How much Internet bandwidth does a mining rig use? • GPU0

Some sites to make extra money

Hello Fellow Redditors,
I am going to list some of my income sources. I will try to give as much information as I can.
Some details about me:I am u/abhiearns, I am currently studying. I want to create some sort of extra income sources. I have been trying to use beermoney as well as other passive income communities like passive_income, passiveincome to find some sites and sources that can work for me.
Enough with the details, Let start by listing some of my extra income sources.
Active Earning: So, I will start with sites on which you have to work actively and devote some serious hours to earn some extra income. These are some beermoney sites (include survey sites, and other such sites):


Passive Earning (No Initial Investments): These will list some of my passive earning sources, I am not listing my investments here because I think they deserve a separate section.Disclaimer: I have 2 laptops and an extra phone so I use all of them for earning, the payments may vary depending on the number and power of various computers.




Passive Earning (Investments Required): These are the sources which require some sort of initial investment. These sources can be risky and there are chances to lose money.



\** I am still trying other sites and apps. I will keep updating this post.*
These are some of the sources I use to earn, I highly recommend these. I won't say you will become a millionaire using these but still its little more than you had yesterday.
submitted by abhiearns to thesidehustle [link] [comments]

Some extra income sources for you

Hello Fellow Redditors,
I am going to list some of my income sources. I will try to give as much information as I can.
Some details about me:I am u/abhiearns, I am currently studying. I want to create some sort of extra income sources. I have been trying to use beermoney as well as other passive income communities like passive_income, passiveincome to find some sites and sources that can work for me.
Enough with the details, Let start by listing some of my extra income sources.
Active Earning: So, I will start with sites on which you have to work actively and devote some serious hours to earn some extra income. These are some beermoney sites (include survey sites, and other such sites):
Passive Earning (No Initial Investments): These will list some of my passive earning sources, I am not listing my investments here because I think they deserve a separate section.Disclaimer: I have 2 laptops and an extra phone so I use all of them for earning, the payments may vary depending on the number and power of various computers.
Passive Earning (Investments Required): These are the sources which require some sort of initial investment. These sources can be risky and there are chances to lose money.
\** I am still trying other sites and apps. I will keep updating this post.*
These are some of the sources I use to earn, I highly recommend these. I won't say you will become a millionaire using these but still its little more than you had yesterday.
submitted by abhiearns to clicksforbeermoney [link] [comments]

DFINITY Research Report

DFINITY Research Report
Author: Gamals Ahmed, CoinEx Business Ambassador
ABSTRACT
The DFINITY blockchain computer provides a secure, performant and flexible consensus mechanism. At its core, DFINITY contains a decentralized randomness beacon, which acts as a verifiable random function (VRF) that produces a stream of outputs over time. The novel technique behind the beacon relies on the existence of a unique-deterministic, non-interactive, DKG-friendly threshold signatures scheme. The only known examples of such a scheme are pairing-based and derived from BLS.
The DFINITY blockchain is layered on top of the DFINITY beacon and uses the beacon as its source of randomness for leader selection and leader ranking. A “weight” is attributed to a chain based on the ranks of the leaders who propose the blocks in the chain, and that weight is used to select between competing chains. The DFINITY blockchain is layered on top of the DFINITY beacon and uses the beacon as its source of randomness for leader selection and leader ranking blockchain is further hardened by a notarization process which dramatically improves the time to finality and eliminates the nothing-at-stake and selfish mining attacks.
DFINITY consensus algorithm is made to scale through continuous quorum selections driven by the random beacon. In practice, DFINITY achieves block times of a few seconds and transaction finality after only two confirmations. The system gracefully handles temporary losses of network synchrony including network splits, while it is provably secure under synchrony.

1.INTRODUCTION

DFINITY is building a new kind of public decentralized cloud computing resource. The company’s platform uses blockchain technology which is aimed at building a new kind of public decentralized cloud computing resource with unlimited capacity, performance and algorithmic governance shared by the world, with the capability to power autonomous self-updating software systems, enabling organizations to design and deploy custom-tailored cloud computing projects, thereby reducing enterprise IT system costs by 90%.
DFINITY aims to explore new territory and prove that the blockchain opportunity is far broader and deeper than anyone has hitherto realized, unlocking the opportunity with powerful new crypto.
Although a standalone project, DFINITY is not maximalist minded and is a great supporter of Ethereum.
The DFINITY blockchain computer provides a secure, performant and flexible consensus mechanism. At its core, DFINITY contains a decentralized randomness beacon, which acts as a verifiable random function (VRF) that produces a stream of outputs over time. The novel technique behind the beacon relies on the existence of a unique-deterministic, non-interactive, DKG-friendly threshold signatures scheme. The only known examples of such a scheme are pairing-based and derived from BLS.
DFINITY’s consensus mechanism has four layers: notary (provides fast finality guarantees to clients and external observers), blockchain (builds a blockchain from validated transactions via the Probabilistic Slot Protocol driven by the random beacon), random beacon (provides the source of randomness for all higher layers like smart contract applications), and identity (provides a registry of all clients).
DFINITY’s consensus mechanism has four layers

Figure1: DFINITY’s consensus mechanism layers
1. Identity layer:
Active participants in the DFINITY Network are called clients. Where clients are registered with permanent identities under a pseudonym. Moreover, DFINITY supports open membership by providing a protocol for registering new clients by depositing a stake with an insurance period. This is the responsibility of the first layer.
2. Random Beacon layer:
Provides the source of randomness (VRF) for all higher layers including ap- plications (smart contracts). The random beacon in the second layer is an unbiasable, verifiable random function (VRF) that is produced jointly by registered clients. Each random output of the VRF is unpredictable by anyone until just before it becomes avail- able to everyone. This is a key technology of the DFINITY system, which relies on a threshold signature scheme with the properties of uniqueness and non-interactivity.

https://preview.redd.it/hkcf53ic05e51.jpg?width=441&format=pjpg&auto=webp&s=44d45c9602ee630705ce92902b8a8379201d8111
3. Blockchain layer:
The third layer deploys the “probabilistic slot protocol” (PSP). This protocol ranks the clients for each height of the chain, in an order that is derived determin- istically from the unbiased output of the random beacon for that height. A weight is then assigned to block proposals based on the proposer’s rank such that blocks from clients at the top of the list receive a higher weight. Forks are resolved by giving favor to the “heaviest” chain in terms of accumulated block weight — quite sim- ilar to how traditional proof-of-work consensus is based on the highest accumulated amount of work.
The first advantage of the PSP protocol is that the ranking is available instantaneously, which allows for a predictable, constant block time. The second advantage is that there is always a single highest-ranked client, which allows for a homogenous network bandwidth utilization. Instead, a race between clients would favor a usage in bursts.
4. Notarization layer:
Provides fast finality guarantees to clients and external observers. DFINITY deploys the novel technique of block notarization in its fourth layer to speed up finality. A notarization is a threshold signature under a block created jointly by registered clients. Only notarized blocks can be included in a chain. Of all RSA-based alternatives exist but suffer from an impracticality of setting up the thresh- old keys without a trusted dealer.
DFINITY achieves its high speed and short block times exactly because notarization is not full consensus.
DFINITY does not suffer from selfish mining attack or a problem nothing at stake because the authentication step is impossible for the opponent to build and maintain a series of linked and trusted blocks in secret.
DFINITY’s consensus is designed to operate on a network of millions of clients. To en- able scalability to this extent, the random beacon and notarization protocols are designed such as that they can be safely and efficiently delegated to a committee

1.1 OVERVIEW ABOUT DFINITY

DFINITY is a blockchain-based cloud-computing project that aims to develop an open, public network, referred to as the “internet computer,” to host the next generation of software and data. and it is a decentralized and non-proprietary network to run the next generation of mega-applications. It dubbed this public network “Cloud 3.0”.
DFINITY is a third generation virtual blockchain network that sets out to function as an “intelligent decentralised cloud,”¹ strongly focused on delivering a viable corporate cloud solution. The DFINITY project is overseen, supported and promoted by DFINITY Stiftung a not-for-profit foundation based in Zug, Switzerland.
DFINITY is a decentralized network design whose protocols generate a reliable “virtual blockchain computer” running on top of a peer-to-peer network upon which software can be installed and can operate in the tamperproof mode of smart contracts.
DFINITY introduces algorithmic governance in the form of a “Blockchain Nervous System” that can protect users from attacks and help restart broken systems, dynamically optimize network security and efficiency, upgrade the protocol and mitigate misuse of the platform, for example by those wishing to run illegal or immoral systems.
DFINITY is an Ethereum-compatible smart contract platform that is implementing some revolutionary ideas to address blockchain performance, scaling, and governance. Whereas
DFINITY could pose a credible threat to Ethereum’s extinction, the project is pursuing a coevolutionary strategy by contributing funding and effort to Ethereum projects and freely offering their technology to Ethereum for adoption. DFINITY has labeled itself Ethereum’s “crazy sister” to express it’s close genetic resemblance to Ethereum, differentiated by its obsession with performance and neuron-inspired governance model.
Dfinity raised $61 million from Andreesen Horowitz and Polychain Capital in a February 2018 funding round. At the time, Dfinity said it wanted to create an “internet computer” to cut the costs of running cloud-based business applications. A further $102 million funding round in August 2018 brought the project’s total funding to $195 million.
In May 2018, Dfinity announced plans to distribute around $35 million worth of Dfinity tokens in an airdrop. It was part of the company’s plan to create a “Cloud 3.0.” Because of regulatory concerns, none of the tokens went to US residents.
DFINITY be broadening and strengthening the EVM ecosystem by giving applications a choice of platforms with different characteristics. However, if DFINITY succeeds in delivering a fully EVM-compatible smart contract platform with higher transaction throughput, faster confirmation times, and governance mechanisms that can resolve public disputes without causing community splits, then it will represent a clearly superior choice for deploying new applications and, as its network effects grow, an attractive place to bring existing ones. Of course the challenge for DFINITY will be to deliver on these promises while meeting the security demands of a public chain with significant value at risk.

