Microsoft launches cloud-based blockchain platform with

Technical: The Path to Taproot Activation

Taproot! Everybody wants to have it, somebody wants to make it, nobody knows how to get it!
(If you are asking why everybody wants it, see: Technical: Taproot: Why Activate?)
(Pedants: I mostly elide over lockin times)
Briefly, Taproot is that neat new thing that gets us:
So yes, let's activate taproot!

The SegWit Wars

The biggest problem with activating Taproot is PTSD from the previous softfork, SegWit. Pieter Wuille, one of the authors of the current Taproot proposal, has consistently held the position that he will not discuss activation, and will accept whatever activation process is imposed on Taproot. Other developers have expressed similar opinions.
So what happened with SegWit activation that was so traumatic? SegWit used the BIP9 activation method. Let's dive into BIP9!

BIP9 Miner-Activated Soft Fork

Basically, BIP9 has a bunch of parameters:
Now there are other parameters (name, starttime) but they are not anywhere near as important as the above two.
A number that is not a parameter, is 95%. Basically, activation of a BIP9 softfork is considered as actually succeeding if at least 95% of blocks in the last 2 weeks had the specified bit in the nVersion set. If less than 95% had this bit set before the timeout, then the upgrade fails and never goes into the network. This is not a parameter: it is a constant defined by BIP9, and developers using BIP9 activation cannot change this.
So, first some simple questions and their answers:

The Great Battles of the SegWit Wars

SegWit not only fixed transaction malleability, it also created a practical softforkable blocksize increase that also rebalanced weights so that the cost of spending a UTXO is about the same as the cost of creating UTXOs (and spending UTXOs is "better" since it limits the size of the UTXO set that every fullnode has to maintain).
So SegWit was written, the activation was decided to be BIP9, and then.... miner signalling stalled at below 75%.
Thus were the Great SegWit Wars started.

BIP9 Feature Hostage

If you are a miner with at least 5% global hashpower, you can hold a BIP9-activated softfork hostage.
You might even secretly want the softfork to actually push through. But you might want to extract concession from the users and the developers. Like removing the halvening. Or raising or even removing the block size caps (which helps larger miners more than smaller miners, making it easier to become a bigger fish that eats all the smaller fishes). Or whatever.
With BIP9, you can hold the softfork hostage. You just hold out and refuse to signal. You tell everyone you will signal, if and only if certain concessions are given to you.
This ability by miners to hold a feature hostage was enabled because of the miner-exit allowed by the timeout on BIP9. Prior to that, miners were considered little more than expendable security guards, paid for the risk they take to secure the network, but not special in the grand scheme of Bitcoin.

Covert ASICBoost

ASICBoost was a novel way of optimizing SHA256 mining, by taking advantage of the structure of the 80-byte header that is hashed in order to perform proof-of-work. The details of ASICBoost are out-of-scope here but you can read about it elsewhere
Here is a short summary of the two types of ASICBoost, relevant to the activation discussion.
Now, "overt" means "obvious", while "covert" means hidden. Overt ASICBoost is obvious because nVersion bits that are not currently in use for BIP9 activations are usually 0 by default, so setting those bits to 1 makes it obvious that you are doing something weird (namely, Overt ASICBoost). Covert ASICBoost is non-obvious because the order of transactions in a block are up to the miner anyway, so the miner rearranging the transactions in order to get lower power consumption is not going to be detected.
Unfortunately, while Overt ASICBoost was compatible with SegWit, Covert ASICBoost was not. This is because, pre-SegWit, only the block header Merkle tree committed to the transaction ordering. However, with SegWit, another Merkle tree exists, which commits to transaction ordering as well. Covert ASICBoost would require more computation to manipulate two Merkle trees, obviating the power benefits of Covert ASICBoost anyway.
Now, miners want to use ASICBoost (indeed, about 60->70% of current miners probably use the Overt ASICBoost nowadays; if you have a Bitcoin fullnode running you will see the logs with lots of "60 of last 100 blocks had unexpected versions" which is exactly what you would see with the nVersion manipulation that Overt ASICBoost does). But remember: ASICBoost was, at around the time, a novel improvement. Not all miners had ASICBoost hardware. Those who did, did not want it known that they had ASICBoost hardware, and wanted to do Covert ASICBoost!
But Covert ASICBoost is incompatible with SegWit, because SegWit actually has two Merkle trees of transaction data, and Covert ASICBoost works by fudging around with transaction ordering in a block, and recomputing two Merkle Trees is more expensive than recomputing just one (and loses the ASICBoost advantage).
Of course, those miners that wanted Covert ASICBoost did not want to openly admit that they had ASICBoost hardware, they wanted to keep their advantage secret because miners are strongly competitive in a very tight market. And doing ASICBoost Covertly was just the ticket, but they could not work post-SegWit.
Fortunately, due to the BIP9 activation process, they could hold SegWit hostage while covertly taking advantage of Covert ASICBoost!

UASF: BIP148 and BIP8

When the incompatibility between Covert ASICBoost and SegWit was realized, still, activation of SegWit stalled, and miners were still not openly claiming that ASICBoost was related to non-activation of SegWit.
Eventually, a new proposal was created: BIP148. With this rule, 3 months before the end of the SegWit timeout, nodes would reject blocks that did not signal SegWit. Thus, 3 months before SegWit timeout, BIP148 would force activation of SegWit.
This proposal was not accepted by Bitcoin Core, due to the shortening of the timeout (it effectively times out 3 months before the initial SegWit timeout). Instead, a fork of Bitcoin Core was created which added the patch to comply with BIP148. This was claimed as a User Activated Soft Fork, UASF, since users could freely download the alternate fork rather than sticking with the developers of Bitcoin Core.
Now, BIP148 effectively is just a BIP9 activation, except at its (earlier) timeout, the new rules would be activated anyway (instead of the BIP9-mandated behavior that the upgrade is cancelled at the end of the timeout).
BIP148 was actually inspired by the BIP8 proposal (the link here is a historical version; BIP8 has been updated recently, precisely in preparation for Taproot activation). BIP8 is basically BIP9, but at the end of timeout, the softfork is activated anyway rather than cancelled.
This removed the ability of miners to hold the softfork hostage. At best, they can delay the activation, but not stop it entirely by holding out as in BIP9.
Of course, this implies risk that not all miners have upgraded before activation, leading to possible losses for SPV users, as well as again re-pressuring miners to signal activation, possibly without the miners actually upgrading their software to properly impose the new softfork rules.

BIP91, SegWit2X, and The Aftermath

BIP148 inspired countermeasures, possibly from the Covert ASiCBoost miners, possibly from concerned users who wanted to offer concessions to miners. To this day, the common name for BIP148 - UASF - remains an emotionally-charged rallying cry for parts of the Bitcoin community.
One of these was SegWit2X. This was brokered in a deal between some Bitcoin personalities at a conference in New York, and thus part of the so-called "New York Agreement" or NYA, another emotionally-charged acronym.
The text of the NYA was basically:
  1. Set up a new activation threshold at 80% signalled at bit 4 (vs bit 1 for SegWit).
    • When this 80% signalling was reached, miners would require that bit 1 for SegWit be signalled to achive the 95% activation needed for SegWit.
  2. If the bit 4 signalling reached 80%, increase the block weight limit from the SegWit 4000000 to the SegWit2X 8000000, 6 months after bit 1 activation.
The first item above was coded in BIP91.
Unfortunately, if you read the BIP91, independently of NYA, you might come to the conclusion that BIP91 was only about lowering the threshold to 80%. In particular, BIP91 never mentions anything about the second point above, it never mentions that bit 4 80% threshold would also signal for a later hardfork increase in weight limit.
Because of this, even though there are claims that NYA (SegWit2X) reached 80% dominance, a close reading of BIP91 shows that the 80% dominance was only for SegWit activation, without necessarily a later 2x capacity hardfork (SegWit2X).
This ambiguity of bit 4 (NYA says it includes a 2x capacity hardfork, BIP91 says it does not) has continued to be a thorn in blocksize debates later. Economically speaking, Bitcoin futures between SegWit and SegWit2X showed strong economic dominance in favor of SegWit (SegWit2X futures were traded at a fraction in value of SegWit futures: I personally made a tidy but small amount of money betting against SegWit2X in the futures market), so suggesting that NYA achieved 80% dominance even in mining is laughable, but the NYA text that ties bit 4 to SegWit2X still exists.
Historically, BIP91 triggered which caused SegWit to activate before the BIP148 shorter timeout. BIP148 proponents continue to hold this day that it was the BIP148 shorter timeout and no-compromises-activate-on-August-1 that made miners flock to BIP91 as a face-saving tactic that actually removed the second clause of NYA. NYA supporters keep pointing to the bit 4 text in the NYA and the historical activation of BIP91 as a failed promise by Bitcoin developers.

