold signature produced by combining them. The magic of the BLS scheme is that it is “unique and deterministic” meaning that from whatever subset of group members the required number of signature shares are collected, the single threshold signature created is always the same and only a single correct value is possible.
Consequently, the sequence of random values produced is entirely deterministic and unmanipulable, and signatures generated by relaying between groups produces a Verifiable Random Function, or VRF. Although the sequence of random values is pre-determined given some set of participating groups, each new random value can only be produced upon the minimal agreement of a threshold of the current group. Conversely, in order for relaying to stall because a random number was not produced, the number of correct processes must be below the threshold. Thresholds are configured so that this is extremely unlikely. For example, if the group size is set to 400, and the threshold is 201, 200 or more of the processes must become faulty to prevent production. If there are 10,000 processes in the network, of which 3,000 are faulty, the probability this will occur is less than 10e-17.

2.3 DFINITY TOKEN

The DFINITY blockchain also supports a native token, called dfinities (DFN), which perform multiple roles within the network, including:
  1. Fuel for deploying and running smart contracts.
  2. Security deposits (i.e. staking) that enable participation in the BNS governance system.
  3. Security deposits that allow client software or private DFINITY cloud networks to connect to the public network.
Although dfinities will end up being assigned a value by the market, the DFINITY team does not intend for DFN to act as a currency. Instead, the project has envisioned PHI, a “next-generation” crypto-fiat scheme, to act as a stable medium of exchange within the DFINITY ecosystem.
Neuron operators can earn Dfinities by participating in network-wide votes, which could be concerning protocol upgrades, a new economic policy, etc. DFN rewards for participating in the governance system are proportional to the number of tokens staked inside a neuron.

2.4 SCALABILITY

DFINITY is constantly developing with a structure that separates consensus, validation, and storage into separate layers. The storage layer is divided into multiple strings, each of which is responsible for processing transactions that occur in the fragment state. The verification layer is responsible for combining hashes of all fragments in a Merkle-like structure that results in a global state fractionation that is stored in blocks in the top-level chain.

2.5 DFINITY CONSENSUS ALGORITHM

The single most important aspect of the user experience is certainly the time required before a transaction becomes final. This is not solved by a short block time alone — Dfinity’s team also had to reduce the number of confirmations required to a small constant. DFINITY moreover had to provide a provably secure proof-of-stake algorithm that scales to millions of active participants without compromising any bit on decentralization.
Dfinity soon realized that the key to scalability lay in having an unmanipulable source of randomness available. Hence they built a scalable decentralized random beacon, based on what they call the Threshold Relay technique, right into the foundation of the protocol. This strong foundation drives a scalable and fast consensus layer: On top of the beacon runs a blockchain which utilizes notarization by threshold groups to achieve near-instant finality. Details can be found in the overview paper that we are releasing today.
The roots of the DFINITY consensus mechanism date back to 2014 when thair Chief Scientist, Dominic Williams, started to look for more efficient ways to drive large consensus networks. Since then, much research has gone into the protocol and it took several iterations to reach its current design.
For any practical consensus system the difficulty lies in navigating the tight terrain that one is given between the boundaries imposed by theoretical impossibility-results and practical performance limitations.
The first key milestone was the novel Threshold Relay technique for decentralized, deterministic randomness, which is made possible by certain unique characteristics of the BLS signature system. The next breakthrough was the notarization technique, which allows DFINITY consensus to solve the traditional problems that come with proof-of-stake systems. Getting the security proofs sound was the final step before publication.
DFINITY consensus has made the proper trade-offs between the practical side (realistic threat models and security assumptions) and the theoretical side (provable security). Out came a flexible, tunable algorithm, which we expect will establish itself as the best performing proof-of-stake algorithm. In particular, having the built-in random beacon will prove to be indispensable when building out sharding and scalable validation techniques.

2.6 LINKEDUP

The startup has rather cheekily called this “an open version of LinkedIn,” the Microsoft-owned social network for professionals. Unlike LinkedIn, LinkedUp, which runs on any browser, is not owned or controlled by a corporate entity.
LinkedUp is built on Dfinity’s so-called Internet Computer, its name for the platform it is building to distribute the next generation of software and open internet services.
The software is hosted directly on the internet on a Switzerland-based independent data center, but in the concept of the Internet Computer, it could be hosted at your house or mine. The compute power to run the application LinkedUp, in this case — is coming not from Amazon AWS, Google Cloud or Microsoft Azure, but is instead based on the distributed architecture that Dfinity is building.
Specifically, Dfinity notes that when enterprises and developers run their web apps and enterprise systems on the Internet Computer, the content is decentralized across a minimum of four or a maximum of an unlimited number of nodes in Dfinity’s global network of independent data centers.
Dfinity is an open source for LinkedUp to developers for creating other types of open internet services on the architecture it has built.
“Open Social Network for Professional Profiles” suggests that on Dfinity model one can create “Open WhatsApp”, “Open eBay”, “Open Salesforce” or “Open Facebook”.
The tools include a Canister Software Developer Kit and a simple programming language called Motoko that is optimized for Dfinity’s Internet Computer.
“The Internet Computer is conceived as an alternative to the $3.8 trillion legacy IT stack, and empowers the next generation of developers to build a new breed of tamper-proof enterprise software systems and open internet services. We are democratizing software development,” Williams said. “The Bronze release of the Internet Computer provides developers and enterprises a glimpse into the infinite possibilities of building on the Internet Computer — which also reflects the strength of the Dfinity team we have built so far.”
Dfinity says its “Internet Computer Protocol” allows for a new type of software called autonomous software, which can guarantee permanent APIs that cannot be revoked. When all these open internet services (e.g. open versions of WhatsApp, Facebook, eBay, Salesforce, etc.) are combined with other open software and services it creates “mutual network effects” where everyone benefits.
On 1 November, DFINITY has released 13 new public versions of the SDK, to our second major milestone [at WEF Davos] of demoing a decentralized web app called LinkedUp on the Internet Computer. Subsequent milestones towards the public launch of the Internet Computer will involve:
  1. On boarding a global network of independent data centers.
  2. Fully tested economic system.
  3. Fully tested Network Nervous Systems for configuration and upgrades

2.7 WHAT IS MOTOKO?

Motoko is a new software language being developed by the DFINITY Foundation, with an accompanying SDK, that is designed to help the broadest possible audience of developers create reliable and maintainable websites, enterprise systems and internet services on the Internet Computer with ease. By developing the Motoko language, the DFINITY Foundation will ensure that a language that is highly optimized for the new environment is available. However, the Internet Computer can support any number of different software frameworks, and the DFINITY Foundation is also working on SDKs that support the Rust and C languages. Eventually, it is expected there will be many different SDKs that target the Internet Computer.
Full article
submitted by CoinEx_Institution to u/CoinEx_Institution [link] [comments]

Free security-aware server monitoring for a couple of servers

Searching this forum did not give me anything promising, so here I go with my question: I managed to get 2 of my servers compromised last week, one with a bitcoin mining malware, and another with something that maxxing out my outgoing bandwidth, perhaps a DDOS bot. Luckily, both would have been caught by a simple look at the graphs, if I had any server graphs! It turned out even removing the malware was tough, too tough for clamav (yes, I also did not have backups, but in my defense this would require "bare metal restore" which may not be so simple on the free).
Anyway, now I want to dedicate one of my servers to monitoring the others, so far I came up with Zabbix and the Vulners plugin, free for up to 10 servers, as a good setup. I could not find any "heuristic" security system, that would for example alert me if I suddenly started serving gigabytes to addresses I never had contact before. Is this a gap in the "free" market, or is it just me? Finally I did not mean to ask about backup here, but if some setup would allow me to do bare metal recovery as well, that would be even better. I may be wrong but Bacula seemed not to do bare metal with their free product, while Veeam offers something they call recovery media but I haven't been able to figure out if there is some dependency on a pay product or not. Thanks folks!
submitted by anakatal to sysadmin [link] [comments]

Diamond in the rough forks to Blockcore tech. Solid 10x short term.