1.1.1 DFINITY FUTURE

  • DFINITY aims to explore new blockchain territory related to the original goals of the Ethereum project and is sometimes considered “Ethereum’s crazy sister.”
  • DFINITY is developing blockchain-based infrastructure to support a new style of the internet (akin to Ethereum’s “World Computer”), one in which the internet itself will support software applications and data rather than various cloud hosting providers.
  • The project suggests this reinvented software platform can simplify the development of new software systems, reduce the human capital needed to maintain and secure data, and preserve user data privacy.
  • Dfinity aims to reduce the costs of cloud services by creating a decentralized “internet computer” which may launch in 2020
  • Dfinity claims transactions on its network are finalized in 3–5 seconds, compared to 1 hour for Bitcoin and 10 minutes for Ethereum.

1.1.2 DFINITY’S VISION

DFINITY’s vision is its new internet infrastructure can support a wide variety of end-user and enterprise applications. Social media, messaging, search, storage, and peer-to-peer Internet interactions are all examples of functionalities that DFINITY plans to host atop its public Web 3.0 cloud-like computing resource. In order to provide the transaction and data capacity necessary to support this ambitious vision, DFINITY features a unique consensus model (dubbed Threshold Relay) and algorithmic governance via its Blockchain Nervous System (BNS) — sometimes also referred to as the Network Nervous System or NNS.

1.2 DFINITY COMMUNITY

The DFINITY community brings people and organizations together to learn and collaborate on products that help steward the next-generation of internet software and services. The Internet Computer allows developers to take on the monopolization of the internet, and return the internet back to its free and open roots. We’re committed to connecting those who believe the same through our events, content, and discussions.

https://preview.redd.it/0zv64fzf05e51.png?width=637&format=png&auto=webp&s=e2b17365fae3c679a32431062d8e3c00a57673cf

1.3 DFINITY ROADMAP (TIMELINE) February 15, 2017

February 15, 2017
Ethereum based community seed round raises 4M Swiss francs (CHF)
The DFINITY Stiftung, a not-for-profit foundation entity based in Zug, Switzerland, raised the round. The foundation held $10M of assets as of April 2017.
February 8, 2018
Dfinity announces a $61M fundraising round led by Polychain Capital and Andreessen Horowitz
The round $61M round led by Polychain Capital and Andreessen Horowitz, along with an DFINITY Ecosystem Venture Fund which will be used to support projects developing on the DFINITY platform, and an Ethereum based raise in 2017 brings the total funding for the project over $100 million. This is the first cryptocurrency token that Andressen Horowitz has invested in, led by Chris Dixon.
August 2018
Dfinity raises a $102,000,000 venture round from Multicoin Capital, Village Global, Aspect Ventures, Andreessen Horowitz, Polychain Capital, Scalar Capital, Amino Capital and SV Angel.
January 23, 2020
Dfinity launches an open source platform aimed at the social networking giants

2.DFINITY TECHNOLOGY

Dfinity is building what it calls the internet computer, a decentralized technology spread across a network of independent data centers that allows software to run anywhere on the internet rather than in server farms that are increasingly controlled by large firms, such as Amazon Web Services or Google Cloud. This week Dfinity is releasing its software to third-party developers, who it hopes will start making the internet computer’s killer apps. It is planning a public release later this year.
At its core, the DFINITY consensus mechanism is a variation of the Proof of Stake (PoS) model, but offers an alternative to traditional Proof of Work (PoW) and delegated PoS (dPoS) networks. Threshold Relay intends to strike a balance between inefficiencies of decentralized PoW blockchains (generally characterized by slow block times) and the less robust game theory involved in vote delegation (as seen in dPoS blockchains). In DFINITY, a committee of “miners” is randomly selected to add a new block to the chain. An individual miner’s probability of being elected to the committee proposing and computing the next block (or blocks) is proportional to the number of dfinities the miner has staked on the network. Further, a “weight” is attributed to a DFINITY chain based on the ranks of the miners who propose blocks in the chain, and that weight is used to choose between competing chains (i.e. resolve chain forks).
A decentralized random beacon manages the random selection process of temporary block producers. This beacon is a Variable Random Function (VRF), which is a pseudo-random function that provides publicly verifiable proofs of its outputs’ correctness. A core component of the random beacon is the use of Boneh-Lynn-Shacham (BLS) signatures. By leveraging the BLS signature scheme, the DFINITY protocol ensures no actor in the network can determine the outcome of the next random assignment.
Dfinity is introducing a new standard, which it calls the internet computer protocol (ICP). These new rules let developers move software around the internet as well as data. All software needs computers to run on, but with ICP the computers could be anywhere. Instead of running on a dedicated server in Google Cloud, for example, the software would have no fixed physical address, moving between servers owned by independent data centers around the world. “Conceptually, it’s kind of running everywhere,” says Dfinity engineering manager Stanley Jones.
DFINITY also features a native programming language, called ActorScript (name may be subject to change), and a virtual machine for smart contract creation and execution. The new smart contract language is intended to simplify the management of application state for programmers via an orthogonal persistence environment (which means active programs are
not required to retrieve or save their state). All ActorScript contracts are eventually compiled down to WebAssembly instructions so the DFINITY virtual machine layer can execute the logic of applications running on the network. The advantage of using the WebAssembly standard is that all major browsers support it and a variety of programming languages can compile down to Wasm (not just ActorScript).
Dfinity is moving fast. Recently, Dfinity showed off a TikTok clone called CanCan. In January it demoed a LinkedIn-alike called LinkedUp. Neither app is being made public, but they make a convincing case that apps made for the internet computer can rival the real things.

2.1 DFINITY CORE APPLICATIONS

The DFINITY cloud has two core applications:
  1. Enabling the re-engineering of business: DFINITY ambitiously aims to facilitate the re-engineering of mass-market services (such as Web Search, Ridesharing Services, Messaging Services, Social Media, Supply Chain, etc) into open source businesses that leverage autonomous software and decentralised governance systems to operate and update themselves more efficiently.
  2. Enable the re-engineering of enterprise IT systems to reduce costs: DFINITY seeks to re-engineer enterprise IT systems to take advantage of the unique properties that blockchain computer networks provide.
At present, computation on blockchain-based computer networks is far more expensive than traditional, centralised solutions (Amazon Web Services, Microsoft Azure, Google Cloud Platform, etc). Despite increasing computational cost, DFINITY intends to lower net costs “by 90% or more” through reducing the human capital cost associated with sustaining and supporting these services.
Whilst conceptually similar to Ethereum, DFINITY employs original and new cryptography methods and protocols (crypto:3) at the network level, in concert with AI and network-fuelled systemic governance (Blockchain Nervous System — BNS) to facilitate Corporate adoption.
DFINITY recognises that different users value different properties and sees itself as more of a fully compatible extension of the Ethereum ecosystem rather than a competitor of the Ethereum network.
In the future, DFINITY hopes that much of their “new crypto might be used within the Ethereum network and are also working hard on shared technology components.”
As the DFINITY project develops over time, the DFINITY Stiftung foundation intends to steadily increase the BNS’ decision-making responsibilities over time, eventually resulting in the dissolution of its own involvement entirely, once the BNS is sufficiently sophisticated.
DFINITY consensus mechanism is a heavily optimized proof of stake (PoS) model. It places a strong emphasis on transaction finality through implementing a Threshold Relay technique in conjunction with the BLS signature scheme and a notarization method to address many of the problems associated with PoS consensus.

2.2 THRESHOLD RELAY

As a public cloud computing resource, DFINITY targets business applications by substantially reducing cloud computing costs for IT systems. They aim to achieve this with a highly scalable and powerful network with potentially unlimited capacity. The DFINITY platform is chalk full of innovative designs and features like their Blockchain Nervous System (BNS) for algorithmic governance.
One of the primary components of the platform is its novel Threshold Relay Consensus model from which randomness is produced, driving the other systems that the network depends on to operate effectively. The consensus system was first designed for a permissioned participation model but can be paired with any method of Sybil resistance for an open participation model.
“The Threshold Relay is the mechanism by which Dfinity randomly samples replicas into groups, sets the groups (committees) up for threshold operation, chooses the current committee, and relays from one committee to the next is called the threshold relay.”
Threshold Relay consists of four layers (As mentioned previously):
  1. Notary layer, which provides fast finality guarantees to clients and external observers and eliminates nothing-at-stake and selfish mining attacks, providing Sybil attack resistance.
  2. Blockchain layer that builds a blockchain from validated transactions via the Probabilistic Slot Protocol driven by the random beacon.
  3. Random beacon, which as previously covered, provides the source of randomness for all higher layers like the blockchain layer smart contract applications.
  4. Identity layer that provides a registry of all clients.

2.2.1 HOW DOES THRESHOLD RELAY WORK?

Threshold Relay produces an endogenous random beacon, and each new value defines random group(s) of clients that may independently try and form into a “threshold group”. The composition of each group is entirely random such that they can intersect and clients can be presented in multiple groups. In DFINITY, each group is comprised of 400 members. When a group is defined, the members attempt to set up a BLS threshold signature system using a distributed key generation protocol. If they are successful within some fixed number of blocks, they then register the public key (“identity”) created for their group on the global blockchain using a special transaction, such that it will become part of the set of active groups in a following “epoch”. The network begins at “genesis” with some number of predefined groups, one of which is nominated to create a signature on some default value. Such signatures are random values — if they were not then the group’s signatures on messages would be predictable and the threshold signature system insecure — and each random value produced thus is used to select a random successor group. This next group then signs the previous random value to produce a new random value and select another group, relaying between groups ad infinitum and producing a sequence of random values.
In a cryptographic threshold signature system a group can produce a signature on a message upon the cooperation of some minimum threshold of its members, which is set to 51% in the DFINITY network. To produce the threshold signature, group members sign the message
individually (here the preceding group’s threshold signature) creating individual “signature shares” that are then broadcast to other group members. The group threshold signature can be constructed upon combination of a sufficient threshold of signature shares. So for example, if the group size is 400, if the threshold is set at 201 any client that collects that many shares will be able to construct the group’s signature on the message. Other group members can validate each signature share, and any client using the group’s public key can validate the single group threshold signature produced by combining them. The magic of the BLS scheme is that it is “unique and deterministic” meaning that from whatever subset of group members the required number of signature shares are collected, the single threshold signature created is always the same and only a single correct value is possible.
Consequently, the sequence of random values produced is entirely deterministic and unmanipulable, and signatures generated by relaying between groups produces a Verifiable Random Function, or VRF. Although the sequence of random values is pre-determined given some set of participating groups, each new random value can only be produced upon the minimal agreement of a threshold of the current group. Conversely, in order for relaying to stall because a random number was not produced, the number of correct processes must be below the threshold. Thresholds are configured so that this is extremely unlikely. For example, if the group size is set to 400, and the threshold is 201, 200 or more of the processes must become faulty to prevent production. If there are 10,000 processes in the network, of which 3,000 are faulty, the probability this will occur is less than 10e-17.

