6 Best Bitcoin Mining Hardware ASICs Comparison In 2017
6 Best Bitcoin Mining Hardware ASICs Comparison In 2017
Bitcoin Mining Software
Bitcoin Mining FAQ
12 Best Bitcoin Mining Software for Windows PC
How Many Bitcoins Are There? How Many Left to Mine? (2020)
Why Osana takes so long? (Programmer's point of view on current situation)
I decided to write a comment about «Why Osana takes so long?» somewhere and what can be done to shorten this time. It turned into a long essay. Here's TL;DR of it:
The cost of never paying down this technical debt is clear; eventually the cost to deliver functionality will become so slow that it is easy for a well-designed competitive software product to overtake the badly-designed software in terms of features. In my experience, badly designed software can also lead to a more stressed engineering workforce, in turn leading higher staff churn (which in turn affects costs and productivity when delivering features). Additionally, due to the complexity in a given codebase, the ability to accurately estimate work will also disappear. Junade Ali, Mastering PHP Design Patterns (2016)
Longer version: I am not sure if people here wanted an explanation from a real developer who works with C and with relatively large projects, but I am going to do it nonetheless. I am not much interested in Yandere Simulator nor in this genre in general, but this particular development has a lot to learn from for any fellow programmers and software engineers to ensure that they'll never end up in Alex's situation, especially considering that he is definitely not the first one to got himself knee-deep in the development hell (do you remember Star Citizen?) and he is definitely not the last one. On the one hand, people see that Alex works incredibly slowly, equivalent of, like, one hour per day, comparing it with, say, Papers, Please, the game that was developed in nine months from start to finish by one guy. On the other hand, Alex himself most likely thinks that he works until complete exhaustion each day. In fact, I highly suspect that both those sentences are correct! Because of the mistakes made during early development stages, which are highly unlikely to be fixed due to the pressure put on the developer right now and due to his overall approach to coding, cost to add any relatively large feature (e.g. Osana) can be pretty much comparable to the cost of creating a fan game from start to finish. Trust me, I've seen his leaked source code (don't tell anybody about that) and I know what I am talking about. The largest problem in Yandere Simulator right now is its super slow development. So, without further ado, let's talk about how «implementing the low hanging fruit» crippled the development and, more importantly, what would have been an ideal course of action from my point of view to get out. I'll try to explain things in the easiest terms possible.
else if's and lack any sort of refactoring in general
Perfection is achieved, not when there is nothing more to add, but when there is nothing left to take away. Antoine de Saint-Exupéry
This is why refactoring — activity of rewriting your old code so it does the same thing, but does it quicker, in a more generic way, in less lines or simpler — is so powerful. In my experience, you can only keep one module/class/whatever in your brain if it does not exceed ~1000 lines, maybe ~1500. Splitting 17000-line-long class into smaller classes probably won't improve performance at all, but it will make working with parts of this class way easier. Is it too late now to start refactoring? Of course NO: better late than never.
If you think that you wrote this code, so you'll always easily remember it, I have some bad news for you: you won't. In my experience, one week and that's it. That's why comments are so crucial. It is not necessary to put a ton of comments everywhere, but just a general idea will help you out in the future. Even if you think that It Just Works™ and you'll never ever need to fix it. Time spent to write and debug one line of code almost always exceeds time to write one comment in large-scale projects. Moreover, the best code is the code that is self-evident. In the example above, what the hell does (float) 6 mean? Why not wrap it around into the constant with a good, self-descriptive name? Again, it won't affect performance, since C# compiler is smart enough to silently remove this constant from the real code and place its value into the method invocation directly. Such constants are here for you. I rewrote my code above a little bit to illustrate this. With those comments, you don't have to remember your code at all, since its functionality is outlined in two tiny lines of comments above it. Moreover, even a person with zero knowledge in programming will figure out the purpose of this code. It took me less than half a minute to write those comments, but it'll probably save me quite a lot of time of figuring out «what was I thinking back then» one day. Is it too late now to start adding comments? Again, of course NO. Don't be lazy and redirect all your typing from «debunk» page (which pretty much does the opposite of debunking, but who am I to judge you here?) into some useful comments.
This is often neglected, but consider the following. You wrote some code, you ran your game, you saw a new bug. Was it introduced right now? Is it a problem in your older code which has shown up just because you have never actually used it until now? Where should you search for it? You have no idea, and you have one painful debugging session ahead. Just imagine how easier it would be if you've had some routines which automatically execute after each build and check that environment is still sane and nothing broke on a fundamental level. This is called unit testing, and yes, unit tests won't be able to catch all your bugs, but even getting 20% of bugs identified at the earlier stage is a huge boon to development speed. Is it too late now to start adding unit tests? Kinda YES and NO at the same time. Unit testing works best if it covers the majority of project's code. On the other side, a journey of a thousand miles begins with a single step. If you decide to start refactoring your code, writing a unit test before refactoring will help you to prove to yourself that you have not broken anything without the need of running the game at all.
This is basically pretty self-explanatory. You set this thing once, you forget about it. Static code analyzer is another «free estate» to speed up the development process by finding tiny little errors, mostly silly typos (do you think that you are good enough in finding them? Well, good luck catching x << 4; in place of x <<= 4; buried deep in C code by eye!). Again, this is not a silver bullet, it is another tool which will help you out with debugging a little bit along with the debugger, unit tests and other things. You need every little bit of help here. Is it too late now to hook up static code analyzer? Obviously NO.
Say, you want to build Osana, but then you decided to implement some feature, e.g. Snap Mode. By doing this you have maybe made your game a little bit better, but what you have just essentially done is complicated your life, because now you should also write Osana code for Snap Mode. The way game architecture is done right now, easter eggs code is deeply interleaved with game logic, which leads to code «spaghettifying», which in turn slows down the addition of new features, because one has to consider how this feature would work alongside each and every old feature and easter egg. Even if it is just gazing over one line per easter egg, it adds up to the mess, slowly but surely. A lot of people mention that developer should have been doing it in object-oritented way. However, there is no silver bullet in programming. It does not matter that much if you are doing it object-oriented way or usual procedural way; you can theoretically write, say, AI routines on functional (e.g. LISP)) or even logical language if you are brave enough (e.g. Prolog). You can even invent your own tiny programming language! The only thing that matters is code quality and avoiding the so-called shotgun surgery situation, which plagues Yandere Simulator from top to bottom right now. Is there a way of adding a new feature without interfering with your older code (e.g. by creating a child class which will encapsulate all the things you need, for example)? Go for it, this feature is basically «free» for you. Otherwise you'd better think twice before doing this, because you are going into the «technical debt» territory, borrowing your time from the future by saying «I'll maybe optimize it later» and «a thousand more lines probably won't slow me down in the future that much, right?». Technical debt will incur interest on its own that you'll have to pay. Basically, the entire situation around Osana right now is just a huge tale about how just «interest» incurred by technical debt can control the entire project, like the tail wiggling the dog. I won't elaborate here further, since it'll take me an even larger post to fully describe what's wrong about Yandere Simulator's code architecture. Is it too late to rebuild code architecture? Sadly, YES, although it should be possible to split Student class into descendants by using hooks for individual students. However, code architecture can be improved by a vast margin if you start removing easter eggs and features like Snap Mode that currently bloat Yandere Simulator. I know it is going to be painful, but it is the only way to improve code quality here and now. This will simplify the code, and this will make it easier for you to add the «real» features, like Osana or whatever you'd like to accomplish. If you'll ever want them back, you can track them down in Git history and re-implement them one by one, hopefully without performing the shotgun surgery this time.
Again, I won't be talking about the performance, since you can debug your game on 20 FPS as well as on 60 FPS, but this is a very different story. Yandere Simulator is huge. Once you fixed a bug, you want to test it, right? And your workflow right now probably looks like this:
Fix the code (unavoidable time loss)
Rebuild the project (can take a loooong time)
Load your game (can take a loooong time)
Test it (unavoidable time loss, unless another bug has popped up via unit testing, code analyzer etc.)
And you can fix it. For instance, I know that Yandere Simulator makes all the students' photos during loading. Why should that be done there? Why not either move it to project building stage by adding build hook so Unity does that for you during full project rebuild, or, even better, why not disable it completely or replace with «PLACEHOLDER» text for debug builds? Each second spent watching the loading screen will be rightfully interpreted as «son is not coding» by the community. Is it too late to reduce loading times? Hell NO.
Or any other continuous integration tool. «Rebuild a project» can take a long time too, and what can we do about that? Let me give you an idea. Buy a new PC. Get a 32-core Threadripper, 32 GB of fastest RAM you can afford and a cool motherboard which would support all of that (of course, Ryzen/i5/Celeron/i386/Raspberry Pi is fine too, but the faster, the better). The rest is not necessary, e.g. a barely functional second hand video card burned out by bitcoin mining is fine. You set up another PC in your room. You connect it to your network. You set up ramdisk to speed things up even more. You properly set up Jenkins) on this PC. From now on, Jenkins cares about the rest: tracking your Git repository, (re)building process, large and time-consuming unit tests, invoking static code analyzer, profiling, generating reports and whatever else you can and want to hook up. More importantly, you can fix another bug while Jenkins is rebuilding the project for the previous one et cetera. In general, continuous integration is a great technology to quickly track down errors that were introduced in previous versions, attempting to avoid those kinds of bug hunting sessions. I am highly unsure if continuous integration is needed for 10000-20000 source lines long projects, but things can be different as soon as we step into the 100k+ territory, and Yandere Simulator by now has approximately 150k+ source lines of code. I think that probably continuous integration might be well worth it for Yandere Simulator. Is it too late to add continuous integration?NO, albeit it is going to take some time and skills to set up.
Stop caring about the criticism
Stop comparing Alex to Scott Cawton. IMO Alex is very similar to the person known as SgtMarkIV, the developer of Brutal Doom, who is also a notorious edgelord who, for example, also once told somebody to kill himself, just like… However, being a horrible person, SgtMarkIV does his job. He simply does not care much about public opinion. That's the difference.
Industry Insight shared by WaykiChain CEO, Gordon Gao
The opening of 2020 is very chaotic considering coronavirus broke out globally, all kinds of assets experienced significant shocks, oil price plummeted, gold prices suffered volatility, and US stocks experienced several trading curbs, etc and different kinds of epic Black swan event happened. What do you think about the influence of these unusual events towards DeFi?
I think it’s the best thing that can happen to DeFi. Because all these things help expose underlying problems, such as economic bubble, indiscriminate leverage, credit crisis, which can cause people to distrust the financial system. And DeFi is the revolution against the traditional financial system, it is a complete subversion. Paul Jones thinks that the government over issued currencies, so he needs to transit his assert to Bitcoin. Crisis means opportunity. The traditional financial system has long-existing problems. Most of the assets were made by capitalists, some in reasonable ways, while the others are simply robbery. But most of the people didn’t realize it. Henry Ford says, people don’t even know how our currencies and bank system works, which is good, since if they know, there will be a revolution before the next morning. Now all kinds of black swan events can make people aware of risks, and before the final risk comes, choose a more transparent and fair way to participate in finance.
Since this year, more and more public chains have begun to deploy the DeFi ecosystem. DeFi ecosystem has become an important direction for public chains to explore the landing of the blockchain this year. Can you analyze why the public chain has gathered to develop the DeFi ecosystem this year?
Most public chains have explored for a long time. Last year, many people said that the public chain industry was dead, but I feel that they just didn’t find the rigid demand for landing applications. Now everyone has begun to understand that DeFi is the best way out of the public chain. WaykiChain started to develop the first product of DeFi in March last year-The stablecoin and collateral loan agreement (WaykiCDP). However, it was not popularly called as DeFi at that time. Now, what we start with is to find a rigid-demanded scenario for the blockchain landing, and shorten the user’s path to enter into ecology. In this circle, most of the people are speculators and investors who hold two big needs of borrowing and making money, and DeFi is doing this business. From another perspective, the emergence of Bitcoin has created a new currency, and the role of public chains and smart contracts is to allow the currency to circulate under certain rules. Isn’t this just finance? In other words, if blockchain can’t even do finance, then it is just a scam.
can you explain to us the status and scale of the DeFi market nowadays?
The size of the DeFi industry can be roughly measured by the value of lock-up. Ethereum, as the largest DeFi platform at present, occupies most of the market share. Now the lock-up value on Ethereum is around USD 1 billion. Since last year, other public chains have started to have DeFi applications, including WaykiChain, cosmos, Polkadot, TRON, etc. The current DeFi scale on WaykiChain is not as good as Ethereum in terms of absolute volume, but in terms of the proportion of DeFi locks, WaykiChain definitely has the highest proportion so far, reaching the total of 17%. In terms of absolute volume, only niche players in the currency circle participate in DeFi, but DeFi has maintained market growth in the past two years, and the amount of lock-up positions has risen sharply, so the entire market still has a lot of room for each project party to explore.
compared to Bitcoin mining, DeFi is obviously more decentralized and suitable to the public. From a broad aspect, what advantage do you think DeFi has when compared to traditional finance, and what is the meaning of it towards the finance industry?
