Contentssubmitted by D-platform to u/D-platform [link] [comments]
Proof of Work (commonly abbreviated to PoW) is a mechanism for preventing double-spends. Most major cryptocurrencies use this as their consensus algorithm. That’s just what we call a method for securing the cryptocurrency’s ledger.
Proof of Work was the first consensus algorithm to surface, and, to date, remains the dominant one. It was introduced by Satoshi Nakamoto in the 2008 Bitcoin white paper, but the technology itself was conceived long before then.
Adam Back’s HashCash is an early example of a Proof of Work algorithm in the pre-cryptocurrency days. By requiring senders to perform a small amount of computing before sending an email, receivers could mitigate spam. This computation would cost virtually nothing to a legitimate sender, but quickly add up for someone sending emails en masse.
What is a double-spend?A double-spend occurs when the same funds are spent more than once. The term is used almost exclusively in the context of digital money — after all, you’d have a hard time spending the same physical cash twice. When you pay for a coffee today, you hand cash over to a cashier who probably locks it in a register. You can’t go to the coffee shop across the road and pay for another coffee with the same bill.
In digital cash schemes, there’s the possibility that you could. You’ve surely duplicated a computer file before — you just copy and paste it. You can email the same file to ten, twenty, fifty people.
Since digital money is just data, you need to prevent people from copying and spending the same units in different places. Otherwise, your currency will collapse in no time.
For a more in-depth look at double-spending, check out Double Spending Explained.
Why is Proof of Work necessary?If you’ve read our guide to blockchain technology, you’ll know that users broadcast transactions to the network. Those transactions aren’t immediately considered valid, though. That only happens when they get added to the blockchain.
The blockchain is a big database that every user can see, so they can check if funds have been spent before. Picture it like this: you and three friends have a notepad. Anytime one of you wants to make a transfer of whatever units you’re using, you write it down — Alice pays Bob five units, Bob pays Carol two units, etc.
There’s another intricacy here — each time you make a transaction, you refer to the transaction where the funds came from. So, if Bob was paying Carol with two units, the entry would actually look like the following: Bob pays Carol two units from this earlier transaction with Alice.
Now, we have a way to track the units. If Bob tries to make another transaction using the same units he just sent to Carol, everyone will know immediately. The group won’t allow the transaction to be added to the notepad.
Now, this might work well in a small group. Everyone knows each other, so they’ll probably agree on which of the friends should add transactions to the notepad. What if we want a group of 10,000 participants? The notepad idea doesn’t scale well, because nobody wants to trust a stranger to manage it.
This is where Proof of Work comes in. It ensures that users aren’t spending money that they don’t have the right to spend. By using a combination of game theory and cryptography, a PoW algorithm enables anyone to update the blockchain according to the rules of the system.
How does PoW work?Our notepad above is the blockchain. But we don’t add transactions one by one — instead, we lump them into blocks. We announce the transactions to the network, then users creating a block will include them in a candidate block. The transactions will only be considered valid once their candidate block becomes a confirmed block, meaning that it has been added to the blockchain.
Appending a block isn’t cheap, however. Proof of Work requires that a miner (the user creating the block) uses up some of their own resources for the privilege. That resource is computing power, which is used to hash the block’s data until a solution to a puzzle is found.
Hashing the block’s data means that you pass it through a hashing function to generate a block hash. The block hash works like a “fingerprint” — it’s an identity for your input data and is unique to each block.
It’s virtually impossible to reverse a block hash to get the input data. Knowing an input, however, it’s trivial for you to confirm that the hash is correct. You just have to submit the input through the function and check if the output is the same.
In Proof of Work, you must provide data whose hash matches certain conditions. But you don’t know how to get there. Your only option is to pass your data through a hash function and to check if it matches the conditions. If it doesn’t, you’ll have to change your data slightly to get a different hash. Changing even one character in your data will result in a totally different result, so there’s no way of predicting what an output might be.
As a result, if you want to create a block, you’re playing a guessing game. You typically take information on all of the transactions that you want to add and some other important data, then hash it all together. But since your dataset won’t change, you need to add a piece of information that is variable. Otherwise, you would always get the same hash as output. This variable data is what we call a nonce. It’s a number that you’ll change with every attempt, so you’re getting a different hash every time. And this is what we call mining.
Summing up, mining is the process of gathering blockchain data and hashing it along with a nonce until you find a particular hash. If you find a hash that satisfies the conditions set out by the protocol, you get the right to broadcast the new block to the network. At this point, the other participants of the network update their blockchains to include the new block.
For major cryptocurrencies today, the conditions are incredibly challenging to satisfy. The higher the hash rate on the network, the more difficult it is to find a valid hash. This is done to ensure that blocks aren’t found too quickly.
As you can imagine, trying to guess massive amounts of hashes can be costly on your computer. You’re wasting computational cycles and electricity. But the protocol will reward you with cryptocurrency if you find a valid hash.
Let’s recap what we know so far:
That’s where public-key cryptography comes in. We won’t go into depth in this article, but check out What is Public-Key Cryptography? for a comprehensive look at it. In short, we use some neat cryptographic tricks that allow any user to verify whether someone has a right to move the funds they’re attempting to spend.
When you create a transaction, you sign it. Anyone on the network can compare your signature with your public key, and check whether they match. They’ll also check if you can actually spend your funds and that the sum of your inputs is higher than the sum of your outputs (i.e., that you’re not spending more than you have).
Any block that includes an invalid transaction will be automatically rejected by the network. It’s expensive for you to even attempt to cheat. You’ll waste your own resources without any reward.
Therein lies the beauty of Proof of Work: it makes it expensive to cheat, but profitable to act honestly. Any rational miner will be seeking ROI, so they can be expected to behave in a way that guarantees revenue.
Proof of Work vs. Proof of StakeThere are many consensus algorithms, but one of the most highly-anticipated ones is Proof of Stake (PoS). The concept dates back to 2011, and has been implemented in some smaller protocols. But it has yet to see adoption in any of the big blockchains.
In Proof of Stake systems, miners are replaced with validators. There’s no mining involved and no race to guess hashes. Instead, users are randomly selected — if they’re picked, they must propose (or “forge”) a block. If the block is valid, they’ll receive a reward made up of the fees from the block’s transactions.
Not just any user can be selected, though — the protocol chooses them based on a number of factors. To be eligible, participants must lock up a stake, which is a predetermined amount of the blockchain’s native currency. The stake works like bail: just as defendants put up a large sum of money to disincentivize them from skipping trial, validators lock up a stake to disincentivize cheating. If they act dishonestly, their stake (or a portion of it) will be taken.
Proof of Stake does have some benefits over Proof of Work. The most notable one is the smaller carbon footprint — since there’s no need for high-powered mining farms in PoS, the electricity consumed is only a fraction of that consumed in PoW.
That said, it has nowhere near the track record of PoW. Although it could be perceived as wasteful, mining is the only consensus algorithm that’s proven itself at scale. In just over a decade, it has secured trillions of dollars worth of transactions. To say with certainty whether PoS can rival its security, staking needs to be properly tested in the wild.