Meet x42 Protocol, the feeless blockchain that will allow anyone to host decentralized applications the easy way.
X42 Protocol Price $0.01275764
Market Cap $247,173 (May 27, 2020)
Explorer: https://explorer.x42.tech/
Website: https://www.x42.tech/
x42 is a decentralized cryptocurrency based on the Blockcore technology designed to be a multi-chain solution for DApps (decentralized applications) that allows for a range that goes anywhere from small indie developed games to large entrepreneurial projects that span dozens of facilities.
The main idea behind x42 is to be a scalable, on-chain solution for any developer that wants to launch games and applications in general with minimal initial investment, zero transaction fees and near infinite scalability.
The protocol works around a main blockchain which hosts all the x42 coins and three types of nodes. Side blockchains can be created at will by the developers that decide to use the x42 protocol to launch their projects, side blockchains are very flexible and allow for a great deal of customization.
The main blockchain of the x42 protocol will have a maximum total of forty-two million coins mined into existence by the year 2030. The coins follow the same rules as most cryptocurrencies, every transaction is final, timestamped and will be registered to the blockchain ledger, blockchain explorers can be used to browse any and all transactions
Every project can have its own side blockchain, in which the development team can fully test and experiment on before going live to the store, because of that need all side blockchains have access to individual testnets.
FM Interview with developer:
The workpaper talks about using Stratis technology - Many say this is soon to be defunct?
It does, the current WP is the 1st itteration, we have a 2.0 that will be released when the servers go online.
However in Dec 2019, we have switched to Blockcore as Stratis had too many limitations that didn't meet our needs without heavy modifications. We did start with stratis as the basic framework, but we modified all of the code thus far to meet the needs we have. x42 is not stratis, but did start with some of their code.
The switch to blockcore is really more of a code thing and not otherwise noticed on the user end. There has been some but not a significant amount of discussion about it. Anyone that does access the new beta will be able to notice the difference as it nolonger will say stratis anywhere. On the user end, some file structures may change with mention of blockcore.
Blockcore is a fork of Stratis, however the cool thing is that it isnt its own project.
More details:
https://www.blockcore.net/ is an open source project started by a group of blockchain developers and engineers to realize a fully integrated platform for building custom blockchains.
Blockcore is the foundation for realizing blockchains and includes core functionality to create your own custom blockchain with a lot of tooling supporting your blockchain.
So its been 18 months of development? When will we say a mainnet?
We are currently in testnet and close to 90% ready. Xservers should be released this year. However we are not working on a timeline for mainnet with dates at the moment. Deadlines produce inferior products. The new wallet (xCore) has passed and is ready, it will work alongside the xServer. The switch to blockcore did require some code changes and we are still working with blockcore to fine tune some issues in their code as well. Security and ease of use for the end user are required.
What about use of dapps in beta?
We have a few in progress, but there are not many as the parameters can be changing. Although, anyone that can code a dapp in c# could drop it into their app folder and have one right now. There just won't be the user interface on the current wallet or the server support yet.
Why did you call it x42?
X has always been the universal unknown in mathematics, which can also mean ‘anything.’
X is believed to have come from the arab letter shin (ش),
that was initially used by spanish scholars because of their inability to translate certain arabic sounds into the spanish language, so it became a synonym for an unknown thing. From there on it was noticed that the spanish language didn’t have an appropriate sound for the arabic ‘sh.’ As time passed it was adapted into the ‘ck’ sound, which in classic greek is written down with a symbol known as chi (X). 42 is known to Douglas Adams’ The Hitchhiker’s Guide to the Galaxy readers as the ‘answer to the ultimate question of life, the universe, and everything’. We believe that x42 can offer a great answer to most questions plaguing the cryptocurrency space at the moment and in the future. That mix of an unknown and an answer is where our name got its origin.
The techy Details:
The two main levels of the x42 architecture are:
xCore – This is responsible for interacting with the infrastructure and the interface layers in addition to the node policy layers. An x42 xCore full node handles all the APIs and user interfaces.
NBitcoin – This is responsible for handling messages between nodes in the Network Layer. It also bridges the gap between various Consensus Layer functions.
Higher Transaction Speed: Transaction on the x42 blockchain platform happens almost instantly under 60 seconds. Also, the main x42 blockchain supports around 70 transactions per second. This is nearly 10 times the transactions supported by the Bitcoin blockchain network. Additionally, the good thing is the x42 side blockchains can be edited to hold as many transactions-per-second (TPS) as the developers want.
Understanding xCore, xServer, and Wallets
xCore – An xCore node is basically a device with software that has the entire x42 blockchain saved and connects the main blockchain to the side blockchains. This node seeds the main and side blockchain to all users and also has all the functionalities of a client node. Client node is any client running a wallet connected to the x42 main blockchain network.
As explained in the white-paper, “The xCore can stake coins on the main blockchain, it can also run decentralised applications hosted on xServers all across the network after having it installed on the local machine”.
xServer – The x42 blockchain supports several different types of servers. xServer is a special sort of wallet that runs on dedicated hardware facilitates decentralisation of applications (DApps), processing and data storage.
xServers are also tasked with other activities on the network like propagating smart contracts and signing transactions. It also allows the server owner (the Gatekeeper) to get paid for hosting diverse applications.
Besides, xServers can choose to host the projects launched on any of the non-private side blockchains. Projects that share a considerable part of their revenues with the xServer owners are likely to get hosted quickly and maintained by the same servers for a longer period of time.
Before we understand xServer wallets, let’s brief about the Hot Wallet and Cold Wallets.
A hot wallet is an online wallet always connected to the internet. This is an instant point-of-contact for receiving and sending payments. The hot wallets receive the staking rewards along with payouts from DApps, side blockchain, smart contracts, and private transactions.
A cold wallet is an offline wallet and more secure from the hot wallet as it is less susceptible to online attacks. This wallet holds the collateral for the server. All the server rewards are paid out to the cold storage wallet.
Coming to the xServer wallets, these are basically software holding information for both hot and cold storage wallets. The xServer wallets can run on almost any operating system. They can also host and launch decentralised applications (DApps) and generate passive income by DApp hosting.
Nice article..
https://medium.com/the-consensus/x42-protocol-not-just-another-pos-mn-project-d8dd73e8846d
submitted by AlfredGemLord to CryptoMoonShots [link] [comments]