2.3 DFINITY TOKEN

The DFINITY blockchain also supports a native token, called dfinities (DFN), which perform multiple roles within the network, including:
  1. Fuel for deploying and running smart contracts.
  2. Security deposits (i.e. staking) that enable participation in the BNS governance system.
  3. Security deposits that allow client software or private DFINITY cloud networks to connect to the public network.
Although dfinities will end up being assigned a value by the market, the DFINITY team does not intend for DFN to act as a currency. Instead, the project has envisioned PHI, a “next-generation” crypto-fiat scheme, to act as a stable medium of exchange within the DFINITY ecosystem.
Neuron operators can earn Dfinities by participating in network-wide votes, which could be concerning protocol upgrades, a new economic policy, etc. DFN rewards for participating in the governance system are proportional to the number of tokens staked inside a neuron.

2.4 SCALABILITY

DFINITY is constantly developing with a structure that separates consensus, validation, and storage into separate layers. The storage layer is divided into multiple strings, each of which is responsible for processing transactions that occur in the fragment state. The verification layer is responsible for combining hashes of all fragments in a Merkle-like structure that results in a global state fractionation that is stored in blocks in the top-level chain.

2.5 DFINITY CONSENSUS ALGORITHM

The single most important aspect of the user experience is certainly the time required before a transaction becomes final. This is not solved by a short block time alone — Dfinity’s team also had to reduce the number of confirmations required to a small constant. DFINITY moreover had to provide a provably secure proof-of-stake algorithm that scales to millions of active participants without compromising any bit on decentralization.
Dfinity soon realized that the key to scalability lay in having an unmanipulable source of randomness available. Hence they built a scalable decentralized random beacon, based on what they call the Threshold Relay technique, right into the foundation of the protocol. This strong foundation drives a scalable and fast consensus layer: On top of the beacon runs a blockchain which utilizes notarization by threshold groups to achieve near-instant finality. Details can be found in the overview paper that we are releasing today.
The roots of the DFINITY consensus mechanism date back to 2014 when thair Chief Scientist, Dominic Williams, started to look for more efficient ways to drive large consensus networks. Since then, much research has gone into the protocol and it took several iterations to reach its current design.
For any practical consensus system the difficulty lies in navigating the tight terrain that one is given between the boundaries imposed by theoretical impossibility-results and practical performance limitations.
The first key milestone was the novel Threshold Relay technique for decentralized, deterministic randomness, which is made possible by certain unique characteristics of the BLS signature system. The next breakthrough was the notarization technique, which allows DFINITY consensus to solve the traditional problems that come with proof-of-stake systems. Getting the security proofs sound was the final step before publication.
DFINITY consensus has made the proper trade-offs between the practical side (realistic threat models and security assumptions) and the theoretical side (provable security). Out came a flexible, tunable algorithm, which we expect will establish itself as the best performing proof-of-stake algorithm. In particular, having the built-in random beacon will prove to be indispensable when building out sharding and scalable validation techniques.

2.6 LINKEDUP

The startup has rather cheekily called this “an open version of LinkedIn,” the Microsoft-owned social network for professionals. Unlike LinkedIn, LinkedUp, which runs on any browser, is not owned or controlled by a corporate entity.
LinkedUp is built on Dfinity’s so-called Internet Computer, its name for the platform it is building to distribute the next generation of software and open internet services.
The software is hosted directly on the internet on a Switzerland-based independent data center, but in the concept of the Internet Computer, it could be hosted at your house or mine. The compute power to run the application LinkedUp, in this case — is coming not from Amazon AWS, Google Cloud or Microsoft Azure, but is instead based on the distributed architecture that Dfinity is building.
Specifically, Dfinity notes that when enterprises and developers run their web apps and enterprise systems on the Internet Computer, the content is decentralized across a minimum of four or a maximum of an unlimited number of nodes in Dfinity’s global network of independent data centers.
Dfinity is an open source for LinkedUp to developers for creating other types of open internet services on the architecture it has built.
“Open Social Network for Professional Profiles” suggests that on Dfinity model one can create “Open WhatsApp”, “Open eBay”, “Open Salesforce” or “Open Facebook”.
The tools include a Canister Software Developer Kit and a simple programming language called Motoko that is optimized for Dfinity’s Internet Computer.
“The Internet Computer is conceived as an alternative to the $3.8 trillion legacy IT stack, and empowers the next generation of developers to build a new breed of tamper-proof enterprise software systems and open internet services. We are democratizing software development,” Williams said. “The Bronze release of the Internet Computer provides developers and enterprises a glimpse into the infinite possibilities of building on the Internet Computer — which also reflects the strength of the Dfinity team we have built so far.”
Dfinity says its “Internet Computer Protocol” allows for a new type of software called autonomous software, which can guarantee permanent APIs that cannot be revoked. When all these open internet services (e.g. open versions of WhatsApp, Facebook, eBay, Salesforce, etc.) are combined with other open software and services it creates “mutual network effects” where everyone benefits.
On 1 November, DFINITY has released 13 new public versions of the SDK, to our second major milestone [at WEF Davos] of demoing a decentralized web app called LinkedUp on the Internet Computer. Subsequent milestones towards the public launch of the Internet Computer will involve:
  1. On boarding a global network of independent data centers.
  2. Fully tested economic system.
  3. Fully tested Network Nervous Systems for configuration and upgrades

2.7 WHAT IS MOTOKO?

Motoko is a new software language being developed by the DFINITY Foundation, with an accompanying SDK, that is designed to help the broadest possible audience of developers create reliable and maintainable websites, enterprise systems and internet services on the Internet Computer with ease. By developing the Motoko language, the DFINITY Foundation will ensure that a language that is highly optimized for the new environment is available. However, the Internet Computer can support any number of different software frameworks, and the DFINITY Foundation is also working on SDKs that support the Rust and C languages. Eventually, it is expected there will be many different SDKs that target the Internet Computer.
Full article
submitted by CoinEx_Institution to u/CoinEx_Institution [link] [comments]

Let's discuss some of the issues with Nano

Let's talk about some of Nano's biggest issues. I also made a video about this topic, available here: https://youtu.be/d9yb9ifurbg.
00:12 Spam
Issues
Potential Mitigations & Outstanding Issues
01:58 Privacy
Issues
  • Nano has no privacy. It is pseudonymous (like Bitcoin), not anonymous.
Potential Mitigations & Outstanding Issues & Outstanding Issues*
  • Second layer solutions like mixers can help, but some argue that isn't enough privacy.
  • The current protocol design + the computational overhead of privacy does not allow Nano to implement first layer privacy without compromising it's other features (fast, feeless, and scalable transactions).
02:56 Decentralization
Issues
  • Nano is currently not as decentralized as it could be. ~25% of the voting weight is held by Binance.
  • Users must choose representatives, and users don't always choose the best ones (or never choose).
Potential Mitigations & Outstanding Issues
  • Currently 4 unrelated parties (who all have a verifiable interest in keeping the network running) would have to work together to attack the network
  • Unlike Bitcoin, there is no mining or fees in Nano. This means that there is not a strong incentive for emergent centralization from profit maximization and economies of scale. We've seen this firsthand, as Nano's decentralization has increased over time.
  • Nano representative percentages are not that far off from Bitcoin mining pool percentages.
  • In Nano, voting weight can be remotely re-delegated to anyone at any time. This differs from Bitcoin, where consensus is controlled by miners and requires significant hardware investment.
  • The cost of a 51% attack scales with the market cap of Nano.
06:49 Marketing & adoption
Issues
  • The best technology doesn't always win. If no one knows about or uses Nano, it will die.
Potential Mitigations & Outstanding Issues
  • I would argue that the best technology typically does win, but it needs to be best in every way (price, speed, accessbility, etc). Nano is currently in a good place if you agree with that argument.
  • Bitcoin started small, and didn't spend money on marketing. It takes time to build a community.
  • The developers have said they will market more once the protocol is where they want it to be (v20 or v21?).
  • Community marketing initiatives have started to form organically (e.g. Twitter campaigns, YouTube ads, etc).
  • Marketing and adoption is a very difficult problem to solve, especially when you don't have first mover advantage or consistent cashflow.
08:07 Small developer fund
Issues
  • The developer fund only has 3 million NANO left (~$4MM), what happens after that?
Potential Mitigations & Outstanding Issues
  • The goal for Nano is to be an Internet RFC like TCP/IP or SMTP - development naturally slows down when the protocol is in a good place.
  • Nano development is completely open source, so anyone can participate. Multiple developers are now familiar with the Nano protocol.
  • Businesses and whales that benefit from Nano (exchanges, remittances, merchant services, etc) are incentivized to keep the protocol developed and running.
  • The developer fund was only ~5% of the supply - compare that to some of the other major cryptocurrencies.
10:08 Node incentives
Issues
  • There are no transaction fees, why would people run nodes to keep the network running?
Potential Mitigations & Outstanding Issues
  • The cost of consensus is so low in Nano that the benefits of the network itself are the incentive: decentralized money with 0 transaction fees that can be sent anywhere in the world nearly instantly. Similar to TCP/IP, email servers, and http servers. Just like Bitcoin full nodes.
  • Paying $50-$100 a month for a high-end node is a lot cheaper for merchants than paying 1-3% in total sales.
  • Businesses and whales that benefit from Nano (exchanges, remittances, merchant services, etc) are incentivized to keep the protocol developed and running.
11:58 No smart contracts
Issues
  • Nano doesn't support smart contracts.
Potential Mitigations & Outstanding Issues
  • Nano's sole goal is to be the most efficient peer-to-peer value transfer protocol possible. Adding smart contracts makes keeping Nano feeless, fast, and decentralized much more difficult.
  • Other solutions (e.g. Ethereum) exist for creating and enforcing smart contracts.
  • Code can still interact with Nano, but not on the first layer in a decentralized matter.
  • Real world smart contract adoption and usage is pretty limited at the moment, but that might not always be the case.
13:20 Price stability
Issues
  • Why would anyone accept or spend Nano if the price fluctuates so much?
  • Why wouldn't people just use a stablecoin version of Nano for sending and receiving money?
Potential Mitigations & Outstanding Issues
  • With good fiat gateways (stable, low fees, etc), you can always buy back the fiat equivalent of what you've spent.
  • The hope is that with enough adoption, people and businesses will eventually skip the fiat conversion and use Nano directly.
  • Because Nano is so fast, volatility is less of an issue. Transactions are confirmed in <10 seconds, and prices change less in that timeframe (vs 10 minutes to hours for Bitcoin).
  • Stablecoins reintroduce trust. Stable against what? Who controls the supply, and how do you get people to adopt them? What happens if the assets they're stable against fail? Nano is pure supply and demand.
  • With worldwide adoption, the market capitalization of Nano would be in the trillions. If that happens, even millions of dollars won't move the price significantly.
15:06 Deflation
Issues
  • Nano's current supply == max supply. Why would people spend Nano today if it could be worth more tomorrow?
  • What happens to principal representatives and voting weight as private keys are lost? How do you know keys are lost?
Potential Mitigations & Outstanding Issues
  • Nano is extremely divisible. 1 NANO is 1030 raw. Since there are no transaction fees, smaller and smaller amounts of Nano could be used to transact, even if the market cap reaches trillions.
  • People will always buy things they need (food, housing, etc).
  • I'm not sure what the plan is to adjust for lost keys. Probably requires more discussion.
Long-term Scalability
Issue
  • Current node software and hardware cannot handle thousands of TPS (low-end nodes fall behind at even 50 TPS).
  • The more representatives that exist, the more vote traffic is required (network bandwidth).
  • Low-end nodes currently slow down the network significantly. Principal representatives waste their resources constantly bootstrapping these weak nodes during network saturation.
Potential Mitigations & Outstanding Issues
  • Even as is, Nano can comfortably handle 50 TPS average - which is roughly the amount of transactions per day PayPal was doing in 2011 with nearly 100 million users.
  • Network bandwidth increases 50% a year.
  • There are some discussions of prioritizing bootstrapping by vote weight to limit the impact of weak nodes.
  • Since Nano uses an account balance system, pruning could drastically reduce storage requirements. You only need current state to keep the network running, not the full transaction history.
  • In the future, vote stapling could drastically reduce bandwidth usage by collecting all representative signatures up front and then only sharing that single aggregate signature.
  • Nano has no artificial protocol-based limits (e.g. block sizes or block times). It scales with hardware.
Obviously there is still a lot of work to be done in some areas, but overall I think Nano is a good place. For people that aren't Nano fans, what are your biggest concerns?
submitted by Qwahzi to CryptoCurrency [link] [comments]