Taproot Activation Proposals

There are two primary proposals I can see for Taproot activation:
  1. BIP8.
  2. Modern Softfork Activation.
We have discussed BIP8: roughly, it has bit and timeout, if 95% of miners signal bit it activates, at the end of timeout it activates. (EDIT: BIP8 has had recent updates: at the end of timeout it can now activate or fail. For the most part, in the below text "BIP8", means BIP8-and-activate-at-timeout, and "BIP9" means BIP8-and-fail-at-timeout)
So let's take a look at Modern Softfork Activation!

Modern Softfork Activation

This is a more complex activation method, composed of BIP9 and BIP8 as supcomponents.
  1. First have a 12-month BIP9 (fail at timeout).
  2. If the above fails to activate, have a 6-month discussion period during which users and developers and miners discuss whether to continue to step 3.
  3. Have a 24-month BIP8 (activate at timeout).
The total above is 42 months, if you are counting: 3.5 years worst-case activation.
The logic here is that if there are no problems, BIP9 will work just fine anyway. And if there are problems, the 6-month period should weed it out. Finally, miners cannot hold the feature hostage since the 24-month BIP8 period will exist anyway.

PSA: Being Resilient to Upgrades

Software is very birttle.
Anyone who has been using software for a long time has experienced something like this:
  1. You hear a new version of your favorite software has a nice new feature.
  2. Excited, you install the new version.
  3. You find that the new version has subtle incompatibilities with your current workflow.
  4. You are sad and downgrade to the older version.
  5. You find out that the new version has changed your files in incompatible ways that the old version cannot work with anymore.
  6. You tearfully reinstall the newer version and figure out how to get your lost productivity now that you have to adapt to a new workflow
If you are a technically-competent user, you might codify your workflow into a bunch of programs. And then you upgrade one of the external pieces of software you are using, and find that it has a subtle incompatibility with your current workflow which is based on a bunch of simple programs you wrote yourself. And if those simple programs are used as the basis of some important production system, you hve just screwed up because you upgraded software on an important production system.
And well, one of the issues with new softfork activation is that if not enough people (users and miners) upgrade to the newest Bitcoin software, the security of the new softfork rules are at risk.
Upgrading software of any kind is always a risk, and the more software you build on top of the software-being-upgraded, the greater you risk your tower of software collapsing while you change its foundations.
So if you have some complex Bitcoin-manipulating system with Bitcoin somewhere at the foundations, consider running two Bitcoin nodes:
  1. One is a "stable-version" Bitcoin node. Once it has synced, set it up to connect=x.x.x.x to the second node below (so that your ISP bandwidth is only spent on the second node). Use this node to run all your software: it's a stable version that you don't change for long periods of time. Enable txiindex, disable pruning, whatever your software needs.
  2. The other is an "always-up-to-date" Bitcoin Node. Keep its stoarge down with pruning (initially sync it off the "stable-version" node). You can't use blocksonly if your "stable-version" node needs to send transactions, but otherwise this "always-up-to-date" Bitcoin node can be kept as a low-resource node, so you can run both nodes in the same machine.
When a new Bitcoin version comes up, you just upgrade the "always-up-to-date" Bitcoin node. This protects you if a future softfork activates, you will only receive valid Bitcoin blocks and transactions. Since this node has nothing running on top of it, it is just a special peer of the "stable-version" node, any software incompatibilities with your system software do not exist.
Your "stable-version" Bitcoin node remains the same version until you are ready to actually upgrade this node and are prepared to rewrite most of the software you have running on top of it due to version compatibility problems.
When upgrading the "always-up-to-date", you can bring it down safely and then start it later. Your "stable-version" wil keep running, disconnected from the network, but otherwise still available for whatever queries. You do need some system to stop the "always-up-to-date" node if for any reason the "stable-version" goes down (otherwisee if the "always-up-to-date" advances its pruning window past what your "stable-version" has, the "stable-version" cannot sync afterwards), but if you are technically competent enough that you need to do this, you are technically competent enough to write such a trivial monitor program (EDIT: gmax notes you can adjust the pruning window by RPC commands to help with this as well).
This recommendation is from gmaxwell on IRC, by the way.
submitted by almkglor to Bitcoin [link] [comments]

Summary Golem Factory AMA, January 22nd 2020!