Closing thoughtsProof of Work was the original solution to the double-spend problem and has proven to be reliable and secure. Bitcoin proved that we don’t need centralized entities to prevent the same funds from being spent twice. With clever use of cryptography, hash functions, and game theory, participants in a decentralized environment can agree on the state of a financial database.
|Byzantine Fault Tolerance Explained||What Is a Dusting Attack||What Are Forward and Futures Contracts|
|Blockchain Use Cases: Charity||What Is Symmetric Key Cryptography||MACD Indicator Explained|
|What Makes a Blockchain Secure?||Pyramid and Ponzi Schemes||What Is Technical Analysis|
|Hybrid PoW/PoS Consensus Explained||What Is a 51% Attack||Stochastic RSI Explained|
|Blockchain Use Cases||What Is a DoS Attack||What Is Quantitative Easing?|
|Blockchain Use Cases: Healthcare||What Is Social Engineering?||What Is Hyperinflation|
|Blockchain Use Cases: Supply Chain||General Security Principles||What Is Inflation|
|zk-SNARKS and zk-STARKS Explained||Why Public Wifi Is Insecure||What Is an ICO|
|Delayed Proof of Work Explained||What Is a Replay Attack||What Is Fractional Reserve|
|What Is a Coin Burn?||What Is Public Key Cryptography||Game Theory and Cryptocurrencies|
|Delegated Proof of Stake Explained||History of Cryptography||What Is Tulip Mania|
|What Is Ethereum?||What Is a Multisig Wallet||What Is Fiat Currency|
|Hard Forks and Soft Forks||Ransomware Explained||The 2008 Financial Crisis Explained|
|Proof of Stake Explained||What Is CryptoJacking||What Is Ripple|
|What is Lightning Network||What Is a Keylogger||Moving Averages Explained|
|What Is Cryptocurrency||Sybil Attacks Explained||Liquidity Explained|
|Blockchain Advantages and Disadvantages||What Is Phishing||What Is the RSI Indicator|
|What Is Ethereum Plasma?||What Is Trust Wallet||Bollinger Bands Explained|
|Proof of Authority Explained||What are Makers and Takers|
|What Is Bitcoin?|
|Difference Between Blockchain and Bitcoin|
|History of Blockchain|
|What Is Cryptocurrency Mining?|
|What Is a Blockchain Consensus Algorithm|
|Proof of Work Explained|
|Proof of Burn Explained|
|What is Binance Coin?|
|How Does Blockchain Work?|
|What are Nodes?|
Any computer that connects to the Bitcoin network is called a node. Nodes that fully verify all of the rules of Bitcoin are called full nodes.In other words, full nodes are what verify the Bitcoin blockchain and they play a crucial role in maintaining the decentralized network. Full nodes store the entirety of the blockchain and validate transactions. Anyone can participate in the Bitcoin network and run a full node. Bitcoin.org has information on how to set up a full node. Running a full node also gives you wallet capabilities and the ability to query the blockchain.
Shreemoon Rajbhandarisubmitted by Shreemoon to loopringorg [link] [comments]
My Intern Experience
During my time as an undergraduate, one of the key experiences recommended is to do an internship. Gaining work experience as an intern overseas will improve a skill set in my area of interest. Working somewhere as culturally different and economically significant as China is a talking point in any interviews. There are many reasons that made me choose to do an internship in China. Definitively the best part of the experience has been living out of your comfort zone. Encountering new situations and experiences, that increase my self awareness, my capabilities and also to discover my weaknesses.
Over the past 2 years, we have seen many digital currencies/cryptocurrencies being introduced globally.These have added the aspect of using this financial ecosystem to eventually solve social issues. This could be the application of Blockchain technology in areas like logistics/supply chain to food security. Eventually, there would be many more areas where blockchain and related technology developers would be needed. It's emerging to change the way we solve the many roadblocks that we face.
Blockchain is considered to be one of the most trending topics. This is the right time for me to learn about the technology and start implementing. Blockchain is a notion that can be implemented directly or indirectly to any sector as such. Only two months prior, I had a minimal amount of knowledge about blockchain innovation, and my insight into blockchain comprised distinctly of an obscure comprehension of bitcoin and cryptographic money all in all.
During my internship, I was given investigation material to help assemble my base comprehension of Loopring and the blockchain innovation that it depends on. In the wake of beginning at Loopring, I have been given significantly more prominent chance to learn. While my comprehension of blockchain is still new, it has improved extensively since my first day at the organisation.
In this post, I would like to talk about two cryptographic methods aiming to give privacy to blockchain technology ; the zk-SNARKS and zk-STARKS protocols are two significant examples. We will look into their advantages and disadvantages, comparison between two protocols, and conclusion.
ZK-SNARKS vs ZK-STARKS
Along with the countless benefits of the Internet from which we can benefit, when we use it for social media or business company purposes, privacy is at greater risk. Approximately 90 million of Facebook users information were damaged by Cambridge Analytical data. The Wall Street stated that “ this is just the beginning, and the results are expected to grow”. The Equifax data breach revealed information on social media channels from private users. Thus, birth dates were exposed to the majority of the populations. Due to the Uber hack, data from over 55 million customers were also shared and exposed.
Privacy has consistently been seen as a valuable element within the cryptocurrency community. There is always a growing focus on improving privacy within the cryptocurrency space. Bitcoin, Ethereum, Litecoin and many other cryptocurrencies are all actively searching for the most convenient approaches to increase their security. It is the antecedent to fungibility, which is vital for a broadly used form of money. Additionally, most crypto-asset holders do not want their transaction history to be completely public to the world. Among the different cryptographic methods aiming to give privacy to blockchain technology; the zk-SNARK and zk-STARKS protocols are two main significant examples.
Two leading technologies today offer their cryptocurrencies - Monero and zcash— and strive to address protection issues. Monero uses the technology of Ring Confidential Signature. By contrast, Z-Cash uses zk-SNARK( Zero-Knowledge transparent knowledge argument), a technology that provides the ability to conduct anonymous transactions.
In recent years, zk-SNARKS has exploded as the most promising technology to solve blockchain privacy. It is a technology derived from proofs of zero-knowledge, a type of proof that anyone with a verification key can check this “proof” without disclosing the information itself. If the statement holds, a verifier will be convinced by a correct proof. If the statement is false, it is true that no prover can convince a verified statement.
zk-SNARK stands for :
- Zero-knowledge : if the statement is true, there is nothing the verifier learns beyond the fact that the statement is true.
- Succinct : The proof size needs to be small enough in a few milliseconds to be verified.
- Non-interactive :Only one set of information is sent to the verifier for verification, therefore there is no back and forth communication between the prover and verifier.
- Argument of Knowledge : A computationally soundproof: soundness runs counter to a prover leveraging polynomial-time, i.e. limited computing. Also, Without access to the witness (the private input needed to prove the statement), the evidence can not be constructed.
zk-SNARKS aims to provide fast, scalable solutions to ensure financial security. Therefore, transaction encryption is possible.When zk-SNARK is applied to a cryptocurrency, it implies you can conceal the majority of the transaction data information. This incorporates the sender address, collector address, just as the transaction sum amount. zk-SNARKS enables us to shroud the majority of this data information, while likewise enabling the system to affirm and verify the transactions. It amplifies security while maintaining consensus. In the realm of blockchain, it is one of the most exceptional blockchain level protection innovation being used.
With the launch of version 3.0, Loopring’s decentralised protocol solution struck a noteworthy milestone in early May- adding off-chain scaling and fee optimisation using zk-SNARKs. Low fees, liquidity, transparency and security are the key goal of the loopring solution. Loopring says the new Loopring 3.0 based zk-SNARK will increase trade speeds and on-chain activity efficiency tenfold. The data previously stored on-chain in Loopring 3.0 is now stored off-chain in a Merkle tree and then used as required in zk-SNARKS, updating the tree.
Be that as it may, there are a few issues with zk-SNARKS. The main problem has been the need for a trusted setup. zk-SNARKS rely on a permission private key. This essentially undermines the entire purpose of decentralised public blockchain. By introducing the need to trust a person rather than code, you threaten the entire concept of trustlessness. In theory, a prover with sufficient computational power could create fake proofs, and this is one of the reasons why many consider quantum computers as a threat to zk-SNARKs (and blockchain systems).
Last year zk-SNARKS were incorporated on a MIT Tech Review list of the top 10 Breakthrough Technologies of 2018 among AI advancements. zk-SNARKS allows both a tremendous speedup in verifying the correctness of a computation while at the same time it hides the private details from prying eyes. Some of the potential uses citied in MIT article were verifying you’re over 18 without having to share your date of birth, and providing you have a enough money in your back account as collateral without having to give away account details like your exact balance. It establishes trust which you need to interact on the blockchain. Zk-SNARK proofs are as of now being used on Zcash, on JP Morgan Pursue's blockchain-based payment system, and as an approach to safely validate customers to servers.