Proof Of Work Explained

Proof Of Work Explained
https://preview.redd.it/hl80wdx61j451.png?width=1200&format=png&auto=webp&s=c80b21c53ae45c6f7d618f097bc705a1d8aaa88f
A proof-of-work (PoW) system (or protocol, or function) is a consensus mechanism that was first invented by Cynthia Dwork and Moni Naor as presented in a 1993 journal article. In 1999, it was officially adopted in a paper by Markus Jakobsson and Ari Juels and they named it as "proof of work".
It was developed as a way to prevent denial of service attacks and other service abuse (such as spam on a network). This is the most widely used consensus algorithm being used by many cryptocurrencies such as Bitcoin and Ethereum.
How does it work?
In this method, a group of users competes against each other to find the solution to a complex mathematical puzzle. Any user who successfully finds the solution would then broadcast the block to the network for verifications. Once the users verified the solution, the block then moves to confirm the state.
The blockchain network consists of numerous sets of decentralized nodes. These nodes act as admin or miners which are responsible for adding new blocks into the blockchain. The miner instantly and randomly selects a number which is combined with the data present in the block. To find a correct solution, the miners need to select a valid random number so that the newly generated block can be added to the main chain. It pays a reward to the miner node for finding the solution.
The block then passed through a hash function to generate output which matches all input/output criteria. Once the result is found, other nodes in the network verify and validate the outcome. Every new block holds the hash of the preceding block. This forms a chain of blocks. Together, they store information within the network. Changing a block requires a new block containing the same predecessor. It is almost impossible to regenerate all successors and change their data. This protects the blockchain from tampering.
What is Hash Function?
A hash function is a function that is used to map data of any length to some fixed-size values. The result or outcome of a hash function is known as hash values, hash codes, digests, or simply hashes.
https://preview.redd.it/011tfl8c1j451.png?width=851&format=png&auto=webp&s=ca9c2adecbc0b14129a9b2eea3c2f0fd596edd29
The hash method is quite secure, any slight change in input will result in a different output, which further results in discarded by network participants. The hash function generates the same length of output data to that of input data. It is a one-way function i.e the function cannot be reversed to get the original data back. One can only perform checks to validate the output data with the original data.
Implementations
Nowadays, Proof-of-Work is been used in a lot of cryptocurrencies. But it was first implemented in Bitcoin after which it becomes so popular that it was adopted by several other cryptocurrencies. Bitcoin uses the puzzle Hashcash, the complexity of a puzzle is based upon the total power of the network. On average, it took approximately 10 min to block formation. Litecoin, a Bitcoin-based cryptocurrency is having a similar system. Ethereum also implemented this same protocol.
Types of PoW
Proof-of-work protocols can be categorized into two parts:-
· Challenge-response
This protocol creates a direct link between the requester (client) and the provider (server).
In this method, the requester needs to find the solution to a challenge that the server has given. The solution is then validated by the provider for authentication.
The provider chooses the challenge on the spot. Hence, its difficulty can be adapted to its current load. If the challenge-response protocol has a known solution or is known to exist within a bounded search space, then the work on the requester side may be bounded.
https://preview.redd.it/ij967dof1j451.png?width=737&format=png&auto=webp&s=12670c2124fc27b0f988bb4a1daa66baf99b4e27
Source-wiki
· Solution–verification
These protocols do not have any such prior link between the sender and the receiver. The client, self-imposed a problem and solve it. It then sends the solution to the server to check both the problem choice and the outcome. Like Hashcash these schemes are also based on unbounded probabilistic iterative procedures.
https://preview.redd.it/gfobj9xg1j451.png?width=740&format=png&auto=webp&s=2291fd6b87e84395f8a4364267f16f577b5f1832
Source-wiki
These two methods generally based on the following three techniques:-
CPU-bound
This technique depends upon the speed of the processor. The higher the processor power greater will be the computation.
Memory-bound
This technique utilizes the main memory accesses (either latency or bandwidth) in computation speed.
Network-bound
In this technique, the client must perform a few computations and wait to receive some tokens from remote servers.
List of proof-of-work functions
Here is a list of known proof-of-work functions:-
o Integer square root modulo a large prime
o Weaken Fiat–Shamir signatures`2
o Ong–Schnorr–Shamir signature is broken by Pollard
o Partial hash inversion
o Hash sequences
o Puzzles
o Diffie–Hellman–based puzzle
o Moderate
o Mbound
o Hokkaido
o Cuckoo Cycle
o Merkle tree-based
o Guided tour puzzle protocol
A successful attack on a blockchain network requires a lot of computational power and a lot of time to do the calculations. Proof of Work makes hacks inefficient since the cost incurred would be greater than the potential rewards for attacking the network. Miners are also incentivized not to cheat.
It is still considered as one of the most popular methods of reaching consensus in blockchains. Though it may not be the most efficient solution due to high energy extensive usage. But this is why it guarantees the security of the network.
Due to Proof of work, it is quite impossible to alter any aspect of the blockchain, since any such changes would require re-mining all those subsequent blocks. It is also difficult for a user to take control over the network computing power since the process requires high energy thus making these hash functions expensive.
submitted by RumaDas to u/RumaDas [link] [comments]