Hi all,
First of all, hope you have all had a great start to the new decade.
Golem has done an AMA on the 22nd of January and there was a lot to discuss with over 50 questions from all of you. It is somewhat understandable that a lot do not want to read the whole thing. I will try to recap the most 'important' or viable questions for the current state of development. As always, I will include a juicy Tl;dr at the end.
General Development Direction and Product Adoption
"We believe that decentralization, in the upcoming years, will not only be needed, but will be inevitable. We’re then preparing for when that time comes, as we are aware that Golem will need to grow robuster and then, the worries of low requestor supplies, will be a thing of the past. Taking into account how dependent we have become from corporations we believe that this trend will have to change and we have to be ready. Nowadays, the adoption is not going as quickly as we expected, and as quickly as we all wished for. Not only for the Golem network but for the whole cryptospace. We believe this is a moment to think progressively and overcome doubts by bulding."
(Viggith) "We're almost about to become Clay officially. Reaching this milestone gave us a lot of opportunities to learn. As the whole process took quite some time, we could observe the development decisions made in other projects, how the tech stack matured, and how expectations in the community changed shape."
"Right now we’re mostly focused on the general platform development rather than working on deep development of integrations. It doesn’t mean that we’re not actively looking for the new ones, we just want to encourage devs to build their own rather then build them interally. However, we have several examples and PoCs that are being integrated - computational chemistry software for one of the scientific research projects from IChO, the transcoding use- case is at its MVP stage. We are also investigating the usage of gWASM for gas price optimization for Ethereum, and we had a PoC for a meta-use case with tools for devops’. We are striving to improve the existing software including Task API, so that the gWASM and Task APIusers will propose new integrations."
Task API Launch and Concent
Last week, the Task API launched on Testnet which allows users to build their tasks on the Golem Network. This has been perceived to be the largest component that will transition Golem from the Brass stage, to Clay. For more information and elaboration on Concent, see this comment
"We worked on the task-api component with a small and agile team, with proper planning and preparation we were able to not have big hiccups. The largest changes where that subtask-id was only unique when combined with task-id. The largest fights with code were about windows exceptions and the issues between twisted and asyncio. Twisted is our old async library, asyncio is the new one that has better native python support.
For the mainnet release we would like to have more use-cases, better developer utilities and a lot of testing, by the team and the community. The main focus is to stabilize the task-api"
For quick examples of the Task API:
"As examples for the task-api we made two apps: `blenderapp` and `tutorialapp`. blenderapp can be run by anyone on the current testnet using these instructions. tutorialapp can be build and run locally using these instructions ( NOTE: technical ). As for tests we made unit tests on almost all levels: the apps, connecting libraries and golem core. In Golem core there are also multiple integration tests to test integration with core, one for testing blenderapp, one for testing apps while developing them."
Other Usecases for Golem on the Horizon
"We did some research on integrating BOINC and BOINC-like computations. For now it seems that it is technically possible. But it will require more effort. Recently we are planning to try to cross-compile [email protected] to gwasm application for the start and run it on mainnet. Another possible way is to use the testnet Task API as you mentioned. In general, it would be better to do so on mainnet but we need to wait for the release.
(...)Golem should be presented to science oriented researchers and be recognized in voluntary computations. That would improve our userbase, it would contribute to non-profit organizations and, of course, would bring dApps to the non blockchain world. (...) I see that there have been more discussions on reddit and we will review them and speak internally."
"Right now we’re mostly focused on the general platform development rather than working on deep development of integrations. It doesn’t mean that we’re not actively looking for the new ones, we just want to encourage devs to build their own rather then build them interally. However, we have several examples and PoCs that are being integrated - computational chemistry software for one of the scientific research projects from IChO, the transcoding use- case is at its MVP stage. We are also investigating the usage of gWASM for gas price optimization for Ethereum, and we had a PoC for a meta-use case with tools for devops’. We are striving to improve the existing software including Task API, so that the gWASM and Task APIusers will propose new integrations."
The GNT, Layer 2 and DeFi
"We crowdfunded for this project, and GNT has always been a utility token. So, in short, the narrative "the price does not matter" would be neither politically nor logically correct. However, we need to look after the best interests of all users, either golem software users or token holders, that helped us kickstart this venture.
(...)So, the GNT should be easy to use directly on the platform. Still, the token should also supplement the platform in other ways (e.g., through community-driven projects on the platform utilizing economic mechanisms envisioned and developed by the community members). The token should also be easy to use in a broader context (e.g., the DeFi), which may or may not result in a direct connection with the Golem platform."
"The current model with on-chain payments is not sustainable for Golem and other similar projects which need a trade-off between the cost of transaction, security/finality and timing. When it comes to small (aka micro) payments it’s even more important. It may happen that due to Ethereum congestion one has to pay more for the gas than the computations itself.
Here comes the idea for moving payments to layer 2 solutions. Unfortunately currently there is no such in the production which fits our platform needs, though the situation is very dynamic and we can expect suches to appear in the coming months."
"It is no secret that we have been thinking about migrating to ERC-20 for a long time. For one reason or another, we always postponed. But with all the 2019 astronomical DeFi growth, the flame was reignited(...).
We’ve been working with ETHWorks on finding the best approach for migrating GNT to ERC20.We chose to work with this particular company as our goal is to make sure that the passage to ERC20 allows the (new)GNT to be able to adapt to various matters: for instance, to be used for layer 2 scaling solutions, or Universal Logins, gassless transactions, among others. Right now, doing gassless transactions with the current GNT is cumbersome, and there are many solutions in the market that would be a great fit if GNT was ERC20.(...) As we continue the work & research, we may come up with more ideas that go beyond this, but our main focus remains on giving our users the chance to improve their Golem experience, trade without KYC (if they want to) - while we simultaneously look into all the DeFi ecosystem, and see if we can have the chance of using the token in other platforms."
New Team Members and GolemGrid
"Radek Tereszczuk has joined us in order to work on the long-term vision of the project and how it fits in the overall web 3 vision. He is an inventor, expert and consultant in areas such as IT, telecommunications, statistics, machine learning, genetics and physics. After hours, research on the new class of programming languages ​​based on his own discoveries in graph mathematics. Has 20+ years professional experience in both his own start-ups and big enterprises (mainly banks and insurance), acting as dev / analyst / architect / project and product manager.
Kuba Kucharski is joining us as Chief Product Engineering Officer to boost our product and engineering efforts. He has vast experience in leading developer teams and building product organisations. Involved in Blockchain space since 2013, some of his projects being OrisiOracles (smart contract framework built on top of Bitcoin and BitMessage) and Userfeeds (attention economy / blockchain explorer built on Ethereum)."
Phillip from GolemGrid has officially joined the team as well, after his support on mainly Rocket Chat. (chat.golem.network). When asked about his product GolemGrid (golemgrid.com) and his working abroad, he said the following:
"So far so good. No issues with working remotely for what i’m currently doing. We have an internal chat for the team members, so if there’s any questions one can just type in there and receive an answer fairly quickly.
No challenges to GolemGrid. Actually all more helpful since i've got the smart developers around to answers questions about Golem if needed. (...)
Currently there has not been any talk of GolemGrid integrating into Golem or something similar. So atm it’s purely separated as it always has been. I myself will always integrate what’s possible with Golem to GolemGrid, so whether that’s ML, Rendering or a third thing, I want to integrate it all when released.
I have plans to fiddle with the Task API in the nearest time and see if I can create something unique and useful for others."
Events and upcoming Promo
"Kubkon’s speaking at FOSSDEM 2020 in Belgium in a matter of days, then he’s heading towards ETHCC 2020 in Paris to spread the word about gWASM even further.The very eloquent Marcin Benke is speaking in April at EDCON.
MP is also doing active reach out to conferences to help with programming and intro some Golem angles we’ve not presented before, and maybe more generalized knowledge that our team can share.We’re adding more conferences every month - and most importantly, we will focus on hackathons. You can rest assured that angle will be thoroughly covered, whether local or more international initiatives, we’ll have a lot of news on this front."
"We are working on our content schedule for 2020 (including regular blogposts as we’ve been doing), planning to add tutorial videos and workshops / hackathons. The planned marketing activities for the first two quarters of 2020 are going to be targeted towards quite technical people and they are going to be heavily tech oriented (tutorials, docs, hackathons, explanatory videos, workshops etc). The promo video was a representation of the more mainstream marketing that forms part of our long-term goal."
Tl;dr
Golem has not adopted users as quickly as expected, however that goes for a lot of things in the cryptospace. The focus is currently on making the platform more robust and on UX instead of deep development and integrations. The Testnet API is live. Blenderapp can be run by anyone on the current testnet using these instructions. tutorialapp can be build and run locally using these instructions ( NOTE: technical ). Other possible use-cases for Golem are BOINC and BOINC-like computations, however these require more effort currently and have been passed on for internal discussion. Several PoCs are being integrated; chemistry software for one of the scientific research projects from IChO as well as gas-optimization calculations for gWASM and a PoC for a meta-usecase with tools for developers.
The GNT should be easy to use directly on the platform. The current model with on-chain payments is not sustainable for Golem and other similar projects which need a trade-off between the cost of transaction, security/finality and timing. When it comes to small (aka micro) payments it’s even more important. Golem has not found a layer 2 solution that satisifies their needs. Golem has been working with ETHWorks on finding the best approach for migrating GNT to ERC20. They chose to work with this particular company as our goal is to make sure that the passage to ERC20 allows the (new)GNT to be able to adapt to various matters. Their main focus remains on giving our users the chance to improve their Golem experience, trade without KYC (if they want to) - while we simultaneously look into all the DeFi ecosystem, and see if we can have the chance of using the token in other platforms.
Radek Tereszczuk, Kuba Kucharski and Phillip from GolemGrid have joined the team and they will help in the fields of long-term web3.0 vision, boosting product and engineering performance and efforts and tech support as well as community support respectively.
Golem will be speaking at FOSSDEM 2020 in Belgium in a matter of days and will then be heading towards ETHCC 2020 in Paris to spread the word about gWASM even further. They will also be speaking in April at EDCON, as well as doing active reach-outs to conferences to help with programming.

See you all next AMA!
submitted by PSVjasper99 to GolemProject [link] [comments]

A portal opened in front of my car today and I hit a time traveler. I cradled him in my arms and he gave me some pages from a journal. His dying words: “take this and publish it to r/Buttcoin. The world must know what awaits it. I fear, however, trying to change the future is futile.” Here it is.

