We're proud to announce Elliptic Vault - the world’s first insured Bitcoin storage service. Elliptic Vault offers protection against the loss or theft of Bitcoin holdings, with insurance underwritten by Lloyd's of London. www.elliptic.co/vault Elliptic Vault is the first service from Elliptic, a new, London-based digital currency company (previously known as BitPrice).
Decentr ($DEC) - foundational cross-chain and cross-platform DeFi protocol
Decentr is a protocol designed to make blockchain/DLT mainstream by allowing DeFi applications built on various blockchains to “talk to each other”. Decentr is a 100% secure and decentralised Web 3.0 protocol where users can apply PDV (personal data value) to increase APR on $DEC that users loan out as part of of our DeFi dLoan features, as well as it being applied at PoS when paying for stuff online. Decentr is also building a BAT competitor browser and Chrome/Firefox extension that acts as a gateway to 100% decentralised Web 3.0
Allows DeFi Dapps to access all Decentr’s dFintech features, including dLoan, dPay. Key innovation is that the protocols is based on a user’s ability to leverage the value of their data as exchangeable “currency”.
Decentr is building foundational chain-agnostic protocols that will support “true” 100% DeFi Dapps, a 100% secure and decentralised, user-centric alt economy. DeFi dApps inter-connected by Decentr can talk to each other and share PDV (personal data value) of their users. PDV is best described as a personalized “exchange rate” (in a sense social reputation where more effort leads to more rewards and NOT more capital to more rewards. ) between currencies that users apply at point-of-sale to make the cost of goods and services cheaper online. PDV is applied to the APR users earn on $DEC (native token) that they hold that they loan out as part of the investing pool. PDV will also allow uncollateralized loans on their dLoan platform, and also on platforms like Aave and Compound.
Decentr will implement ZKsync to get super cheap and super fast transactions across the ETH network. It is also working with HoloChain and Tomochain to allow connect their DeFi ecosystem to the Ethereum DeFi ecosystem. Decentr has DEEP TIES and a PARTNERSHIP with Holochain: https://medium.com/@DecentrNet/decentr-holochain-ama-29d662caed03
Decentr is also building a browser and Chrome/Firefox extension - a gateway that “transitions” Web 2.0 into a 100% decentralised Web 3.0 via their suite of decentralised dFintech and dCommunications features. The browser adds a 100% decentralised “user layer” to current blockchain protocols so that applications built on blockchain can actually “talk to each other”. The browser uses encryption all the time and the power of blockchain to keep private keys safe. Browser will offer a more robust and innovative type of blockchain storage and caching that is much faster than VPN or TOR. It will allow surfing .onion addresses as well as the regular ones. >>BAT browser 400m marketcap, DEC marketcap 4m<<
Decentr is researching a hardware application, powered by Decentr software, that would greatly enhance current IoT networks. It’s called a “Smart Chip Node” (SCN) and will adhere to 4G LTE standards (with in-built 5G capability), which means connectivity between devices will match or exceed current speed and connectivity, dramatically improving stability and coverage of standalone devices, such as a laptop or tablet, as well as IoT devices, such as home routers and modems.
Decentr uses Coinbase API to optimise integrated implementation of the user layer and Blockchain as a Service (BaaS) to allow users to leverage cloud-based solutions to build, host and use their own blockchain apps. Tierion’s technological infrastructure, the Chainpoint Proof protocol, will come into play whenever a user adds something in Tierion’s data store. Hyperledger Fabric and R3 Corda private blockchains are used as an immutable transaction database for data transfers, including the following tech: R3 Corda, Hyperledger Fabric, Ansible, Bitbucket Pipelines, AWS, Node.JS, GoLang, Kotlin and CouchDB.
Implements a system of layered security protocols based on a radically-new software architecture that combines Elliptic Curve Cryptography (ECC)4 and Sobol sequencing with a n-dimensional chain as part of AI-enhanced, platform-wide community consensus mechanism — a mechanism that assigns mutually agreed value to data and user security protocol upgrades (further encouraging enhanced data integrity) by deploying a Delegated Proof of Stake (DPoS) protocol.
Bank of England has reached out to Decenr to discuss the potential of a UK CBDC upon hearing about the potential of their tech. Decentr is consistent with their own R&D into a "dGBP" and they requested a top-level document for review >> Decentr created this proposal: https://decentr.net/files/Decentr_Consultancy_Doc_UK_CBDC.pdf
A fee is charged for every transaction using dPay whereby an exchange takes place between money (fiat and digital) and data, and vice versa, either as part of DeFi features or via a dApp built on Decentr. They are launching pilot programmes in the following industries:
Banking/PSP Industry: On Product launch, due to Decentr’s powerful PSP connections (including the worlds #2 PSP by volume), a medium-scale pilot program will be launched, which will seed the network with 150,000 PSP customers in primarily the Spanish/LAC markets, generating revenue from day one.