Currency-mining.com Review: 0.5%-2.5% daily for 12-24 months

Currency-mining.com is a high yield investment program which provides long term deposit plans. It started on 30th Apr 2020, and the minimum deposit amount is only $10. The admin bought Standard listing on my website four days ago. My former withdrawal requests are all processed instantly into my PerfectMoney wallet. Now let me introduce it to you.
Started: 30th April 2020
Investment Plans
(1) Deposit 10–499 dollars, earn 0.5% daily for 12 months and principal of deposit is returned at the end
(2) Deposit 500–4999 dollars, earn 1.5% daily for 18 months and principal of deposit is returned at the end
(3) Deposit 5000–10000 dollars, earn 2.5% daily for 24 months and principal of deposit is returned at the end
These are all the plans Currency-mining.com provides. Let me take the second plan for example: if you deposit $500, then you can earn $7.5 per day and $225 per month. At the end of 18 months, you will earn $4050 profits with your initial deposits($500), totally $4550. Profit is paid daily and you can withdraw it from your account at any time.
According to the FAQ page, early contract termination is possible only after the mandatory hold term (180 days). You will get 50% of the funds deposited.
Referral Commissions
Currency-mining.com provides 5 level referral commissions for its promoters. And you can earn 5%, 3%, 2%, 1% and 0.5% from your team members’ deposits. You don’t need a deposit to participate in the partner program. So you can only invite friends, family members, colleagues, and earn up to 11.5% of all the purchases of your partners! Share the link and make money!
If you register and invest from my personal link, then welcome to submit RCB request at top of my website. I will give 5% of your deposits back to your wallet.
Payment Options
Currency-mining.com accepts PerfectMoney, Payeer, Bitcoin, Ethereum, YandexMoney, Qiwi and Russian Bank Card.
Withdrawal Type
It takes 30 seconds to transfer funds to any payment system. If you did not receive money within 15 minutes, firstly, check that your wallet ID is correct in Settings. If your wallet ID is correct, send a message to admin, with time, date, and transaction sum to check the payment.
Domain Registration
Domain Time: 2020/02/24–2021/02/24
IP Location: Belize — Belize City — Ddos-guard Corp.
IP Address: 190.115.30.156 is hosted on a dedicated server
ASN: AS262254 DDOS-GUARD CORP., BZ (registered Dec 05, 2012)
More Information
Currency-mining.com runs its website on an original designed template, and admin registered UK company certificate with registration number 07132418. There is also a video review on its homepage and you can click to watch if interested. Currently, Currency-mining.com supports 4 languages, including English, Russian, German and Uzbek. For more information about Currency-mining.com, you can follow their social accounts at the bottom of their website, including Telegram, VK and Youtube.
Register: https://currency-mining.com/ref/hyiper
Come From: https://www.hyiper.net/blog/177.html
submitted by vipinvestor1988 to u/vipinvestor1988 [link] [comments]

Numbers on the screen or how digital payment systems make the market fair?

Numbers on the screen or how digital payment systems make the market fair?

https://preview.redd.it/6m1gp2mvotx41.png?width=1160&format=png&auto=webp&s=a83f0346d8008c17968d6a240cfba8fe3fe4e2aa
Continuing the trend of practicality characteristic of the XXI century, paper money is gradually disappearing from our lives, giving way to more practical digital storage. However, the digitized banking that we now use every day is still far from perfect. For starters, it is completely controlled by third parties. No one owns the numbers they see on the screen — control is entirely owned by third parties, such as banks.
Banks create money out of thin air, and credit is a prime example of this. Money is no longer printed when someone takes out an overdraft or mortgage-it is simply created out of nothing. Moreover, these banks charge disproportionately high fees for the services they provide, and these services are outdated and impractical today.
For example, it is impractical to pay a Commission to spend your money abroad, as it is impractical to wait a few days to verify the transfer of a small amount from You to your relative. All this makes no sense in the interconnected and instantaneous world in which We live today.
Thus, the monetary system has ceased to be practical, it is replaced by a higher form of value storage. In this particular case, it is replaced by a faster and safer system that eliminates expensive operations and gives control to the person.
https://i.redd.it/quc2bgmxotx41.gif
Money that you have in your Bank account can be considered a virtual currency since it does not have a physical form and exists only in the Bank book. If they lose the book, your money will simply disappear. These are just numbers that you see on the screen. The numbers are stored on the hard drives of Bank servers.

https://i.redd.it/4nvhydtzotx41.gif
Do you open a regular app and think you have money? They are just bytes of the computer system. Today’s global payment infrastructure moves money from one payment system to another through a series of internal Deposit transfers between financial institutions. Since these transfers occur in different systems with a low level of coordination, the calculation of funds is slow, often 3–5 days, capturing liquidity.

How do payments work?

When you make a money transfer, for example, from your Bank card to the Bank card of a friend or acquaintance, you see an instant transfer, so to speak, moving numbers from you to the Recipient. For the user, the transfer is carried out instantly, and the exchange of obligations between the participants of the process takes place within 3–7 days, the User does not know about it and hardly ever thinks about it.

https://preview.redd.it/rl4aai81ptx41.png?width=1400&format=png&auto=webp&s=cdfa10f0d68442aac84c14e3bae5a52e92651878
When you make a payment at a supermarket or any other point of sale, at the time of payment, information from the POS-terminal is sent to the acquiring Bank — then the acquiring Bank sends a request that passes through the payment system (Visa or MasterCard) and then transmitted to Your Bank, which confirms the operation. At this point, there is no write-off of funds. The funds are temporarily held, and the actual withdrawal will take place within a few days, the maximum processing time is up to 30 days.
https://i.redd.it/8njxgxq2ptx41.gif

Currency transactions and payments abroad

You may have noticed that after making a transaction in a different currency, such as yen or dirhams, or any other currency that differs from the currency of your account or buying an item abroad, the amount charged may differ from the amount that was reflected immediately after payment.

Why is this happening?

As soon As you have made a transaction with Your Bank card — the local Bank transfers the information to the payment system: Visa or MasterCard — the payment system converts the currency used into the billing currency.
Billing currency — the currency that will be used for payment with the payment system by your Bank that issued the card. For the US, the billing currency is the dollar, in Europe — the Euro.
The billing currency may also differ depending on the issuing Bank — the Bank that issued your debit card. For example, some banks use the billing currency — Euro when making payments with MasterCard cards in the United States, which will lead to additional costs when converting euros into dollars.
If the payment is in other currencies, the payment scheme will become more complicated and, accordingly, its cost will be more expensive. The transfer rate from one settlement currency to another is set by the payment system: Visa and MasterCard.
If the currency of your Bankcard is the same as the currency of the payment system, the payment will take place without additional operations. For example, You have a dollar card, you make a payment in dollars in the United States, and if you make a payment with a dollar card in Europe, your Bank will convert the amount at its exchange rate, which will lead to additional costs. There are exceptions, some European banks can use dollars for settlements, but this is more an exception than a rule.
Also, if, for example, you pay for purchases in China using a Bank card in euros, then double conversion is inevitable.
Thus, payment in dollars is universal all over the world, except for the European Union countries. The dollar is a global currency and is therefore often used for binding in international settlements.
Now we understand that due to differences in the account currency and the differences in the VISA or MasterCard payment system, additional conversions may occur, which will lead to additional bank fees. as a result, the actual payment amount will differ from the amount debited from your card.
In addition to paying for conversion in the payment system and paying for currency conversion in your Bank, some banks charge an additional fee for conducting a cross-border transaction.

Where do we lose money when making debit card payments?


https://i.redd.it/tykhrd56ptx41.gif
  1. Currency conversion by the payment system;
  2. Euro-Dollar, or in the case of processing payment via MasterCard in Turkey, Turkish lira-Euro and additional conversion on the side of the issuing Bank (your Bank) Euro — Dollar.
  3. Currency conversion by an acquiring bank;
  4. The difference between the exchange rate on the purchase date and the write-off date. We purchased at a rate of 0.91 euros per dollar, and the write-off occurred at a rate of 0.94 euros per dollar.
  5. A large number of currency conversions.
  6. The greater the number of them, the more we will lose when buying. For example, when paying in the UAE or China, buying a product for the local currency, we understand that the number of conversions increases several times.
If we touch on the topic of international translations, we will encounter additional nuances:
  • This is the payment processing time. International payments can be processed within 3–5 days, as mentioned above, which in our dynamic time — it interferes with the comfortable use of the system.
  • Restrictions on the amounts;
  • Possible requirements for certain documentation for payment confirmation;
  • Additional fees and commissions, sometimes hidden fees.
It is not always possible to make a transfer quickly and when necessary due to these restrictions. All this confirms the complexity of the operations and additional commissions that the user pays.