Thursday, July 27, 2023
5:30 am -My alarm goes off blaring random Leo Wolf clips. When he says “I want you to deal with your problems by becoming rich!” I roll out of bed and fill my kitty’s bowl until it overflows. I watch his obese body slide out from under the bed and make its way toward the bowl. I return to sleep.
5:53 am - I awake to Mr. Fats barfing up his food along with a tiny baggie containing a small slip of paper with one-time codes to unlock my trading computers. Not safe to just leave them laying around at night where they could be stolen while I sleep or photographed by a drone through a window.
6:15 am - I enter my sonically shielded (so no one can record my typing patterns) and EMF shielded (obvious reasons) trading room I built out of the closet next to the front door of my 200 square foot apartment. I unlock my machines and get the new random passwords for tomorrow. Time to start trading during my self-imposed two hour trading schedule. Things are looking good. HomeCoin is up 10% - yes! - one step closer to being out of the apartment and into my own house. PottyCoin went down the tubes last night, so to speak, but I knew it was coming and I hedged with 10x margin shorts. Someone will be personally wiping my butt clean in a luxurious stall today! WaterCoin down - no wonder my faucet wasn’t working this morning - but CoffeeCoin up. One of my exchanges exit scammed last night but like most people I have at least ten different exchange accounts with balances at any given time.
8:15 am - I’m done trading. I wipe the sweat from my brow and take my pulse. 137. Not bad! Who needs exercise when you spend each morning with your life savings one click away from being decimated? Suddenly I remember that my paycheck came in last night and it’s time to do some bitcoin cost averaging to my altcoin portfolio. The bitcoin transaction fee eats up half my paycheck, as usual, but I’m not too worried. Lightning Network is only about 18 months from being production-ready and high fees will soon be a thing of the past.
8:33 am - I make it to my favorite coffee shop a little late and order my favorite latte. The cashier frowns, however. Turns out that five minutes ago CoffeeCoin pulled a bart and I can’t even pay for half a cup. I shrug, “I guess I’ll have to trade for more tomorrow!” I tell the cashier as I leave. Oh crypto market you big silly animal - big gains mean sometimes you take little losses.
8:59 am - I squeeze into work just before the door traps me inside. Phew. Wouldn’t want to be docked a week’s pay. Ever since the government collapsed when fiat became worthless, businesses have become way more efficient and profitable due to not being restrained by oppressive labor laws. I may work twelve hours a day, six days a week, but being locked in the building motivates me to strive toward that eight-year promotion where I’ll only work ten hours a day and I can leave the building for thirty minutes at lunch.
9:15 am - I settle into my desk at Kodak Corp. We specialize in ICOs, our most successful being a coin for tracking food coloring from production to consumption. My job is to find photos of random people on the internet that look important and make the images suitable for our ICO prospectuses.
11:37 am - I’m fatigued so I pop a few amphetamines. Weird to think I once had to buy these on the dark web but now they sell them at the company pharmacy.
12:18 pm - Watch a bunch of new hires in a conference room for orientation. KodakCoin has really been up since last Monday and we’ve been hiring like crazy. Hope they all aren’t canned by next Friday if the market drops.
12:47 pm - Eat a quick lunch and then “drop the kids off at the pool”. It’s everything I dreamed it would be.
7:17 pm - Finish a lot of photos. Stretch. Pop more amphetamines.
9:25 pm - Get out of work a little late and then head home.
9:55 pm - Arrive at my apartment only to find a repo team taking my stuff away. After a frantic two hours I discover what happened. Turns out I was dumb enough to buy a laptop from a non-Intel approved computer store. It had a hidden chip on the motherboard waiting for the right moment to steal my private keys and then move my crypto out of my wallets. At first I’m distraught, but then at the lowest point of my despair I realize that I’m one of the few people that could afford to learn a lesson this expensive. I’m truly lucky.
11:58 pm - After dealing with the fiasco at my former apartment, I find out hackers discovered KodakCoin was using SHA1 for their block hashes and the entire coin collapsed. So I’m out of a job, too. I head to my local HomelessShelterPlus. In the past, I would have been ashamed, but now that homeless shelters are all private companies, I have the satisfaction of knowing I won’t be getting a handout. Only five years of indentured servitude until I’m back in the voluntary work force. I smile as I step forward to wait in line for a cardboard box and an allocated spot on a nearby street.
submitted by taxonomicnomenclatur to Buttcoin [link] [comments]

I'm an Undercover FBI Agent on the Deep Web

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to DrCreepensVault [link] [comments]

Weekly Update: First ParJar Pilot Class, Constellation partners with Chainlink, $BAT on 2gether, Pynk on BlockMAG... – 11 Oct - 17 Oct'19

Weekly Update: First ParJar Pilot Class, Constellation partners with Chainlink, $BAT on 2gether, Pynk on BlockMAG... – 11 Oct - 17 Oct'19
Hi everyone! Here’s your week at Parachute + partners (11 Oct - 17 Oct'19):

The first ParJar Pilot Class is officially off to a roaring start with 5 amazing projects and their communities. Here’s to a great future. This was the perfect occasion to announce a ParJar Battle Royale for our ParJar Pilot partners. Blood will be spilled next week. Pow! ParJar now has almost 20k active users. It works in 400+ communities and has seen 400k+ transactions. Say what! Par4Par lottery entered stage 5 this week. The stakes are even higher. 250k $PAR in prizes. Dang! Reflecting on Vitalik Buterin’s observation, Cap says: “...we’ve done things in reverse here at Parachute - we grew an amazing community around exploring ideas and built our tech to meet what they needed”. What are your thoughts on buying houses for USD 1 each in an Italian town for building the Parachute village? Cap’s recommendation. Haha.
Andy’s Advent calendar. Each window is a 16.9 oz can of beer. Sweet!
We saw Tiproom become the 17th most active group on Telegram a few weeks back. Well, hold on to your pants because it is now the 12th most active group. Whoa! A big reason for the group’s constant buzz are the amazing trivias hosted by the TTR crew. This week was no different. Doc Victor’s Sunday medical trivia had 8 Qs, 3k $PAR each. This was a quiz with a twist. In Doc’s words: "..beware, in each question they will have to diagnose a case based on symptoms and signs that I will give them". Noice! Charlotte’s Tuesday Trivia had 10 questions with a 25k $PAR prize pool. Another trivia by Victor (not the Doc) had another 10 Q’s, 2500 $PAR each. Listened to the TTR theme yet? DJ Jose in da house with a rocking theme. Wicked! Congratulations to Mario for winning the pet contest in TTR. Sebastian made a compilation video of all the entries. Awww!
Let’s see if Cap’s guerrilla marketing at Burger Joint in NYC gets us a new Parachuter
Victor’s Friday trivia at aXpire was the usual 10 Q, 100 $AXPR per Q affair. And like always, super duper fun! If you missed news from Week 41 at aXpireverse, Joakim’s got your back. Check out his video to catch up. CEO Gary Markham travelled to India this week to prepare for the Bilr release. Click here to track the latest 20k $AXPR burn. Plus, a featured article by Hosting Advice was pretty cool. 2gether added Basic Attention Token ($BAT) support to the app this week. Let the $BAT spending begin! Use the invite code: paywithbat to get 100 $2GT free when you sign up for the app. Know of a startup that’s going to Malta Blockchain Summit? Let the XIO crew know since the team will be attending along with Uptrennd. Benjamin’s tutorial video on market cycles with the BOMB token as case study was riveting and full of useful info. This week’s Dash-walk-the-talk discussion revolved around getting unstuck as an entrepreneur. After taking inputs from the community 2 weeks back, the BOMB Board finalised on the team and way forward to manage the BOMB Instagram. For the latest update on the Birdchain app, click here. Congratulations to Bounty0x for crossing 2.5x of its funding goal on Republic with more than 2 months to go. Voyager is offering a 5% annual interest on ETHOS tokens held on their platform. Read more about it here. The news was also covered by SludgeFeed. Wendy O shared her usability experience of Voyager as well.
Bitcoin ATM in Alexis’ neighbourhood. Cool!
The McAfeeDex launched last week is off to a tremendous start. Bitcoin Cash’s Roger Ver spoke briefly on it in a news roundup video. 6 portals are live already. If you’re still wondering how to list your token on the Dex, here’s a simple guide from the man himself. Binance Chain support coming soon! SwitchDex is now trackable on DappRadar and State of the DApps. The team has set up a dedicated TG group for folks wanting to BUIDL on SwitchDex. Also, Callisto Network is slated to do a security audit of the McAfeeDex contracts. Great stuff! Peeps who missed the Fantom AMA with G.Crypto from 2 weeks back, can catch up from the transcript released this week. The latest technical update is detailed and covers all major changes in code. Uptrennd started a new video intro contest for a 2500 $1UP prize pool. Woot! Full transcript of Jeff’s interview with OmiseGo CTO Kasima from few weeks back was released this week. $1UP can now be spent in tons of retail chains thanks to a newly forged partnership with MobiePay. Last week we saw Jarau buy a laptop with his Uptrennd earnings. This week we learnt about Zubair buying a mobile phone with his $1UP earnings. Neat! The latest biweekly Dev update and weekly District update from Ditrict0x covers news such as Ethlance redesign, Meme factory NSFW filter etc.
Uptrennd continues to breach new heights on Alexa rankings every week