“Bricks and Mortar” Supermarket/Grocery Industry: Decentr aims to ensure the long-term competitiveness of “bricks and mortar” supermarkets against online-only grocery retailers, such as Amazon, by a) building secure tech that allows supermarkets to digitise every aspect of their supply chains and operational functions, while b) allowing supermarkets to leverage this incredibly valuable data as a liquid asset class. Expected revenue by Year 5: $114Mn per year.
Online Advertising Industry: Decentr’s 100% decentralised platform credits users secure data with payable value, in the form of PDV, for engaging with ads. The Brave browser was launched in 2012 and in 8 years has reached over 12 million monthly active users, accented by as many as 4.3 million daily active users.
TOKEN $DEC AND SALE
Decentr recently complete their token sale on a purchase portal powered by Dolomite where they raised $974,000 in 10 minutes for a total sale hardcap of 1.25M. The $DEC token is actively trading on multiple exchanges including Uniswap and IDEX. Listed for free on IDEX, Hotbit, Hoo, Coinw, Tidex, BKex. Listed on CoinGecko and Coinmarketcap. Listed on Delta and Blockfolio apps. ➡️ Circulating supply: 61m $DEC. ➡️ Release schedule and token distribution LINK -> NO RELEASE UNTIL 2021.
A tradeable unit of value that is both internal and external to the Decentr platform.A unit of conversion between fiat entering and exiting the Decentr ecosystem.A way to capture the value of user data and combines the activity of every participant of the platform performing payment (dPay), or lending and borrowing (dLend), i.e a way to peg PDV to tangible/actionable value.Method of payment in the Decentr ecosystem.A method to internally underwrite the “Deconomy.
We’re seeing a bunch of interesting Rust blockchain and crypto projects, so this month the “Interesting Things” section is loaded up with news, papers, and project links. This month, Elrond, appeared on our radar with the launch of their mainnet. Although not written in Rust, it runs Rust smart contracts on its Arwen WASM VM, which itself is based on the Rust Wasmer VM. Along with NEAR, Nervos, and Enigma (and probably others), this continues an encouraging trend of blockchains enabling smart contracts in Rust. See the “Interesting Things” section for examples of Elrond’s Rust contracts. Rust continues to be popular for research into zero-knowledge proofs, with Microsoft releasing Spartan, a zk-SNARK system without trusted setup. In RiB news, we published a late one-year anniversary blog post. It has some reflection on the changes to, and growth of, RiB over the last year. The Awesome Blockchain Rust project, which is maintained by Sun under the rust-in-blockchain GitHub org, has received a stream of updates recently, and is now published as the Awesome-RiB page on rustinblockchain.org. It’s a pretty good resource for finding blockchain-related Rust projects, with links to many of the more prominent and mature projects noted in the RiB newsletter. It could use more eyes on it though.
What’s It Good For?. Lane’s take on the blockchain tech: “blockchain is very good at a narrow set of applications and pretty bad at just about everything else. When you get past the hype, it’s really just a slow, expensive, distributed, permissionless, append-only ledger, nothing more and nothing less.”
rust-fil-proofs. The Filecoin Proving Subsystem (or FPS) provides the storage proofs required by the Filecoin protocol. It is implemented entirely in Rust, as a series of partially inter-dependent crates – some of which export C bindings to the supported API.
Shuffler uses StarkWare’s VeeDo VDF to seed a seedable RNG, and shuffle a randomisable list of items.