My career isn’t always dangerous, but clients can be unpredictable

My name is Amy, and I’m what’s called a Computer Dominatrix. My clients are all long distance, we never interact face-to-face, and I have control over all of them. Some give me absolute control, some give me specific portions with boundaries. Some are married or dating, others are single. They all make use of my talents to give up control of at least part of their lives.
When a new client contacts me, we exchange a few messages so I have some background about them, and I lay out what my services usually entail. I tell a few stories of what other clients have asked me to do for them, to help the new client select scenarios they would like to set up. Most of my clients have never had a Digital Dom before. So, giving them a few examples and options helps bolster their confidence.
The usual set-up goes like this: my client installs some spyware on their computer that I control. It gives me the power to do things like lock their computer, see their screen, disable the keyboard, take over control of their computer, and get reports of what they’re doing on their computer. With this tool, I can perform my services.
Some clients want me to watch their bank statements and shame them if they spend too much money or buy surprise things with their money as if I own the account. Other clients want me to monitor their porn usage and shame them for what they look up. Or, if I log in and catch them using porn, I should direct them to different porn of my choosing and force them to watch that instead. One even wanted me to try and break into his computer and install the spyware secretly. That was a fun client to work with.
When it comes down to it, they just want to relinquish a little control over their lives. I understand where their desires come from, and knowing it helps me be a better Dom.
Contrasting the fun times of my career, I’ve had a few mishaps and horrible things happen.
I had one client sign up for my services. We messaged a few times to get to know one another before I agreed to accept him as a client. He was in his mid thirties, single, and wanted me to watch him look at porn and make random comments on the things he was watching.
Really, not that abnormal for my choice of career.
I had him sign an agreement that helps me avoid legal trouble if they try to report me for hacking (had this happen before), and we got started. I gave him the url where he could install my personal spyware, and he followed through.
He only asked that I give him a little advance notice before I start watching, which I agreed to. Boundaries are important.
I would check up on him twice a week, and send him a message before I did saying “I’m coming to check on you in ten minutes, you better be watching something good.” I would log in ten minutes later to the second and start either shaming him for his choice of videos or praise him for making the “right” choice. All of this was predetermined.
Things were going fine with this client, and I balanced him with about 10 others. Being a Digital Dom makes it easy to spread your attention across many clients. Bonus if you can get clients from different time zones so they would log in at different times so you don’t have to multitask.
I was about to check in with another client, when I mis-clicked in my software. See, my spyware (which I paid to be custom written after wishing for more features in commercial tools) lists my clients by most recently connected in one screen. When I add a new client, it can mess with the order of the page I am so used to mindlessly clicking through. I’ve since paid for that to get fixed and sort clients alphabetically, but this time I made a mistake.
I clicked on this new client and connected to his computer.
A gasp escaped my lips as I saw what he was looking at. I’ll leave that up to your imagination. It was some of the most fucked up porn I’ve ever seen. Involving victims of questionable age. And blood.
If I could have slipped out of there, I would have. But this client requested a popup to appear whenever I connected so he would know I was there.
That popup revealed my unexpected presence.
Instead of panicking and trying to close the window, he calmly moved his mouse to the task bar and opened a text document. I was frozen while watching him type. I should have logged straight out, but I instead started to open a voice channel to tell him I was dropping him as a client.
It was too much for me, and I decided to set that boundary early on in my career.
“Like what you see?”
He had typed into the word document, and the cursor blinked impatiently at me.
I thought my voice would crack, so I took over the keyboard and typed back.
“I’m sorry, but I’m going to refund your money and no longer service you. Please uninstall this software and watch for your refund.”
He paused for a while, and I waited for him to respond once before I disconnected. He took too long, so I closed the window and took a deep breath while sitting back.
I was feeling really disconcerted from what I’d watched. It wasn’t the first time a client had tried to show me illegal things during a session, but it always makes me sick when they do. I gave the reins over to another Digital Dom I have partnered with. We take over for each other if we feel ill or something. Just temporarily.
I went to take a shower to wash out those images.
 
My computer started acting up more than a month later. So much had gone on since dropping that client that I didn’t connect the two at first.
The computer would slow down for a few minutes, then resume its normal speed. I assumed it was because I hadn’t restarted in a while, so I restarted it. That seemed to fix the problem.
When I had rebooted, the wifi slowed down considerably, enough for my roommate, Jess, to ask if I was downloading anything big. I had logged into the router to see if that also needed to be restarted when I noticed a device I didn’t recognize was connected to the wifi.
I swallowed hard.
RASPI was the name of the connected device. It had connected to the network three days ago.
Some strangers' device was on our network. And they had to be nearby, at least within range of wifi. I immediately suspected that a neighbor had brute forced our wifi password and was now stealing internet.
Before kicking the device off, I looked at the router’s traffic report. The device had a significant size of traffic in the last few days, but my computer used the most out of all of our devices. The device came in 5th place for most data used.
It made sense that my computer was using so much bandwidth, but 75+ gigabytes in 3 days was excessive.
My throat seized, and I immediately reached around to the back of my computer and unplugged the ethernet cable.
Deep, primal panic set in. This was a very specific attack. It’s not the kind of hacking you can do en masse to install some ransomware or adware.
Someone was targeting me or both of us.
Someone who was willing to spend time brute forcing a wifi password and going after one specific machine on the network.
 
I called Lucas, the guy I hired to write my spyware for me, and filled him in on everything I knew. He knows perfectly well what his software is used for and isn’t weird about it. He agreed to take a look at my computer for a fee.
So, trusting him as I have all my career, I installed a commercial remote desktop tool and let him connect. The moment I reconnected the computer to the internet, the router showed a spike in traffic again.
I had him on a call while he worked, and I watched what he did carefully, trying my best to learn what he was doing so I could troubleshoot myself if this ever happened again.
“Oh shit,” Lucas muttered. He had a traffic analyzer and computer process analyzer open on-screen. “Amy, I think you got hacked. Like, they’re downloading your hard drive!”
“They’re what?!” I began to really panic. I had a lot of my clients information on this machine. Keys that let me log into their machines. Bitcoin Cash addresses and keys where I stored my fees.
Now someone had them. They could easily start stealing and spending my thousands in accumulated fees and harass my clients.
I’d lose a big chunk of my savings and my livelihood.
Immediately, I took over the computer and shut Lucas out while I created new crypto addresses and started transferring money. The fees from transferring would make me lose a little money, but it was better than losing it all.
I also started backing up the hard drive to several USB drives I had lying around. Just the important stuff like my files, personal photos, and client info.
When I let Lucas back in, he got to work finding the process that was exfiltrating my data and shutting it down. He tracked down the executable that was running the show and downloaded it to his own computer before deleting it from mine.
He promised to dissect it as best he could to figure out what it was doing.
Before he did that, however, he started monitoring my system to make sure the virus had been truly cleared out.
While watching my system, he gave me a task.
“Walk around your apartment. Search everywhere and look for that rogue device. It’s been continuously connected for days, which means whoever is doing this is probably not camped out on the road. From the name, I’d guess it’s a Raspberry Pi -- a small computer about the size of a phone but two inches tall.”
He sent me a picture of the type of device we were looking for.
“They probably left it hidden somewhere, either connected to an outlet or with a large battery pack. Go and look for it,” he insisted.
I got Jess to help me search the place top to bottom. Nothing. Not even outside in the bushes or on the back porch.
We split up and went to our neighbors, asking if they’d seen anyone suspicious hanging around the building in the last week. No one on our floor had. I went upstairs and asked the same questions.
Our upstairs neighbor said the only person he’d seen was a guy coming to update their satellite dish on the balcony. My throat seized up as I realized that could be them.
I asked hesitantly if I could look at their dish. I didn’t know them, but briefly explained that someone had left a device lying around that was breaking into our wifi and that our next step was to call the police.
They panicked at that, and let me check their balcony if I promised to keep them out of it if I called the cops. I agreed, knowing full well that they did drugs and would hate for the police to come around the apartment complex.
There, on the balcony, was exactly what Lucas had told me to look for. A black box sat along the wall between the satellite and the wall the cable ran into. A power cord exited the box and connected to an outlet on the balcony.
I cracked open the box with my fingers and found a circuit board inside, connected via usb to the outlet. The satellite cable passed straight through the box without connecting to anything. The box was a fake, made to look like it was doing something to the cable as it passed through.
The circuit board looked exactly like the picture Lucas had shown me.
There was our rogue device.
I unplugged the device, fully aware that unplugging it would alert whoever was controlling it. They could assume it was disconnected accidentally, or they would think I had found it. Either way, I couldn’t just leave it.
I thanked the neighbors and left with the whole box. Jess met me on the stairs, saying that Lucas had asked her to disconnect the internet on the computer and have me call him back.
Jess stared in wide-eyed shock as I showed her what I’d found. The upstairs neighbors were well within range of our wifi for the device to connect. The job was only barely sloppy enough to detect. We were lucky I had found it at all.
 
On the phone Lucas sounded panicked.
“They didn’t just copy your hard drive, they added files to it,” he squeaked. “Bad files. Bad pictures.”
My jaw tightened, and I felt sick. I made the connection to the client I’d dropped.
“Delete all your shit now,” Lucas was demanding. “You already backed up what you want, you need to destroy that hard drive. Smash it, burn it, bury it. Go get a new hard drive. Start as fresh as you can. I can help you get set back up if you want.”
“I think I know what’ll happen,” I muttered. “He’ll call the police on me and tip them off that I have those… pictures. They’ll find it and arrest me for possession. Game over.”
“He? You know who it is?” Lucas pressed.
I told him about the client I’d dropped.
“That’s why you need to torch your hard drives. Now. Both of you. Same with your phones. Who knows where else he’s been,” was Lucas’ advice.
I won’t confirm or deny what I did with the hard drive or the device. If I destroyed it, it would technically be destruction of evidence.
I ordered a new hard drive and reinstalled everything. I explained to my clients that I had lost internet connection for a couple of days, and didn’t end up losing any clients.
I haven’t told the police everything. The last time I got involved with them, there was so much harassment from them about my career that I’d rather not have more negative interactions with them. It just isn’t worth it in this case. I kept my report short and simple: a guy I met online and dumped might try something and come to my house. I gave them the information the client gave me, but I suspect more and more that it was fake.
Making a report will help if anything new happens.
I’ve written about this before on other anonymous forums, specifically for other Doms. Because of those posts, a few journalists have reached out and are writing features based on me, my career, and these events. They should be published in the next few days.
I’m just interested in sharing stories like this as publicly as possible, for awareness.
Lucas explained that the Raspberry Pi was a tiny computer that had a cellular connection so the client could connect to it from anywhere in the world and try to break into my wifi. Once he had succeeded, the client had gone to work breaking into my computer and getting their malware installed. We still don’t know 100% how he did it.
Lucas worked tirelessly to revise his software and remove vulnerabilities that could be used to trace me. We don’t know which vulnerabilities the client used, if any. We do know that there is one left, however.
I know this because every once in a while, a client will show up in my software who I didn’t sign up. A new name and data every time. I don’t dare click it. I just know what will be waiting for me upon connection.
“Like what you see?”
Lucas hasn’t been able to track down how he’s injecting fake clients into the software. Until Lucas can fix it, all I can do is click carefully and not connect again by accident. I’m sure the client is using a modified version of my spyware, ready to do all kinds of damage the moment I connect.
The guy is clearly an expert. Who knows how many other people he’s done something like this to. One thing is certain: he was prepared to conduct this attack.
My career isn’t always dangerous, but the clients can be unpredictable.
submitted by DigitDom to nosleep [link] [comments]