OST has set up a community slack to coordinate all Pepo related feedback received for the Pepo app. So join in if you want to help out! Did you know that Pepo is home to some of the most influential people in crypto? This week, we heard from Ethereum and Coinbase investor Bobby Goodlatte. The app crossed 20k P2P transactions and is now live in both app stores. The first such with micro-transactions, in-app purchases and cash-out options for crypto. Few weeks back, the Sentivate community chose to burn tokens (vs a raffle). This week, they voted on how many to burn. The $SNTVT crew sat down for a live Q&A with Bit Shaman this week. The team also wrote about possible future use-cases of the Universal Web with short story threads. Cryptoreview.xyz’s review of the project also came out this week. Constellation announced that it is joining Chainlink as a new node operator in order to stream enterprise data to Chainlink’s smart contracts. Click here for the PR release. The technical overview paper gets into details of what the partnership means for both companies. Bags Token hosted an AMA this week in their Telegram group. Hope you had an opportunity to get your doubts cleared. Community member Con built a $BAGS-centric image/gif board called bagsbook. Check it out! In a bit of a sobering news, Scroll (XD Token) ceased business operations this week.
Constellation will act as an oracle for Chainlink by streaming verified data to the network
Pynk was featured in the latest edition of the BlockMAG published by the Malta Blockchain Summit. COO Rupert Barksfield was invited by NatWest to speak on how to get traction for tech projects. Rupert’s interview by Ayo News where he explains how AI and crowd wisdom works in tandem at Pynk came out as well. Pynk Tank is Pynk's very own think tank intiative which hosts meet ups, panel discussions, podcasts with entrepreneurs, thought leaders etc. Their latest event was this week. Folks who are yet to figure out what Pynk does can read co-founder Zack Yurtsever’s article that explains it all. Following up on the Hydro Vault sneak peek from last week, check out its detailed update on the dev front. How can the Hydro platform be used to get acceleration for your fintech product? Click here to read how. Co-Founder Mike Kane travelled to the AWS Loft in NYC for the Shearman & Sterling Empire Startups Demo Day event to showcase Hydro’s fintech solutions. $HYDRO got listed on the Coinone exchange. This will be $HYDRO's first IDR fiat on-ramp. With bZx joining the Hydro dApp store this week, it now has an impressive line up of partners. Thanks to the massive community push, $HYDRO will be listed on Atomic Wallet in its next release. For a quick summary of the latest news from Hydroverse, click here. Most of these have already been covered in our updates. Silent Notary conducted the first ever speedtest of its IDL network. The team published the results and steps to optimise the code. In its current state, the network is able to execute 5-12 transactions per second. The first version of the SelfKey Corporate Wallet was launched this week. The corporate wallet will allow you to purchase digital services for your business in the future. Plus, a partnership with ChangeNOW allows easy crypto swapping from the marketplace.

And with that, we close for another week in the Parachuteverse. See you soon with another update. Cheers!
submitted by abhijoysarkar to ParachuteToken [link] [comments]

I'm an Undercover FBI Agent on the Deep Web.

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to mrcreeps [link] [comments]

AMA Summary

By popular demand, I've taken the automatically-generated transcript of the AMA video and broken it down to bullet points. Of course, this is not a word-for-word transcription and I've paraphrased a few things, so it's highly recommended you watch it for yourself: https://youtu.be/FGOSDZbETr4
Team Goals/Priorities – seen in current and future job postings
Coin accessibility
Adoption
Project Apollo
Awareness about Aion (video choppy here)
Unity Economics
Building the next “Killer App”
Enterprise Ethereum Alliance
WinMiner
Hackathons
Awareness in developer communities
Marketing
Java developer interest
Integrations
Market position
MavenNet
TRS
Interoperability
Anthony “Pomp” Pompliano interview
(Video skipped)
Big Enterprises
Singularity University
Charles Hoskinson/IOHK/Cardano
Challenges as FoundeCEO
European presence
ConsenSys
Value to Aion
Interoperability (part 2)
Runway
Thank you so much for being patient with us. Stay tuned for our weekly AMAs from different members of the team, community surveys, and these quarterly video AMAs. There's going to be a lot more information coming out of the project especially as we wrap up Unity.
submitted by a_toad_a_so to AionNetwork [link] [comments]

Andreas Antonopoulos' depiction of the day he became aware of the donations that made him a millionaire