Сryptocurrency exchanges

And now back to the numbers on the screen, this topic affects not only banks but also centralized cryptocurrency exchanges:
  • You top up your Deposit on the exchange in cryptocurrency-then you use numbers inside the exchange, and real funds are most often stored on “cold storage” for which administrators or other responsible persons are responsible.
  • Only when you make a withdrawal from the exchange to your wallet-you are sent real funds (tokens or cryptocurrency).
The same applies to centralized applications and online services that deal with cryptocurrencies:
There are many services, both online and apps, that are centralized, regardless of what they will be called: Bitcoin wallet or bitcoin exchange. This means that when you add funds to an account in such a wallet, the funds are stored on the developecompany’s side. In simple words, all your funds are stored in the wallets of the system’s creators.
If you use a centralized app, you have a risk of losing funds. Although the application is called cryptocurrency, it does not affect its main principles — it is decentralization.
In other words, using systems where there is a Central authority, especially in the cryptocurrency market — the risk increases, so we recommend using decentralized systems for storing currency to reduce risks to a minimum.
Decentralization is the process of redistributing, dispersing functions, forces, power, people, or things from a Central location or governing body. Centralization is a condition in which the right to make the most important decisions remains with the highest levels of management.

Peer-to-peer payment systems

The opposite and standard of security and independence are peer-to-peer payment systems. Using the application-level network Protocol, clients running on multiple computers connect to form a peer-to-peer network.

https://preview.redd.it/ojcg4fz7ptx41.png?width=601&format=png&auto=webp&s=6cc81d1617b0cb64a3f5c7cc6d06a78354386f8c
There are no dedicated servers in such a network, and each node is both a client and performs server functions. In contrast to the client-server architecture, this organization allows you to maintain the network operability with any number and any combination of available nodes. All nodes are members of the network.

https://preview.redd.it/npttc3a9ptx41.png?width=1000&format=png&auto=webp&s=0f2dee1e5b19436a847dca96e2b3b7f22b801b57
Tkeycoin is a decentralized peer-to-peer payment system based on p2p principles and the concept of electronic cash. P2P technology is a fairer means of mutual settlements between users and companies around the world. Modern payment systems are imperfect and may depend on the will of high-ranking officials.
The main goal of Tkeycoin is to create universal products that will make financial transactions more accessible, profitable and secure.

https://i.redd.it/gk6j0m9bptx41.gif

What do decentralized systems protect against?

Using decentralized tools, for example, a local Tkeycoin wallet or a Multi-currency blockchain tkeyspace wallet — Your funds belong only to You and only You can use them, which eliminates the risks of third-party bankruptcy, and such a decentralized architecture can also protect against natural disasters. Given that there is no central server that can be damaged in a natural disaster, the system can work even if there are 2 nodes.

https://i.redd.it/sb6i2ladptx41.gif
In addition to force majeure situations, you protect your funds from theft and any sanctions from third parties-in our time, this is very important. The owner of Tkeycoin does not need Bank branches, does not need additional verifications, and does not need permission to use, transfer, or even transport Tkeycoin. You can easily carry $1 million worth of Tkeycoin in your pocket and even in theory not know any troubles.

https://preview.redd.it/uvw9vfyeptx41.png?width=1400&format=png&auto=webp&s=14b89acca3568fdc5eb82d986aaa2710219ced91
Besides, it is extremely convenient and safe to store even multibillion-dollar capital in Tkeycoin. Imagine that you have a lot, a lot of money, and you need a safe place to store it. Where do you apply? Of course, the Swiss Bank, Yes, but it can easily freeze your accounts and you can easily lose your savings. In recent years, many banks are actively fighting against gray non-cash funds (including offshore ones), and every month more and more legal proceedings are organized on this basis.

https://preview.redd.it/vodiuq5gptx41.png?width=1400&format=png&auto=webp&s=31ab44da4431b0159ef1213db7e37c6fd92d5b0a
The fact is that serious money, for the most part, has a gray tinge, and only a tiny fraction of billions and millions are clean for the law. That is why their owners are often called to court, subjected to pressure, forced to leave the country, and so on. If your money is stored in Tkeycoin, you will not be subjected to such pressure and will avoid the lion’s share of troubles that usually accompany accounts with many zeros.
Using peer-to-peer systems — you will not be called by a Bank Manager and require documents or a fraudster who asks for Your card number and SMS for confirmation. This is simply not the case, wallets are encrypted, and using different addresses guarantees privacy.
As for fees for transfers, there are no Visa or Mastercard payment systems, as well as additional fees that we discussed above.

How are payments made in the Tkeycoin peer-to-peer payment system?


https://i.redd.it/9ftct10iptx41.gif
As soon as you sign a transaction, it is sent to the blockchain and the miners are engaged in its confirmation, for which they take a symbolic Commission. Let’s look at an example, the key rate is $1, the transfer fee will be 0.00001970 TKEY or 0.00000174 TKEY.
0.00001970 TKEY=$0.00001970 0.00000174 TKEY=$0.00000174
Accordingly, commissions are almost zero. In Europe, on average, you will pay $15–20 for a small Bank transfer.
For example, now sending 1 million dollars to BTC, You will pay a Commission in the area of ≈3–8 dollars. Just think, 1 million dollars, without restrictions, risks, and sanctions, and most importantly, the transaction will be the available day today, and you paid an average of ≈5 dollars for the transfer.

Transactions in the Tkeycoin blockchain

Now let’s touch on the topic of how a transaction in the blockchain goes. Once you have sent a transaction, it will be available to the Recipient. The transaction takes place instantly and the User sees not” numbers on the screen”, but real funds-cryptocurrency. This is very convenient when you make any transactions and the Recipient needs to make sure that the payment came.
In the full node-there is a choice of confirmation blocks — this is the amount after which you can use the received cryptocurrency. When sending, you can select the number of confirmations:
• 2 blocks≈10 minutes • 4 block≈40 minutes • 6 blocks≈60 minutes • 12 blocks≈120 minutes • 24 blocks≈4 hours • 48 blocks≈8 hours • 144 blocks≈24 hours • 504 blocks≈3 days • 1008 blocks≈7 days
As we can see, you can also set a weekly confirmation if necessary. The minimum recommended number is 3 blocks. by default, the full node (local wallet) has 6 blocks installed. The presence of this number of confirmations ensures that Your block will not be forged and will be accepted by the network.
Each new transaction that receives network approval is sent to mempool, where it waits for miners to confirm it. When a miner takes a transaction to include it in the next block, it automatically receives the first confirmation.

Generating blocks in the TKEY network

A block in the TKEY network is generated within 6–10 minutes. the network automatically corrects the complexity and time of block formation. Thousands of transactions or a single transaction can be placed in a block.

https://i.redd.it/f9d17k8uptx41.gif
Transactions work faster in the TKEYSPACE app because we have already enabled new algorithms and this is now the fastest and most convenient way to exchange various digital currencies.