Beware of Fluidstack abusing your network

Hey /beermoney users,
I have been using fluidstack for the past month and I have some serious issues which I thought were just subject to my own network but then I was made aware of it effecting all of my referred friends in USA and UK. I have learned that Fluidstack is abusing our networks and opening it to heavy amounts of fraud, media streaming abuse, and more.
Let me explain further for those of you which will say “but they pic me $5”....I am going to go service by service :
Netflix - fluidstack has been sending mass numbers of connections to Netflix through my network and the network of my friends in UK and Canada. I spoke to a representative at Netflix customer support and they said upwards of 300 accounts had logged into Netflix from my account in the past 24 hours. They then confirmed the reason why I was now UNABLE to watch any Netflix content was due to the fact that they further investigated and confirmed my IP was one of many being used as a VPN Providers IP. I argued with them for over an hour but had no luck resolving the matter.
Then, I contacted over a dozen friends of mine that were also blocked from viewing any content on Netflix, Hulu and Amazon prime - I asked them to contact the streaming services and find out the issue. It turns out that a representative at Amazon prime named Dhiraj confirmed that a few VPN companies were using our ips to unblock copyrighted content and for that reason these ips would be blocked for a minimum of 6 months!
Fluidstack is an amateur operation completely abusing our networks and giving VPN companies the ability to use our networks for not only trying to bypass media blocks but also giving common users the ability to use the internet through our ips. There is something very wrong with this. People use VPN services for general security but there are many consumers that use VPN services to commit fraud, terrorist threats, hacking , cracking , and more! @fluidstack, do you have any idea what you’re doing by allowing VPN companies to use a common users IP? I’ll tell you the happy ending though - after pleading for hours to get a new IP, I was assigned one , and I thought I stopped fluidstack from running but it was secretly running in the background and got the new IP blocked too!
Bbc iplayer - I had referred over 100 customers of mine at a UK based service, and told them to use fluidstack. Within 7 days 100% of those users were unable to use BBC iPlayer . That too, with a permanent block! You can contact dan Taylor from bbc at his email [email protected] and he will confirm for you that he is aware of fluidstack and they’re banning every single IP which they find using fluidstack because fluidstack is handing everyone’s network over to a shady VPN company that is streaming bbc iplayer and more through Uk user networks and abusing the connection meanwhile.
Swagbucks - I use swagbucks to make money as many beermoney users do. Obviously i also use many other survey and quick money services but this is a common one I’m using as an example. My friends and about 75% of the people I referred from a company I run, were all blocked from using swagbucks and when we tried to figure out why it was because there was fraudulent tasks going through swagbucks on our networks - it was not from us, and so we looked at our network usage and saw tons of connections to swagbucks, meaning fluidstack is promoting that fraud as well. Perhaps it would be different if they were supporting users making money in a safe way, but they’re allowing the abuse and so everyone is losing by using fluidstack.
We don’t need services here which blatantly abuse our networks. We need safe and secure solutions which care about our well being. What’s the point of making a few dollars if fluidstack is making 100x as much from selling our bandwidth to these multimillion dollar VPN companies, and we are getting abuse on our network on top of tons of risks? This being said, I think fluidstack should shut its doors entirely and apologize to our community here. They’ve sponsored a giveaway here and for that reason they have a top post in this subreddit, but I don’t even think it’s logical to support them knowing this is happening. I am not the first client to report this. You can find many other posts like this with outraged providers . For example , please read https://www.reddit.com/FluidStack/comments/chzfzd/netflix_have_blacklisted_me/ .
I know the fluidstack team will come here and suggest for users to remove their proxy feature and just leave the cpu sharing. However quite honestly I’ve been seeing cpu usage being quite high for the fluidstack app recently as well. How do we know they aren’t mining bitcoin with this massive network they’re putting together? Of course they can sponsor a few $25 giveaways if they’re mining or doing something shady to make money with our cpu.
I believe a lot of fluidstack providers will read this and want answers. Be careful everybody, delete the application by going to your c drive then program files then find fluidstack then uninstall. Also check your processes and services in task manager to double check they aren’t secretly running after uninstalling. This is the shadiest operation I’ve ever seen and I think it’s time we protect the users that have been naive enough like I was to think this company would respect our network. We need smarter and more secure options. Fluidstack made an innocent service into a complete sham!
submitted by Pasty_Luis to beermoney [link] [comments]

Downloaded fitgirl repack now network unusable??? BTC MINER???

I downloaded a few games of the official fitgirl repack site three days ago. I live in a rural area of a small country with bad internet. Downloading on steam I get about(100% consistent) 600 kb/s if no one is doing anything. So something small really offsets my internet back to dialup era internet speeds.
As of, incidentally, two days ago(when I installed both games), my internet randomly spikes to 400 ping while playing games, while also being the only one, doing the only thing on the entire network. . Wi-fi disabled for phone usage, only one at the house, only ethernet cable plugged in etc.
I wouldnt care too much, but now I can't even browse websites with images without it taking 5 literal minutes to load a clothing website or forum
I check the network in task manager to see if windows is downloading in background, disabled any potential services doing that, but no, chrome (or whatever browser) is using all the bandwidth(0.5mbps) . which was never the case before. Therefore, presumably, some clandestine shit is going on, probably bitcoin mining.
I know there could be 100 reasons for this but seems all to coincidental to be just that.
Anyone experienced anything similar?? Or solutions

**please do mind that I could be completely wrong about the cause of this, but the timeline aligns perfectly with the issue** Don't let this post hesitate you from using their very helpful service
submitted by TameLameJames to PiratedGames [link] [comments]

Roll your own Android-friendly Stadia in 12 steps

A lot of this comes from /cloudygamer, so go there and give them your clicks, but I've been cloud gaming now for months in a variety of ways, and I think I've settled on my happiest path. I rent a server from Paperspace, and simply use Steam Link Anywhere to play any game from my Steam Library from my house. Quality is very good, but not perfect, but my costs are $10/month for storage and $0.51/hr of streaming time. At my rate of about 1-2 hours/day, my annual spend rate is about $400. The benefits I see are as follows:
  1. Incredible portability - I can play on my phone, my laptop, or my Nvidia Shield on my TV.
  2. On-demand usage - If I'm not playing, I'm only paying the storage fee each month, so it sort of scales naturally.
  3. Excellent graphical fidelity - I'm generally able to play on excellent settings and stream at 1080p. I also find that the input lag doesn't bother me. I'm certain if I recorded myself playing in slo-mo, I'd notice input lag, but I've had great fun playing many hours of Rocket League, and I'm having a great time playing through Jedi: Fallen Order
  4. Excellent library - This method basically supports all PC games, and lets me play anything from Steam, Epic, etc, etc, down to indies and anything I want to play. If XCloud has 50 games, and Stadia has 22, I think this path compares rather favorably.
Downsides
  1. Cost - I'm saving money versus keeping a comparable gaming PC running these games at these settings, but I'm probably losing money against just purchasing new Playstations as they are released. Also, the free tier of Stadia will be cheaper than this, although factor in the purchase of games. This method uses your Steam Library.
  2. Network costs - I assume that if I had anything less than bulletproof internet, my experience would rapidly degrade
  3. Framerate stuff - On occasion I'll hit a bit of lag or delay.

How-to:
This is just my path through, and you may choose a different path. I picked Paperspace because the ease of use is just astounding compared to Google Cloud or AWS or Azure. However, they only have 3 servers from what I can tell - California, New York and Amsterdam. I would perform the majority of these steps on your PC:
  1. Create an account with Paperspace (paperspace.com)
  2. Pick the server location closest to you
  3. Create a Windows 10 P4000 server
    1. At this point you may get stopped by a form that requires you to explain what you want to use the server for. I don't think they want people using them for Bitcoin mining, maybe? If you get that form, it usually takes a day for them to get back to you
  4. Choose a storage amount. If you only play one game at a time, you can save some cash here by choosing one of the lower priced storage tiers.
  5. Add your payment details and click "Create Your Paperspace"
  6. You'll be taken to a screen that shows you that Paperspace is provisioning and spinning up your server. Once it's ready, simply click on the box representing your server. You'll be dropped into the Windows environment.
  7. Now, install Steam and log in to your account.
  8. Having done that, enable the beta version of Steam by using the Beta Participation setting in Settings>Account
  9. Steam will restart.
  10. Install Steam Link on your phone (or Android TV device, or tablet, etc, etc). It will by default look for a PC on your home network. When that fails, it will prompt you with "Other Computer". Take the code it gives you, and return to your Paperspace tab in your browser, and navigate to the Remote Play entry in your Steam Settings.
  11. Click the "Pair Steam Link" button, and type in the code that the Steam Link app gave you.
  12. You're in business! Close your Paperspace tab (as it will consume bandwidth that you want to reserve for gaming). Your phone will launch into Steam Big Picture mode, and you can install and play games at will.
Considerations:
  1. You can use the on-screen controls in the Steam Link app, and that might be okay for some indie games or non-twitchy games, but I purchased one of these controllers and this clip for my phone.
  2. A quirk with Paperspace is that it uses the resolution of your browser as the upper bound for the display resolution. So to get higher than 1080p, I open my browser tab in full screen, and I use Chrome to zoom out, which causes the desktop to increase in resolution. Then I close my tab.
  3. If you leave on the auto-start with Windows setting for Steam, all you have to do to get things going is open Paperspace's website on your phone and start your machine. Don't open it on your phone, as that will mess up your resolution, just hit the start button.
  4. Always remember to shutdown your machine after use. Paperspace will kill it after a day of inactivity by default (you can adjust that setting), but you'll keep spending $0.50/hr until you turn it off.
  5. If a particular game requires you to fill out fields and move a mouse cursor around, you can open your Paperspace window and interface that way.

TL, DR: It's really quite simple to set up a personal cloud gaming service that beats Stadia in a number of ways using any number of cloud hosting providers and Steam Link Anywhere.
submitted by kad-air to Android [link] [comments]

What are Nano's biggest issues? Let's talk about it!