The more developed version of zk-SNARKS is called zk-STARKS which stands for :
Argument of Knowledge
zk-STARKS verifications are currently being touted as the better than ever form of the convention, tending to a considerable lot of the past disadvantages of zk-SNARKs. It has demonstrated an approach to accomplish a similar degree of privacy as zk-SNARKS without the requirement for the trusted setup. Starks are practically superior to Snarks as they require weaker crypto suppositions, they don't require a trusted setup and are post-quantum resistant. zk-SNARKs are based on Elliptic-Curve Cryptography, which is susceptible to advances in Quantum-Computers. zk-STARKs, on the other hand are Post-Quantum system meaning that even if Quantum-computers become powerful and ubiquitous they will not have an advantage, compared to classical computers, in breaking zk-STARKs. Anyway they have a noteworthy downside, as in the proof being too enormous. Their problem is their storage requirements. STARKs are doubly scalable, which means the proof verification is exponentially faster than the original computation’s time but the drawback is the size of the proof they create being too large, possibly 2 or 3 orders of magnitude more than those produced by zk-SNARKs. One example : StarkWare solves the inherent problems of scalability and privacy of blockchains. Using STARK technology, they generate a full proof-stack to produce and verify computer integrity tests. They utilise STARKs to batch transactions into a single proof that is verified on Ethereum. Matt Taylor states that the present iteration of StarkDEX demonstrates the viability of using STARKs for the scalability of Layer-2 by showing a substantial rise in the amount of blockchain transaction.
The idea of zk-STARKS was proposed by Eli-Ben Sasson, a professor at the Technion-Israel institute of Technology. zk-STARKS provide proofs that can be verified a lot quicker than zk-SNARKS. At the present time, Z-cash and Ethereum are on the whole considering to utilize zk-STARKS. zk-STARKS have solved the trusted setup issue. They have totally expel the requirement for multiple parties to create the private key required for the string. Rather everything needed to produce the proofs is public and the verifications are generated from arbitrary numbers. zk-STARKS actually removed the necessity in zk-SNARKS for unbalanced cryptography and rather utilizes the hash fuctions like those found in Bitcoin mining. In addition, they ought to have longer timeframe of realistic usability as far as their crytographic resilience than zk-SNARKS. However, there are some impediment of zk-STARKS, the main issue with zk-STARKS is their size. The verifications it uses are basically too enormous to use in many blockchains as they stand. As indicated by Vitalik Buterin, zk-STARKS will result in proofs of a couple of hundreds kilobytes versus the 288 bytes seen in zk-SNARKS.
The Difference Between zk-STARKS and zk-SNARKS.
Source : The Medium - Coinmonks
The complexity of communication : With the computation’s expanded complexity, the zk-SNARKS communication complexity also increases linearly, whereas zk-STARKs develops in the opposite direction and grows slowly as the computation size grows.The graph above shows that the communication required by the zk-STARKs to complete the calculation rises much slower than zk-snarks as the underlying evidence increases in complexity.
Source : The Medium - Coinmonks
The complexity of the verifier : zk-STARKs slightly widening with the development in computation size. On the other side, for confirmation evidence, zk-SNARKs requires less time than zk-STARKs. zk-STARKs, for instance need up to 100 ms to verify and zk-SNARKs need only up to 10ms. The graph above illustrates the the time taken by the zk-STARK to verify an evidence rises very slowly compared to the zk-SNARK as the underlying evidence increases in complexity.
Overall these two protocols have excellent potential in the cryptocurrency globe and can be a breakthrough avenue for mainstream implementation. Both conventions are truly needed steps to protect our privacy.
submitted by liuidaxmn to u/liuidaxmn [link] [comments]
Chinese Encryption Law To Come Into Force Next January China has passed the Encryption Law during the 14th session of the 13th National People’s Congress (NPC) on Oct 26, which will take effect on January 1, 2020.
Libra’s Threat To Central Banks Raises Questions About Its Launch According to AMBCrypto, Beatrice Weder di Mauro, President of the Centre for Economic Policy Research, is the latest think-tank professional to shed some light on Libra’s positive impact. In a recent interview with CNBC, di Mauro admitted that Libra may not receive a green light from lawmakers, adding that it had however managed to sow the seed for the introduction of another global digital currency.
YI Huanhuan: There Will Be National-Level Digital Bank, Digital Asset Exchange, Digital Investment Bank And Digital Asset Management Services Beijing Financial Association Research Institute Dean Yi Huanhuan commented on this politburo study session. YI has made nine predictions on governments’ action and industrial trend based on XI’s remarks. 1. The Cyberspace Administration will likely oversee this [blockchain] field; 2. To establish a national association of blockchain; 3. A large number of blockchain pilots will appear first in the financial industry, and then in government administrations; 4. Chinese national digital currency will play an important role in the world; 5. There will be state level digital banks, digital asset exchanges, digital investment banks and digital asset management; 6. The global blockchain network standards are likely to be set by China; 7. China will generate a large number of world-class leaders, entrepreneurs, and scholars in blockchain; 8. The performance of blockchain will be improved significantly in the next three to five years; 9. Mathematics, cryptography, and computational theory will become the most popular subjects.
Former Deputy Of BOC Governor: China has high blockchain visions, but should be careful with the trading risks and speculations Former Deputy Governor Of Bank Of China WANG Yongli shared his thought with CoinNess that China shows its ambition of establishing a leading global position in blockchain by researching and developing blockchain technology and applications. However, the blockchain technology is on an initial development stage. He urges investors to be careful with the trading risks and speculations as the definition of blockchain hasn’t been clarified, and there are existing issues like “decentralisation, security, high energy consumption” to be solved.
Video Lessons Targeting Blockchain Technology Go Live On CCPPD’s Platform Following the news that XI Jinping, Chinese President and General Secretary of the Communist Party of China, addressed the importance of blockchain in making technological breakthroughs at the eighteenth group learning event organized by the Political Bureau of the Central Committee Oct 24, the Xuexi.cn platform led by the Publicity Department of the Central Committee of the Communist Party of China, or CCPPD, announced Oct 26 the launch of the video lessons targeting the blockchain technology. The videos with a total of 25 lessons mainly include the preliminary introduction to the blockchain technology, the consensus agreement, Bitcoin, Ethereum and smart contracts, blockchain performance improvement, blockchain security, the basic knowledge of big data, in-depth analysis of blockchain instances, as well as the concrete programming code examples.
Encrypted project calendar（October 26, 2019）
KAT/Kambria: Kambria (KAT) Kambria will host the 2019 Southern California Artificial Intelligence and Data Science Conference in Los Angeles on October 26th with IDEAS. BTC/Bitcoin: CoinAgenda Global Summit will be held in Las Vegas from October 26th to 28th Horizen (ZEN): 26 October 2019 (or earlier) ZEN 2.0.19 Upgrade Zen 2.0.19 upgrade at block #610000, which is expected around October 26. IOTA (MIOTA): 26 October 2019 Taipei Workshop “Sam Chen, our Software Engineer, will explain how to use IOTA C Client library & will demonstrate 3 IoT projects running on ESP32 at…” Streamr DATAcoin (DATA): 26 October 2019 Data Union Demonstration “This Saturday, Streamr will hold the first demonstration of data unions, with a community built plugin for users to crowdsell…”
Encrypted project calendar（October 27, 2019）
ICON (ICX): 27 October 2019 Money 20/20 USA Event Money 20/20 USA in Las Vegas from October 27–30. Aeternity (AE): and 5 others 27 October 2019 CoinAgenda Conference CoinAgenda conference in Las Vegas from October 26–28.
Encrypted project calendar（October 28, 2019）
LTC/Litecoin: Litecoin (LTC) 2019 Litecoin Summit will be held from October 28th to October 29th in Las Vegas, USA BTC/Bitcoin: Mt.Gox changes the debt compensation plan submission deadline to October 28 ZEC/Zcash: Zcash (ZEC) will activate the Blossom Agreement on October 28th Stellar (XLM): 28 October 2019 Protocol 12 Upgrade Vote Horizon v0.22.0 has been released, which supports Protocol 12. This gives everyone ample time to prepare for the Protocol 12 upgrade vote Celsius (CEL) and 3 others: 28 October 2019 Litecoin Summit “…The Litecoin Summit offers two fun, jam-packed days with something for everyone.” XFOC (XFOC): The IDAX platform will be online XFOC and will open the XFOC/USDT trading pair at 13:00 on October 28. MEDIUM (MDM): The IDAX platform lists MDM and will open MDM/BTC trading pairs on October 28th at 15:00. ZB/ ZB Blockchain: The “2019 Hamburg Intercontinental Dialogue Conference” hosted by ZB.com will be held from October 28th to November 9th at the Four Seasons Hotel Hamburg, Germany. BQT (BQTX)： 28 October 2019 Down for Maintenance BQTX.com will be down for maintenance on the 28th of October from 7 to 12am UTC.