https://preview.redd.it/nnz5krdvptx41.png?width=1400&format=png&auto=webp&s=fee452ae6389c8f46d97357777193ed2b10bc4bc
Anyway, using the full node is also one of the safest ways to store and send Tkeycoin cryptocurrency, and most importantly, the full node stores a full copy of the entire blockchain, which benefits the network and provides protection from information forgery.
The more popular the project becomes, the more load is placed on the network itself. For example, 10,000 transactions passed in one block that was processed quickly, while the other 10–20 transactions in another block hung for a longer time, so temporary “pits” may appear. To deal with them, we are working on implementing additional chains-separate chains that are created for cross-transactions, which ensures fast payments under heavy load.
For the global system — we get a shipment around the world in 6–10 minutes, in cross-chains in 10 seconds. In comparison with the global payment system, which processes cross — border payments within 3–5 days, this is a huge advantage. If we add liquidity to this, we will get a perfect payment system.
https://preview.redd.it/2d0uu4gxptx41.png?width=1200&format=png&auto=webp&s=ae5f2f0bc8b7c7dedd1814eb32e97092a6330c3a
Also, you should not forget that if you did not sync with the network and sent a transaction, the transaction may hang in its memory pool and you will have to perform several actions to solve this situation. Here we must understand that syncing with the network is an important point because if you have a connection failure in the Internet Bank, the payment will also not be processed. After all, it will not be sent to a specialist for confirmation.
If you are currently experiencing any delays with transactions, this is due to the transition of CPU mining to GPU, as soon as miners switch to new mining methods, the confirmation of blocks will be consistently fast.
In conclusion: blockchain is a new technology and many terms, concepts and how it all works are still difficult for many to understand and this is normal from innovation.
In many countries, the word cryptocurrency and blockchain are synonymous and no one wants to understand the reality, most people believe that if the blockchain, it means it is related to trading on the cryptocurrency exchange. No one thinks about the real usefulness of certain solutions that will become commonplace for Us in the future.
For example, the Internet banking system dates back to the ’80s of the last century, when the Home Banking system was created in the United States. This system allowed depositors to check their accounts by connecting to the Bank’s computer via their phone. In the future, as the Internet and Internet technologies develop, banks are beginning to introduce systems that allow depositors to get information about their accounts via the Internet. For the first time, the service of transferring funds from accounts was introduced in 1994 in the United States by the Stanford Federal Credit Union, and in 1995 the first virtual Bank was created — Security First Network Bank. But, to the disappointment of the founders of the project, it failed because of strong distrust from potential customers, who, at that time, did not trust such an innovation.
Only in 2001, Bank of America became the first among all banks that provide e-banking services, the whole user base for this service exceeded 2 million customers. At that time, this figure was about 20 % of all Bank customers. And in October of the same year, 2001, and the same Bank of America took the bar in 3 million money transfers made using online banking services for a total amount of more than 1 billion US dollars. Currently, in Western Europe and America, more than 50% of the entire adult population uses e-banking services, and this figure reaches 90% among adult Internet users.
Life changes, and in the bustle of everyday work — we do not even notice how quickly all processes change.
We are experiencing a technological revolution that is inevitable.

https://i.redd.it/afcfj3rzptx41.gif
submitted by tkeycoin to Tkeycoin_Official [link] [comments]

MXC AMA Recapitulation-Filenet

MXC AMA Recapitulation-Filenet

https://preview.redd.it/6u8t4y55nay41.png?width=1200&format=png&auto=webp&s=6ad7775ac648def445571a6a80e285f1c152a803

Guest: FN Global Community Rep,Andrew Chan

Host: Molly

Introduction:

Andrew:
Nice to meet you guys here,it's my honor to stand here speach for Filenet.Filenet(FN) is the world's first public chain of distributed storage application who has lauchned the mainet, and is also the world's first public chain of distributed storage application using DPOS + POC consensus mechanism.Filenet is dedicated to storing and distributing valuable content, rewarding miners in the form of mining to contribute idle bandwidth and storage. The mission of Filenet is to establish a powerful distributed data service system by connecting all idle storage to form, so any storage device that can connect to the Internet can participate in mining. Generally, Filenet is a super cloud system based on distributed storage and content sharing.

Questions from community:

Molly: Q1.What are the benefits of the FN project for business? What is the main role FN plays in business for five validation and security?
Andrew:
As we said just now,Filenet(FN) is the world's first public chain of distributed storage.
Filenet is dedicated to storing and distributing valuable content. The system provides a file promotion system. The more data is retrieved, the more popular it becomes, and the file can be mined.The DAO mechanism adopted by Filenet, in the system of Filenet, users need not pay for uploading and downloading, which greatly reduces the cost of enterprise server and bandwidth.Besides that Filenet is used to retrieve and distribute mining patterns, pledge a certain amount of deposit and provide a certain amount of storage space to participate in mining. The higher the miner's contribution, the higher the probability of a block.
Filenet is a leader in the field of distributed storage because of its unique consensus mechanism, business model, economic model, ecological strategy and governance structure, enabling blockchain storage to break out of the shackles and develop into a new format, and providing a key role for the development of other blockchain storage systems.
On the level of consensus, Filenet adopts the DPOS+POC mechanism as the consensus mechanism for distribution in the context of POC storage and mining, avoiding the direct contradiction between equipment efficiency and resource allocation, and greatly improving the mining mode in the blockchain 3.0 era.
The specific operation process of DPOS algorithm is that stakeholders, namely the Token holders and miners, vote to select Filenet Super Nodes through the election program, and then the Super Nodes in the block will be randomly pseudorandomly, and the Filenet Super Nodes can choose whether to produce blocks within a specified time.
As for smart contracts, Filenet is a common chain for developers that provides special programming primitives for DApp to interact with stored data.
These primitives are contained within the EVM (ethereum intelligent contract virtual machine). Thus, information about the location of data, storage nodes, and miners can also be accessed in smart contracts.
The world's first distributed storage DApp "Ztiao" developed based on Filenet network is now on the market. All chat data in this application will be stored in a fragmented form at any node in the world, transferred by private key, and the ecology in the application will be circulated and settled with Fn as payment token.
Filenet's smart contracts apply primarily to miners' coin holdings.The smart contracts we have developed may be rapidly realized through EVM (ethereum smart contract virtual machine) and solsea.
Filenet itself has the potential to implement an intelligent contract mechanism, and we believe that future versions of EVM and WASM will naturally integrate with the capabilities of Filenet and allow other main chains to benefit from Filenet.
In terms of data structure, the Filenet block saves all data trace parameters, and the data uploaded to Filenet is of various types and large quantities. While traditional linked list structures make blocks redundant and complex to express, Filenet USES a block chain data structure with Merkle tree and DAG (directed acyclic graph) structure.
The DAG structure is more flexible, more powerful, and faster than the traditional blockchain chain structure, greatly improving the efficiency of block packaging, thereby improving the performance of the Filenet network.
The Merkle tree does not require complete block information, but only the key Merkle node information to verify the block chain number filenet. IO page 10, a total of 24 data, which makes the node lighter and more energy and resources are devoted to business processing and providing services for the filenet network.
At the same time, Merkle tree can also simplify the verification process and further improve network performance.
Molly: Q2.Why does Filenet use the DPOS + POC consensus mechanism? What is the advantage?
Andrew:
As we all know,the core element of blockchain technology is the consensus mechanism. Currently, the most commonly used mechanisms include PoW (Proof-of-Work), PoS (Proof-of-Stake), DPoS (Delegated-Proof-of Stake), and PoC (Proof-of-Contribution). Proof of Work requires miners to solve complex cryptographic math problems and relies on computing power. The advantage of the system is that it is secure and reliable. Disadvantages are its limited capacity and the possibility of “51% attacks”. The Proof of Stake consensus mechanism selects miners according to how many coins he or she has. An immediate advantage is its low resource consumption. However, it opens itself to a range of attacks, such as nothing-at-stake, and also results in centralization since wealth brings more rewards and more decision-making power. In DPoS, the majority of people holding voting rights authorize a small number of nodes to act for them. The system’s merits are its high efficiency, throughput capacity and concurrency. However, the power is then concentrated in the hands of a few nodes, which is not safe. Proof of Contribution allocates mining and validating rights according to the contributions made by the nodes. The advantage of this system is that it does not waste resources thanks to its concept of selection based on resources provided to network. A disadvantage is that the calculation of contributions depends on specific scenarios. In the era of Blockchain 3.0, the consensus mechanisms are to advance under the principles of economy of resources, security focus and scalability, throughput capacity and concurrency.