Let's talk about some of Nano's biggest issues. I also made a video about this topic, available here: https://youtu.be/d9yb9ifurbg.
00:12 Spam
Issues
Potential Mitigations & Outstanding Issues
01:58 Privacy
Issues
  • Nano has no privacy. It is pseudonymous (like Bitcoin), not anonymous.
Potential Mitigations & Outstanding Issues & Outstanding Issues*
  • Second layer solutions like mixers can help, but some argue that isn't enough privacy.
  • The current protocol design + the computational overhead of privacy does not allow Nano to implement first layer privacy without compromising it's other features (fast, feeless, and scalable transactions).
02:56 Decentralization
Issues
  • Nano is currently not as decentralized as it could be. ~25% of the voting weight is held by Binance.
  • Users must choose representatives, and users don't always choose the best ones (or never choose).
Potential Mitigations & Outstanding Issues
  • Currently 4 unrelated parties (who all have a verifiable interest in keeping the network running) would have to work together to attack the network
  • Unlike Bitcoin, there is no mining or fees in Nano. This means that there is not a strong incentive for emergent centralization from profit maximization and economies of scale. We've seen this firsthand, as Nano's decentralization has increased over time.
  • Nano representative percentages are not that far off from Bitcoin mining pool percentages.
  • In Nano, voting weight can be remotely re-delegated to anyone at any time. This differs from Bitcoin, where consensus is controlled by miners and requires significant hardware investment.
  • The cost of a 51% attack scales with the market cap of Nano.
06:49 Marketing & adoption
Issues
  • The best technology doesn't always win. If no one knows about or uses Nano, it will die.
Potential Mitigations & Outstanding Issues
  • I would argue that the best technology typically does win, but it needs to be best in every way (price, speed, accessbility, etc). Nano is currently in a good place if you agree with that argument.
  • Bitcoin started small, and didn't spend money on marketing. It takes time to build a community.
  • The developers have said they will market more once the protocol is where they want it to be (v20 or v21?).
  • Community marketing initiatives have started to form organically (e.g. Twitter campaigns, YouTube ads, etc).
  • Marketing and adoption is a very difficult problem to solve, especially when you don't have first mover advantage or consistent cashflow.
08:07 Small developer fund
Issues
  • The developer fund only has 3 million NANO left (~$4MM), what happens after that?
Potential Mitigations & Outstanding Issues
  • The goal for Nano is to be an Internet RFC like TCP/IP or SMTP - development naturally slows down when the protocol is in a good place.
  • Nano development is completely open source, so anyone can participate. Multiple developers are now familiar with the Nano protocol.
  • Businesses and whales that benefit from Nano (exchanges, remittances, merchant services, etc) are incentivized to keep the protocol developed and running.
  • The developer fund was only ~5% of the supply - compare that to some of the other major cryptocurrencies.
10:08 Node incentives
Issues
  • There are no transaction fees, why would people run nodes to keep the network running?
Potential Mitigations & Outstanding Issues
  • The cost of consensus is so low in Nano that the benefits of the network itself are the incentive: decentralized money with 0 transaction fees that can be sent anywhere in the world nearly instantly.
  • Paying $50-$100 a month for a high-end node is a lot cheaper for merchants than paying 1-3% in total sales.
  • Businesses and whales that benefit from Nano (exchanges, remittances, merchant services, etc) are incentivized to keep the protocol developed and running.
11:58 No smart contracts
Issues
  • Nano doesn't support smart contracts.
Potential Mitigations & Outstanding Issues
  • Nano's sole goal is to be the most efficient peer-to-peer value transfer protocol possible. Adding smart contracts makes keeping Nano feeless, fast, and decentralized much more difficult.
  • Other solutions (e.g. Ethereum) exist for creating and enforcing smart contracts.
  • Code can still interact with Nano, but not on the first layer in a decentralized matter.
  • Real world smart contract adoption and usage is pretty limited at the moment, but that might not always be the case.
13:20 Price stability
Issues
  • Why would anyone accept or spend Nano if the price fluctuates so much?
  • Why wouldn't people just use a stablecoin version of Nano for sending and receiving money?
Potential Mitigations & Outstanding Issues
  • With good fiat gateways (stable, low fees, etc), you can always buy back the fiat equivalent of what you've spent.
  • The hope is that with enough adoption, people and businesses will eventually skip the fiat conversion and use Nano directly.
  • Because Nano is so fast, volatility is less of an issue. Transactions are confirmed in <10 seconds, and prices change less in that timeframe (vs 10 minutes to hours for Bitcoin).
  • Stablecoins reintroduce trust. Stable against what? Who controls the supply, and how do you get people to adopt them? What happens if the assets they're stable against fail? Nano is pure supply and demand.
  • With worldwide adoption, the market capitalization of Nano would be in the trillions. If that happens, even millions of dollars won't move the price significantly.
15:06 Deflation
Issues
  • Nano's current supply == max supply. Why would people spend Nano today if it could be worth more tomorrow?
  • What happens to principal representatives and voting weight as private keys are lost? How do you know keys are lost?
Potential Mitigations & Outstanding Issues
  • Nano is extremely divisible. 1 NANO is 1030 raw. Since there are no transaction fees, smaller and smaller amounts of Nano could be used to transact, even if the market cap reaches trillions.
  • People will always buy things they need (food, housing, etc).
  • I'm not sure what the plan is to adjust for lost keys. Probably requires more discussion.
Long-term Scalability
Issue
  • Current node software and hardware cannot handle thousands of TPS (low-end nodes fall behind at even 50 TPS).
  • The more representatives that exist, the more vote traffic is required (network bandwidth).
  • Low-end nodes currently slow down the network significantly. Principal representatives waste their resources constantly bootstrapping these weak nodes during network saturation.
Potential Mitigations & Outstanding Issues
  • Even as is, Nano can comfortably handle 50 TPS average - which is roughly the amount of transactions per day PayPal was doing in 2011 with nearly 100 million users.
  • Network bandwidth increases 50% a year.
  • There are some discussions of prioritizing bootstrapping by vote weight to limit the impact of weak nodes.
  • Since Nano uses an account balance system, pruning could drastically reduce storage requirements. You only need current state to keep the network running, not the full transaction history.
  • In the future, vote stapling could drastically reduce bandwidth usage by collecting all representative signatures up front and then only sharing that single aggregate signature.
  • Nano has no artificial protocol-based limits (e.g. block sizes or block times). It scales with hardware.
submitted by Qwahzi to nanocurrency [link] [comments]

Groestlcoin 6th Anniversary Release

Introduction

Dear Groestlers, it goes without saying that 2020 has been a difficult time for millions of people worldwide. The groestlcoin team would like to take this opportunity to wish everyone our best to everyone coping with the direct and indirect effects of COVID-19. Let it bring out the best in us all and show that collectively, we can conquer anything.
The centralised banks and our national governments are facing unprecedented times with interest rates worldwide dropping to record lows in places. Rest assured that this can only strengthen the fundamentals of all decentralised cryptocurrencies and the vision that was seeded with Satoshi's Bitcoin whitepaper over 10 years ago. Despite everything that has been thrown at us this year, the show must go on and the team will still progress and advance to continue the momentum that we have developed over the past 6 years.
In addition to this, we'd like to remind you all that this is Groestlcoin's 6th Birthday release! In terms of price there have been some crazy highs and lows over the years (with highs of around $2.60 and lows of $0.000077!), but in terms of value– Groestlcoin just keeps getting more valuable! In these uncertain times, one thing remains clear – Groestlcoin will keep going and keep innovating regardless. On with what has been worked on and completed over the past few months.

UPDATED - Groestlcoin Core 2.18.2

This is a major release of Groestlcoin Core with many protocol level improvements and code optimizations, featuring the technical equivalent of Bitcoin v0.18.2 but with Groestlcoin-specific patches. On a general level, most of what is new is a new 'Groestlcoin-wallet' tool which is now distributed alongside Groestlcoin Core's other executables.
NOTE: The 'Account' API has been removed from this version which was typically used in some tip bots. Please ensure you check the release notes from 2.17.2 for details on replacing this functionality.

How to Upgrade?

Windows
If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes for older versions), then run the installer.
OSX
If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes for older versions), run the dmg and drag Groestlcoin Core to Applications.
Ubuntu
http://groestlcoin.org/forum/index.php?topic=441.0

Other Linux

http://groestlcoin.org/forum/index.php?topic=97.0

Download

Download the Windows Installer (64 bit) here
Download the Windows Installer (32 bit) here
Download the Windows binaries (64 bit) here
Download the Windows binaries (32 bit) here
Download the OSX Installer here
Download the OSX binaries here
Download the Linux binaries (64 bit) here
Download the Linux binaries (32 bit) here
Download the ARM Linux binaries (64 bit) here
Download the ARM Linux binaries (32 bit) here

Source

ALL NEW - Groestlcoin Moonshine iOS/Android Wallet

Built with React Native, Moonshine utilizes Electrum-GRS's JSON-RPC methods to interact with the Groestlcoin network.
GRS Moonshine's intended use is as a hot wallet. Meaning, your keys are only as safe as the device you install this wallet on. As with any hot wallet, please ensure that you keep only a small, responsible amount of Groestlcoin on it at any given time.

Features

Download

iOS
Android

Source

ALL NEW! – HODL GRS Android Wallet

HODL GRS connects directly to the Groestlcoin network using SPV mode and doesn't rely on servers that can be hacked or disabled.
HODL GRS utilizes AES hardware encryption, app sandboxing, and the latest security features to protect users from malware, browser security holes, and even physical theft. Private keys are stored only in the secure enclave of the user's phone, inaccessible to anyone other than the user.
Simplicity and ease-of-use is the core design principle of HODL GRS. A simple recovery phrase (which we call a Backup Recovery Key) is all that is needed to restore the user's wallet if they ever lose or replace their device. HODL GRS is deterministic, which means the user's balance and transaction history can be recovered just from the backup recovery key.

Features

Download

Main Release (Main Net)
Testnet Release

Source

ALL NEW! – GroestlcoinSeed Savior

Groestlcoin Seed Savior is a tool for recovering BIP39 seed phrases.
This tool is meant to help users with recovering a slightly incorrect Groestlcoin mnemonic phrase (AKA backup or seed). You can enter an existing BIP39 mnemonic and get derived addresses in various formats.
To find out if one of the suggested addresses is the right one, you can click on the suggested address to check the address' transaction history on a block explorer.