I like this question, so I will spend more time explaining it. I think the difference of DeFi can be shown in 3 points: DeFi can change the role people play in the financial system. In traditional finance, as an ordinary user, your role and participation process are very limited. However, this limitation is determined by all aspects, such as the credit problem, the threshold of the number of funds, as well as the license and the threshold of power, and so on. Such limitations often make ordinary users vulnerable groups in the financial system. And under the rules of the top class, wealth will always flow to the top. For example, global currencies have been issued continuously, have we participated in the decision? No. Has it been issued to individuals? No. We can only see that the world keeps issuing money, and the money in our hands is depreciating, while there is nothing we can do. But DeFi is different. Let me give an example. WaykiChain DeFi's governance coin WGRT, the holder has both the power of governance parameters and the benefits of the interest and penalty of the entire system. This is a role you cannot play in traditional finance. In DeFi system, it is full of fairness. DeFi can reduce financial costs. Since the beginning of the industrial era, the global financial structure has remained unchanged, relying heavily on various intermediate institutions. Central banks, investment banks, commercial banks, securities companies, etc. It can be said that any financial activity needs to have more than one intermediary profit from it. For example, in addition to the loss of the price difference of a transaction, a transaction also includes brokerage commissions, exchange transaction fees, stamp duties of regulatory authorities, etc. The price difference earned by these so-called "middlemen" makes them the richest class in the world. However, DeFi adopts an open protocol and provides low-cost financial services for everyone at low cost, which greatly reduces the cost of transactions. DeFi can improve the efficiency of finance. Blockchain enables financial transactions to achieve transaction settlement. It has gone beyond the traditional settlement system of financial institutions. When it comes to cross-border transactions. In terms of the transfer, a cross-border transfer can sometimes take several days, but in the blockchain system or DeFi system, the actual ownership of assets has changed when the transaction occurs. There’s one more point that I want to mention that is DeFi can derive something that traditional finance doesn’t have. For example, the constant product market maker is an innovative product in the field of DeFi. We believe that DeFi can not only improve and improve the original traditional finance but also have more innovations to be discovered. The CTO of our team wrote such a sentence in the introduction of WaykiChain code: “the only limitation of the blockchain is our imagination.”
At present, there is a strange situation in the industry. When asked DeFi, many people said they know it. But when it comes to the question of who invest it, everyone said they didn’t. What do you think is the reason for this situation? Where are the potential users of DeFi?
There should still be some people who have invested in the DeFi project. This year's link, knc, and mkr are all DeFi concepts, and they all have good market performance, including WaykiChain is also a DeFi concept, and our community is not small. It's just that few people are using DeFi products. In fact, not only a few people use DeFi products, but also fewer people who put coins in wallets to play any application in addition to the use of exchanges to speculate coins in the currency circle. For example, I got data before that showed only 14,000 people on Ethereum participate in DeFi. DeFi currently lacks a popular hit, like Dapp's ethernet cat, fomo3D, which can mobilize the market's passion at once. WaykiChain will release a DeFi product called Wayki-X in the second half of this year. Concerning synthetic asset transactions, we are confident that this product will become a hot issue. The first-level potential users of DeFi are users of public chain tokens, especially for collateral-type DeFi applications. For example, users who hold ETH are potential users of DeFi on Ethereum. Only if I look high on ETH, I will collateral ETH for various other financial activities. The same is true for WaykiChain. So if most of the non-DeFi public chains are removed, and most Bitcoin holders, this first-level potential user is still very limited. The second-level potential users are DeFi participants, such as participating in DEX transactions, or using other assets to purchase DeFi stable coins for investment and so on. The third-level potential users are some users outside the circle. They will take advantage of income opportunities, such as wealth management and other applications to come in contact with DeFi. This most extensive market has not been well developed. Ethereum already has an integrated DeFi ecosystem, and there are plenty of branches on it, plus a lot of public chains have poured into the DeFi track this year. However, the current scale of DeFi users is still small, and many people are worried that so many public chains are pouring into the DeFi track, but the market can’t digest so many DeFi products, thus they may finally be of varying quality. Are you worried about this problem? I am not worried. First of all, the advantage of Ethereum is not that great. The DeFi ecosystem on Ethereum can be said to be in full bloom, but it is not integrated. In addition, Ethereum now establishes DeFi in a savage way of development. I feel that it is just a child who plays on the beach and cannot build a skyscraper. The financial system needs to be framed, at least the asset standards should be unified, the pricing unit should be unified, and the liquidity measurement standards should be unified. DeFi on Ethereum does not have all these uniformities above, so many problems have arisen this year. Although the single-module product looks fine, once it comes to the “interoperability” that DeFi on Ethereum is proud of, three particularly serious security incidents occurred. Another thing is that if users want to use DeFi on Ethereum completely, they have to cross many products, and each time they exchange currency, they must bear the loss of the price difference, which will disperse the liquidity of DeFi. WaykiChain’s thinking is different from that of Ethereum. What WaykiChain wants to do is an integrated DeFi public chain, which means that we will unify the currency, unify the standard of asset release, unify the valuation unit, and unify the liquidity. Based on those preconditions, then smart contracts use imagination to build more products, and ultimately provide users with a one-stop DeFi experience. The market covered by DeFi is huge, so we don’t worry about competition. If you introduce 1% of Bitcoin’s market value to any public chain, it is enough to support a very large DeFi project, not to mention the introduction of traditional assets in the future.
How do you view DeFi’s development prospects and future market scale? Where do you think the ceiling for DeFi development is?
In the near term, although DeFi’s volume has developed rapidly, it is still very small. The current market value of the digital currency is about more than 270 billion US dollars, but the collateral in the DeFi agreement is only 1 billion US dollars. I think it will reach 20 billion US dollars in two years. It can be seen that the future market is still very broad. In addition to the need to compete for the Bitcoin market, mature public chains are also a development idea for DeFi empowerment of other public chains. For the ceiling of DeFi development, it is not yet seen now, but the first bottleneck that may be encountered is how to release off-chain assets to the blockchain to expand the overall DeFi market cap.
WGRT has set a strict risk control mechanism in terms of safety, convenience, and risk reserve. Such a professional and rigorous team believes that in the near future, it will present a different DeFi ecosystem to everyone. According to some latest data, there are more than 4,000 bitcoins locked in the DeFi ecosystem. What do you think is the reason that BTC has poured into the DeFi battlefield in large numbers? Will this set off a new round of DeFi boom?
The BTC market is the most attractive part of DeFi. Let me explain a few things. 1.For BTC currency holders, these people are optimistic about BTC for a long time, but when they lack liquidity at hand, they need a loan agreement to help them get some cash. However, the centralized financial platform has various security risks, such as asset theft, asset misappropriation, or platform running. Some money holders who pay special attention to security will choose the DeFi protocol.
In terms of DeFi projects, the market value and volume of BTC is the largest, so whoever can occupy the BTC market will become a giant.
For the DeFi market, BTC itself does not have programmability, so any other public chain needs to do a cross-chain protocol to introduce BTC, so the largest market provides the most fair competition environment. WaykiChain introduced a decentralized cross-chain mechanism in the upcoming public chain version 3.0. After going online, users can collateral BTC or ETH to generate stablecoin. At the same time, the interest paid by users, as well as the penalties that are cleared in the middle, are also to be repurchased for the destruction of WGRT.
WaykiChain's DeFi lockup volume actually reached 17% of the total, and it is expected to break new highs next. Gordon, what form and changes do you think the DeFi market will develop in the future? How should WaykiChain seize market opportunities?
First, the form of products will be more diversified, and many innovative products will appear. Second, the product will be more professional and have a better experience, while providing one-stop financial services. This is the direction that WaykiChain is currently doing. Third, the DeFi on the public chain will expand through cross-chain. For example, as mentioned earlier, the DeFi on the public chain will compete for the Bitcoin market. However, in addition to competing for the Bitcoin market, the market for more small currencies cannot be ignored. We will also try to use the WaykiChain DeFi system to empower other small currencies or public chains. So that their currency users can also enjoy the financial services brought by DeFi. This market has not yet been explored.
What plans does WGRT follow?
We want to build the world's first integrated DeFi public chain. The development of WGRT is inseparable from the promotion and use of stablecoin WUSD. Therefore, our follow-up plan is mainly to build more products around the stable currency system to empower WUSD. At the end of July this year and early August, we will launch a new product called WaykiX, which is a synthetic asset trading platform that can trade almost all types of assets in the world. After that, we will also launch WUSD financial management, so that the currency holders can enjoy a fixed income. At the same time, we will also develop asset securitization business, and publish some high-quality asset targets on WaykiChain, such as Vietnam real estate, European and American government bonds, etc., while expanding the volume of DeFi assets on WaykiChain, to the community more Investment opportunities.
Is there any plan after WGRT listed on OKEx?
Yes, I will answer in terms of two levels, the first level is the ecological level, and the second level is the level of the entire coin itself. From an ecological perspective, the quality of WGRT depends on the entire stablecoin system, and whether more people can use it. The stablecoin WUSD develops well, so the whole WGRT becomes the biggest beneficiary. In fact, the series of DeFi products we created later are all based on the stablecoin WUSD, such as the Wayki-X synthetic asset trading platform. After the Wayki-X synthetic asset trading platform is launched at the end of July and early August, the market will have a lot of demand for WICC. We will also use this platform as a fist product of this year to promote, so as to ensure the benefit of the entire WGRT. In addition, the real estate in Vietnam and the national debt in Europe are based on financial products issued by WUSD, and they will also promote the development of WGRT. The WGRT coin will be launched on OKEx, and then some high-quality second-tier exchanges will be listed to enhance its liquidity. When the liquidity is sufficient, we will also impact other first-tier exchanges, including domestic first-tier and international first-tier exchanges.
Just like the first Protocol (Core 1.0), the TKEY asset used in the TkeyNet network — there are no changes in this plan. After launching TkeyNet, you can transfer TKEY to any user on the TKEY network without any restrictions.
Transactions in TkeyNet will be much faster than it was before. You can check it in practice.
The Protocol has a built-in TkeyConnect module, which allows you to connect various blockchains to our network to conduct transactions directly in the TkeyNet blockchain. Besides, TkeyConnect meets the international ISO and ISIN standards, which also allows you to conduct transactions with Fiat currencies and shares in the TkeyNet blockchain. TkeyConnect creates a flexible system, giving users the ability to store and conduct transactions in any assets, be it Bitcoin, Ethereum, Litecoin or dollars, euros, etc. https://preview.redd.it/rkroh5ulbjg51.png?width=700&format=png&auto=webp&s=c47a094c9ae3d22131bebea80badafd0dd1f8dd6
If the previous software based on the Core 1.0 Protocol, after switching to TkeyNet, wallets, a blockchain search engine, and other software related to the project will be adapted to the new Protocol.
Contact information and support service
Email addresses of the support service and other departments will be transferred to other service providers and will structure in the following areas: B2B and B2C. The list of email addresses will publish after updates are complete.
B2B (business-to-business)a term that means that a company or a division of a company sells its goods/services to corporate clients, that is, to other companies.B2C (business-to-consumer)is a term that refers to the commercial relationship between an organization (Business) and a private, so-called “end” consumer.
Information about the project, the company, and its products will subdivide into two websites: tkeycoin.com and tkey.org. The purpose of this division is to simplify product navigation, improve the appearance of pages for each product and solution, and update content. The solution is modular. The information will be structured according to sections and sites, dividing the corporate and user segments. As the products develop, the information will be updated. Technical specifications, documentation, and a description of the Protocol and its features will appear on the official website: tkey.org. Sections will fill in gradually.
Testing and launching TkeyNet
Between July 22 and July 24, Telnet was successfully launched in testnet mode. Our team is actively testing the entire TkeyNet network and its functions. The system is tested with different scenarios, its effectiveness is checked when working with high loads, and the security of the entire system is audited. Testing of TkeyNet is an important stage of production aimed at detailed research of the program code and identification of errors in the system operation. Comprehensive testing, which is carried out by our team, is necessary to determine the level of readiness of the system for subsequent operation. Testing is based on a set of test scenarios that cover the main business operations.
The testing process contains all the life cycle activities: dynamic and static indicators. The testing process involves planning, preparing, and evaluating a software product. The purpose of testing is to determine that all meet the requirements described, as well as to show that they are suitable for the stated purposes and for detecting errors.
You can buy or sell TKEY only on the exchange and not in any other source. Private transactions are subject to high risks. Once again, we remind you that at the time of updates, any transactions with TKEY will be invalid.
Safety of funds
If you use a local wallet on your computer, make a backup copy of the wallet.dat file. If you use a TkeySpace mobile wallet, make a backup copy of the private key (backup phrase).