Encrypted project calendar（October 29, 2019）
BTC/Bitcoin: The 2nd World Encryption Conference (WCC) will be held in Las Vegas from October 29th to 31st. ICON (ICX): 29 October 2019 Decentralization “As a result, the decentralization schedule of the ICON Network has been changed from September 24, 2019 to October 29, 2019.” Ark (ARK): and 10 others 29 October 2019 WCC 2019 Second annual Blockchain and Cryptocurrency Technology event, World Crypto Conference (WCC), October 29th — October 31, 2019. Insifa (ISF): 29 October 2019 Prototype Alpha “We from Insifa have decided to be more open. Our Prototype will be developed in scrum. This means new releases every two weeks.” Enjin Coin (ENJ): 29 October 2019 EnjinCraft Stress Test “Join us Oct. 29 at 7:00pm GMT for a stress test. Let’s try to break #EnjinCraft!” IOTA (MIOTA): 29 October 2019 IOTSWC Barcelona IOT Solutions World Congress Digitalizing Industries conference in Barcelona from October 29–31.
Encrypted project calendar（October 30, 2019）
MIOTA/IOTA: IOTA (MIOTA) IOTA will host a community event on October 30th at the University of Southern California in Los Angeles on the topic “How to store data on IOTA Tangle.” TRON (TRX): 30 October 2019 SFBW19 Afterparty “TRON Official SFBW19 Afterparty from 7–10:30 PM in San Francisco.” Horizen (ZEN): 30 October 2019 Horizen Quarterly Update Join our first Quarterly Update on October the 30th at 5 PM UTC/ 1 PM EST. Deeper look into Engineering, BD, Marketing, and more. Aeternity (AE): 30 October 2019 Hardfork “The third hardfork of the æternity Mainnet is scheduled for October 30, 2019.” Valor Token (VALOR): 30 October 2019 Transaction Fees Resume “It’s September and the SMART VALOR Platform is still waiving transaction fees for all members, until October 30th!” Aragon (ANT): 30 October 2019 Singapore Meetup “Aragon on DAOs and DeFi” from 6:30–8:30 PM. Kambria (KAT): 30 October 2019 Outliers Hashed Awards Outliers Hashed awards from October 30–31. Ethereum Classic (ETC): 30 October 2019 Cohort Demo Day “ETC Labs hosts it’s 2nd Cohort Demo Day. Learn about the companies and project being accelerated through the Ethereum Classic ecosystem.”
Encrypted project calendar（October 31, 2019）
Spendcoin (SPND): 31 October 2019 (or earlier) Cross Ledger Mainnet “Cross Ledger Mainnet Release and SPND Token Swap,” during October 2019. Spendcoin (SPND): 31 October 2019 (or earlier) Blkchn University Beta “Blockchain University Beta goes live,” during October 2019. Stellar (XLM): 31 October 2019 (or earlier) Minor Release “We will have 6 Minor Releases in 2019; one each in February, March, May, June, August, and October.” Bitcoin SV (BSV): 31 October 2019 (or earlier) BSV Conference Seoul No additional information. Seele (SEELE): 31 October 2019 (or earlier) Public Network Mainne launch has been moved to Oct 31 . Howdoo (UDOO): 31 October 2019 (or earlier) Howdoo Live on Huawei Howdoo begins its exciting partnership with Huawei with listing as a featured app starting in October. Chiliz (CHZ): 31 October 2019 (or earlier) App Soft Launch Soft launch of Socios App by end of October. Dent (DENT): 31 October 2019 (or earlier) Loyalty Program “Afterburner loyalty program launch for all 21,6 Million mobile #DENT users will be in October!” IceChain (ICHX): 31 October 2019 (or earlier) Wallet Release IceChain releases wallet during October. Chiliz (CHZ): 31 October 2019 (or earlier) New Partnerships New sports and new teams joining Socios (+more updates and events) will be announced in the upcoming weeks. Horizen (ZEN): 31 October 2019 Weekly Insider Team updates at 3:30 PM UTC/ 11:30 AM EDT: Engineering, Node network, Product/UX, Helpdesk, Legal, BD, Marketing, CEO Closing thoughts, AMA. PCHAIN (PI): 31 October 2019 (or earlier) New Website No additional information. IOST (IOST): 31 October 2019 (or earlier) New Game on IOST “Eternal Fafnir, a new role-playing game developed by INFUN is coming to you in Oct.” Achain (ACT)： 31 October 2019 Mainnet 2.0 Launch “… The main network is officially scheduled to launch on October 31.” Mithril (MITH)：31 October 2019 Burn “MITH burn will take place on 2019/10/31 2pm UTC+8. “ Aergo (AERGO)： 31 October 2019 (or earlier) Aergo Lite V1.0 Release AergoLite, which brings blockchain compatibility to billions of devices using SQLite, released during October 2019. TE-FOOD (TFD)： 31 October 2019 (or earlier) Complementary Product “Development of a new, complementary product with a new partner, which we hope to be launched in September-October.” Edge (DADI)： 31 October 2019 (or earlier) Full Open Source Code base for the network fully open-sourced in September or October. BlockStamp (BST)： 31 October 2019 (or earlier) ASIC Miner Prototype In orderr to ensure BlockStamps continued decentralization, we will release a BST ASIC miner for testing. Perlin (PERL)： 31 October 2019 (or earlier) SSA Partnership “Perlin has partnered with the Singapore Shipping Association to create the International E-Registry of Ships (IERS)” Skrumble Network (SKM)： 31 October 2019 (or earlier) Exchange Release “3rd dApp: Exchange Release,” during October 2019. EDC Blockchain (EDC)： 31 October 2019 (or earlier) Blockchain Marketplace “As you already know, our ECRO blockchain marketplace is ready for release, and will open to the global community in October!” BlockStamp (BST)： 31 October 2019 (or earlier) ASIC Miner Prototype In orderr to ensure BlockStamps continued decentralization, we will release a BST ASIC miner for testing. XinFin Network (XDCE)： 31 October 2019 Homebloc Webinar “XinFin — Homebloc Webinar 2019” from 9–10 PM. Akropolis (AKRO)： 31 October 2019 (or earlier) Alpha Release “Delivers the initial mainnet implementation of protocol. All building blocks will be united to one product.” Hyperion (HYN)： 31 October 2019 (or earlier) Economic Model The final version of the HYN Economic Model launches in October.
Encrypted project calendar（November 1, 2019）
INS/Insolar: The Insolar (INS) Insolar wallet and the redesigned Insolar Block Explorer will be operational on November 1, 2019. VeChain (VET)：”01 November 2019 BUIDLer Reunion Party BUIDLer Reunion Party in San Francisco from 8–11 PM. uPlexa (UPX)： 01 November 2019 Steadfast Storm — PoS/PoW split (Utility nodes ie. master nodes) — Upcoming Anonymity Network much like TOR — Privacy-based DApps — Reduced network fees. Enjin Coin (ENJ)： 01 November 2019 MFT Binding “ICYMI: On Enjin Coin’s 2nd anniversary (November 1), Enjin MFTs will be bound to hodlers’ blockchain addresses…” Auxilium (AUX)：01 November 2019 AUX Interest Distribution Monthly interest distribution by Auxilium Interest Distribution Platform for coinholders. Also supports charity. Havy (HAVY)：01 November 2019 Token Buyback “Havy tokens buyback, Only in 1 exchange between Idex, Mercatox & Hotbit. The exchange depends on the most lower sell wall.” Egretia (EGT): 01 November 2019 Global DApp Contest SF 2019 Egretia Global DApp Contest in San Francisco.