I'm not sure if this already has been posted here, but I just came across this post from A. Antonopoulos' Patreon page (it's a public entry posted on 16th of December. The readability and formatting is better there btw):
Edit: direct link to the post: https://www.patreon.com/posts/emotional-15912702
On December 6th, my life changed trajectory... again. I went to sleep on a wave of positive messages and support from the bitcoin community, in response to a letter I had posted on Patreon titled “In defense of optimism” that had leaked to Reddit. I had spent the day reading messages of support pouring in on Twitter, Patreon, and email, literally thousands of them. It was a life-affirming experience. Like everyone else on social media, the messages I receive are not always kind and supportive. Often the critical messages and trolls are far louder than the supporters. Our brains don't evaluate praise and criticism in equal measure - it's easy to believe the criticism and see the praise as undeserved. That’s why each little message of support makes a difference, each one helps me ignore the critics and see the impact of my work. In addition to all of the written messages, people were signing up to support me on Patreon and some were even sending bitcoin to my donation address. By the time I went to sleep, I was filled with gratitude, humbled by the overwhelmingly positive, viral response of the community.
Here’s what happened next...
I wake up on December 7th, the notifications list on my phone was too long to scroll. Hundreds more messages of support had come in while I was asleep.
Then my phone rings and I recognize the number of a dear friend. "Strange," I think. I’m not expecting a call. "Don't open your laptop yet," she says. "You got some big bitcoin donations overnight. Are you sitting down?" I sit down. I open my laptop, I look at the balance in my 1andreas bitcoin donation address.
Surprise, gratitude, fear, shock, joy, elation, anxiety. My emotions achieved a level of volatility that mirrored that of the bitcoin exchange rate. Good thing I was sitting down.
You're probably thinking that between the supportive messages and the large donations, I’d have been celebrating without a care in the world. But I'm a security professional who works in bitcoin. Could I come up with a doomsday scenario to taint this experience? Hold my beer.
I'm in a taxi on the way to the airport. I’m cycling through emotions again, a bit faster now.
Joy, Terror, Tears, Gratitude, Fear, Elation, Dread, Cold Sweat. It's a good thing I'm sitting down. I can't feel my fingers.
Anxiety
Wouldn't it be ironic if I get hacked and this massive donation is stolen the same day it was given? Shudder. That was a real possibility. Funds were sent to a vanity address, posted on my website, which was mainly used to support my habit of giving small amounts of bitcoin to strangers at meetups and conferences. Before December 6th, the address typically received small gifts each month and I emptied it every now and then in a spree of small donations.
Gratitude
I still can’t believe how many people have responded. I had no idea how many people could identify with the feelings expressed “In defense of optimism” and would want to show their support. I’m grateful to be a part of this community.
Fear
This vanity address is secured with a single private key which was stored on my phone in a “hot” wallet, so that I can give away bitcoin at meetups. The address has maximum public visibility and no Segwit (segregated witness) support. My security model just tipped over and I'm freaking out.
Happiness
I’m so happy! This is incredible, unimaginable. My fingers are numb, in a good way. Is this really happening?!?
Cold Sweats
I have to move the funds out. Now. Right now. But I only have this key on a wallet that doesn't handle RBF (replace-by-fee), CPFP (child-pays-for-parent), and it's not a Segwit address. I'm traveling; I’m about to get on two long flights and the mempool is slammed with transactions. Of all the days!
Joy
I’m crying. Tears of joy. This is something most people never get to experience in the most meaningful of careers, a loud acknowledgement from an entire community and financial security. I’m thinking about my family members and close friends who are struggling and overjoyed at the opportunity I now have to help them.
Terror
Then it dawns on me: a perfect nightmare scenario. What if this is considered "income" in the US and I have to pay taxes at a 39.6% rate? Those taxes would be evaluated on the USD value of the donation at the time it was made, at an all-time-high price of bitcoin. If bitcoin's bubble bursts by 50% today, I will owe more taxes than the donation is worth. I will be bankrupt but will owe the IRS and those debts can't be discharged in bankruptcy. I'm going to be in debt for a decade!
Elation
I can HODL! I don’t have to keep selling to pay bills. Patreon has grown too, so I should be able to cover my expenses and build the business with their support. I can really HODL!
[Alarm buzzes on my phone]
“Boarding on Gate D15”. Pack everything back up, run to the gate. Find my seat. Unpack all my electronics. Re-establish connections. No Wifi yet. 3G if I hold my phone just so against the window. We're taking off. No Wifi at all on this flight. 4 hours, offline, me and my thoughts. What is the opposite of a state of mindfulness? Head spinning.
Fear
What if the price crashes. Should I sell some?
Silliness
I'm buying a lambo (I laugh out loud at the thought of that. No, I'd never waste money on something so silly).
Dread
What if the donations had zero fees and will never confirm? What if this was all a cruel joke?
Joy
My dad will be so proud!
[Landed]
Turn on smartphone. Too many notifications. Turn on VPN, Tor. Sync wallet. Too slow. Too slow.
Run to the lounge. Get on Wifi. Fire up VPN, Tor. Start electrum. Import keys. Child-pays-for-parent the stuck transactions, Replace-by-fee new transactions. Careful coin selection. Send to cold storage (so glad I keep an unused cold storage address handy). Overpay fees more than ever before. 2000 satoshi per byte? Fuck yeah. This is the highest priority transaction of my life. 8 agonizing minutes. 1st block. Confirmations ripple down my screen. Exhaling... I hadn't noticed I was holding my breath.
“Boarding gate C51”. Pack everything, run to the gate. Board the plane. Unpack everything. This flight has Wifi. Bet it doesn't work. Yup, it doesn't work. 6.5 hour flight. I'll just read a book. I've read the same paragraph 8 times and don't know what it says. I'll sleep. Nope. Ok fine, I'll fret - seems I'm good at that and nothing else right now.
[Landed]
That was the longest flight ever. Boot up, 4G, VPN, Tor. Sync.... slow, too slow.
ANOTHER GIANT DONATION. WTF! Is this really happening? Is my wallet counting the balance incorrectly? This isn't possible. WTF IS GOING ON?
Joy, Terror, Tears, Gratitude, Fear, Elation, Dread. I’m cycling faster now.
I just emptied my wallet into cold storage and now it's carrying a ridiculous amount again. Boot up, VPN, Tor, Electrum, CPFP, RBF, cold sweat, 1 confirmation. Phew.
I realize that I just conducted the 4 biggest transactions of my life. I'm shaking. Hope I didn't screw anything up.
Finally I get to my hotel. “Long day” doesn’t even begin to describe it. I am grateful, giddy, jetlagged and exhausted, so sleep should come easy, right? Not happening. Two hours of tossing and turning while my mind is racing. In the end I just pass out from exhaustion. I wake up in a state of anxiety.
I open my inbox. I have a dozen interview requests from newspapers, TV, radio. They don’t want to talk about bitcoin. They want to talk about “my story.” It’s never been about “my story” and I’m not about to change that. Denied, denied, denied. That’s it. I’m going offline for a few days. I need time to process everything that has happened over the past couple of days and strategize about what to do next.
There are no words to adequately convey my appreciation, my gratitude.
These are life-changing gifts, but I don’t intend to change my life. I’m highly suspicious and careful about “lifestyle inflation”: I resist any urges to increase my spending as my income increases because as a self-employed entrepreneur I know my income can decrease significantly at any moment.
First, the practical side: For legal and tax reasons the gifts should remain mostly untouched for at least three years. This is a new situation and no one knows for sure how the authorities will characterize it. I wanted to HODL anyway, so that’s fine with me.
Second, and the much more important side, I love what I do. I’m obviously not going to “retire” or slow down. Receiving your messages and support has energized me and I’m excited to do more, much more.
The number of people supporting me on Patreon has grown significantly and with that support I’ll actually be able to do a lot more. And there are many things I want to do: a new website with more materials, in as many formats and languages as possible; more books; an epic tour; and that’s just the beginning! I also plan to grow my team, which serves two goals: I can get help for the things that need to be done, but I can also bring more people success and security with a steady paycheck.
While I’m excited about all of these new projects, I want you to know that the ultimate goal remains the same: to educate as many people as possible about this transformational technology and remain an independent voice, working directly for the community.
A week has passed. The one feeling that keeps returning, among the barrage of feelings, is gratitude. After taking time to process and calm down, the fear and stress is gone and all that is left is gratitude. I am so thankful for all the messages of support. I am so touched to hear stories of how my work has affected others in a positive way. I am thankful for all the donors who rallied behind me to help me in my advocacy and education.

THANKYOUBITCOINCOMMUNITY

Thank you for being so generous, so kind, so supportive; I’ll never forget this experience. Now, back to work!
submitted by TheGreatMuffin to Bitcoin [link] [comments]

The History, The Current State And The Future Of NavCoin

The History, The Current State And The Future Of NavCoin

This is it. If you're interested to see what NAV is all about, this is the ultimate guide for you. You will learn about the history of NavCoin and how it evolved. You will learn about the current state and features of NavCoin and you will learn about the exciting new features that are planned and coming up in the (near) future.
So buckle up, this is going to be a long ride!

Table Of Content


Introduction - What is NavCoin?


The History

Introduction
The following chapter will summarize and break down the history of NavCoin in a few sentences. NAV started a long time ago, went through rebrandings and changes of the core team before it became what it is today.

SummerCoin
NavCoin was initially first introduced under the name SummerCoin on April 23 in 2014. SummerCoin was a fork of the Bitcoin blockchain. It used to have a PoW/PoS hybrid algorithm with a block time of 45 seconds.

SummerCoinV2 /NavajoCoin
Soon after the initial launch of SummerCoin, the original developer left and SoopY (soopy452000 on bitcointalk) took over as the main developer and rebranded the project to SummerCoinV2 respectively NavajoCoin and introduced new features.
The name NavajoCoin was chosen in honor of the Navajo Code Talker. The unbreakable Navajo code was used to encrypt highly classified military information and commands and decrypt the same in WW II.
SoopY introduced a technology which allowed sending transactions anonymously and private. This technology was called "Navajo Anonymous Technology". SoopY also released a new wallet and set the Proof of Stake rewards at 10% for the first year, 5% for the second year and 2% for every year after.

NavCoin
On August 12, 2014, Craig (current lead core developer, pakage on bitcointalk) started to get involved with NAV by helping to set up a website [10].
It was officially announced that Craig joined the core team as a "Wallet & Web Developer" on November 06, 2014.
The last tokenswap and restart of the blockchain of NAV happened on May 12, 2016.
Soon later, SoopY stopped showing up and Craig stepped into the role of the lead core developer. Since then, Craig has assembled a strong team with which he built NavCoin into what it is today.
Currently, Craig and the NavCoin Core team is located in New Zealand and they are actively developing many ground-braking features which differentiate NAV from other cryptocurrencies. You will read more about that later in this article.

The Current State

Introduction
The year 2018 has been a thriving year for the NavCoin ecosystem. Despite the USD price of NAV not reflecting it, in 2018 the core team has developed a whole bunch of new features. Also the core content creators published the first official guidelines that function as an orientation guide for community content creators. This chapter will give you an overview of the current team, the features, the prior mentioned guidelines and the community of NavCoin.

Core Team [1]
Last year, the core team has grown alot. It contains of developers, content creators and interns. The core team are employees of Encrypt S, the New Zealand's leading blockchain R&D lab. Encrypt S is developing blockchain solutions since 2014 and values building open-source software highly.

Craig MacGregor - Chief Executive Officer
Craig is the CEO of Encrypt S and the founder of NavCoin. He is one of the world's most experienced blockchain developers. Craig founded NavCoin in 2014 and is developing software for it since then. He has assembled a strong team of like-minded people. Craig also speaks at seminars and conferenced. Some of the companies and conferences he did blockchain education sessions at are Oracle, Xero, Air New Zealand, Blok Tex and trademe. Together with the team, he is also doing a education series on YouTube where he explains upcoming features in-depth for the community.