Transactions before updates are completed
During updates-no transactions can be made on the network, which means that any private dealing made at the time of updates will be invalid. Additionally, we ask you to refrain from any actions related to TKEY until the end of updates protocol, including starting mining, local wallets, and reinstalling them.
Testing of the system and its functions takes place in a stable mode without days off. The test results that will receive at the end of this week will reflect the current state of Affairs. We will get up-to-date information about the end date of updates and the planned release date of TkeyNet. An announcement of interim test results, as well as future updates, will be published at the end of this week or early next.
Dieter Fishbein, Ecosystem Development Lead, Web3 Foundation
Dan: Hey everyone, thanks for joining us for the Polkadot Launch AMA. We have Dieter Fishbein (Head of Ecosystem Development, our business development team), Logan Saether (Technical Education), and Will Pankiewicz (Master of Validators) joining us today. We had some great questions submitted in advance, and we’ll start by answering those and learning a bit about each of our guests. After we go through the pre-submitted questions, then we’ll open up the chat to live Q&A and the hosts will answer as many questions as they can. We’ll start off with Dieter and ask him a set of some business-related questions.
Dieter could you introduce yourself, your background, and your role within the Polkadot ecosystem?
Dieter: I got my start in the space as a cryptography researcher at the University of Waterloo. This is where I first learned about Bitcoin and started following the space. I spent the next four years or so on the investment team for a large asset manager where I primarily focused on emerging markets. In 2017 I decided to take the plunge and join the space full-time. I worked at a small blockchain-focused VC fund and then joined the Polkadot team just over a year ago. My role at Polkadot is mainly focused on ensuring there is a vibrant community of projects building on our technology.
Q: Adoption of Polkadot of the important factors that all projects need to focus on to become more attractive to the industry. So, what is Polkadot's plan to gain more Adoption? [sic]
A (Dieter): Polkadot is fundamentally a developer-focused product so much of our adoption strategy is focused around making Polkadot an attractive product for developers. This has many elements. Right now the path for most developers to build on Polkadot is by creating a blockchain using the Substrate framework which they will later connect to Polkadot when parachains are enabled. This means that much of our adoption strategy comes down to making Substrate an attractive tool and framework. However, it’s not just enough to make building on Substrate attractive, we must also provide an incentive to these developers to actually connect their Substrate-based chain to Polkadot. Part of this incentive is the security that the Polkadot relay chain provides but another key incentive is becoming interoperable with a rich ecosystem of other projects that connect to Polkadot. This means that a key part of our adoption strategy is outreach focused. We go out there and try to convince the best projects in the space that building on our technology will provide them with significant value-add. This is not a purely technical argument. We provide significant support to projects building in our ecosystem through grants, technical support, incubatoaccelerator programs and other structured support programs such as the Substrate Builders Program (https://www.substrate.io/builders-program). I do think we really stand out in the significant, continued support that we provide to builders in our ecosystem. You can also take a look at the over 100 Grants that we’ve given from the Web3 Foundation: https://medium.com/web3foundation/web3-foundation-grants-program-reaches-100-projects-milestone-8fd2a775fd6b
Q: On moving forward through your roadmap, what are your most important next priorities? Does the Polkadot team have enough fundamentals (Funds, Community, etc.) to achieve those milestones?
A (Dieter): I would say the top priority by far is to ensure a smooth roll-out of key Polkadot features such as parachains, XCMP and other key parts of the protocol. Our recent Proof of Authority network launch was only just the beginning, it’s crucial that we carefully and successfully deploy features that allow builders to build meaningful technology. Second to that, we want to promote adoption by making more teams aware of Polkadot and how they can leverage it to build their product. Part of this comes down to the outreach that I discussed before but a major part of it is much more community-driven and many members of the team focus on this. We are also blessed to have an awesome community to make this process easier 🙂
Q: Where can a list of Polkadot's application-specific chains can be found?
A (Dieter): The best list right now is http://www.polkaproject.com/. This is a community-led effort and the team behind it has done a terrific job. We’re also working on providing our own resource for this and we’ll share that with the community when it’s ready.
Q: Could you explain the differences and similarities between Kusama and Polkadot?
A (Dieter): Kusama is fundamentally a less robust, faster-moving version of Polkadot with less economic backing by validators. It is less robust since we will be deploying new technology to Kusama before Polkadot so it may break more frequently. It has less economic backing than Polkadot, so a network takeover is easier on Kusama than on Polkadot, lending itself more to use cases without the need for bank-like security. In exchange for lower security and robustness, we expect the cost of a parachain lease to be lower on Kusama than Polkadot. Polkadot will always be 100% focused on security and robustness and I expect that applications that deal with high-value transactions such as those in the DeFi space will always want a Polkadot deployment, I think there will be a market for applications that are willing to trade cheap, high throughput for lower security and robustness such as those in the gaming, content distribution or social networking sectors. Check out - https://polkadot.network/kusama-polkadot-comparing-the-cousins/ for more detailed info!
Q: and for what reasons would a developer choose one over the other?
A (Dieter): Firstly, I see some earlier stage teams who are still iterating on their technology choosing to deploy to Kusama exclusively because of its lower-stakes, faster moving environment where it will be easier for them to iterate on their technology and build their user base. These will likely encompass the above sectors I identified earlier. To these teams, Polkadot becomes an eventual upgrade path for them if, and when, they are able to perfect their product, build a larger community of users and start to need the increased stability and security that Polkadot will provide. Secondly, I suspect many teams who have their main deployment on Polkadot will also have an additional deployment on Kusama to allow them to test new features, either their tech or changes to the network, before these are deployed to Polkadot mainnet.
Logan Saether, Technical Education, Web3 Foundation
Q: Sweet, let's move over to Logan. Logan - could you introduce yourself, your background, and your role within the Polkadot ecosystem?
A (Logan): My initial involvement in the industry was as a smart contract engineer. During this time I worked on a few projects, including a reboot of the Ethereum Alarm Clock project originally by Piper Merriam. However, I had some frustrations at the time with the limitations of the EVM environment and began to look at other tools which could help me build the projects that I envisioned. This led to me looking at Substrate and completing a bounty for Web3 Foundation, after which I applied and joined the Technical Education team. My responsibilities at the Technical Education team include maintaining the Polkadot Wiki as a source of truth on the Polkadot ecosystem, creating example applications, writing technical documentation, giving talks and workshops, as well as helping initiatives such as the Thousand Validator Programme.
Q: The first technical question submitted for you was: "When will an official Polkadot mobile wallet appear?"
A (Logan): There is already an “official” wallet from Parity Technologies called the Parity Signer. Parity Signer allows you to keep your private keys on an air-gapped mobile device and to interactively sign messages using web interfaces such as Polkadot JS Apps. If you’re looking for something that is more of an interface to the blockchain as well as a wallet, you might be interested in PolkaWallet which is a community team that is building a full mobile interface for Polkadot. For more information on Parity Signer check out the website: https://www.parity.io/signe
Q: Great thanks...our next question is: If someone already developed an application to run on Ethereum, but wants the interoperability that Polkadot will offer, are there any advantages to rebuilding with Substrate to run as a parachain on the Polkadot network instead of just keeping it on Ethereum and using the Ethereum bridge for use with Polkadot?
A (Logan): Yes, the advantage you would get from building on Substrate is more control over how your application will interact with the greater Polkadot ecosystem, as well as a larger design canvas for future iterations of your application. Using an Ethereum bridge will probably have more cross chain latency than using a Polkadot parachain directly. The reason for this is due to the nature of Ethereum’s separate consensus protocol from Polkadot. For parachains, messages can be sent to be included in the next block with guarantees that they will be delivered. On bridged chains, your application will need to go through more routes in order to execute on the desired destination. It must first route from your application on Ethereum to the Ethereum bridge parachain, and afterward dispatch the XCMP message from the Polkadot side of the parachain. In other words, an application on Ethereum would first need to cross the bridge then send a message, while an application as a parachain would only need to send the message without needing to route across an external bridge.
Q: DOT transfers won't go live until Web3 removes the Sudo module and token holders approve the proposal to unlock them. But when will staking rewards start to be distributed? Will it have to after token transfers unlock? Or will accounts be able to accumulate rewards (still locked) once the network transitions to NPoS?
A (Logan): Staking rewards will be distributed starting with the transition to NPoS. Transfers will still be locked during the beginning of this phase, but reward payments are technically different from the normal transfer mechanism. You can read more about the launch process and steps at http://polkadot.network/launch-roadmap
Q: Next question is: I'm interested in how Cumulus/parachain development is going. ETA for when we will see the first parachain registered working on Kusama or some other public testnet like Westend maybe?
A (Logan): Parachains and Cumulus is a current high priority development objective of the Parity team. There have already been PoC parachains running with Cumulus on local testnets for months. The current work now is making the availability and validity subprotocols production ready in the Polkadot client. The best way to stay up to date would be to follow the project boards on GitHub that have delineated all of the tasks that should be done. Ideally, we can start seeing parachains on Westend soon with the first real parachains being deployed on Kusama thereafter. The projects board can be viewed here: https://github.com/paritytech/polkadot/projects Dan: Also...check out Basti's tweet from yesterday on the Cumulus topic: https://twitter.com/bkchstatus/1270479898696695808?s=20
Q: In what ways does Polkadot support smart contracts?
A (Logan): The philosophy behind the Polkadot Relay Chain is to be as minimal as possible, but allow arbitrary logic at the edges in the parachains. For this reason, Polkadot does not support smart contracts natively on the Relay Chain. However, it will support smart contracts on parachains. There are already a couple major initiatives out there. One initiative is to allow EVM contracts to be deployed on parachains, this includes the Substrate EVM module, Parity’s Frontier, and projects such as Moonbeam. Another initiative is to create a completely new smart contract stack that is native to Substrate. This includes the Substrate Contracts pallet, and the ink! DSL for writing smart contracts. Learn more about Substrate's compatibility layer with Ethereum smart contracts here: https://github.com/paritytech/frontier
Will Pankiewicz, Master of Validators, Parity Technologies
Q: (Dan) Thanks for all the answers. Now we’ll start going through some staking questions with Will related to validating and nominating on Polkadot. Will - could you introduce yourself, your background, and your role within the Polkadot ecosystem?
A (Will): Sure thing. Like many others, Bitcoin drew me in back in 2013, but it wasn't until Ethereum came that I took the deep dive into working in the space full time. It was the financial infrastructure aspects of cryptocurrencies I was initially interested in, and first worked on dexes, algorithmic trading, and crypto funds. I really liked the idea of "Generalized Mining" that CoinFund came up with, and started to explore the whacky ways the crypto funds and others can both support ecosystems and be self-sustaining at the same time. This drew me to a lot of interesting experiments in what later became DeFi, as well as running validators on Proof of Stake networks. My role in the Polkadot ecosystem as “Master of Validators” is ensuring the needs of our validator community get met.
Q: Cool thanks. Our first community question was "Is it still more profitable to nominate the validators with lesser stake?"
A (Will): It depends on their commission, but generally yes it is more profitable to nominate validators with lesser stake. When validators have lesser stake, when you nominate them this makes your nomination stake a higher percentage of total stake. This means when rewards get distributed, it will be split more favorably toward you, as rewards are split by total stake percentage. Our entire rewards scheme is that every era (6 hours in Kusama, 24 hours in Polkadot), a certain amount of rewards get distributed, where that amount of rewards is dependent on the total amount of tokens staked for the entire network (50% of all tokens staked is currently optimal). These rewards from the end of an era get distributed roughly equally to all validators active in the validator set. The reward given to each validator is then split between the validators and all their nominators, determined by the total stake that each entity contributes. So if you contribute to a higher percentage of the total stake, you will earn more rewards.
Q: What does priority ranking under nominator addresses mean? For example, what does it mean that nominator A has priority 1 and nominator B has priority 6?
A (Will): Priority ranking is just the index of the nomination that gets stored on chain. It has no effect on how stake gets distributed in Phragmen or how rewards get calculated. This is only the order that the nominator chose their validators. The way that stake from a nominator gets distributed from a nominator to validators is via Phragmen, which is an algorithm that will optimally put stake behind validators so that distribution is roughly equal to those that will get in the validator set. It will try to maximize the total amount at stake in the network and maximize the stake behind minimally staked validators.
Q: On Polkadot.js, what does it mean when there are nodes waiting on Polkadot?
**A (Will):**In Polkadot there is a fixed validator set size that is determined by governance. The way validators get in the active set is by having the highest amount of total stake relative to other validators. So if the validator set size is 100, the top 100 validators by total stake will be in the validator set. Those not active in the validator set will be considered “waiting”.
Q: Another question...Is it necessary to become a waiting validator node right now?
A (Will): It's not necessary, but highly encouraged if you actively want to validate on Polkadot. The longer you are in the waiting tab, the longer you get exposure to nominators that may nominate you.