Encrypted project calendar（November 2, 2019）
Kambria (KAT)： 02 November 2019 VietAI Summit 2019 Kambria joins forces with VietAI for the annual VietAI Summit, with top experts from Google Brain, NVIDIA, Kambria, VietAI, and more!
Encrypted project calendar（November 4, 2019）
Stellar (XLM)： 04 November 2019 Stellar Meridian Conf. Stellar Meridian conference from Nov 4–5 in Mexico City. Cappasity (CAPP)： 04 November 2019 Lisbon Web Summit Lisbon Web Summit in Lisbon, Portugal from November 4–7.
Encrypted project calendar（November 5, 2019）
Nexus (NXS)： 05 November 2019 Tritium Official Release “Remember, Remember the 5th of November, the day Tritium changed Distributed Ledger. Yes, this is an official release date.” NEM (XEM)： 05 November 2019 Innovation Forum — Kyiv NEM Foundation Council Member Anton Bosenko will be speaking in the upcoming International Innovation Forum in Kyiv on November 5, 2019. TomoChain (TOMO): 05 November 2019 TomoX Testnet “Mark your calendar as TomoX testnet will be live on Tuesday, Nov 5th!” aelf (ELF): 05 November 2019 Bug Bounty Program Ends On Oct 24th, 2019 aelf’s biggest bug bounty will launch with a large reward pool. The event will run for almost 2 weeks.
Encrypted project calendar（November 6, 2019）
STEEM/Steem: The Steem (STEEM) SteemFest 4 conference will be held in Bangkok from November 6th to 10th. KIM/Kimcoin: Kimcoin (KIM) Bitfinex will be online at KIM on November 6, 2019 at 12:00 (UTC).
Encrypted project calendar（November 7, 2019）
XRP (XRP)： 07 November 2019 Swell 2019 Ripple hosts Swell from November 7th — 8th in Singapore. BTC/Bitcoin: Malta The A.I. and Blockchain summit will be held in Malta from November 7th to 8th.
Encrypted project calendar（November 8, 2019）
BTC/Bitcoin: The 2nd Global Digital Mining Summit will be held in Frankfurt, Germany from October 8th to 10th. IOTX/IoTeX: IoTex (IOTX) will participate in the CES Expo on November 08
Encrypted project calendar（November 9, 2019）
CENNZ/Centrality: Centrality (CENNZ) will meet in InsurTechNZ Connect — Insurance and Blockchain on October 9th in Auckland. HTMLCOIN (HTML): 09 November 2019 (or earlier) Mandatory Wallet Update Mandatory Wallet Update: there will be a soft fork on our blockchain. This update adds header signature verification on block 997,655.
Encrypted project calendar（November 11, 2019）
PAX/Paxos Standard: Paxos Standard (PAX) 2019 Singapore Financial Technology Festival will be held from November 11th to 15th, and Paxos Standard will attend the conference. Crypto.com Coin (CRO): and 3 others 11 November 2019 Capital Warm-up Party Capital Warm-up Party in Singapore. GoldCoin (GLC): 11 November 2019 Reverse Bitcoin Hardfork The GoldCoin (GLC) Team will be “Reverse Hard Forking” the Bitcoin (BTC) Blockchain…”
Encrypted project calendar（November 12, 2019）
BTC/Bitcoin: The CoinMarketCap Global Conference will be held at the Victoria Theatre in Singapore from November 12th to 13th Binance Coin (BNB) and 7 others: 12 November 2019 CMC Global Conference “The first-ever CoinMarketCap large-scale event: A one-of-a-kind blockchain / crypto experience like you’ve never experienced before.”
Encrypted project calendar（November 13, 2019）
Fetch.ai (FET): 13 November 2019 Cambridge Meetup “Join us for a @Fetch_ai #Cambridge #meetup on 13 November @pantonarms1.” Binance Coin (BNB) and 5 others: 13 November 2019 Blockchain Expo N.A. “It will bring together key industries from across the globe for two days of top-level content and discussion across 5 co-located events…” OKB (OKB): 13 November 2019 Dnipro, Ukraine- Talks Join us in Dnipro as we journey through Ukraine for our OKEx Cryptour on 11 Nov. Centrality (CENNZ): 13 November 2019 AMA Meetup “Ask our CEO @aaronmcdnz anything in person! Join the AMA meetup on 13 November in Singapore.” OKB (OKB): 13 November 2019 OKEx Cryptotour Dnipro “OKEx Cryptour Ukraine 2019 — Dnipro” in Dnipro from 6–9 PM (EET).
Encrypted project calendar（November 14, 2019）
BTC/Bitcoin: The 2019 BlockShow Asia Summit will be held at Marina Bay Sands, Singapore from November 14th to 15th.
Bitcoin (BTC) bulls seem to have decimated the bears. As of the time of writing this article, the leading cryptocurrency is at $9,800 — up over $2,500, some 38%, in the past 36 hours. This is around $800 short of the daily high of $10,600.
Chairman of China’s top leadership announced that China should be expected to take the lead in the global blockchain, so that the exchange rate of Bitcoin against the US dollar rose sharply, and the support level exceeded $10,500.
Review previous articles: https://firstname.lastname@example.org
submitted by atomarsofficial to Atomars [link] [comments]
What is Zcoin?
Zcoin, also referred to as XZC or Zerocoin, is an open source decentralized cryptocurrency that provides privacy and anonymity for its users when making transactions.
To achieve its privacy and anonymity, Zcoin uses zero-knowledge proofs via the Zerocoin protocol, which is at this moment in time one of the most cited cryptography papers.
According to Wikipedia, in cryptography, a zero-knowledge proof or zero-knowledge protocol is a method in which one party proves to another party (the verifier) that a given statement is actually true.
In other words, in a transaction with Bitcoin or Ethereum or something similar, your transaction history is always linked to your coins by default, leaving you vulnerable. All it takes is one link to your personal information or IP to find out the origin of the coins.
However, when you trade with Zcoin’s Zercoin feature, your transaction history is not linked to the actual coins. Only the receiver and sender know that the funds have actually been exchanged.
How Does Zcoin Work?Zcoin works on the Zerocoin protocol by enforcing Zero-knowledge proofs. Here are the components of Zcoin to explain how it works.
Mint: When sending a private transaction with Zcoin, all you need to do is select the number of coins you want to mint. Post that your normal Zcoin balance would reduce automatically and you will be credited with new coins and no transaction history. In essence, your old coins are burned cryptographically, which prevents anyone else from using them again and being directed to your transaction history. You get credited with new coins with no history, while the total supply is maintained.
For now, you can only mint in denominations of 1, 10, 25, 50 and 100. If you choose ‘100’ coins to be minted, for instance, you will instantly be credited with 100 new Zcoins with no history attached to them.
Zcoin’s VisionZcoin seeks to improve things that Bitcoin hasn’t been able to so far, some of which include fungibility, privacy and miner’s centralization.
Users of Zcoin can enjoy full fungibility and privacy along with demolishing miner’s centralization by implementing a better proof of work algorithm called MTP.
Total Zcoin supply
Only 21 million units of Zcoin will ever be produced. Currently, there are about 3.4 million units in circulation, with the rest yet to be mined.
But the total supply has increased by 388450 XZC units after a Zcoin code bug, which the team refused to roll back due to economic reasons, which is why the total supply stands at approximately 21.4 million.
Every 10 minutes, a Zcoin block is mined and 50 coins are generated, making 72,000 Zcoins per day.
Market cap of Zcoin
According to CoinMarketCap, the total circulating supply of Zcoin is 5,757,841 XZC and the current unit price is $9.6. That makes the market cap approximately $55 million*.*
How To Buy Zcoin CryptocurrencyIf you are looking to get some Zcoin, here is a list of resources where it can be bought from.
Zcash is a decentralized and open-source peer-to-peer cryptocurrency that provides strong privacy protections. It was created as a fork of Bitcoin and, like bitcoin, it also has a hard limit of 21 million coins. Unlike bitcoin, however, Zcash offers total privacy for its users maintaining the absolute anonymity behind each transaction along with the parties and the amounts involved in it.