Alex Vazquez - Chief Technical Officer
Alex is the CTO of Encrypt S and the most active contributor to the NavCoin core Github. He has incredible knowledge of blockchains and proposes and implements solutions for challenges and features. He supports community developers frequently and answers any questions of the community thoroughly. Like Craig, Alex is developing software for the NavCoin ecosystem for a very long time. Alex speaks at universities at times and educates students about the blockchain technology.

Paul Sanderson - Lead Software Engineer
Paul is the Lead Software Engineer at Encrypt S. He has a flair for technology. His technical and management skills are perfectly suited for consultancy and investment advising. He also frequently contributes to the NavCoin core source code.

Rowan Savage - Senior Software Engineer
Rowan is a full stack software engineer with more than a decade experience in developing complex front-end web applications. He joined Encrypt S in February 2018 and has since been involved in the Valence Plattform, the Kauri Wallet and NavCoin Core. You will read more about these feature/projects later.

Carter Xiao - Lead UX/UI Designer
Carter specializes in user-centric design and is also very talented with 3D animation, motion graphics and programming. One of NavCoins core principle is "Simplifying Crypto" and UX/UI is a very important part of that.

Matt Paul - Software Engineer
Like Rowan, Matt is a full stack Software Engineer. He joined the core team in Mai 2017 and has since worked on NavPay, NavPi, the Kauri Wallet and NavCoin Core. Kieren Hyland - Chief Strategy Officer Kieren is one of the employees that are working for Encrypt S for a very long time. He is the CSO and is a digital strategist and growth hacker with a passion for new technology and has a lot of experience in online marketing. Laura Harris - Creative Director Laura has a combination of commercial and creative flair. She manages the social media accounts for NavCoin and ensures, that NavCoins' message is always powerful, relevant and distinctive. John Darby - Content Creator John is an internationally awarded Technology and Financial sector marketing communications specialist. He is one of the Core Content Creators for NavCoin.

Features of NavCoin [2]
The following features are currently available and have been developed in the last months and years. It is sorted from newest to oldest.

Static Block Reward
The soft-fork for the enabling of static block rewards have been accepted and became active recently at 5th January 2019. This means, that the block reward was changed from a percentage based reward to a static reward. This will incentivize the stakers to have their node online 24/7 which increased the security of the network. It also aligns NavCoin with the PoSv3 specification. With this implementation, the yearly inflation will be 3.6% currently and will exponentionally decrease because of the static value of the rewards. Every staked block will now give the staker 2 NAV. Depending on how many people are staking, the yearly percentage varies. With the network weight currently being around 20'000'000 NAV, stakers earn around 10% rewards from staking 24/7.

Cold staking
To provide extra security to participants in the staking process in the NavCoin network, the core team decided to implement cold staking. This allows to store NAV offline and still be able to sign staking inputs. Looking forward, a possible integration into the Ledger Nano S would mean, that one can stake NAV securely from a offline hardware wallet. How cool is that?

OpenAlias
One of the core principle of NAV is to simplify cryptocurrencies. Many non-technical people are deterred from the long, cryptic addresses used in wallets. When sending funds, you have to make sure that every single letter and digit is correct which is nerve-wracking for the average person. NavCoin has implemented OpenAlias, which allows to transform the wallet address into a email-like form. Everyone can register a name like "[[email protected]](mailto:[email protected])". Funds can then be sent to this name, which makes sending crypto much easier and less error-prone.

Community Fund
This is the one big feature I was most excited about. NavCoin core has implemented the first fully decentralized community fund. Acceptance of proposals and release of funds is all approved by the decentralized network. No central authority has access to the fund. The community fund enables everyone to propose their ideas to the NavCoin community and to get paid to implement these ideas. Everyone can propose whatever they like (of course there is a higher rate of success if the proposal contributes to the NavCoin ecosystem ;-)). In fact, this article was sponsored by the NAV-Community by voting "yes" for my proposal. The fund works like this:
For a fee of 50 NAV, everyone can create and present his idea/proposal to the entire NavCoin network. The fee is here to help prevent spam attacks. Proposals can literally be anything - be it development, marketing or anything else you can some up with.
After creating the proposal, everyone contributing to the NavCoin network can then decide if they like the proposal of not. They vote with "Yes" or "No" for the acceptance of the proposal. Voting happens via staking. Every transaction that gets validated by you gives you one vote. This means that the more NAV you are staking, the higher your voting weight is.
The proposal stays in the state "Pending" until it is accepted or rejected. To be accepted, a proposal has to have a participation of at least 50% of all staked blocks and at least 75% of these votes have to be "Yes"-votes. Like-wise to be rejected a proposal need 50% participation of the network and 75% of these votes have to be "No"-votes. Additionally, if a proposal didn't pass after 6 voting cycles (about 6 weeks) it is also rejected.
After a proposal has been accepted, the creator of the proposal can start his work. When the work is finished, or at in the proposal defined checkpoints, the proposal creator can create a payment request for the full or part of the requested funds.
The NavCoin network can then again decide, if the work is what the creator promised to do and vote for the funds or reject the payment request because it was not what he promised. This mechanism ensures, that the funds are only release if the creator of the proposal did what he promised. The NavCoin network decides everything, there is no central authority which makes the community fund 100% decentralized.
The community fund is quite new but there have already been some proposals that were accepted like paying for the development & hosting of NAV block explorer, the creation and distribution of NAV car stickers to the community for free (or paid by the community fund), the funding of interns for NavCoin Core, translation of the website into other languages and YouTube videos. What ideas could you come up with? By the way: this article was also sponsored by the community fund :-)

Proof of Stake
Like said before, NavCoin uses the Proof of Stake algorithm to create and validate blocks. Participants of the NavCoin network can earn rewards by putting their coins to stake and thus validating blocks and securing the network. The reward used to be 4% fixed but recently changed with the implementation of PoSv3. Currently, rewards for stakers that are staking 24/7 is about 10% but it is dependent on how many people are staking. If more nodes come online, this reward will go down. If 90% of all NAVs would be at stake, stakers would still earn 4%.

Tutorials And Guidelines [3]
The NavCoin Core team pushes the community to contribute to the NavCoin ecosystem constantly. They emphasize that NavCoin is an open source project and everyone can contribute. The team tries to make it as easy as possible for the average person to contribute and thus created different tutorials and guidelines.

Tutorials To Contribute To The Website
The whole website is open source. Everyone can contribute to the website. The team created different guides for people to follow [4].

The NavCoin Developer Manifesto
The content creator core team has build a developer manifesto. It defines the values that should be uphold like for example that they will always operate in the best interest of the network. If defines the principles, purposes, scope of involvement and operational requirements [5].

The NavCoin Content Creation Manifesto
Similar to the developer manifesto, there is also a content creation manifesto. Again it defines the principles for creating content, the purpose, the scope of involvement and the operational requirements [6].

NavCoin Brand Guidelines
In addition to the content creation manifesto, there is also a brand guideline booklet. This should help content creators to create images, videos, articles etc. in the same style as the core team. It defines the NAV brand. The brand guidelines contain definitions, the language to use (words to use, words not to use), the tone of voice, what the community aspires to be and what we discourage to be. It also contains the logo pack which can be used in graphics etc. It describes correct logo spacing, logo placement, the colors of NAV and different web assets. It gives tips about gradients and overlays, the typefaces (with a font pack) and many more. Check it out yourself [7].

NavCoin Educational Series
The core team has decided to actively involve the community in the creation of new features. For this reason and to allow users to ask questions, they created the NavCoin Educational Series. The core team schedules an online live meetup which can be joined by everyone. On YouTube they do live-streams and explain upcoming features. Examples of these series are explanations for cold staking, static rewards (PoSv3) and the community fund. The community can ask questions live and the core team will answer them immediately.

Community
During the last year there have been an influx of software developers from the community starting to create features for NAV.

navexplorer.com
An examples is navexplorer.com which is programmed by community developer prodpeak and is a block explorer for NavCoin. Additionally, it functions as a interface to see what is going on in the community fund. It shows pending proposals and payment requests.

NEXT Wallet
The NEXT Wallet is an alternative wallet for NAV and other cryptocurrencies. It has a beautiful user interface and is additionally the easiest interface to interact with the community fund (create proposals, create payment requests and vote for proposals and payment requests). It is programmed by community developer sakdeniz who put hundreds of hours into it during last year.