Q: Will current validators for Kusama also validate for Polkadot? How strongly should I consider their history (with Kusama) when looking to nominate a good validator for DOTs?
A (Will): A lot of Kusama validators will also be validators for Polkadot, as KSM was initially distributed to DOT holders. The early Kusama Validators will also likely be the first Polkadot validators. Being a Kusama validator should be a strong indicator for who to nominate on Polkadot, as the chaos that has ensued with Kusama has allowed validators to battle test their infrastructure. Kusama validators by now are very familiar with tooling, block explorers, terminology, common errors, log formats, upgrades, backups, and other aspects of node operation. This gives them an edge against Polkadot validators that may be new to the ecosystem. You should strongly consider well known Kusama validators when making your choices as a nominator on Polkadot.
Q: Can you go into more details about the process for becoming a DOT validator? Is it similar as the KSM 1000 validators program?
A (Will): The Process for becoming a DOT validators is first to have DOTs. You cannot be a validator without DOTs, as DOTs are used to pay transaction fees, and the minimum amount of DOTs you need is enough to create a validate transaction. After obtaining enough DOTs, you will need to set up your validator infrastructure. Ideally you should have a validator node with specs that match what we call standard hardware, as well as one or more sentry nodes to help isolate the validator node from attacks. After the infrastructure is up and running, you should have your Polkadot accounts set up right with a stash bonded to a controller account, and then submit a validate transaction, which will tell the network your nodes are ready to be a part of the network. You should then try and build a community around your validator to let others know you are trustworthy so that they will nominate you. The 1000 validators programme for Kusama is a programme that gives a certain amount of nominations from the Web3 Foundation and Parity to help bootstrap a community and reputation for validators. There may eventually be a similar type of programme for Polkadot as well. Dan: Thanks a lot for all the answers, Will. That’s the end of the pre-submitted questions and now we’ll open the chat up to live Q&A, and our three team members will get through as many of your questions as possible. We will take questions related to business development, technology, validating, and staking. For those wondering about DOT: DOT tokens do not exist yet. Allocations of Polkadot's native DOT token are technically and legally non-transferable. Hence any publicized sale of DOTs is unsanctioned by Web3 Foundation and possibly fraudulent. Any official public sale of DOTs will be announced on the Web3 Foundation website. Polkadot’s launch process started in May and full network decentralization later this year, holders of DOT allocations will determine issuance and transferability. For those who participated in previous DOT sales, you can learn how to claim your DOTs here (https://wiki.polkadot.network/docs/en/claims).
Telegram Community Follow-up Questions Addressed Below
Q: Polkadot looks good but it confuses me that there are so many other Blockchain projects. What should I pay attention in Polkadot to give it the importance it deserves? What are your planning to achieve with your project?
A (Will): Personally, what I think differentiates it is the governance process. Coordinating forkless upgrades and social coordination helps stand it apart. A (Dieter): The wiki is awesome - https://wiki.polkadot.network/
Q: Over 10,000 ETH paid as a transaction fee , what if this happens on Polkadot? Is it possible we can go through governance to return it to the owner?
Q: What is the minimum ideal amount of DOT and KSM to have if you want to become a validator and how much technical knowledge do you need aside from following the docs?
A (Will): It depends on what the other validators in the ecosystem are staking as well as the validator set size. You just need to be in the top staking amount of the validator set size. So if its 100 validators, you need to be in the top 100 validators by stake.
Q: Will Web3 nominate validators? If yes, which criteria to be elected?
Q: How did you manage to prove that the consensus protocol is safe and unbreakable mathematically?
A (Dieter): We have a research teams of over a dozen scientists with PhDs and post-docs in cryptography and distributed computing who do thorough theoretical analyses on all the protocols used in Polkadot
Q: What are the prospects for NFT?
A: Already being built 🙂
Q: What will be Polkadot next roadmap for 2020 ?
A (Dieter): Building. But seriously - we will continue to add many more features and upgrades to Polkadot as well as continue to strongly focus on adoption from other builders in the ecosystem 🙂 A (Will): https://polkadot.network/launch-roadmap/ This is the launch roadmap. Ideally adding parachains and xcmp towards the end of the year
Q: How Do you stay active in terms of marketing developments during this PANDEMIC? Because I'm sure you're very excited to promote more after this settles down.
A (Dan): The main impact of covid was the impact on in-person events. We have been very active on Crowdcast for webinars since 2019, so it was quite the smooth transition to all-online events. You can see our 40+ past event recordings and follow us on Crowdcast here: https://www.crowdcast.io/polkadot. If you're interested in following our emails for updates (including online events), subscribe here: https://info.polkadot.network/subscribe
Q: Hi, who do you think is your biggest competitor in the space?
A (Dan): Polkadot is a metaprotocol that hasn't been seen in the industry up until this point. We hope to elevate the industry by providing interoperability between all major public networks as well as private blockchains.
Q: Is Polkadot a friend or competitor of Ethereum?
A: Polkadot aims to elevate the whole blockchain space with serious advancements in interoperability, governance and beyond :)
Q: When will there be hardware wallet support?
A (Will): Parity Signer works well for now. Other hardware wallets will be added pretty soon
Q: What are the attractive feature of DOT project that can attract any new users ?
A: We are working on integrations on all the biggest and best wallet providers. ;)
Q: What event/call can we track to catch a switch to nPOS? Is it only force_new_era call? Thanks.
A (Will): If you're on riot, useful channels to follow for updates like this are #polkabot:matrix.org and #polkadot-announcements:matrix.parity.io A (Logan): Yes this is the trigger for initiating the switch to NPoS. You can also poll the ForceEra storage for when it changes to ForceNew.
Q: What strategy will the Polkadot Team use to make new users trust its platform and be part of it?
Q: What problems do you see occurring in the blockchain industry nowadays and how does your project aims to solve these problems?
A (Will): Governance I see as a huge problem. For example upgrading Bitcoin and making decisions for changing things is a very challenging process. We have robust systems of on-chain governance to help solve these coordination problems
Q: How involved are the Polkadot partners? Are they helping with the development?
Q: Can you explain the role of the treasury in Polkadot?
A (Will): The treasury is for projects or people that want to build things, but don't want to go through the formal legal process of raising funds from VCs or grants or what have you. You can get paid by the community to build projects for the community. A: There’s a whole section on the wiki about the treasury and how it functions here https://wiki.polkadot.network/docs/en/mirror-learn-treasury#docsNav
Q: Any plan to introduce Polkadot on Asia, or rising market on Asia?
**A (Will):**We're globally focused
Q: What kind of impact do you expect from the Council? Although it would be elected by token holders, what kind of people you wish to see there?
A (Will): Community focused individuals like u/jam10o that want to see cool things get built and cool communities form If you have further questions, please ask in the official Polkadot Telegram channel.
There have been many recent posts about the blackmail email scam, so I have written this post and will keep it stickied until the posts about the scam die down. If you are reading this because you have received one of these emails and you are worried, you can stop worrying. The blackmail email scam is a spam campaign that is sent out to thousands of addresses at a time. In al cases, the threats are lies and you do not have anything to worry about. In many cases, the emails will contain information about you such as your name, part or all of your phone number, and your password.The emails may also look like they were sent from your own email address. The data is gathered from data breaches, and if the email looks like it came from your account that is due to email spoofing. You can use the service Have I Been Pwned? to see if you are in any publicly known data breaches. If you receive an email that contains a password that you currently use, you should immediately change that. Current recommended password guidelines say that you should use a different, complex password for every account. You can generate and save passwords using a password manager for convenience. You should also be using two factor authentication using an app like Google Authenticator instead of receiving codes through SMS. Here are some news articles about this scam. Here is a story from Brian Krebs, and here is a story from the New York Times. Below are a few examples, but if you receive an email that is similar but not the same as the examples you see, that does not matter and does not mean that the email is real. The spammers constantly switch up their templates in order to bypass spam filters, so it's normal to receive an email that hasn't yet been posted online. Hey there So I am the hacker who cracked your email address and device a few weeks back. You typed in your pwd on one of the sites you visited, and I intercepted that. Here is your password from (redacted) upon time of compromise: (redacted) Obviously you can can change it, or even already changed it. However it won't really matter, my malware modified it every time. Do not really try to contact me personally or find me. Via your email, I uploaded harmful code to your Operation System. I saved your entire contacts together with buddies, fellow workers, loved ones along with a entire history of visits to the World wide web resources. Also I set up a Virus on your system. You aren't my only target, I generally lock computers and ask for a ransom. But I was hit by the web pages of romantic material that you normally stop by. I am in shock of your own fantasies! I have never ever noticed anything at all like this! Consequently, when you had enjoyment on piquant web-sites (you know what I am talking about!) I made screenshot with utilizing my program from your camera of yours device. There after, I put together them to the content of the currently viewed site. There will certainly be giggling when I send these pics to your connections! Nevertheless I am certain you do not need this. Therefore, I expect to have payment from you for my silence. I feel $859 is an satisfactory price for this! Pay with Bitcoin. My Bitcoin wallet is xxxxxxxxxxxxxxxxxxxxxxxxxxxxx If you do not really understand how to do this - submit in to Google 'how to transfer money to the bitcoin wallet'. It is easy. Immediately after getting the given amount, all your files will be right away destroyed automatically. My computer virus will also get rid of itself through your operating-system. My Trojan viruses have auto alert, so I know when this specific e mail is read. I give you 2 days (48 hours) to make a payment. If this does not occur - just about all your associates will get outrageous pictures from your darkish secret life and your system will be blocked as well after two days. Do not end up being foolish! Police or buddies won't support you for sure ... P.S I can provide you with recommendation for the future. Do not type in your security passwords on risky web pages. I wish for your wisdom. Bon voyage. Your computer device was attacked by the malicious app . Whats the trouble? I placed my malicious agent on a erotica portal, you clicked on this data and promptly adjusted the malware to your computer . The hostile program made your selfie-camera shooting and I enjoy the videotape with you dash your doodle. In next 5 hours this hostile program copied all your contacts. Right now, I receive your all your contact information and video with you masturbating, and now if you wish me to destroy all the data affect payment 350 $USD in BTC digital currency. Other way I want forward that this record to all your contacts . I forward you my Bitcoin wallet - XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX You possess 27 hours after reading. In a case if I possess transaction I am going to undo that this record once for all. I beg pardon for my mistakes- I live in China . P.S. this postal address, I have thieved it Good day, If you had been more careful while caressing yourself, I wouldn't worry you. I don't think that playing with yourself is very bad, but when all your colleagues, relatives and friends get a video recording of it - it is definitely bad for you. I placed malicious software on a website for adults (with porn) which was visited by you. When the target taps on a play button, your device starts recording the screen and all cameras on your device begin to work. Moreover, my program allows a remote desktop connection with keylogger function from the device, so I could collect all contacts from your e-mail, messengers and other social networks. I'm writing on this e-mail cuz it's your working address, so you must check it. I suppose that three hundred twenty usd is good enough for this little misstep. I made a split screen video (recorded from your screen (u have interesting tastes ) and camera ooooooh... its awful AF) So it's your choice. If you want me to erase this compromising evidence, use my Bitcoin wallet address: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX You have one day after opening my message; I put a special tracking pixel in it, so when you will open it I will see. If you want me to show you the proofs, reply to this message and I will send my creation to five contacts that I got from your contacts. P.S. You can try to complain to the police, but I don't think that they can help, the investigation will last for 5 month- I'm from Ukraine - so I dgf lmao Hey there So I am the hacker who cracked your email address and device a few weeks back. You typed in your pwd on one of the sites you visited, and I intercepted that. Here is your password from (redacted) upon time of compromise: (redacted) Obviously you can can change it, or even already changed it. However it won't really matter, my malware modified it every time. Do not really try to contact me personally or find me. Via your email, I uploaded harmful code to your Operation System. I saved your entire contacts together with buddies, fellow workers, loved ones along with a entire history of visits to the World wide web resources. Also I set up a Virus on your system. You aren't my only target, I generally lock computers and ask for a ransom. But I was hit by the web pages of romantic material that you normally stop by. I am in shock of your own fantasies! I have never ever noticed anything at all like this! Consequently, when you had enjoyment on piquant web-sites (you know what I am talking about!) I made screenshot with utilizing my program from your camera of yours device. There after, I put together them to the content of the currently viewed site. There will certainly be giggling when I send these pics to your connections! Nevertheless I am certain you do not need this. Therefore, I expect to have payment from you for my silence. I feel $859 is an satisfactory price for this! Pay with Bitcoin. My Bitcoin wallet is xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx If you do not really understand how to do this - submit in to Google 'how to transfer money to the bitcoin wallet'. It is easy. Immediately after getting the given amount, all your files will be right away destroyed automatically. My computer virus will also get rid of itself through your operating-system. My Trojan viruses have auto alert, so I know when this specific e mail is read. I give you 2 days (48 hours) to make a payment. If this does not occur - just about all your associates will get outrageous pictures from your darkish secret life and your system will be blocked as well after two days. Do not end up being foolish! Police or buddies won't support you for sure ... P.S I can provide you with recommendation for the future. Do not type in your security passwords on risky web pages. I wish for your wisdom. Bon voyage. I Have YOUR code. I rule phone xxxx I SENT this newsletter from YOUR ACCOUNT. I look your device. I am in daze of your sex act fantasies! I made backup your contacts and files. I made screenshots from your digital camera of yours device. I want 888 $ to my (Bitcoin My )Bitcoin currency xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx If YOU don't transaction )Bitcoin. I share my quake of your golden age of porn fantasies with your contacts! If you do not know how to do this - enter into Google/ =how to transfer money to a Bitcoin& wallet- Time 30 hours. This excellent post as Subway & Dairy Queen. Hello! I'm a programmer who cracked your email account and device about half year ago. You entered a password on one of the insecure site you visited, and I catched it. Of course you can will change your password, or already made it. But it doesn't matter, my rat software update it every time. Please don't try to contact me or find me, it is impossible, since I sent you an email from your email account. Through your e-mail, I uploaded malicious code to your Operation System. I saved all of your contacts with friends, colleagues, relatives and a complete history of visits to the Internet resources. Also I installed a rat software on your device and long tome spying for you. You are not my only victim, I usually lock devices and ask for a ransom. But I was struck by the sites of intimate content that you very often visit. I am in shock of your reach fantasies! Wow! I've never seen anything like this! I did not even know that SUCH content could be so exciting! So, when you had fun on intime sites (you know what I mean!) I made screenshot with using my program from your camera of yours device. After that, I jointed them to the content of the currently viewed site. Will be funny when I send these photos to your contacts! And if your relatives see it? BUT I'm sure you don't want it. I definitely would not want to ... I will not do this if you pay me a little amount. I think $877 is a nice price for it! I accept only Bitcoins. My BTC wallet: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx If you have difficulty with this - Ask Google "how to make a payment on a bitcoin wallet". It's easy. After receiving the above amount, all your data will be immediately removed automatically. My virus will also will be destroy itself from your operating system. My Trojan have auto alert, after this email is looked, I will be know it! You have 2 days (48 hours) for make a payment. If this does not happen - all your contacts will get crazy shots with your dirty life! And so that you do not obstruct me, your device will be locked (also after 48 hours) Do not take this frivolously! This is the last warning! Various security services or antiviruses won't help you for sure (I have already collected all your data). Here are the recommendations of a professional: Antiviruses do not help against modern malicious code. Just do not enter your passwords on unsafe sites! I hope you will be prudent. Bye. Same as before but they increased the amount I got an order from someone to kill you and your family but I am far from your house if you still love your family, I ask you to transfer 0.1 BTC to me. If you report this email, I will immediately kill your family. FORWARD THIS MAIL TO WHOEVER IS IMPORTANT IN YOUR COMPANY AND CAN MAKE DECISION! We Hacked network. We Caught Communications. We Backuped DATA And DOCUMENTS. We send this mail to you in YOUR account. After analyzing documents. We found Illegal activity - HIDING TAXES. That we want? I want two (2) Bitcoin To wallet Bitcoin. 1Dz7DbQmE7SNm3C5mb9syPcctgZECcCEbL That we do if you don't pay bitcoin? We send these Documents and Proofs to your Tax Department. And in this time Your network will be DDoS. Read that in this link https://en.wikipedia.org/wiki/Denial-of-service\_attack We are locking your operation system. Our friends, WannaCry, ready start and waiting command. Read that in this link https://en.wikipedia.org/wiki/WannaCry\_ransomware\_attack This is our guarantee, that you don't clean evidence and building a protection policy. If you don't pay by in 7 days, attack will start. Attack including. 1.DDOS 2.Locking operation system 3.Sending all documents in Tax Departament Yours service going down permanently and price to stop will increase to Four (4) BTC, Price will go up one (1) BTC for every day of the attack. This is not a joke. Our attacks are extremely powerful - sometimes over 1 Tbps per second. And we pass CloudFlare and others remote protections! So, no cheap protection will help. Prevent this problem all with just Two (2) BTC Pay to our wallet Bitcoin. 1Dz7DbQmE7SNm3C5mb9syPcctgZECcCEbL AND YOU WILL NEVER AGAIN HEAR FROM US! If you read, hear fake-experts and assure yourself that this is not true. Remember that they are not responsible and your life don't important him. Their business is to speak and make money. Your business to do and make money and stay freedom. All mistakes in text we do specily. Bitcoin is anonymous, nobody will ever know you cooperated. Time started after open this mail. To track the reading of a message and the actions in it, I use the facebook pixel. Read that in this link Hello! I am a hacker who has access to your operating system. I also have full access to your account. I've been watching you for a few months now. The fact is that you were infected with malware through an adult site that you visited. If you are not familiar with this, I will explain. Trojan Virus gives me full access and control over a computer or other device. This means that I can see everything on your screen, turn on the camera and microphone, but you do not know about it. I also have access to all your contacts and all your correspondence. Why your antivirus did not detect malware? Answer: My malware uses the driver, I update its signatures every 4 hours so that your antivirus is silent. I made a video showing how you satisfy yourself in the left half of the screen, and in the right half you see the video that you watched. With one click of the mouse, I can send this video to all your emails and contacts on social networks. I can also post access to all your e-mail correspondence and messengers that you use. If you want to prevent this, transfer the amount of $500 to my bitcoin address (if you do not know how to do this, write to Google: "Buy Bitcoin"). My bitcoin address (BTC Wallet) is: x After receiving the payment, I will delete the video and you will never hear me again. I give you 50 hours (more than 2 days) to pay. I have a notice reading this letter, and the timer will work when you see this letter. Filing a complaint somewhere does not make sense because this email cannot be tracked like my bitcoin address. I do not make any mistakes. If I find that you have shared this message with someone else, the video will be immediately distributed. Best regards. Hey, I know your password is: Your computer was infected with my malware, RAT (Remote Administration Tool), your browser wasn't updated / patched, in such case it's enough to just visit some website where my iframe is placed to get automatically infected, if you want to find out more - Google: "Drive-by exploit". My malware gave me full access and control over your computer, meaning, I got access to all your accounts (see password above) and I can see everything on your screen, turn on your camera or microphone and you won't even notice about it. I collected all your private data and I was spying on you, I RECORDED (through your webcam) embarrassing moments of you, you know what I mean! After that I removed my malware to not leave any traces. I can publish all your private data everywhere and I can send the videos to all your contacts, post it on social network, publish it on the whole web, including the darknet, where the sick people are! Only you can prevent me from doing this and only I can help you out in this situation. Transfer exactly 1200$ with the current bitcoin (BTC) price to my bitcoin address. It's a very good offer, compared to all that horrible shit that will happen if I publish everything! You can easily buy bitcoin here: www.paxful.com , www.coingate.com , www.coinbase.com , or check for bitcoin ATM near you, or Google for other exchanger. You can send the bitcoin directly to my address, or create your own wallet first here: www.login.blockchain.com/en/#/signup/ , then receive and send to mine. My bitcoin address is: Copy and paste my address, it's (cAsE-sEnSEtiVE) I give you 3 days time to transfer the bitcoin! As I got access to this email account, I will know if this email has already been read. If you get this email multiple times, it's to make sure you read it and after payment you can ignore it. After receiving the payment, I will remove everything and you can life your live in peace like before. Next time update your browser before browsing the web! НЕLLО! I’m going to cut to thе chӓsе.I know ӓbout thе sеcrеt you ӓrе kееping from your wifе.Morе importӓntly,I hӓvе еvidеncе of whӓt you hӓvе bееn hiding.I won’t go into thе spеcifics hеrе in cӓsе your wifе intеrcеpts this,but you know whӓt I ӓm tӓlking ӓbout. You don’t know mе pеrsonӓlly ӓnd nobody hirеd mе to look into you.Nor did I go out looking to burn you.It’s just your bӓd luck thӓt I stumblеd ӓcross your misӓdvеnturеs whilе.I thеn put in morе timе thӓn I probӓbly should hӓvе looking into your lifе.Frӓnkly,I ӓm rеӓdy to forgеt ӓll ӓbout you ӓnd lеt you gеt on with your lifе.And I ӓm going to givе you two options thӓt will ӓccomplish thӓt vеry thing.Thosе two options ӓrе to еithеr ignorе this lеttеr,or simply pӓy mе $822.Lеt’s еxӓminе thosе two options in morе dеtӓil. Option 1 is to ignorе this lеttеr.Lеt mе tеll you whӓt will hӓppеn if you chosе this pӓth.I will tӓkе this еvidеncе ӓnd sеnd it to your wifе. And ӓs insurӓncе ӓgӓinst you intеrcеpting it bеforе your wifе gеts it,I will ӓlso sеnd copiеs to hеr friеnds ӓnd fӓmily.So,Evеn if you dеcidе to comе clеӓn with your wifе,it won’t protеct hеr from thе humiliӓtion shе will fееl whеn hеr friеnds ӓnd fӓmily find out your sordid dеtӓils from mе. Option 2 is to pӓy mе $822.Wе’ll cӓll this my ‘confidеntiӓlity fее.’Now lеt mе tеll you whӓt hӓppеns if you choosе this pӓth.Your sеcrеt rеmӓins your sеcrеt.You go on with your lifе ӓs though nonе of this еvеr hӓppеnеd.Though you mӓy wӓnt to do ӓ bеttеr job ӓt kееping your misdееds sеcrеt in thе futurе. At this point you mӓy bе thinking,‘I’ll just go to thе cops.’Which is why I hӓvе tӓkеn stеps to еnsurе this lеttеr cӓnnot bе trӓcеd bӓck to mе.So thӓt won’t hеlp,ӓnd it won’t stop thе еvidеncе from dеstroying your lifе.I’m not looking to brеӓk your bӓnk.I just wӓnt to bе compеnsӓtеd for thе timе I put into invеstigӓting you. $822 will closе thе books on thӓt. Lеt’s ӓssumе you hӓvе dеcidеd to mӓkе ӓll this go ӓwӓy ӓnd pӓy mе thе confidеntiӓlity fее.In kееping with my strӓtеgy to not go to jӓil,wе will not mееt in pеrson ӓnd thеrе will bе no physicӓl еxchӓngе of cӓsh.You will pӓy mе ӓnonymously using bitcoin.If you wӓnt to kееp your sеcrеt thеn sеnd $822 in bitcoin to thе Rеcеiving Bitcoin Addrеss listеd bеlow.Pӓymеnt must bе rеcеivеd within 1 dӓys of thе post. You should mӓkе ӓ trӓnsӓction of using bitcoins (cryptocurrеnsy): x [Bitcoin dеtӓils] Tеll no onе whӓt you will bе using thе bitcoin for or thеy mӓy not givе it to you.Thе procеdurе to obtӓin bitcoin cӓn tӓkе ӓ dӓy or two so do not put it off.Agӓin pӓymеnt must bе rеcеivеd within 1 dӓys of this lеttеr’s post mӓrkеd dӓtе.If I don’t rеcеivе thе bitcoin by thе dеӓdlinе,I will go ӓhеӓd ӓnd rеlеӓsе thе еvidеncе to еvеryonе.If you go thӓt routе,thеn thе lеӓst you could do is tеll your wifе so shе cӓn comе up with ӓn еxcusе to prеpӓrе hеr friеnds ӓnd fӓmily bеforе thеy find out.Thе clock is ticking. And here are some common keywords used in the email so that this thread can be found by people Googling the email: "Marlware, international hacker group, No person has compensated, very own video clip, software on the adult, porno sitio, one of your pass word, .br, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, instantaneously erase, actual recorded material, neglect this email, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remove your video footage, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material""Marlware, international hacker group, No person has compensated, very own video clip, software on the adult, porno sitio, one of your pass word, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, instantaneously erase, actual recorded material, neglect this email, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remove your video footage, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material"
In a single day, 3% of our funding goal has been reached for a block template validation service!