PIVX, which stands for Private Instant Verified Transaction, is an open-source, decentralized form of digital online money that uses blockchain technology. This makes it easy to transfer all around the world in an instant with low transaction fees with market leading security & privacy. PIVX focuses on privacy, security, anonymity, and instant transactions.
Monero is a fast, private, secure and untraceable digital currency system that uses a special kind of cryptography to keep all its transactions 100% unlinkable and untraceable. With Monero, you are your own bank. You can spend safely, knowing that others cannot see your balances or track your activity.
Some Zcoin misconceptions
There are some misconceptions regarding Zcoin:
Zcoin’s Future & RoadmapZcoin’s future is quite promising and worth watching based on these interesting milestones on their roadmap:
Zcoin Team & ProgressZerocoin is a cryptocurrency proposed by professor Matthew D. Green, a professor of Johns Hopkins University, and graduate students Ian Miers and Christina Garman. It was proposed as an extension to the Bitcoin protocol that would add true cryptographic anonymity to Bitcoin transactions.
Zerocoin was first implemented into a fully functional cryptocurrency and released to the public by Poramin Insom, the lead developer, as Zcoin in September 2016.
Some of the notable dev members of the team are listed below.
Founder and Core Developer
Poramin Insom created what was the world's 4th most valuable cryptocurrency in February 2014. He is also the world's first person to implement stealth addresses in QT-Wallets, improving cryptocurrency anonymity. He earned a master’s degree in Information Security from Johns Hopkins University, where he wrote a paper on a proposed practical implementation of the Zerocoin protocol.
Alexander N. aka Aizensou is a full-stack developer who has experience in many programming languages (C++, C#, Python, Perl, Java etc.) and has been involved in the cryptocurrency space since 2013. He has a broad development portfolio from low level APIs in Python and C++ to Android native applications in Java. In addition to his involvement in cryptocurrencies, Alexander was doing his P.h.D. in machine learning at a German university from 2012 to 2016.
Saran Siriphantnon is the CTO of Satang.co/Satoshift, a fintech company focusing on creating an open financial system for Southeast Asia. He served as President of the Computer System Administrator Group at King Mongkut's Institute of Technology Ladkrabang.
Tadhg Riordan is a 24 year old Software Developer from Wexford, Ireland. He recently completed his MSc from Trinity College Dublin, where he worked with Blockchain privacy mechanisms, focusing particularly on Zero-Knowledge Proofs and the Ethereum platform. He is a strong advocate for the adoption of cryptocurrency and for complete financial privacy.
Apart from these, their team comprises of other developers, community managers, support personnel and advisors who maintain the required balance.
Advisors:Aram Jivanyan (Cryptography Advisor): Co-Founder at Skycryptor & KMSchai
Torphop Korgtadam (It Security Consultant): Senior Vice President, Head Of Internal Audit Strategy, Innovation and Decision Science at United Overseas Bank Limited
Alexander N. aka Aizensou (Advisor)
Unique/Key Features Against Its Competitors:
Original article here: https://medium.com/wanchain-foundation/ama-with-wanchain-vp-lini-58ada078b4fesubmitted by maciej_wan to wanchain [link] [comments]
“What is unique about us is that we have actually put theory into practice.”https://preview.redd.it/n6lo2xcmtn621.png?width=800&format=png&auto=webp&s=281acce4b45eed8acf0c52b201d01cb6f0d13507
Wanchain’s Vice President of Business Development, Lini, sat down with blockchain media organization Neutrino for an AMA covering a wide range of topics concerning Wanchain’s development.
The following is an English translation of the original Chinese AMA which was held on December 13th, 2018:
Neutrino: Could you please first share with us a little basic background, what are the basic concepts behind cross chain technology? What are the core problems which are solved with cross-chain? In your opinion, what is the biggest challenge of implementing cross chain to achieve value transfer between different chains?
Lini: Actually, this question is quite big. Let me break it down into three smaller parts:
In China, we like to use the word “cross-chain”, the term “interoperability” is used more frequently in foreign countries. Interoperability is also one of the important technologies identified by Vitalik for the development of a future blockchain ecosystem mentioned in the Ethereum white paper. So cross-chain is basically the concept of interoperability between chains.
In essence, blockchain is a distributed bookkeeping technique, also known as distributed ledger technology. Tokens are the core units of account on each chain, there currently exist many different chains, each with their own token. Of especial importance is the way in which each ledger uses tokens to interact with each other for the purpose of clearing settlements.
Cross chain technology is one of the foundational technological infrastructures that is necessary for the large scale application of blockchain technology.
Neutrino: As we all know, there are many different kinds of cross-chain technologies. Please give us a brief introduction to several popular cross-chain technologies on the market, and the characteristics of each of these technologies。
Lini: Before answering this question, it is very important to share two important concepts with our friends: heterogeneity and homogeneity, and centralization and decentralization.
These two points are especially important for understanding various cross-chain technologies, because there are many different technologies and terminologies, and these are some of the foundational concepts needed for understanding them.
There are also two core challenges which must be overcome to implement cross-chain:
Combining the above two points, we look at the exploration of some solutions in the industry and the design concepts of other cross-chain projects.
First I’d like to discuss the Relay solution.
However the Relay solution must consume a relatively large amount of gas to read the BTC header. Another downside is that, as we all know, Bitcoin’s blocks are relatively slow, so the time to wait for verification will be long, it usually takes about 10 minutes to wait for one block to confirm, and the best practice is to wait for 6 blocks.
The next concept is the idea of Sidechains.
This solution is good, but not all chains contain SPV, a simple verification method. Therefore, there are certain drawbacks. Of course, this two way peg way solves challenge beta very well, that is, the atomicity of the transaction.
These two technical concepts have already been incorporated into a number of existing cross chain projects. Let’s take a look at two of the most influential of these.
The first is Polkadot.
This is just a summary based on Polkadot’s whitepaper and most recent developments. The theoretical design is very good and can solve challenges alpha and beta. Last week, Neutrino organized a meetup with Polkadot, which we attended. In his talk, Gavin’s focus was on governance, he didn’t get into too much technical detail, but Gavin shared some very interesting ideas about chain governance mechanisms! The specific technical details of Polkadot may have to wait until after their main net is online before it can be analyzed.
Next is Cosmos.
Cosmos is a star project who’s basic concept is similar to Polkadot. Cosmos’s approach is based on using a central hub. Both projects both take into account the issue of heterogeneous cross-chain transactions, and both have also taken into account how to solve challenges alpha and beta.
To sum up, each research and project team has done a lot of exploration on the best methods for implementing cross-chain technology, but many are still in the theoretical design stage. Unfortunately, since the main net has not launched yet, it is not possible to have a more detailed understanding of each project’s implementation. A blockchain’s development can be divided into two parts: theoretical design, and engineering implementation. Therefore, we can only wait until after the launch of each project’s main network, and then analyze it in more detail.
Neutrino: As mentioned in the white paper, Wanchain is a general ledger based on Ethereum, with the goal of building a distributed digital asset financial infrastructure. There are a few questions related to this. How do you solve Ethereum’s scaling problem? How does it compare with Ripple, which is aiming to be the standard trading protocol that is common to all major banks around the world? As a basic potential fundamental financial infrastructure, what makes Wanchain stand out?
Lini: This question is actually composed of two small questions. Let me answer the first one first.
The TPS of Ethereum is not high at this stage, which is limited by various factors such as the POW consensus mechanism. However, this point also in part is due to the characteristics of Ethereum’s very distributed and decentralized features. Therefore, in order to improve TPS, Wanchain stated in its whitepaper that it will launch its own POS consensus, thus partially solving the performance issues related to TPS. Wanchain’s POS is completely different from the POS mechanism of Ethereum 2.0 Casper.
Of course, at the same time, we are also paying close attention to many good proposals from the Ethereum community, such as sharding, state channels, side chains, and the Raiden network. Since blockchain exists in the world of open source, we can of course learn from other technological breakthroughs and use our own POS to further improve TPS. If we have some time at the end, I’d love to share some points about Wanchain’s POS mechanism.