There were also some marketing activities starting to emerge with the release of the community fund. Some of these were for example free stickers for everyone in the NAV community to stick to their car / shop / window etc. or YouTube videos of CryptoCandor and Cryptomoonie that explained the details of NAV. I am sure, that with the 500'000 NAV available in the community fund per year there will be an influx of gread ideas - development as well as marketing activities - that will be funded.

The Future

Introduction
These features are planned for the future. Many of the following features are part of the 2019 roadmap. Some will not be described in great detail because not much is known about them yet. I've still listed them as they are part of what is yet to come.

Features
Rimu - Improved Privacy Solution
NavCoin used to be a optional privacy coin. That means, that you could choose to send a transaction in private. NavCoin was criticized for the way it handles private payments because it relied on a few servers which didn't make it that decentralized. The technology was called "NavTech" and was a secondary blockchain that obscured the transaction and the amount that was sent. NavCoin Core is currently developing a new improved privacy solution that will make the private payment system completely trustless and districuted and runs at a protocol level. Alex of the NavCoin Core team has published a paper that describes this new privacy solution. It's called Zero Confidential Transactions and can be found here: https://www.researchgate.net/publication/330366788_ZeroCT_Improving_Zerocoin_with_Confidential_Transactions_and_more. What I want to highlight is the collaboration between Alex as the proposer of the solution and the Veil team, a Bitcoin Core developer and Moneros main cryptographer as reviewers. When the best work together, it will be interesting to see what the outcome is!

Valence Plattform [8]
Valence is an applied Blockchain platform that can help businesses realise the tangible benefits of blockchain. You can think of Valence as a platform with which you can build Anonymous Distributed Applications (aDapps) with. But Valence is a different kind of platform that enables developers to create new types of blockchain applications. The problem with current (turing complete) dApp platforms are their complexity and rigid nature. Security holes in smart contracts and scaling issues happen frequently [9].
Valence provides transitional pathways that let businesses migrate only part of their activities to the blockchain without having to restructure their entire business model [9].
Valence will provide a spectrum of blockchain application solutions which sit along the decentralized spectrum, offering businesses simple ways to dip their toes into the blockchain at minimal risk or complexity [9].
Thanks to the proof of stake nature of the Valence blockchain, more of a node's resources can be used for processing and routing application data which makes the platform faster and scalable.
Valence aims to make building blockchain applications as accessible to the general public as WordPress or Squarespace has made building websites.
The developers NavCoin and Valence aim to make Valence extremely easy to work with:
A Valence application could be an open source mobile or web application that submits unencrypted or encrypted data directly to the blockchain. The only configuration necessary for the app developer would be setting up the data structure. Once they've done that they can start writing to the blockchain immediately.
The Valence blockchain interface is language agnostic, meaning developers are free to build applications in whichever language they're familiar with, which greatly reduces the barrier to entry.
As the platform progresses, Valence will introduce more and more smart contract templates in collaboration with the development community. These will be like plugins that users can simply select and configure for their application, without having to reinvent the wheel and risk contract errors or spend countless hours of research to program them.

NavShopper
The following information is taken from the latest weekly news: NavShopper is a new project which will allow people to spend NavCoin on a growing list of retailers and service providers. NavShopper sits between traditional retailers accepting fiat and NavCoin users and purchases products on behalf of the user by managing the crypt-fiat conversion, payment and shipping. This project will unlock many more ways for people to spend NAV on existing websites/marketplaces without requiring each site to individually accept cryptocurrencies. Some of the prototypes we are working on include crediting your Uber account, buying products on Amazon and donating to charities.

Kauri Wallet
The Kauri Wallet aims to be an open-source, multi-currency wallet which functions as a foundation for other features.

Kauri Enhanced
Enhancements to the Kauri Wallet will allow multiple accounts, pin numbers, recurring payments and more.

Kauri DAEx
The Kauri DAEx is a Decentralised Atomic Exchange that utilises the features of the Kauri Wallet and enables users to create safe peer to peer atomic exchanges for any currency supported by the Kauri Wallet. NavDelta NavDelta will be a payment gateway that allows users to spend NAV at any business which accepts currencies supported by the Kauri Wallet. NavMorph NavMorph is a fusion of Rimu and Kauri DAEx and will allow to privately send every cryptocurrency supported by the Kauri Wallet.

Outro

If you have made it this far: Congratulations! You have learned about how NAV evolved, what its current state is and what the future will bring. To sum all up: NavCoin has made incredible progress during last year and released many long awaited features despite the bear market. Many more exciting features are yet to come and it's going to be very interesting to see where we will stand on this day next year.

Giveaway

Unfortunately, the giveaway was not possible in the cryptocurrency-subreddit because of their rules, so I'm doing it here :-) As a surprise, in the next 2 hours I am going to send some NAV to everyone who wants to try out the awesome features and NavPay you read about above.
To get your NAVs, all you have to do is the following:
If you liked the experience, I'd be happy to hear back from you :)

References

[1] https://encrypt-s.com/company/
[2] https://navcoin.org/en/roadmap/
[3] https://navhub.org/get-involved/
[4] https://navhub.org/how-to-guide/
[5] https://navhub.org/assets/NavCoinDeveloperManifesto.pdf
[6] https://navhub.org/assets/NavCoinContentManifesto.pdf
[7] https://navhub.org/assets/NavCoinBrandGuidelines.pdf
[8] https://valenceplatform.org/
[9] https://valenceplatform.org/learn/business-on-the-blockchain-made-easy/
[10] https://bitcointalk.org/index.php?topic=679791.msg8320228#msg8320228
submitted by crypto_sIF to NavCoin [link] [comments]

Nvidia GPU Bitcoin Mining in Windows How to CPU Mine Bitcoins 2018 Updated Windows 10 CryptoCurrency Altcoin Creation using Windows Enviroment Bitcoin-Api AWS Lambda Deploy Test Bitcoin SV: It's Time to Build

Bitcoin Wallet Guide. Bitcoin wallets are programs that allow you to send and receive Bitcoin. However, in order to choose the best wallet for your needs there are a lot of factors to take into account. In this post I'll cover everything you need to know about wallets and also review the best Bitcoin wallets around. Read More Bitcoin News is the world's premier 24/7 news feed covering everything bitcoin-related, including world economy, exchange rates and money politics. Ethereum inventor, Vitalik Buterin, Consensys co-founder Andrew Keys, Microsoft CEO, Satya Nadella, and Microsoft blockchain global strategist, Yorke Rhodes at the //Build conference in San BRD is the simple and secure way to get started with Bitcoin, Ethereum and other cryptocurrencies. BRD Rewards About Partners Blog Support Careers. 8:00 pm Total Assets $43,224.97. Bitcoin $38,642.91. $9,135.44 per BTC 4.23 BTC Ethereum $1,900.59. $233.43 per ETH 8.142 ETH BRD Bitcoin (BTC) Price Prediction – July 19, 2020After the recent downward move to $9,026 low, price corrected upward and has risen to $9,200. To test […] July 19, 2020

[index] [15647] [26963] [25233] [20025] [30207] [15850] [26075] [9340] [8188] [14507]

Nvidia GPU Bitcoin Mining in Windows

In his inspiring opening speech for CoinGeek Seoul Conference, Bitcoin Association Founding President Jimmy Nguyen challenged the attendees to build innovative projects by harnessing the benefits ... Click here to join The Bitcoin Mine!: http://www.thebitcoinmine.triplemining.com Link to stable 32 bit version of BFGMiner: http://luke.dashjr.org/programs/b... Best Bang For Buck GPU Mining Rig Build Guide 2019 - Mine Zcoin, Ethereum, Ravencoin, Grin, and Beam - Duration: 36:40. VoskCoin 80,664 views Then when it opens, hit wallet and either put in your NiceHash user id to deposit to your NiceHash Bitcoin wallet, or at the bottom you can select to put in an external wallet. After you input ... Now the Winmax Miner - Alpha Version is out. You don't need to pay any mining fees or premium key account and it goes for a cool $300.00 USD Use this software forever and make money from it. Watch ...

Flag Counter