Features

Live Version (Not Recommended)

https://www.groestlcoin.org/recovery/

Download

https://github.com/Groestlcoin/mnemonic-recovery/archive/master.zip

Source

ALL NEW! – Vanity Search Vanity Address Generator

NOTE: NVidia GPU or any CPU only. AMD graphics cards will not work with this address generator.
VanitySearch is a command-line Segwit-capable vanity Groestlcoin address generator. Add unique flair when you tell people to send Groestlcoin. Alternatively, VanitySearch can be used to generate random addresses offline.
If you're tired of the random, cryptic addresses generated by regular groestlcoin clients, then VanitySearch is the right choice for you to create a more personalized address.
VanitySearch is a groestlcoin address prefix finder. If you want to generate safe private keys, use the -s option to enter your passphrase which will be used for generating a base key as for BIP38 standard (VanitySearch.exe -s "My PassPhrase" FXPref). You can also use VanitySearch.exe -ps "My PassPhrase" which will add a crypto secure seed to your passphrase.
VanitySearch may not compute a good grid size for your GPU, so try different values using -g option in order to get the best performances. If you want to use GPUs and CPUs together, you may have best performances by keeping one CPU core for handling GPU(s)/CPU exchanges (use -t option to set the number of CPU threads).

Features

Usage

https://github.com/Groestlcoin/VanitySearch#usage

Download

Source

ALL NEW! – Groestlcoin EasyVanity 2020

Groestlcoin EasyVanity 2020 is a windows app built from the ground-up and makes it easier than ever before to create your very own bespoke bech32 address(es) when whilst not connected to the internet.
If you're tired of the random, cryptic bech32 addresses generated by regular Groestlcoin clients, then Groestlcoin EasyVanity2020 is the right choice for you to create a more personalised bech32 address. This 2020 version uses the new VanitySearch to generate not only legacy addresses (F prefix) but also Bech32 addresses (grs1 prefix).

Features

Download

Source

Remastered! – Groestlcoin WPF Desktop Wallet (v2.19.0.18)

Groestlcoin WPF is an alternative full node client with optional lightweight 'thin-client' mode based on WPF. Windows Presentation Foundation (WPF) is one of Microsoft's latest approaches to a GUI framework, used with the .NET framework. Its main advantages over the original Groestlcoin client include support for exporting blockchain.dat and including a lite wallet mode.
This wallet was previously deprecated but has been brought back to life with modern standards.

Features

Remastered Improvements

Download

Source

ALL NEW! – BIP39 Key Tool

Groestlcoin BIP39 Key Tool is a GUI interface for generating Groestlcoin public and private keys. It is a standalone tool which can be used offline.

Features

Download

Windows
Linux :
 pip3 install -r requirements.txt python3 bip39\_gui.py 

Source

ALL NEW! – Electrum Personal Server

Groestlcoin Electrum Personal Server aims to make using Electrum Groestlcoin wallet more secure and more private. It makes it easy to connect your Electrum-GRS wallet to your own full node.
It is an implementation of the Electrum-grs server protocol which fulfils the specific need of using the Electrum-grs wallet backed by a full node, but without the heavyweight server backend, for a single user. It allows the user to benefit from all Groestlcoin Core's resource-saving features like pruning, blocks only and disabled txindex. All Electrum-GRS's feature-richness like hardware wallet integration, multi-signature wallets, offline signing, seed recovery phrases, coin control and so on can still be used, but connected only to the user's own full node.
Full node wallets are important in Groestlcoin because they are a big part of what makes the system be trust-less. No longer do people have to trust a financial institution like a bank or PayPal, they can run software on their own computers. If Groestlcoin is digital gold, then a full node wallet is your own personal goldsmith who checks for you that received payments are genuine.
Full node wallets are also important for privacy. Using Electrum-GRS under default configuration requires it to send (hashes of) all your Groestlcoin addresses to some server. That server can then easily spy on your transactions. Full node wallets like Groestlcoin Electrum Personal Server would download the entire blockchain and scan it for the user's own addresses, and therefore don't reveal to anyone else which Groestlcoin addresses they are interested in.
Groestlcoin Electrum Personal Server can also broadcast transactions through Tor which improves privacy by resisting traffic analysis for broadcasted transactions which can link the IP address of the user to the transaction. If enabled this would happen transparently whenever the user simply clicks "Send" on a transaction in Electrum-grs wallet.
Note: Currently Groestlcoin Electrum Personal Server can only accept one connection at a time.

Features

Download

Windows
Linux / OSX (Instructions)

Source

UPDATED – Android Wallet 7.38.1 - Main Net + Test Net

The app allows you to send and receive Groestlcoin on your device using QR codes and URI links.
When using this app, please back up your wallet and email them to yourself! This will save your wallet in a password protected file. Then your coins can be retrieved even if you lose your phone.

Changes

Download

Main Net
Main Net (FDroid)
Test Net

Source

UPDATED – Groestlcoin Sentinel 3.5.06 (Android)

Groestlcoin Sentinel is a great solution for anyone who wants the convenience and utility of a hot wallet for receiving payments directly into their cold storage (or hardware wallets).
Sentinel accepts XPUB's, YPUB'S, ZPUB's and individual Groestlcoin address. Once added you will be able to view balances, view transactions, and (in the case of XPUB's, YPUB's and ZPUB's) deterministically generate addresses for that wallet.
Groestlcoin Sentinel is a fork of Groestlcoin Samourai Wallet with all spending and transaction building code removed.

Changes

Download

Source

UPDATED – P2Pool Test Net

Changes

Download

Pre-Hosted Testnet P2Pool is available via http://testp2pool.groestlcoin.org:21330/static/

Source

submitted by Yokomoko_Saleen to groestlcoin [link] [comments]

Perfecting NANO: fungibility

Fungibility
Sending 1 "tainted" Nano to Binance hot wallet would "wash" it by making it meld with all other coins in the wallet. Same as Bitcoin. However, up to the point of sending, that 1 Nano had a history which can be used by an exchange or any other entity to treat it differently which is the matter that defines fungibility.
When you pick up a dollar bill on the street, you have no idea where it went before. That bill is fungible.
When you pick up any cryptocoin other than Monero and it's clones, and move it to your wallet, with that coin (technically, with that UTXO) you have it's complete history: complete history of movement from one wallet to another, from the moment it was mined, to the end of the world (or a coin burning event). Even if coins aren't yours, you can still track their movement. Nano bounds to this rule as well as 99.9% all other coins.
NANO had solved the problem of consensus (DAG), the problem of PoW (making it completely distributed), and the problem of distribution. NANO had also solved the problem of coin creation, by (metaphorically speaking) closing the Chamber of Guf, and not allowing any new coins/souls to be created.
On the other hand, Monero (XMR) had solved the problem of practical fungibility, at the cost of complexity and practical scalability problems. Non-mining nodes aren't incentivized to waste bandwidth, disk space, and CPU power to decrypt blocks for third parties. Bandwidth use and processing power would impose a great cost on nodes. Using remote nodes breaks some of the privacy. It's not easy to use Monero for quick purchases in close succession. It's impossible to "stream money" using Monero. And it's blockchain always grows. There's no UTXO set, no possibility of storing just the UTXOs instead of whole chain.
Bitcoin's Lightning Network is extremely complex and requires paying on-chain fees for opening and closing of channels. The channels themselves are volatile, unstable, and require trusting "watchtowers" not to lose balance. As Bitcoin's usage grows, fees will skyrocket and make using it impossible.
Therefore, making NANO fungible, I think, would be the most important thing in history of money. Because we will finally have actual digital cash, where each transaction is immediate, final and irreversible, scalable to the entire world.
submitted by rattie_ok to nanocurrency [link] [comments]

How Much Can You Make Mining Bitcoin With 6X 1080 Ti ... How Much Internet Bandwidth/Usage Does MY Mining Rig Use ... How to Mine Bitcoins Using Your Own Computer - YouTube What is Bitcoin? Bitcoin Explained Simply for Dummies ... What is Bitcoin Mining? - YouTube

I measured the bandwidth usage of the client with 60 connections (you can drop down to 8 if you want) and made sure my sample included discovering a block. The inbound average bandwidth was 12Kbps (1.50 KB/s) and the average outbound bandwidth was 9Kbps (1.04 KB/s). So that should give you an idea what solo mining would be like. Notice that the bandwidth usage is basically insignificant in ... Mining takes a very tiny amount of bandwidth. Unless you are running hundreds of GH/s then there's no way it uses anything close to 1GB in 3 days. Should be more like 1% of that, if you have a high hash rate. What software are you using to mine? Maybe you are measuring bitcoin-qt bandwidth, and not mining bandwidth? You are mining in a pool, right? If not, then switch to pool mining. level 2 ... Unfortunately, the majority of the data usage of a Bitcoin node (typically between 40% and 70%) is not even spent on transaction data, but just on announcing new transactions to each other to find out which ones to relay. Right now, increasing the number of connections between nodes proportionally increases bandwidth overheads. This limits the number of connections each node can support. Crypto Mining Bandwidth. Crypto mining bandwidth, as one may expect, depends on a few factors. The coin you are mining, the speed at which you are mining at, and the type of pool connection you have. We pulled figures from a heterogeneous mining operation to gauge how much networking stress crypto mining levies. When it comes to bandwidth consumption, bitcoin mining isn’t the worst thing in the world and, as a matter of fact, it barely even consumes a lot of bandwidth, whether you are mining on your own with dedicated equipment, or mining in a bitcoin rig with a thousand other miners. According to most miners on the internet, the bandwith taken by bitcoin mining activities for a solo miner is very ...

[index] [28024] [36343] [9604] [33173] [16567] [29718] [3259] [38890] [1295] [2305]

How Much Can You Make Mining Bitcoin With 6X 1080 Ti ...

Start trading Bitcoin and cryptocurrency here: http://bit.ly/2Vptr2X IMPORTANT!! This method only illustrates how mining works. You will not make any money f... Learn how to use and setup a bitcoin miner to earn bitcoins , litecoins , dogeecoins etc. Download miner from https://easyminer.net/Downloads/ For more information: https://www.bitcoinmining.com and https://www.weusecoins.com What is Bitcoin Mining? Have you ever wondered how Bitcoin is generated? T... Start trading Bitcoin and cryptocurrency here: http://bit.ly/2Vptr2X Bitcoin is the first decentralized digital currency. All Bitcoin transactions are docume... SUBSCRIBE FOR MORE HOW MUCH - http://shorturl.at/arBHL Nviddia GTX 1080 Ti - https://amzn.to/2Hiw5xp 6X GPU Mining Rig Case - https://bitcoinmerch.com/produc...

#