Wanchain is focused on different use cases, it is to act as a bridge between different tokens and tokens, and between assets and tokens. For various cross-chain applications it is necessary to consume WAN as a gas fee to pay out to nodes.
So it seems that the purpose Ripple and Wanchain serve are quite different. Of course, there are notary witnesses in the cross-chain mechanism, that is, everyone must trust the middleman. Ripple mainly serves financial clients, banks, so essentially everyone’s trust is already there.
Neutrino: We see that Wanchain uses a multi-party computing and threshold key sharing scheme for joint anchoring, and achieves “minimum cost” for integration through cross-chain communication protocols without changing the original chain mechanism. What are the technical characteristics of multi-party computing and threshold key sharing? How do other chains access Wanchain, what is the cross-chain communication protocol here? What is the cost of “minimum cost?
Lini: The answer to this question is more technical, involving a lot of cryptography, I will try to explain it in a simple way.
In sMPC multiple parties each holding their own piece of private data jointly perform a calculation (for example, calculating a maximum value) and obtain a calculation result. However, in the process, each party involved does not leak any of their respective data. Essentially sMPC calculation can allow for designing a protocol without relying on any trusted third parties, since no individual ever has access to the complete private information.
Secure multiparty computing can be abstractly understood as two parties who each have their own private data, and can calculate the results of a public function without leaking their private data. When the entire calculation is completed, only the calculation results are revealed to both parties, and neither of them knows the data of the other party and the intermediate data of the calculation process. The protocol used for secure multiparty computing is homomorphic encryption + secret sharing + OT (+ commitment scheme + zero knowledge proofs, etc.)
Wanchain’s 21 cross chain Storeman nodes use sMPC to participate in the verification of a transaction without obtaining of a user’s complete private key. Simply put, the user’s private key will have 21 pieces given to 21 anonymous people who each can only get 1/21 part, and can’t complete the whole key.
Wanchain uses the threshold M<=N; N=21; M=16. That is to say, at least 16 Storeman nodes must participate in multi-party calculation to confirm a transaction. Not all 21 Storeman nodes are required to participate. This is a solution to the security problem of managing private keys.
Cross-chain communication protocols refers to the different communication methods used by different chains. This is because heterogeneous cross-chain methods can’t change the mechanism of the original chains. Nakamoto and Vitalik will not modify their main chains because they need BTC and ETH interoperability. Therefore, project teams that can only do cross-chain agreements to create different protocols for each chain to “talk”, or communicate. So the essence of a cross-chain protocol is not a single standard, but a multiple sets of standards. But there is still a shared sMPC and threshold design with the Storeman nodes.
The minimum cost is quite low, as can be shown with Wanchain 3.0’s cross chain implementation. In fact it requires just two smart contracts, one each on Ethereum and Wanchain to connect the two chains. To connect with Bitcoin all that is needed is to write a Bitcoin script. Our implementation guarantees both security and decentralization, while at the same time remaining simple and consuming less computation. The specific Ethereum contract and Bitcoin scripts online can be checked out by anyone interested in learning more.
Neutrino: What kind of consensus mechanism is currently used by Wanchain? In addition, what is the consensus and incentive mechanism for cross-chain transactions, and what is the purpose of doing so? And Wanchain will support cross-chain transactions (such as BTC, ETH) on mainstream public chains, asset cross-chain transactions between the alliance chains, and cross-chain transactions between the public and alliance chains, how can you achieve asset cross-chain security and privacy?
Lini: It is now PPOW (Permissioned Proof of Work), in order to ensure the reliability of the nodes before the cross-chain protocol design is completed, and to prepare to switch to POS (as according to the Whitepaper roadmap). The cross-chain consensus has been mentioned above, with the participation of a small consensus (at least 16 nodes) in a set of 21 Storeman nodes through sMPC and threshold secret sharing.
In addition, the incentive is achieved through two aspects: 1) 100% of the cross chain transaction fee is used to reward the Storeman node; 2) Wanchain has set aside a portion of their total token reserve as an incentive mechanism for encouraging Storeman nodes in case of small cross-chain transaction volume in the beginning.
It can be revealed that Storeman participation is opening gradually and will become completely distributed and decentralized in batches. The first phase of the Storeman node participation and rewards program is to be launched at the end of 2018. It is expected that the selection of participants will be completed within one quarter. Please pay attention to our official announcements this month.
In addition, for public chains, consortium chains, and private chains, asset transfer will also follow the cross-chain mechanism mentioned above, and generally follow the sMPC and threshold integration technology to ensure cross-chain security.
When it comes to privacy, this topic will be bigger. Going back to the Wanchain Whitepaper, we have provided privacy protection on Wanchain mainnet. Simply put, the principle is using ring signatures. The basic idea is that it mixes the original address with many other addresses to ensure privacy. We also use one-time address. In this mechanism a stamp system is used that generates a one-time address from a common address. This has been implemented since our 2.0 release.
But now only the privacy protection of native WAN transactions can be provided. The protection of cross-chain privacy and user experience will also be one of the important tasks for us in 2019.
Neutrino: At present, Wanchain uses Storeman as a cross-chain trading node. Can you introduce the Storeman mechanism and how to protect these nodes?
Lini: Let me one problem from two aspects.
Neutrino: On December 12th, the mainnet of Wanchain 3.0 was launched. Wanchain 3.0 opened cross-chain transactions between Bitcoin, Ethereum and ERC20 (such as MakerDao’s stable currency DAI and MKR). What does this version mean for you and the industry? This upgrade of cross-chain with Bitcoin is the biggest bright spot. So, if now you are able to use Wanchain to make transactions between what is the difference between tokens, then what is the difference between a cross chain platform like Wanchain and cryptocurrency exchanges?
Lini: The release of 3.0 is the industry’s first major network which has crossed ETH and BTC, and it has been very stable so far. As mentioned above, many cross-chain, password-protected theoretical designs are very distinctive, but for engineering implementation, the whether or not it can can be achieved is a big question mark. Therefore, this time Wanchain is the first network launched in the world to achieve this. Users are welcome to test and attack. This also means that Wanchain has connected the two most difficult and most challenging public networks. We are confident we will soon be connecting other well-known public chains.
At the same time of the release of 3.0, we also introduced cross chain integration with other ERC20 tokens in the 2.X version, such as MakerDao’s DAI, MKR, LRC, etc., which also means that more tokens of excellent projects on Ethereum will also gradually be integrated with Wanchain.
Some people will be curious, since Wanchain has crossed so many well-known public chains/projects; how is it different with crypto exchanges? In fact, it is very simple, one centralized; one distributed. Back to the white paper of Nakamoto, is not decentralization the original intention of blockchain? So what Wanchain has to do is essentially to solve the bottom layer of the blockchain, one of the core technical difficulties.
Anyone trying to create a DEX (decentralized exchange); digital lending and other application scenarios can base their application on Wanchain. There is a Wanchain based DEX prototype made by our community members Jeremiah and Harry, which quite amazing. Take a look at this video below.
Neutrino: What are the specific application use cases after the launch of Wanchain 3.0? Most are still exploring small-scale projects. According to your experience, what are the killer blockchain applications of the future? What problems need to be solved during this period? How many years does it take?
Lini: As a cross-chain public chain, we are not biased towards professional developers or ordinary developers, and they are all the same. As mentioned above, we provide a platform as infrastructure, and everyone is free to develop applications on us.
For example, if it is a decentralized exchange, it must be for ordinary users to trade on; if it is some kind of financial derivatives product, it is more likely to be used by finance professionals. As for cross-chain wallets which automatically exchange, I’m not sure if you are talking about distributed exchanges, the wallet will not be “automatic” at first, but you can “automatically” redeem other tokens.
Finally, the remaining WAN tokens are strictly in accordance with the plan laid out in the whitepaper. For example, the POS node reward mentioned above will give 10% of the total amount for reward. At the same time, for the community, there are also rewards for the bounty program. The prototype of the DEX that I just saw is a masterpiece of the overseas community developers, and also received tokens from our incentive program.
Neutrino community member’s question: There are many projects in the market to solve cross-chain problems, such as: Cosmos, Polkadot, what are Wanchain’s advantages and innovations relative to these projects?