Introduction to Bitterfly: Butterfly Matrix Entropy Weight Consensus Algorithm
When Bitcoin launched 11 years ago, Satoshi Nakamoto had the vision of giving people power over their money. His vision lives on through BTC. However, the Bitcoin network has a few flaws. One of those flaws is the Proof of Work mechanism. Mining Bitcoin requires a huge amount of resources that are out of reach for most ordinary people. The result is that the BTC network is increasingly being placed in centralized control.The Bitterfly project hopes to change that using a revolutionary consensus mechanism called the Buttery that will be used on the Bitterfly blockchain. About Bitterfly Bitterfly wants to continue the vision that Nakamoto had for Bitcoin. The goal is to give power back to the people and place them in control of their finances. To do this, the Bitterfly team is working on three main areas that require improvement: · The consensus mechanism · The blockchain performance · Community Governance The Consensus Mechanism To improve the consensus mechanism, the team behind Bitterfly has created the Butterfly algorithm that they will add to the PoW mechanism. Not only can it ensures that the hash rate is obtained fairly, it ensures that the hash rate of the whole network is enhanced via the butterfly effect. Performance In terms of performance, the Bitterfly blockchain has been upgraded to have a confirmed commercial speed of 5000TPS. Bitterfly is designed as a Blockchain As a Service open-source platform, which can be used in different applications. Bitterfly will support different types of computing services that include cloud servers. As a result, it will utilize idle server resources to boost the hash rate support for the network. Community Governance When it comes to community Governance, Bitterfly plans to introduce a node competition mechanism that will release 210 nodes over time to enhance the butterfly effect. First, they will introduce the nodes via the Butterfly matrix network. Later, they will do so via a fair elimination process. The goal is to ensure that the nodes contribute to the success of Bitterfly. The Encryption Algorithm Encryption and decryption of data are at the core of the operation of any blockchain. It helps to guarantee the security of the whole blockchain. Only a corresponding private key can unlock data encrypted using a public key. In most blockchains, the Hash Function and the Asymmetric Key Encryption Algorithm are used to encrypt and decrypt data. For the Hush Function, the main algorithms used are SHA and MD5.Bitterfly uses the SHA256 algorithm for encryption and RSA, DSA, and Elliptic curve algorithms for decryption. For the verification phase, Bitterfly developed the DFLYSChnorr, which is based on the SCHNOOR algorithm. Consensus Algorithm The consensus mechanism is used in the blockchain to ensure that each transaction is accurate. Bitterfly plans to operate within the enterprise space, which requires comprehensive and heterogeneous systems that are integrated with various communication protocols. To deal with the challenges that might arise, Bitterfly developed a two-layer consensus algorithm for the PoW mechanism called the PBFT algorithm. Here is how the Bitterfly algorithm works: · The network Structure Bitterfly is designed as an internet payment and application protocol that is based on embracing the digital economy. It can facilitate value storage as well as the decentralized exchange of digital assets, payments, as well as clearing functions. Within Bitterfly, everyone can participate in productively. It will place a huge demand on Bitterfly. The network will offer performance guarantees as well as smart contracts. · Bitterfly Consensus Algorithm To meet the goal of decentralization and security, Bittefly wants to become a global computer instead of a P2P information system. Besides satisfying the decentralization and security needs of its users via PoW, the system will also need to perform at a high level. As a result, the team opted to support smart contracts in commercial applications. To deal with the issue of energy consumption, the team came up with the Butterfly algorithm. The algorithm allows the use of PoW as well as other cross-chain methods such as the Layer 2 protocol. Confirmation of transactions is done via verification nodes. Each node is preconfigured with a list of trusted nodes known as the Consensus Achievement List (CAL). The node list can be used to confirm transactions. Once a transaction is confirmed with the local ledger, it is integrated into the transaction candidate set while all illegal ones are discarded. To improve the security of the network, the verification confirmation was raised to 60% unlike in other networks where it is 50% +1. A transaction is officially confirmed once it is confirmed by 80% of the CAL nodes. The process is known as the Last Closed Ledger, which represents the latest changes to the ledger. Within Bitterfly, the identities of those taking part in the confirmation of transactions are known beforehand. AS a result, transactions are faster and the blockchain is more efficient. Butterfly Matrix Entropy Weight Algorithm Entropy is used to measure the level of uncertainty in the system. Bitterfly built a way to establish consensus using multiple factors. In the network, each data set has a corresponding weight. Summary For the past 11 years, Bitcoin has enjoyed tremendous success. The launch of Bitcoin ushered in a new era for humanity. For the first time in history, decentralized money that is outside the control of governments and other central entities is possible. The new type of money gives people the power to control their finances and avoid the harsh effects of inflation caused by the wanton printing of government currency. When a new economic downturn hit the global economy, Bitcoin failed the litmus test. While Bitcoin should have helped to save people’s finances as the money printing began, it seemed to have followed the same trend as the sinking global economy. It revealed that BTC still had numerous weaknesses that need to be corrected. Bitterfly wants to build on what Bitcoin has accomplished and do more with it. The team behind this project is quite optimistic. They believe that they can achieve what Bitcoin has achieved in the past 11 years. Besides that, they believe they can achieve where Bitcoin has failed in those past 11 years. Social Media Links TWITTER: https://twitter.com/BitterflyD MEDIUM: https://medium.com/@BitterflyD YOUTUBE: https://www.youtube.com/channel/UCxSNCzuQsNj-oCgepxzoXQg TELEGRAM: https://t.me/Bitterfly_Disciples
https://preview.redd.it/yeib74adcoy41.png?width=900&format=png&auto=webp&s=8e50b543a01a25860c7c732c17a1f2da338cd7c6 In the blockchain system, since there is no centralized organization responsible for managing the backup user sensitive data, the generation, storage, use, retrieval, destruction, and update of the user’s private key all need to be guaranteed by the user. Therefore, for the entire life cycle of the private key, there needs to be a strict way to manage and control it, to ensure the security of the asset. Today ’s NeoLine Talk, let ’s talk about how to ensure the security of the private key life cycle.