https://preview.redd.it/krjv4rm9may41.png?width=1066&format=png&auto=webp&s=40875d9f7c76c5259faba1ad09f2396447231fa5
Molly: Q3.What is the main reason behind the formation of FN? Why do you think coins like FN should be in the Marketplace?
Andrew:
As I just said,Filenet is an IPFS incentive layer to reward miners for sharing their storage and networking resources.
Filenet is also a token which powers a distributed certification mechanism. It creates a cloud-level system for content-sharing dedicated to storing and distributing valuable content on IPFS,demand leaders to results. Filenet solve the problem of data distribution and storage.Why coins like FN should be in the marketplace?
This is easy to understand,why bitcoin should be in the market?All coins can be in the market for just one reason-the consensus.If there just one person who think FN is valueble,we cannot say this is consesus,but if there is 10000,or 1 billion who make consesus,then you can say,FN should be in the market.Fn happens to have so many users make the consesus.The number of people in Filenet community has reached 210000+,the autonomy community is up to 21,the global super nodes is over 51+,Our community is still growing,our consensus is also deepening,because we all believe in the future of FN.In short term,in the mining mode, on the one hand: the tokens will be locked, and the decrease in circulation can increase the value of the token; on the other hand: mining can also generate income.
On the long term,Filenet can provide commercial applications with commercial value. Giant Internet companies such as Tencent WeSee and Byte Dance with giant data amount will have requirements for massive storage. Filenet can provide distributed storage services to solve the problem. Companies need to pay and lock FN for the distributed storage services. In this way, the circulation of FN on the market can be controlled, and thereby the value can be appreciated.
Molly: Q4.Can ordinary users also participate in mining? If can participate, how much mining can ordinary user do? And please explain the role of FN Coin easily.
Andrew:
Ordinary people can also participate in mining,as long as you pledge 400FN,and provide 4T storage space,you can join to mining.And the specific details depend on the mining pool you joined,you can see these pictures for a detailed mining tutorial.

https://preview.redd.it/z9hr1knkmay41.png?width=864&format=png&auto=webp&s=61abf14e3e659430f8387915389e024a1523ad2e

https://preview.redd.it/g8r2hmgmmay41.png?width=864&format=png&auto=webp&s=d82d323958a9ff11761b7c165be0179d7aeb91d9
Molly: Q5.What's the future plan of Filenet?
Andrew:
In the 1.0 stage, Filenet is the first distributed storage application public chain on the mainnet, the first distributed storage application public chain on the exchange, and the first distributed storage application public chain using the DPOS + POC consensus mechanism.
Filenet 2.0 comprehensively solves the key shortcomings of centralized data service centers.
In Filenet3.0 stage, the vision can catch up with and surpass many leading projects and brands of the decentralized distributed storage track, such as Filecoin, IBM, Amazon, Maidsafe, and become the leader of the track.

Free-asking Session

Q1.What is the difficulty bomb solution? Can you tell us more about [email protected]
Andrew:

https://preview.redd.it/zghna15smay41.png?width=905&format=png&auto=webp&s=2f01912ecb429f6e543d0b74322f4c295b901015
difficulty bomb is a solution to to encourage the nodes of the entire network to contribute more storage space and bandwidth, the Filenet Foundation plans to implement the difficulty bomb program in stages from May 1, 2020.
Q2.Checking the website, I found that the transaction fees of FN coins are very low, and the transaction speed is also very high! Can you explain how the FILENET project can achieve such a high transaction rate at the lowest [email protected]
Andrew:
As I said just now,there are lots of ways to generate revennue,in short term Filenet can provide commercial applications with commercial value. Giant Internet companies such as Tencent WeSee and Byte Dance with giant data amount will have requirements for massive storage. Filenet can provide distributed storage services to solve the problem. Companies need to pay and lock FN for the distributed storage services. In this way, the circulation of FN on the market can be controlled, and thereby the value can be appreciated.And in long term Filenet is aim to encourage the nodes of the entire network to contribute more storage space and bandwidth, the Filenet Foundation plans to implement the difficulty bomb program in stages from May 1, 2020.
Q3.According to packaging node program, theywill recruit 105 packaging nodes worldwide. If 105 packaging nodes have been allocated, can I still participate in the activities of this packaging [email protected]
Andrew:
yes,of course,our paging nodes have proceed to the fifth issue,you can join us.
Q4.Why do people have to buy FN or hold it back? What is the FILENET team's plan to keep competing in the [email protected]
Andrew:
You could also refer to the eco mode and the apppreciation logic I've jsut share.
Q5.what are the benefits of $FN Long Term [email protected]
Andrew:
As we just shared: For long term, Filenet can provide commercial applications with commercial value. Giant Internet companies such as Tencent WeSee and Byte Dance with giant data amount will have requirements for massive storage. Filenet can provide distributed storage services to solve the problem. Companies need to pay and lock FN for the distributed storage services. In this way, the circulation of FN on the market can be controlled, and thereby the value can be appreciated.
Follow us:
Telegram: https://t.me/MXCEnglish
MXC trading: https://t.me/MXCtrade
Twitter: https://twitter.com/MXC_Exchange
https://twitter.com/MXC_Fans
Reddit: https://www.reddit.com/MXCexchange/
Facebook: https://www.facebook.com/mxcexchangeofficial/
Discord: https://discord.gg/zu5drS8
submitted by SimonZhu666 to MXCexchange [link] [comments]

Election hacking Russians OPSEC fails (page 22)

submitted by carrotcypher to oopsec [link] [comments]

Technical: A Brief History of Payment Channels: from Satoshi to Lightning Network

Who cares about political tweets from some random country's president when payment channels are a much more interesting and are actually capable of carrying value?
So let's have a short history of various payment channel techs!

Generation 0: Satoshi's Broken nSequence Channels

Because Satoshi's Vision included payment channels, except his implementation sucked so hard we had to go fix it and added RBF as a by-product.
Originally, the plan for nSequence was that mempools would replace any transaction spending certain inputs with another transaction spending the same inputs, but only if the nSequence field of the replacement was larger.
Since 0xFFFFFFFF was the highest value that nSequence could get, this would mark a transaction as "final" and not replaceable on the mempool anymore.
In fact, this "nSequence channel" I will describe is the reason why we have this weird rule about nLockTime and nSequence. nLockTime actually only works if nSequence is not 0xFFFFFFFF i.e. final. If nSequence is 0xFFFFFFFF then nLockTime is ignored, because this if the "final" version of the transaction.
So what you'd do would be something like this:
  1. You go to a bar and promise the bartender to pay by the time the bar closes. Because this is the Bitcoin universe, time is measured in blockheight, so the closing time of the bar is indicated as some future blockheight.
  2. For your first drink, you'd make a transaction paying to the bartender for that drink, paying from some coins you have. The transaction has an nLockTime equal to the closing time of the bar, and a starting nSequence of 0. You hand over the transaction and the bartender hands you your drink.
  3. For your succeeding drink, you'd remake the same transaction, adding the payment for that drink to the transaction output that goes to the bartender (so that output keeps getting larger, by the amount of payment), and having an nSequence that is one higher than the previous one.
  4. Eventually you have to stop drinking. It comes down to one of two possibilities:
    • You drink until the bar closes. Since it is now the nLockTime indicated in the transaction, the bartender is able to broadcast the latest transaction and tells the bouncers to kick you out of the bar.
    • You wisely consider the state of your liver. So you re-sign the last transaction with a "final" nSequence of 0xFFFFFFFF i.e. the maximum possible value it can have. This allows the bartender to get his or her funds immediately (nLockTime is ignored if nSequence is 0xFFFFFFFF), so he or she tells the bouncers to let you out of the bar.
Now that of course is a payment channel. Individual payments (purchases of alcohol, so I guess buying coffee is not in scope for payment channels). Closing is done by creating a "final" transaction that is the sum of the individual payments. Sure there's no routing and channels are unidirectional and channels have a maximum lifetime but give Satoshi a break, he was also busy inventing Bitcoin at the time.
Now if you noticed I called this kind of payment channel "broken". This is because the mempool rules are not consensus rules, and cannot be validated (nothing about the mempool can be validated onchain: I sigh every time somebody proposes "let's make block size dependent on mempool size", mempool state cannot be validated by onchain data). Fullnodes can't see all of the transactions you signed, and then validate that the final one with the maximum nSequence is the one that actually is used onchain. So you can do the below:
  1. Become friends with Jihan Wu, because he owns >51% of the mining hashrate (he totally reorged Bitcoin to reverse the Binance hack right?).
  2. Slip Jihan Wu some of the more interesting drinks you're ordering as an incentive to cooperate with you. So say you end up ordering 100 drinks, you split it with Jihan Wu and give him 50 of the drinks.
  3. When the bar closes, Jihan Wu quickly calls his mining rig and tells them to mine the version of your transaction with nSequence 0. You know, that first one where you pay for only one drink.
  4. Because fullnodes cannot validate nSequence, they'll accept even the nSequence=0 version and confirm it, immutably adding you paying for a single alcoholic drink to the blockchain.
  5. The bartender, pissed at being cheated, takes out a shotgun from under the bar and shoots at you and Jihan Wu.
  6. Jihan Wu uses his mystical chi powers (actually the combined exhaust from all of his mining rigs) to slow down the shotgun pellets, making them hit you as softly as petals drifting in the wind.
  7. The bartender mutters some words, clothes ripping apart as he or she (hard to believe it could be a she but hey) turns into a bear, ready to maul you for cheating him or her of the payment for all the 100 drinks you ordered from him or her.
  8. Steely-eyed, you stand in front of the bartender-turned-bear, daring him to touch you. You've watched Revenant, you know Leonardo di Caprio could survive a bear mauling, and if some posh actor can survive that, you know you can too. You make a pose. "Drunken troll logic attack!"
  9. I think I got sidetracked here.
Lessons learned?