Lini: As I mentioned earlier, Cosmos and pPolkadot all proposed very good solutions in theory. Compared with Wanchain, I don’t think that we have created anything particularly unique in our theory. The theoretical basis for our work is cryptography, which is derived from the academic foundation of scholars such as Yao Zhizhi and Silvio Micali. Our main strong point is that we have taken theory and put it into practice..
Actually, the reason why people often question whether a blockchain project can be realized or not is because the whitepapers are often too ambitious. Then when they actually start developing there are constant delays and setbacks. So for us, we focus on completing our very solid and realizable engineering goals. As for other projects, we hope to continue to learn from each other in this space.
Neutrino community member Amos from Huobi Research Institute question: How did you come to decide on 21 storeman nodes?
Lini: As for the nodes we won’t make choices based on quantity alone. The S in the POS actually also includes the time the tokens are staked, so that even if a user is staking less tokens, the amount of time they stake them for will also be used to calculate the award, so that is more fair. We designed the ULS (Unique Leader Selection) algorithm in order to reduce the reliance on the assumption of corruption delay (Cardano’s POS theory). which is used for ensuring fairness to ensure that all participants in the system can have a share of the reward, not only few large token holders.
Wu Di, a member of the Neutrino community: Many big exchanges have already begun to deploy decentralized exchanges. For example, Binance, and it seems that the progress is very fast. Will we be working with these influential exchanges in the future? We we have the opportunity to cooperate with them and broaden our own influence?
Lini: I also have seen some other exchange’s DEX. Going back the original point, distributed cross-chain nodes and centralized ones are completely different. I’m guessing that most exchanges use a centralized cross-chain solution, so it may not be the same as the 21 member Storeman group of Wanchain, but I think that most exchanges will likely be using their own token and exchange system. This is my personal understanding. But then, if you are developing cross chain technology, you will cooperate with many exchanges that want to do a DEX. Not only Binance, but also Huobi, Bithumb, Coinbase… And if there is anyone else who would like to cooperate we welcome them!
Neutrino community member AnneJiang from Maker: Dai as the first stable chain of Wanchain will open a direct trading channel between Dai and BTC. In relation to the Dai integration, has any new progress has been made on Wanchain so far?
Lini: DAI’s stable currency has already been integrated on Wanchain. I just saw it yesterday, let me give you a picture. It’s on the current 3.0 browser, https://www.wanscan.org/, you can take a look at it yourself.
This means that users with DAI are now free to trade for BTC, or ETH or some erc20 tokens. There is also a link to the Chainlink, and LRC is Loopring, so basically there are quite a few excellent project tokens. You may use the Wanchain to trade yourself, but since the DEX is not currently open, currently you can only trade with friends you know.
About NeutrinoNeutrino is a distributed, innovative collaborative community of blockchains. At present, we have established physical collaboration spaces in Tokyo, Singapore, Beijing, Shanghai and other places, and have plans to expand into important blockchain innovation cities such as Seoul, Thailand, New York and London. Through global community resources and partnerships, Neutrino organizes a wide range of online an offline events, seminars, etc. around the world to help developers in different regions better communicate and share their experiences and knowledge.
About WanchainWanchain is a blockchain platform that enables decentralized transfer of value between blockchains. The Wanchain infrastructure enables the creation of distributed financial applications for individuals and organizations. Wanchain currently enables cross-chain transactions with Ethereum, and today’s product launch will enable the same functionalities with Bitcoin. Going forward, we will continue to bridge blockchains and bring cross-chain finance functionality to companies in the industry. Wanchain has employees globally with offices in Beijing (China), Austin (USA), and London (UK).
You can find more information about Wanchain on our website. Additionally, you can reach us through Telegram, Discord, Medium, Twitter, and Reddit. You can also sign up for our monthly email newsletter here.
Bitcoin Explained. Bitcoin is digital money, it is money just like the Ghana Cedi (GHS) but instead of a paper and coin-based form of currency, Bitcoin is virtual. Bitcoin allows us to send money globally, from any point of the world to another point securely and instantly with very minimal fees. Bitcoin is not controlled by any government. All parameters on the distribution (when and how much ... Binance Hack: Cryptocurrency Forks Explained. ROKKEX . Follow. May 8, 2019 · 5 min read. W hat will you choose: accept lost funds or betray your ideals? Binance Hack 2019. Today the crypto world ... Cryptoeconomics lies at the intersection of cryptography, economics, and computer science and provides insight into the incentives and disincentives experienced by different stakeholders in a decentralized network. All of the items we already discussed, now together. Its practice involves applying economic methodologies like game theory, mechanism design, and econometrics to help reveal ... Art Bitcoin Blockchain. Over the years cryptography has evolved to include many different techniques, one of which is a core component of the digital currency Bitcoin, Public-key cryptography. Binance Blocks Account Worth Almost $1M. In November 2018, Binanace blocked an account that had over $850,000 worth of crypto funds. The owner claims that the exchange led by Changpeng Zhao (CZ) stole the money, Russia-based crypto news site Forklog reports, citing HackControl.. The account owner claims that Binance froze crypto funds worth $$858,999 at the time. A very straight forward explanation of a very complex topic. We explain this highly abstact and mathmatical concept in a way anyone can understand. Getting Bitcoin blockchain explained is essential to understanding how blockchain works. The Bitcoin blockchain is a database (known as a “ledger”) that consists only of Bitcoin transaction records.There is no central location that holds the database, instead, it is shared across a huge network of computers. Bitcoin (BTC), Bitcoin Cash (BCH) & Bitcoin SV (BCH) (November 2018 - December 2019) 2.1 Efficient resource allocation theory. According to Binance Research, the mining allocation problem can be referred to as a problem of efficient resource allocation, from the perspective of participants in the Bitcoin mining industry: SHA-256 (ASIC) miners. Understanding cryptocurrency means first understanding Bitcoin… The Story of Bitcoin. No one knows who Satoshi Nakamoto is. It could be a man, a woman or even a group of people. Satoshi Nakamoto only ever spoke on crypto forums and through emails. In late 2008, Nakamoto published the Bitcoin whitepaper. Symmetric key cryptography (or symmetric encryption) is a type of encryption scheme in which the same key is used both to encrypt and decrypt messages. Such a method of encoding information has been largely used in the past decades to facilitate secret communication between governments and militaries. Nowadays, symmetric key algorithms are ...
[index]          
https://dssminer.com https://www.binance.com/en/register?ref=42863570 https://www.youtube.com/channel/UCGVEQPhtmMbHgoD-5HbfMFQ welcome to to this channel ple... =====(binance tutorial for beginners)===== Bitcoin Trading Tutorial 6 - Binance Coin (BNB) Explained #binance tutorial tagalog #binance tutorial malayalam #b... Binance Futures: https://www.binance.com/en/futures/ref/blockbuilders BitMEX (save 10% trading fees): https://www.bitmex.com/register/KtaiLr In this how-to I... Join Coinbase - $10 of Bitcoin with $100 investment - https://calcur.tech/coinbase Binance for trading cryptocurrency - https://calcur.tech/binance Have you ... Binance $100 Day Beginners Guide. To Crypto trading on Binance REGISTRATION Binance: https://clck.ru/JsEpq All Projects. Push! https://bitcoin-eng.blogsp... #binance #crypto #bitcoin Explaining the Bittrex and Binance ban from the US Where do you think the money will flow? Updates on technical and fundamental analysis to keep you on track with your ... #bitcoin #crypto #cryptocurrencies In this quick video we will show how to place a trade in Binance Futures. ----- ... How to trade bitcoin futures on binance for beginners. Binance Bitcoin Futures Trading for Beginners EXPLAINED Join Binance https://www.binance.com/?ref=... =====(binance tutorial)===== Bitcoin Trading Tutorial 6 - Binance Coin (BNB) Explained #binance tutorial for beginners #binance tutorial bd #binance tutorial... Depth Chart Binance Explained for Crypto Trading. How to Read Binance Depth Chart for beginners. GET YOUR FREE STOCK in Robinhood http://share.robinhood.com/...