Four days ago I posted on read.cash that Software Verde will be posting funding requests for individual features and improvements for Bitcoin Verde. Yesterday I made an announcement for one of those features: a block template validation service that will improve miner diversity by enabling miners to more safely mine with minority node implementations without risking orphaning via invalid blocks. We have already reached nearly $1,000 in a single day. That's absolutely amazing, and makes me optimistic that this kind of funding mechanism can work. To those that have donated, thank you! We will be publishing additional features ("issues") next week to provide more choices for funding. In the mean time, feel free to review the following development opportunities for Bitcoin Verde: Create Non-Indexing Module Block Template Validation Service Implement Testnet Configuration
An old friend of mine emailed this to me a while back with the subject line “Hide and Seek” and I’ve been hesitant to post it for reasons that should become obvious as you read it. That said, I feel that enough time has gone by for this to be safe so I’m going to post it here. The only edits I’ve made were swapping out names and formatting, otherwise it’s all exactly as he sent it. T, if you’re reading this then message me. I want to know if you’re alright, and if you are I know you’ll be looking for this story to show up. This is what the email said: Rijento, I’m writing this story because I feel like I need an outlet. I swear to god that you better actually check your email for once in your damn life! Please… As for if you actually are reading this, I want you to wait as long as your (admittedly) better judgment tells you to wait and then post this story online. I know it’s a bit vain, but I want people to know my story. Hell, it might be the last one I ever tell. Double hell, it might actually even help some poor soul out. I’m going to disappear after sending this, hopefully the good kind of disappear and not the death kind. I know nobody but you is going to believe this story but damn if typing this out didn’t make my sorry ass feel better. You were right about that man, I’m sorry for giving you shit for writing so much…
This is the attached file. “Hide and Seek”: Before I get in to the ‘hiding’ and ‘seeking’ I have a bit of a confession that needs to be made. I work as a transporter for a deep web black market site… I hope it doesn’t change your opinion of me too much, sorry for not telling you sooner. I’m the guy they call when they get an order for something they can’t send through the mail. Guns and live animals are two good examples. You’d be pretty hyped to know how many rich assholes just order lions and tigers from the dark web. For obvious reasons, I can’t go in to too much detail, I don’t want to make any dangerous enemies and even after this I still don’t want to lose my job. It’s a pretty sweet gig all things considered, all I have to do is pick up from the seller and deliver to the buyer. I can even choose what jobs I want to take, lets me cling to what little principles I still have. And I DO have principles. After a few years working for the site, my two rules were: no people and no crossing borders. Anyways, I got into a bit of a bind with the cryptocurrency crash that happened early this year. The site mostly pays in Bitcoin and, well, I decided to let my wallet sit and grow. By the time I realized what happened, my savings were destroyed. Nobody expected it to crash that hard… And it probably wouldn’t have been as much of a problem if I hadn’t also gotten used to living a life full of the finer things. I didn’t really ‘save’ all that much to begin with either. So when my savings finally ran dry and the market was still down, I decided to… Lower my standards a bit and take a riskier, higher paying job. Organ transport. I haven’t done it before… I hadn’t been that broke in a long time. Organ jobs pay well too, and I figured I still wasn’t strictly breaking my ‘no people’ rule if it was just their organs. So, I hopped on the site and browsed through the pitiful number of requests in my area till I found what I was looking for. A rich buyer who: had shady connections, was in need of some organs, and lacked either the time or patience to wait for them to come legally. As far as these sort of requests went, this was pretty much the norm from what I’d heard. So I accepted the job and got an email with some additional details about the order: the customer needed two kidneys (which was what I was to transport) and a liver (which they had made a separate request for). From what other people on the site have told me, what should have happened was the job would move to the ‘seeking seller’ section and I’d be on hold till someone… ‘_acquired_’ the kidneys. What actually happened probably should have tipped me off to use my monthly free withdraw… I got a notification two hours later that there was a seller. Rijento, I don’t know how much you know about medicine, but if you do know anything then you’re probably squirming in your own skin about right now. For those who may or may not be reading this that are not in the know, not only do the donor and receiver have to have compatible blood types but kidneys only last about a day outside of a warm body. Not exactly a product you can stockpile. I got another email, about the pickup this time, and began the internal debate between the bad feeling in my gut and my empty wallet… You can probably guess which one of them won out… Anyways, I planned my route; one hour to get to the seller and four hours to get from there to the buyer. I sent the site my plan and within minutes they approve of it and set up an actual meeting point. I sighed and grabbed my things, trying to swallow my nerves the entire hour it took me to reach the meeting point. I sat down on a bench in a city park and waited for what seemed like ages before I felt someone staring at me. It took me a solid minute to pick out who it was even though there were only a few people around. He was sitting with his back to me at a picnic table about ten yards away from me and whenever I looked away I could feel his eyes on me. When we eventually did make eye-contact he bounced excitedly in his seat and waved me over; my heart sank as he also slid a small case into my line of sight. I forced myself to smile, walked over, sat down, and hid my annoyance. Most of the buyers on the site were practically carbon copies of each other. Probably because you could only become a buyer if another buyer knew and endorsed you. The sellers, on the other hand, were all certifiably insane. None of the other transporters I’d chatted with had ever met with a ‘normal’ seller. Because of this, all of them quickly learned to keep conversation to a minimum and to not under any circumstances piss any of them off. I decided to follow in their example. The man sitting in front of me looked friendly enough, overly so if anything. He was scrawny, didn’t look like he would be strong enough to… well… kill someone and harvest their insides. He had a strange smile on his face, and even now I can’t get it out of my head. The kind of overly friendly, wide toothed smile that mothers warned their children to stay away from. It somehow managed to be both inviting and creepy at the same time. I smiled back and spoke up, “So you’re the seller then?” I asked, and the man nodded. He nodded and responded in a sickeningly sweet voice… He sounded like a child in a toy store, his voice strained with excitement and wonder as he droned on to his parents about what toys he wanted. “Oh I’m so glad you found me. For a minute there I thought I’d have to call ‘olly olly oxen free.’” He said with a pleased sigh, pushing the case to my side of the table. “You know… Over the years I’ve gotten quite good at playing hide and seek. So good, in fact, that I’ve never been found. Not. Even. Once. Do you want to know my secret?” the man asked, his voice still just as unsettlingly sweet as his smile. “Sure, what’s your secret?” I asked. I really, really didn’t want to know what the hell he was talking about; but if it kept him happy then… He clapped rapidly and bounced in place, “Oh I’m so glad that you’re a curious one. My secret is that the seekers never know that they’re playing.” “Makes sense…” I said, opening the case momentarily to verify. Two kidneys in pristine condition, doused with preserving fluid, wrapped in plastic. and packed in ice. “If the seeker doesn’t know they’re playing then how would they know to start looking?” I said, leaving out the fact that it would just be stalking at that point before swallowing hard when I thought about where these kidneys came from. “You’re a smart one…” he said with a smile as I sent a message confirming the pickup. All that was left was to wait for the transaction to process. “I was worried about this last one though… she came right up to me. This. Close.” he said, leaning in till our faces almost touched. I struggled to keep my composure, and managed to keep from jumping or pushing him away. “So what did you do?” I asked as he leaned back, my suspicions about these kidneys being all but confirmed. “Why, nothing of course…” He said, a slightly bewildered expression on his face. He looked as though I just asked him how to breathe. I glanced down at my phone to see if the transaction had been verified yet and he snapped his fingers like he remembered something. “Oh I must apologize!” he said, making me look up, “I forgot that you don’t play much… I simply held my breath, closed my eyes, and wished that she would just… go away.” “You’re right… You are good at hide and seek...” I said, wishing to myself that he would just go away and hearing the familiar ding of a successful transaction sound on both of our phones as if to answer my prayers. I reached out my hand as a formality and he grabbed it and shook it vigorously. I forced a smile and stood, although what he said next made my blood nearly freeze. “You’re the first person to find me in oh so long…” He trailed off as he said it, his voice slowly shifting from that of an exited child to the cold blooded maniac that he was. “Maybe my games won’t be so one sided from now on,” He said, his voice disturbingly normal. Although, even without looking back I could tell that the same sickeningly sweet smile was glued to his face. I kept walking but waved my arm as though saying goodbye. The worst part was that I could feel him watching me as I walked back to my car… Not just at first, like if he was watching me leave, but the entire way back, and even as I got in my car. I took a moment to look around and sighed as I saw nothing. It might not sound like much to you. I don’t know, I can still hardly describe it myself, but he had this… creepy way of getting under your skin just by talking to you. I wrote it off as me just being paranoid, the guy harvests organs from people for a living so of course everything he says is creepy. I groaned and started my car, but it wasn’t until I hit the freeway that I was finally able to shake the feeling of his gaze. It’s not like he could’ve been following me, by then I was already paranoid enough to be checking for that, making a few detours just to be sure of it. And because of my detours, I ended up being about an hour past the scheduled drop off with the buyer… Lost my chance at a tip for sure, guy was furious and there was nothing I could tell him to calm him down. I’m pretty sure, ‘sorry I’m late, but the seller was a total psycho and I wanted to make sure he wasn’t following me,’ wouldn’t have been a very good excuse. Whatever, I had my money and the buyer had his organs and plenty of time for whatever operation that used them. Not much to complain about on either side, well except for the fact that I already knew I wouldn’t be sleeping that night. Especially because the feeling of being watched had returned as soon as I set foot out of my car which was, again, impossible. The site never tells the sellers anything about the buyers or transporters, so there’s no way he could have known where I was headed to and no way that he could have followed me. I hopped back in my car and started to head for home, hoping that a few tabs of melatonin would be enough for at least a few hours of sleep. And again, I could feel eyes on me as I drove and I saw his eerie smile everywhere until I hit the highway. I felt a weight lift off of my shoulders then, although I made sure to take the most winding path home that I could afford gas for (which was quite a bit after a job like that). By the time I did get home it was starting to get dark, and I had made a few loops around my apartment just to be sure I didn’t still feel his eyes on me. Luckily, my apartment building has a public parking garage attached to it so even if I was being followed I felt safe enough that nobody would be able to find my room. But Just to be sure, I took the stairs for the first time in months. Have any of you ever climbed seven flights of stairs out of paranoia before Rijento? Well in case you haven’t let me tell you what it’s like. Do you remember running up the stairs from the basement after turning off the lights as a kid? That feeling of unease and terror? Well it’s like that, but you aren’t a kid anymore. It’s not the dark or what imaginary monsters could be lurking in it that frightens you anymore. Instead, you’re worried about who could be hiding in the darkness, what real monster could be following you up those stairs… I’m no slouch when it comes to exercise but it still drained everything out of me hauling my body up those stairs on my hands and feet like an animal as fast as I could. I got inside and locked the door securely behind me, panting, covered in sweat, but I sighed in relief with the fact that I hadn’t felt anyone watching me at all during my climb. I took a moment to catch my breath, slumping down by the door and chuckling to myself while shaking my head. I couldn’t believe that I’d let that freak get so deep under my skin. Once I had caught my breath, I stood up and made my way to my couch before flopping onto it. I wanted nothing more than to go to sleep then and there, but I had to be smart with my money this time. I immediately cashed the Bitcoin out. Better to pay myself out in small increments, but I had bills to pay and I’d already learned my lesson about leaving things in Bitcoin. Once business was taken care of, I grabbed the remote control and flicked on the TV. The familiar faces of the local news anchors greeted me and I began drifting off to sleep while listening to the happenings of our city. It was around seven a.m. when I was woken up by the sound of the ‘breaking news’ alert coming on. “We are just receiving reports of a ghastly murder of one [yeah, I’m not gonna put her name or age here] year old college student living on her own. Police investigators say that several of her organs were found to be missing and that they found evidence of someone living in her home without her knowledge for quite some time before the murder…” The reporters kept talking about how much of a tragedy the situation was… But I wasn’t listening. How could I listen… I’ve never been less happy to be right then I was at that moment. I shuddered thinking about it. My thoughts and paranoia regarding the man I’d met the other day bubbling back up to the surface. It was then that the reality of what I’d done hit me like a freight train. By accepting that contract I doomed that girl to die… All because I needed some quick cash. I stood up and went to the kitchen and opened my liquor cabinet. Without looking, I grabbed a bottle of something with shaking hands and fumbled with the top while trying to keep my mind clear of thoughts. Once I had the cap off I took several deep swigs from the bottle, spilling quite a bit down my chin before I set it down and gasped for air. The burn of the alcohol in my throat gave me something to focus on while it worked its magic on the rest of my body. As my mind slowly clouded I found my way to a chair and found it easier to think about what happened without panicking. My first thought was that I needed to do something. I knew the guy’s face, I should go to the cops! It was at this moment that the… Less impulsive side of my brain kicked in. I go to the cops and all I do is give myself a one way ticket to an early grave. My employers don’t take kindly to police interactions. I slowly resigned myself to the fact that I was going to have to live with the consequences of this job for the rest of my life… I’m a coward, I know. Anyways, the next few days passed by slowly. I was… Not in a good place mentally and I’m sure you remember how much alcohol my cabinets were stocked with. I blacked out more than once only to wake up gasping for breath from drinking too much. It was honestly a miracle that I didn’t kill myself through alcohol poisoning. But I… Managed to come to terms with everything. Don’t get me wrong, I still had nightmares where I was the guy hiding in that girls closet… But I wasn’t drinking my problems away anymore, although I think that was more because of the fact that I’d run out of liquor than any meaningful character development. It was about a week later that I was able to get my first night of actual sleep. I didn’t dream about anything either so that was a plus. I know it probably sounds bad, but I was starting to feel normal again… Like I could maybe find a way to just be myself… Either way, even after all that I still wanted to keep my job. I just added a new rule: no organs. From there I fell back into more or less my old routine. I went to eat out almost every day though, I thought any excuse that got me cleaned up and out of my place was worth taking… And then, I began to feel it again. That skin-crawling sensation of eyes on me from somewhere that I felt the day I met Mr. Hide&Seek. I didn’t think much of it at first, I only felt the eyes when I was surrounded by other people