Spilman Channels

Incentive-compatible time-limited unidirectional channel; or, Satoshi's Vision, Fixed (if transaction malleability hadn't been a problem, that is).
Now, we know the bartender will turn into a bear and maul you if you try to cheat the payment channel, and now that we've revealed you're good friends with Jihan Wu, the bartender will no longer accept a payment channel scheme that lets one you cooperate with a miner to cheat the bartender.
Fortunately, Jeremy Spilman proposed a better way that would not let you cheat the bartender.
First, you and the bartender perform this ritual:
  1. You get some funds and create a transaction that pays to a 2-of-2 multisig between you and the bartender. You don't broadcast this yet: you just sign it and get its txid.
  2. You create another transaction that spends the above transaction. This transaction (the "backoff") has an nLockTime equal to the closing time of the bar, plus one block. You sign it and give this backoff transaction (but not the above transaction) to the bartender.
  3. The bartender signs the backoff and gives it back to you. It is now valid since it's spending a 2-of-2 of you and the bartender, and both of you have signed the backoff transaction.
  4. Now you broadcast the first transaction onchain. You and the bartender wait for it to be deeply confirmed, then you can start ordering.
The above is probably vaguely familiar to LN users. It's the funding process of payment channels! The first transaction, the one that pays to a 2-of-2 multisig, is the funding transaction that backs the payment channel funds.
So now you start ordering in this way:
  1. For your first drink, you create a transaction spending the funding transaction output and sending the price of the drink to the bartender, with the rest returning to you.
  2. You sign the transaction and pass it to the bartender, who serves your first drink.
  3. For your succeeding drinks, you recreate the same transaction, adding the price of the new drink to the sum that goes to the bartender and reducing the money returned to you. You sign the transaction and give it to the bartender, who serves you your next drink.
  4. At the end:
    • If the bar closing time is reached, the bartender signs the latest transaction, completing the needed 2-of-2 signatures and broadcasting this to the Bitcoin network. Since the backoff transaction is the closing time + 1, it can't get used at closing time.
    • If you decide you want to leave early because your liver is crying, you just tell the bartender to go ahead and close the channel (which the bartender can do at any time by just signing and broadcasting the latest transaction: the bartender won't do that because he or she is hoping you'll stay and drink more).
    • If you ended up just hanging around the bar and never ordering, then at closing time + 1 you broadcast the backoff transaction and get your funds back in full.
Now, even if you pass 50 drinks to Jihan Wu, you can't give him the first transaction (the one which pays for only one drink) and ask him to mine it: it's spending a 2-of-2 and the copy you have only contains your own signature. You need the bartender's signature to make it valid, but he or she sure as hell isn't going to cooperate in something that would lose him or her money, so a signature from the bartender validating old state where he or she gets paid less isn't going to happen.
So, problem solved, right? Right? Okay, let's try it. So you get your funds, put them in a funding tx, get the backoff tx, confirm the funding tx...
Once the funding transaction confirms deeply, the bartender laughs uproariously. He or she summons the bouncers, who surround you menacingly.
"I'm refusing service to you," the bartender says.
"Fine," you say. "I was leaving anyway;" You smirk. "I'll get back my money with the backoff transaction, and posting about your poor service on reddit so you get negative karma, so there!"
"Not so fast," the bartender says. His or her voice chills your bones. It looks like your exploitation of the Satoshi nSequence payment channel is still fresh in his or her mind. "Look at the txid of the funding transaction that got confirmed."
"What about it?" you ask nonchalantly, as you flip open your desktop computer and open a reputable blockchain explorer.
What you see shocks you.
"What the --- the txid is different! You--- you changed my signature?? But how? I put the only copy of my private key in a sealed envelope in a cast-iron box inside a safe buried in the Gobi desert protected by a clan of nomads who have dedicated their lives and their childrens' lives to keeping my private key safe in perpetuity!"
"Didn't you know?" the bartender asks. "The components of the signature are just very large numbers. The sign of one of the signature components can be changed, from positive to negative, or negative to positive, and the signature will remain valid. Anyone can do that, even if they don't know the private key. But because Bitcoin includes the signatures in the transaction when it's generating the txid, this little change also changes the txid." He or she chuckles. "They say they'll fix it by separating the signatures from the transaction body. They're saying that these kinds of signature malleability won't affect transaction ids anymore after they do this, but I bet I can get my good friend Jihan Wu to delay this 'SepSig' plan for a good while yet. Friendly guy, this Jihan Wu, it turns out all I had to do was slip him 51 drinks and he was willing to mine a tx with the signature signs flipped." His or her grin widens. "I'm afraid your backoff transaction won't work anymore, since it spends a txid that is not existent and will never be confirmed. So here's the deal. You pay me 99% of the funds in the funding transaction, in exchange for me signing the transaction that spends with the txid that you see onchain. Refuse, and you lose 100% of the funds and every other HODLer, including me, benefits from the reduction in coin supply. Accept, and you get to keep 1%. I lose nothing if you refuse, so I won't care if you do, but consider the difference of getting zilch vs. getting 1% of your funds." His or her eyes glow. "GENUFLECT RIGHT NOW."
Lesson learned?

CLTV-protected Spilman Channels

Using CLTV for the backoff branch.
This variation is simply Spilman channels, but with the backoff transaction replaced with a backoff branch in the SCRIPT you pay to. It only became possible after OP_CHECKLOCKTIMEVERIFY (CLTV) was enabled in 2015.
Now as we saw in the Spilman Channels discussion, transaction malleability means that any pre-signed offchain transaction can easily be invalidated by flipping the sign of the signature of the funding transaction while the funding transaction is not yet confirmed.
This can be avoided by simply putting any special requirements into an explicit branch of the Bitcoin SCRIPT. Now, the backoff branch is supposed to create a maximum lifetime for the payment channel, and prior to the introduction of OP_CHECKLOCKTIMEVERIFY this could only be done by having a pre-signed nLockTime transaction.
With CLTV, however, we can now make the branches explicit in the SCRIPT that the funding transaction pays to.
Instead of paying to a 2-of-2 in order to set up the funding transaction, you pay to a SCRIPT which is basically "2-of-2, OR this singlesig after a specified lock time".
With this, there is no backoff transaction that is pre-signed and which refers to a specific txid. Instead, you can create the backoff transaction later, using whatever txid the funding transaction ends up being confirmed under. Since the funding transaction is immutable once confirmed, it is no longer possible to change the txid afterwards.