so of course one or two would be looking my way right? I thought I was just guilty and paranoid. But no matter what I did, I would always feel like I was being watched whenever other people were around. So I started driving more and more and eating out less and less. Not driving anywhere in particular, just driving… I felt safe on the open road, I couldn’t feel any eyes on me… For about a week. It started small. A shiver down my spine here and there. A sharp sensation that made my eyes snap to one car or another. Then it came more frequently, and I began to get more and more paranoid as the feeling became stronger and stronger. I started driving less and less, and whenever I did, I kept my eyes on the cars around me. Trying desperately to find where that feeling was coming from. To find who was watching me… Trying to catch a glimpse of his face in a passing car. I even thought I did see him a few times… Except that was just paranoia… I hope. Eventually, I stopped driving unless I had to. I shut myself in my apartment, only going out to get groceries and always, always making sure that I didn’t feel anyone watching me before I parked. But that feeling would always find me whenever I went out. This went on for about a month. I started to drink again, I didn’t go out to eat or drive anymore. I paid someone to deliver my groceries to the garage of my building. All I did was eat, sleep, drink, and watch movies or play games… I’d be living the dream, if I didn’t think a serial killer was stalking me. Part of me believed that I was just being paranoid and to be honest I desperately wanted to believe that part of me… But not enough to stake my life on it. And after another week of living like a shut-in the feeling of being watched started to re-surface. Like before it started off small. I felt a ping of eyes on me and from then on I kept the blinds securely closed. Even then, the feeling persisted for days, gradually gathering in strength. So I emptied out all of my closets and cabinets daily… Eventually I just left all of the doors open and everything on the floor so that I could look in to any hiding spot in an instant… But that feeling still persisted. I stopped drinking because I was terrified of being attacked. I started sleeping less and less and when I had to sleep, I slept inside of my closet and barred the doors shut from the inside. I ate and drank only when I felt hungry and always with my back to a corner of the room or locked in my closet… But I could still feel eyes on me, feel His eyes on me the same way I had back at the park. It was about a month later when I finally discovered my haven. The one place left that I didn’t feel watched. The stairwell of my building. I found that whenever I went down and back up the stars to get my groceries – as I’d long since stopped using the elevator – that I would have a brief respite from the feeling of being watched. I started to spend all of my waking hours there, sat on one of the stairs without a care in the world. I only left them to eat and sleep and whenever I entered the building proper I would feel eyes on me almost immediately. But having those stairs to return to made my life almost bearable. It had been a long time since I had anywhere I felt safe, and like every place before it I kept waiting form the feeling of being watched to follow me into the stairwell… But it never did. For another month, I fell into a somewhat bearable rhythm. I’d wake up in my closet feeling watched, I’d eat in the corner of my kitchen feeling watched, and then I’d scurry off to the stairwell where I could blessedly feel alone – Especially near the top floors where the stairs were seldom used. But all good things must come to an end and all that, and while I never did feel watched in the stairs, I did run out of money. Apartments and cars don’t pay for themselves after all, and while I managed a few months on the blood money from my last job it was finally time to get back to work. In the months since I last logged on to the site, things had calmed down significantly and there were now plenty of jobs that didn’t break any of my rules… So I decided to go with a route that I’d done before a couple of times. A gun run. The seller always treated me to a drink or two at his bar and was also always well armed so I felt that it would be a nice and easy job that I could feel safe doing. After confirming the job I closed my laptop, pulled on a fresh set of clothing, and headed out the door. I wanted to get this over and done with, and thankfully the feeling of being watched was rather light that day. I do admit, however, that I lingered in the stairwell for a bit before heading out. I wanted a bit of time alone before being out in the open for the first time in months. Anyways, I hopped in my car after about thirty minutes of blessed stairwell time and headed to the bar. After about two hours of paranoid and twisting driving I managed to make it just on time and pulled my car into the alleyway behind the bar. The owner greeted me with a smile as I got out of my car, “T, long time no see!” he said, his smile fading as I walked up and he got a better look at me. “Holy shit man, are you feeling okay?” he asked, genuine worry in the eyes of the large man. “No… I’m pretty far from okay…” I said with an exhausted sigh. I could still feel the faintest hint of eyes on me even now, though I know that the owner wouldn’t let me be jumped at his bar. “It’s a long story,” I offered, realizing for the first time that it might be nice to actually tell someone what happened. “Is that so.” he said with a hint of a smile and a shake of his head. “Well, hows about we get you a drink while the boys get ready to load up your car.” He offered in return, making me smile. “There’s always plenty of time for stories at my bar.” He said proudly. “I’d like that…” I said with another exhausted sigh, managing to keep the smile up as he put an arm around me and lead me in the back door of the bar. “Oh, by the way, how did you hold up during the bitcoin crash? I heard it hit a couple of transporters pretty hard.” he said, making me chuckle as we made our way through the kitchen. “Funny you should mention that,” I said, making him raise an eyebrow, “because that’s how my long story star—” I began, only to stop short when I looked at the bar. HE was siting there, sipping on a beer without a care in the world. He noticed me out of the corner of his eye and that same sickeningly sweet smile crept onto his face as his eyes met mine. I froze. There was no way that this was a coincidence. There was no way that he just happened to be at this bar at this time. I was broken from my trance by the bar owner waving his hand in front of my face and saying my name, “Hello? T, you alright?” I quickly ducked back into the kitchen and started to hyperventilate. How did he know? How could he possibly have known that I would be here? Did he follow me? “Did who follow you?” The owner’s voice brought me back to reality once again as I realized I’d been thinking out loud. His face was concerned, bordering on scared. “How long has that guy been at the bar?” I asked, hoping that the owner knew who I was talking about. “If you mean tall, thin, and creepy then about an hour… What is going on T?” He asked, as I slumped against the wall. I started crying. I broke down and burst back into the bar only to see that Mr. Hide&Seek he was already gone. “I… I need to go. I need to get home!” I said, pushing past the owner and running to my car. He called after me, trying to get me to stay and explain what the hell was happening but I wasn’t listening. For all I know, Mr. Hide&Seek could be breaking in to my apartment already. I drove straight home and threw open the door to my apartment. It had still been locked, but I wasn’t taking any chances. I grabbed a knife from the kitchen and checked everywhere. But he wasn’t there. Then, my phone rang and scared the living hell out of me. I checked the number and gulped when I saw that it was blocked. I considered not answering but in the end I picked up the call. “H-Hello?” I asked tentatively. “T… What the hell happened at the bar?” a modulated voice rang through the speaker in my ear, making me wince. It was one of the site admins for sure. I was silent for a moment before telling the admin everything. I couldn’t see the man, but I could feel a sudden change when I mentioned seeing Mr. Hide&Seek at the bar. “T,” the admin began, a serious edge to his voice. “I need you to log in to the site… _Now_” he said, and something in me told me to listen. I booted up my laptop and hopped on to the site. As soon as I logged in a dialog appeared that I’d never seen before. ‘ADMIN would like to take control of this computer. Do you consent to this?’ With two buttons. One for yes. One for no. I clicked yes and watched as my cursor began to move on it’s own. “Thank you T. This will only take a moment…” the admin said, a practiced calm in his voice as he downloaded several files and began to do… Something on my laptop. A minute later a dialog box popped up that said, ‘Threat detected!’ and the admin sighed and his voice sharpened as he spoke. “T… You’ve been compromised. You’ve had a nasty piece of spyware installed on your machine, for about a month by the looks of things. It’s been recording your keystrokes and giving someone remote access to your camera…” the admin explained, making me gulp as I realized that all of my information was insecure. “B-but, there’s no way! I haven’t download anything!” I said, making the admin mutter something as a bout of typing could be heard coming through the phone. The admin’s voice was cold and calculated when he spoke next. “No… No you didn’t…” he said, making me gulp. “This software was installed via _USB_…” the admin said, making my heart nearly stop. Hide&Seek had been in my home! He had been here without me noticing and put that program on my laptop. Even after all of my paranoia, he still found his way into my room without me knowing. “I’m going to delete the program,” the admin said, and a few keystrokes later, “done… What the—” As the admin deleted the program, thousands of windows began popping up on the screen of my laptop. All of them saying the same thing… ‘olly olly oxen free’ After that, I threw my laptop in the trash and got a new one as well as a new phone, sim card and all. I was taking no chances. I got all new accounts for everything and the admin told me he revoked Mr. Hide&Seek’s membership personally. But I’m going to disappear all the same, I have a plane ticket to somewhere and my bags are already packed. Don’t look for me, and if you ever start to feel like you’re being watched… It’s because you are.
jl777’s first law of blockchain dynamic:“Once the value of the assets exceeds the value of the underlying platform, it become irresistible to invent ‘taxes’ to extract a rent-seeking position”
In the ‘multi-chain’ category of blockchain platforms, Komodo stands out both as a pioneer and as the most extreme application of such design. Creating and running fully independent blockchains is one of Komodo main design features, so I want to talk a little about the concept of ‘blockchain sovereignity’ and how it compares with the competition. First I need to define the meaning of blockchain sovereignity, I’ll offer this one:
Sovereignity is a project’s degree of independence from the platform it's built upon. The more its reliability, features and costs are immune from the base layer’s own reliability, features, costs, changes or events, the more it’s ‘sovereign’.
This concept isn’t much talked about in the cryto space but it’s going to grow in importance in future. Actually it’s already been important… in the past 6 years I’ve seen more than one project wrecked by backward incompatible changes on the underlying platform: does anyone remember Counterparty and the op_return story? Or when Vitalik tried first to build his idea on Bitcoin? Or the Supernet project on Nxt? So this is not just an abstract problem! How does this concept apply to project built on Komodo technology? On Komodo they will enjoy by default the following ‘sovereign’ features:
Every Smartchain is completely independent from Komodo and from each other
It doesn’t cost any Komodo to create or use a Smartchain
A Smartchain pays its own tx fees in its own native coin
A Smartchain has its own open network of nodes, consensus rules and customization possibilities
In other words they’re all as independent blockchains as they can be, though they come with cross-chain interoperability. If aliens pulverized all Komodo nodes from orbit, any Smartchains would continue to work. Exactly like Litecoin would continue to work if Bitcoin disappeared or vice-versa. In fact anyone is free to create a fully functional Smartchain and it wouldn’t make difference if it never interacted with the rest of Komodo ecosystem! How does such design compare with other multi-chain platforms? Ethereum has by far the most developed infrastructure after Bitcoin. Now it’s under a gradual transition to a 2.0 version that should be completed sometimes between 2020 and 2021. Ethereum was born with a single chain design but the 2.0 plan has striking resemblances with a sort of multichain or bespoke architecture: the base layer will adopt a sharding technology and far larger use will be made of various 2nd layer scaling solutions: Plasma, State Channels, Payment Channels and ZK-STARKs. All of them come with different trade-offs but overall they should fix the scaling problems. Yet from the point of view of ‘sovereignity’ this design doesn’t offer much. Projects using 2nd layers solutions will be safe from congestion but their security, fees and interoperability will still be strongly dependent upon the base layer. Indeed their very existence depends on it, no plasma sidechain can exist without Ethereum! Despite a well developed smart contract technology, no real customizations are possible at the core level and the gas cost remains a concern for resource-intensive applications. Polkadot was born specifically as a multichain scalable & interoperable protocol. Yet the chains based on it, called parachains, are strongly dependent on the base layer for security and only a limited number of parachain slots exist. Their number gets increaesed in time but, in order to avoid squatting, they must be won via an auction mechanism. Thus a parachain is only ‘rented’, working in practice like a subscription model. This design is very little reassuring from the ‘sovereignity’ point of view! Ardor is a platform that allows to create individual ‘Child Chains’ for specific businesses or purposes. Such childchains have their own token but the Ardor token is still needed to pay for block creation purpose, so it comes with an automatic market-based exchange mechanism between them. Childchains are safe from congestion but still completely dependent on the base layer for security and survival. They come with smart contract and useful features but no advanced customizations are possible. Cosmos is a network of independent application-specific blockchains, i.e. it allows to create custom blockchains using both prebuilt modules or creating your own. Cosmos is probably the one coming closer to Komodo in terms of sovereignity and customizations and it has many clever mechanisms and features that make it one of the most interesting projects in the crypto space. The customizations possibilities are greater than most competitors, yet compared to Komodo there are parts where it’s lacking: first the only consensus algo choice is Tendermint and don’t seem to be options to customize that. Then the Atom coins are required for transactions between blockchains and payment of commissions. And last the smart contract language is still interpreted and gas-based. I think it’s fair to say that Komodo wins hands down in the blokchain ‘sovereignity’ category. But let’s also ask another important question: does ‘blockchain sovereignity’ really matter? I’ve mentioned a few examples where it did make a huge difference, yet the proper answer is that it depends… there exists a very large spectrum of blockchain-based projects with very different needs! At one end of the spectrum we find tokens with a temporary utility. At the other extreme there are mission-critical projects with highly customized features. For the former ‘sovereignity’ is of no importance. For the latter it can make the difference between working and catastrophe. Everything in the middle have to decide for itself on a case by case base. I think tokens/colored coins are perfectly fine for the simplest cases. Ethereum, Cosmos, Polkadot, Ardor and others are probably fine too for more advanced cases. Komodo’s target market overlaps with them but its ultimate audience are the most ambitious and challenging projects, the ones needing full sovereignity and state-of-the-art customizations at the core level. The base degree of independence enjoyed by developers using Komodo technology is further compounded by unique technological advances like the Antara framework. With Antara any program, software, blockchain rule and feature can be coded into special purpose modules. ‘Smart contracts’ are just a subset of what Smartchains can be programmed to do. Anything is possible, including changes to core consensus rules. The modules are compiled with the daemon and run at native cpu speed, without gas fees or virtual machine. Antara represents a qualitative jump above all existing ‘smart contract’ technologies, similar to the difference between Asic mining vs Cpu mining.
jl777:“It seems almost all other smartcontract solutions are just a variation on the self-limiting GAS model. You would think there would be a better solution, and there is. The transactionalized… model totally avoids the GAS issue, runs the custom code at native CPU speeds (not interpreted) and best of all the performance is not affected by any other project as you have your own Smartchain...”