Todd Micropayment Networks

The old hub-spoke model (that isn't how LN today actually works).
One of the more direct predecessors of the Lightning Network was the hub-spoke model discussed by Peter Todd. In this model, instead of payers directly having channels to payees, payers and payees connect to a central hub server. This allows any payer to pay any payee, using the same channel for every payee on the hub. Similarly, this allows any payee to receive from any payer, using the same channel.
Remember from the above Spilman example? When you open a channel to the bartender, you have to wait around for the funding tx to confirm. This will take an hour at best. Now consider that you have to make channels for everyone you want to pay to. That's not very scalable.
So the Todd hub-spoke model has a central "clearing house" that transport money from payers to payees. The "Moonbeam" project takes this model. Of course, this reveals to the hub who the payer and payee are, and thus the hub can potentially censor transactions. Generally, though, it was considered that a hub would more efficiently censor by just not maintaining a channel with the payer or payee that it wants to censor (since the money it owned in the channel would just be locked uselessly if the hub won't process payments to/from the censored user).
In any case, the ability of the central hub to monitor payments means that it can surveill the payer and payee, and then sell this private transactional data to third parties. This loss of privacy would be intolerable today.
Peter Todd also proposed that there might be multiple hubs that could transport funds to each other on behalf of their users, providing somewhat better privacy.
Another point of note is that at the time such networks were proposed, only unidirectional (Spilman) channels were available. Thus, while one could be a payer, or payee, you would have to use separate channels for your income versus for your spending. Worse, if you wanted to transfer money from your income channel to your spending channel, you had to close both and reshuffle the money between them, both onchain activities.

Poon-Dryja Lightning Network

Bidirectional two-participant channels.
The Poon-Dryja channel mechanism has two important properties:
Both the original Satoshi and the two Spilman variants are unidirectional: there is a payer and a payee, and if the payee wants to do a refund, or wants to pay for a different service or product the payer is providing, then they can't use the same unidirectional channel.
The Poon-Dryjam mechanism allows channels, however, to be bidirectional instead: you are not a payer or a payee on the channel, you can receive or send at any time as long as both you and the channel counterparty are online.
Further, unlike either of the Spilman variants, there is no time limit for the lifetime of a channel. Instead, you can keep the channel open for as long as you want.
Both properties, together, form a very powerful scaling property that I believe most people have not appreciated. With unidirectional channels, as mentioned before, if you both earn and spend over the same network of payment channels, you would have separate channels for earning and spending. You would then need to perform onchain operations to "reverse" the directions of your channels periodically. Secondly, since Spilman channels have a fixed lifetime, even if you never used either channel, you would have to periodically "refresh" it by closing it and reopening.
With bidirectional, indefinite-lifetime channels, you may instead open some channels when you first begin managing your own money, then close them only after your lawyers have executed your last will and testament on how the money in your channels get divided up to your heirs: that's just two onchain transactions in your entire lifetime. That is the potentially very powerful scaling property that bidirectional, indefinite-lifetime channels allow.
I won't discuss the transaction structure needed for Poon-Dryja bidirectional channels --- it's complicated and you can easily get explanations with cute graphics elsewhere.
There is a weakness of Poon-Dryja that people tend to gloss over (because it was fixed very well by RustyReddit):
Another thing I want to emphasize is that while the Lightning Network paper and many of the earlier presentations developed from the old Peter Todd hub-and-spoke model, the modern Lightning Network takes the logical conclusion of removing a strict separation between "hubs" and "spokes". Any node on the Lightning Network can very well work as a hub for any other node. Thus, while you might operate as "mostly a payer", "mostly a forwarding node", "mostly a payee", you still end up being at least partially a forwarding node ("hub") on the network, at least part of the time. This greatly reduces the problems of privacy inherent in having only a few hub nodes: forwarding nodes cannot get significantly useful data from the payments passing through them, because the distance between the payer and the payee can be so large that it would be likely that the ultimate payer and the ultimate payee could be anyone on the Lightning Network.
Lessons learned?

Future

After LN, there's also the Decker-Wattenhofer Duplex Micropayment Channels (DMC). This post is long enough as-is, LOL. But for now, it uses a novel "decrementing nSequence channel", using the new relative-timelock semantics of nSequence (not the broken one originally by Satoshi). It actually uses multiple such "decrementing nSequence" constructs, terminating in a pair of Spilman channels, one in both directions (thus "duplex"). Maybe I'll discuss it some other time.
The realization that channel constructions could actually hold more channel constructions inside them (the way the Decker-Wattenhofer puts a pair of Spilman channels inside a series of "decrementing nSequence channels") lead to the further thought behind Burchert-Decker-Wattenhofer channel factories. Basically, you could host multiple two-participant channel constructs inside a larger multiparticipant "channel" construct (i.e. host multiple channels inside a factory).
Further, we have the Decker-Russell-Osuntokun or "eltoo" construction. I'd argue that this is "nSequence done right". I'll write more about this later, because this post is long enough.
Lessons learned?
submitted by almkglor to Bitcoin [link] [comments]

Cryptocurrency Mining with SERVER Power Suppiles - YouTube Crypto Mining Pool Server Setup Vlog #1 - YouTube server mining app hack 100% +50000TH/s +10 bitcoins in day 2019 Earn BTC Using Server Mining #legit - YouTube How to Hack bitcoin server mining app - YouTube

Bitcoin mining having with a dedicated server is good so that we can ensure earning those things. VirtuBox Well-known member. Joined May 3, 2016 Messages 1,623 Points 83. Jan 15, 2018 #18 VirtuBox. You cannot mine bitcoin with a dedicated servers, even with addtional GPU. Bitcoin can only be mined with ASICS nowadays. But there are some good alternative you can mine with a CPU like the Monero ... Nowadays all serious Bitcoin mining is performed on dedicated Bitcoin mining hardware ASICs, usually in thermally-regulated data-centers with low-cost electricity. Don’t Get Confused. There is Bitcoin mining hardware, which mines bitcoins. There are also Bitcoin hardware wallets like the Ledger Nano X, which secure bitcoins. Quick Tip. Mining is not the fastest way to get bitcoins. Buying ... Coutts Bitcoin Mining is a premier international investment corporation that is registered in the UK. The company is headquartered in 212 Wellington Road, Oldham, England, OL8 4LS but its activities go far beyond the borders. We may be the largest investment manager you've nevr heared of. So strongly do we believe in the value of professional advice, we offer our funds through financial advisors. Bitcoin Mining Dedicated Server Miners can find provider dedicated server providers but the ROI on standard dedicated server may not be profitable. Standard dedicated servers can compete versus Bitmain miners. The best way to move forward is to find a provider that will lease you a dedicated Bitman Antminer like an S9. Dedicated Antminer ... Can data centers tap unused server capacity to mine for Bitcoins? The question occurred to the team at the online backup service iDrive, which performs most of its customer backup jobs overnight, leaving its 3,000 quad-core servers idle for much of the day. So the company ran a test with 600 servers to see whether Bitcoin mining could become a secondary revenue stream. The result: running ...

[index] [1126] [41900] [35282] [26472] [8201] [13931] [46220] [39144] [1110] [39152]

Cryptocurrency Mining with SERVER Power Suppiles - YouTube

https://www.serverfolio.com/payment-options - Dedicated Servers Web hosting service is when you're able to utilize a single server exclusively and you simply... Managed VPS/Dedicated Server Hosting, DDos Protection Inlcuded. Order now: http://www.a1dedicatedservers.com Budget Dedicated Servers SSD Dedicated Servers S... (Coins.Ph)Sign up with my referral code 6arqg8 and get ₱50 credit here: https://coins.ph/invite/6arqg8 Server Mining Link: https://play.google.com/store/apps... Server bitcoin mining auto sultat bossku - Duration: 1:02. u mi Recommended for you. 1:02 'Fake Bitcoin' - How this Woman Scammed the World, then Vanished - Duration: 17:50. ... I have a follow up video coming soon to walk you through migrating my rig to 1400w server PSUs! In this video I walk you through a real general computer data...

#