The library of Antara modules continues expand and simple dApps can be created using the large set of rpc calls available from existing modules. Developing an entire module from scratch isn’t stuff for weekend coders but any serious project looking for state-of-the-art custom solutions is certainly going to pay attention! To recap, if you’re planning to use a platform to launch a blockchain-based project (especially a very complex one) there’s a set of questions that you must ask yourself before proceeding:
In which specific ways, if any, is your project depending to the underlying platform?
Could the platform developers or the coin holders (via on-chain governance system), decide to increase costs, charge additional fees, deprecate functionalities or make other dramatic changes?
Would you have any saying on such decisions?
How would such changes affect your project?
And what are you going to do in such case?
If the questions above matter to you, then it’s time to take the concept of ‘blockchain sovereignity’ seriously.
Jl777 “Smart projects that want to build a valuable use-case would want to minimize… all future incremental costs… ideally minimal or zero, like zero tax platform. Since this sounds too good to be true, most maybe don’t even imagine it is possible, but the smart projects will analyze these critical details...”
You may wonder why there aren’t more free platforms like Komodo? The reason is simple: all coin holders are concerned with finding use cases that give value to their coin. Moreover some platforms have big VC funders that want a return on their investment. So the more use cases the better: simple, isn’t it? Unfortunately this leads to short-sighted decisions, like forcing the use of a coin in any possible way or putting a cap on usage or ‘fee market’ fantasies.
Jl777 “Increasing tax rates might boost revenues temporarily from projects that are locked in, but as soon as the taxes become meaningful, every effort is made to migrate, regardless of the cost to migrate. Isn’t it better to start in a tax free zone?”
Komodo is unique in this regard, as it has made a deliberate design decision to be as much permissionless and free as possible. Some people find this design hard to understand: I could buy a Lambo if I had one dollar for every time someone asked “So what is Komodo use case?”. It takes some long-term vision to understand the benefits. Komodo does have use-cases but none of them is obligatory or costly. Projects building on its technology are free to use Komodo or not to use it at all. They can design their own alternatives. They could even create a separate dPoW network! Yet Komodo remains the cheapest, simplest and most liquid option and center of its ecosystem. This fact alone ensures it’s going to be actually used.
MrKomodoWorld: “Instead of devising schemes to make projects pay, Komodo has devised schemes that prevents itself from forcing projects to pay”
I earned about 4000% more btc with my android tablet than with a $250 ASIC mini rig setup using GekkoScience Newpac USB miners!
Requirements: 1.) Android Device with access to Google Play Store. *I haven't tried yet but you may be able to use tis on Android TV devces as well by sideloading. If anyone has success before I try, let me know! -Note, I did this with a Samsung Galaxy Tab S6 so its a newer more powerful device. If your android is older, your profts will most likely be less than what I earned but to give a projected range I also tested on my Raspberry Pi 4 running a custom LineageOS rom that doesn't allow the OS to make full use of the Pi's specs and I still got 500 h/s on that with Cloud boost, so about 60% of what my Tab 6 with MUCH Higher Specs does. **Hey guys. Before I get started i just wanted to be clear about one thing. Yes I have seen those scammy posts sharing "miracle" boosts and fixes. I have a hard time believing stuff online anymore. But this is honestly real. Ill attach photos and explain the whole story and process below. Thanks for taking the time to read and feel free to share any thoughts, concerns, tips, etc* So last week I finally got started with my first mini rig type mining build. I started getting into crypto about a year ago and it has taken me a long time to even grasp half of the projects out there but its been fun thus far! Anyways my rig was 2 GekkoScience Newpac USB miners, a Moonlander USB miner to pair with an FPGA i already had mining, a 10 port 60W 3.0 USB hub and 2 usb fans. The Newpacs actually are hashing at a combined 280 g/s which is actually better than their reported max hash rate when overclocked. Pleasant surpise and they are simple!! I just wanted to get a moonlander because my fpga already mines on Odocrypt for DGB and I just wanted to experience Scrypt mining and help build the DGB project. The Newpacs are mining BTC though. After I got everything up and running i checked my payout daily average after 1 week. I averaged .01 a day TOTAL between all three miners with them all perforing ABOVE SPEC!!! I had done research so i knew I wouldnt earn much. More than anything i just wanted to learn. But still. I was kinda surprised in a negative way. Yesterday I actually earned less than .01 Frustrated I went back to scouring the web for new ideas. About a year ago, when II was starting, I saw an app on my iphone called CryptoBrowser that claimed to mine btc on your phone without actually using phone resources using a method of cloud mining. I tried it for a week and quit because I earned like .03 after a ton of use and seemed scammy. Plus my iphone actually would get very hot when doing this so I quit using it as it seemed like a possible scam with all the cryptonight browser mining hacks and malware out there. Anyways I was on my Galaxy Tab S6 and saw that CryptoBrowser released a "PRO" edition for 3.99 on Google Play. I bought it for Sh*ts and giggles and booted it up. It came with what they called "Cloud Boost" Essentially this is a button you press and it multiplys the estimated hashrate that it gives you device by the number shown on the boost button. (With the purchase of PRO you get one free x10 boost. You can purchase additional boosts to use with other android devices but those are actually pretty pricy. Another x10 boost was like $25 if i remember correctly). I played with it for about an hour to see if it actually worked like it said it would this time. To my surprise, as i was browsing, my device didnt increase in temperature AT ALL!!!!! I checked my tast manager to confirm and it was indeed true, my memory and usage barely went up. it was giving me an estimated range of 80-105 on the hashrate. Once i pushed the x10 boost button, that went to 800-1150 h/s. I switched my screen to not go to sleep, plugged it to the charge and let it run on the browser page, hashing. When you push the boost button, it runs for 3 hours at the boosted speeds. After that it goes back to normal but if you press the button again, it boosts everything again. There is no limit to how many times you use it. After checking what I earned after 24 hours, I HAD MADE .40 in BTC!!!!! I JUST EARNED OVER 4000% MORE THAN MY $280 MINING RIG EARNED ME!!!! I was blown away. Maybe this was a fluke? I did it again next day. Every 3 hours or so I would push the button again but thats all. Sure enough, .35 that day. Also, it realy BTC. I requested a payout and although it took like 12 hours for them to send me an email stating they had just sent it, I actually did recieve the state amount of BTC within 24 hours in my personal wallet. The fees to send are SUPER LOW!. Like .01 Below I will list the steps I took, along with an explanation of thier "Mining" process on Androids. Reminder, this ONLY WORKS ON ANDROIDS. Also DO NOT use cryptobrowser on a physcal laptop or desktop. I ran it on an old laptop for three days last year and it fried it. It does actually use your hardware on those platforms to mine and it is not efficnet at all as I suspect they prob steal over half of your power for themselves using the REAL RandomX protocol via browser mining which is EXTREMELY INEFFICIENT DONT TRY IT!! -----How To Do This Yourself: Cryptotab Browser states the program works on Android devices by estimating what it thinks the hashrate would be for your device specs and siimulates what you would mine in a remote server however you still earn that estimated coin amount. It is not a SHA-256 process or coin that they say is mining, rather it is XMR and they swap that and pay it out to you in BTC Bitcoin. However I know damn well my Tab S6 doesnt hash 80-105 h/s on RandomX because I have done it with a moodified XMRig module i ported to Android. I got 5 h/s a sec if I was getting any hashes at all. But thats besides the point as I still was making money. Now, when you press that cloud boost button it immediately boosts that hash rate it estimates by the number on the cloud boost. As stated above, you can purchase more boosts and gift them or use them on extra android devices that you may have. Again, they are pricey so I'm not doing that plus it would just mean that I have another device that I have to leave on and open. The boosts come in x2, x4, x6, x8 and x10 variants. Again, they have unlimited uses. Here is the link to grab yourself CryptoBrowser Pro from CryptoTab. This IS A REFERRAL LINK! This is where I benefit from doing tis tutorial. Like i said, I want to be transparent as this is not a scam but I'm also not doing this out of the love of my heart. Their referral system works in that people that use the donwload the app using your link are your stage 1 referrals. Anytime they are mining, you earn a 15% bonus. So say they mine $.30 one day. You would get paid out an additional $.045 in your own balance (it does not come out of the referred user balance fyi so no worries). Then lets say that referred miner also gets their own referrals. I would get a 10% bonus on whatever THOSE people mine. This goes on and on for like 8 tiers. Each tier the bonus percntage essential halves. So again, I stand to benefit from this but it also is stupid to not make this visible as its WAY CHEAPER, EASIER AND MORE PROFITABLE TO GET BTC USING THIS METHOD THAN IT IS USING ASICS!! THIS EARNS ALMOST AS MUCH BTC AS AN ANTMINER S7 DOES RUNNING 24/7 ONLY WITHOUT THE HUGE ELLECTRICTY BILL AND COSTS!!!!) Thats it. Again, if you have concerns, let me know or if you have suggestions, other tips, etc... mention those as well!!! https://cryptotabbrowser.com/8557319 Links to Picture Proof http://imgur.com/gallery/P13bEsB
BitCoin miner virus or BitCoin mining virus is a dangerous malware that may use your CPU and/or GPU to obtain BitCoin cryptocurrency by mining illegally. Cryptocurrency miners keep hitting computers and trying to use their resources to generate revenue for their developers. Introduction. Mining is the process of adding transaction records to Bitcoin's public ledger of past transactions (and a "mining rig" is a colloquial metaphor for a single computer system that performs the necessary computations for "mining".This ledger of past transactions is called the block chain as it is a chain of blocks.The blockchain serves to confirm transactions to the rest of the ... Importance of Using a Bitcoin Mining Software. The primary aim of the software is to convey the work of the mining hardware to the remaining Bitcoin network and to collect the completed work from other miners on the network. The software keeps a check on this activity (input and output) of the miner and projects the statistics at the same time ... Mining is the method through which Bitcoin is secured Because many miners are adding new hashpower, over the last few years blocks have often been found at 9.5 minute intervals rather than 10. This creates new bitcoins faster, so on most days there are actually more than 900 new bitcoins created. Bitcoin Mining Hardware Guide The best Bitcoin mining hardware has evolved dramatically since 2009. At first, miners used their central processing unit (CPU) to mine, but soon this wasn't fast enough and it bogged down the system resources of the host computer. Miners quickly moved on to using the graphical processing unit (GPU) in computer graphics cards because they were able to hash data 50 ...
I mined cryptocurrency full-time for over a year, this is a story of my journey navigating mining cryptocurrency such as Bitcoin, Ethereum, Zcash and many mo... Bitcoin and cryptocurrency mining explained with the Byzantine Generals Problem. We use it to explain the essence of cryptocurrency mining. https://www.udemy... Where do Bitcoins come from, and what is Bitcoin "mining"? Peter van Valkenburgh, Director of Research at Coin Center, explains the role of miners in a syste... For more information: https://www.bitcoinmining.com and https://www.weusecoins.com What is Bitcoin Mining? Have you ever wondered how Bitcoin is generated? T... What is Bitcoin? With the Bitcoin price so volatile everyone is curious. Bitcoin, the category creator of blockchain technology, is the World Wide Ledger yet...