Private key generation
Private key: A 256-bit binary random number whose quality depends entirely on the quality of the random number that generated the private key. If the randomness of the key generation process is insufficient to make it predictable, then all subsequent security protection measures will be in vain. Random numbers are the cornerstone of information security systems based on modern cryptography. The security of the entire system depends entirely on the generation efficiency and quality of random number sequences. The core of high-quality random numbers is “unpredictability”. There are two types of random numbers: pseudo-random and true random. Pseudo-random is also called pseudo-random. It generally relies on seeds and algorithms. Knowing the seeds or the random numbers that have been generated, you can get the next random numbers, which is predictable. The current mainstream blockchain system is the private key generated by this method … True random numbers are generally based on the design of the hardware. Random numbers are generated according to the external temperature, voltage, electromagnetic field, environmental noise, etc., and the unpredictability of randomness is greatly increased. All security cryptographic chips in the financial field adopt this design.
Let’s see in detail how to generate a private key from a random number?
The first step in generating a private key is also the most important. It is to find a sufficiently secure source of entropy, that is, a source of randomness. Generating a Bitcoin private key is essentially the same as “choose a number between 1 and 2256”. As long as the selected results are unpredictable or unrepeatable, the specific method of selecting numbers is not important. Bitcoin software uses a random number generator at the bottom of the operating system to generate 256 bits of entropy (randomness). Normally, the operating system random number generator is initialized by an artificial random source, and it may also need to be initialized by shaking the mouse continuously within a few seconds. More precisely, the private key can be any number between 1 and n-1, where n is a constant (n = 1.158 * 1077, slightly less than 2256) and is defined by the order of the elliptic curve used by Bitcoin. To generate such a private key, we randomly choose a 256-bit number and check whether it is less than n-1. From a programming point of view, it is generally by taking a long string of random bytes from a cryptographically secure random source and using the SHA256 hash algorithm to perform operations, so that a 256-bit number can be easily generated. If the operation result is less than n-1, we have a suitable private key. Otherwise, we repeat it with another random number.
Private key storage
Each bitcoin address corresponds to a private key, and mastering the private key means mastering the bitcoin in its corresponding address. In layman’s terms, a key opens a lock. If the Bitcoin address is a lock, then the private key is the key to the lock. The storage and use of private keys are generally divided into soft and hard implementations. Soft implementation, storage, and use are in the form of software. After the key is generated, it is stored in the user terminal or hosted on the server as a file or character string. When used, the private key plain text is read directly or through simple password control into the memory, and the private key calculation is completed by the CPU. This storage and use method has a lot of security risks and is easy to be copied, stolen, brute-forced by hackers or ghosts. Hard implementation generally relies on a dedicated cryptographic security chip or cryptographic device as a carrier. There are generally mechanisms such as physical protection, sensitive data protection, and key protection to ensure that the private key must be generated by dedicated hardware. At any time and under any circumstances, the private key cannot appear outside the cryptographic device in clear text; the key stored inside the cryptographic device should have an effective key protection mechanism to prevent dissection, detection, and illegal reading. The private key cannot be exported, and only the signature value can be calculated and output. But whether it is soft or hard, as long as others know your private key, you can transfer your assets. Remember, whoever holds the private key is the real owner of the asset.
Safe use of private keys
When using the private key, it is necessary to ensure the security of the use environment, and access, reading, and writing of the private key file need to have relevant permission control. After the use is completed, all sensitive data cached in the memory needs to be cleared using a dedicated function to prevent the leakage of sensitive data. From the perspective of password cracking, the private key should be replaced after a certain period of use. This is a problem involving the destruction and update of the private key, which we will introduce later.
Private key recovery
If a traditional centralized bank loses its U-shield or forgets its password, it can rebind a new U-shield (private key) through the account system. Accounts and private keys are logically bound and are operated by centralized banks while meeting risk control requirements. There are also some traditional centralized payment institutions. When the user’s asset certificate is lost, the centralized institution can retrieve the relevant data through its identity certificate. But in the blockchain system, there is no centralized organization to help us back up sensitive data such as private keys. Therefore, when designing the system’s private key management scheme, it is necessary to provide multiple back-ups and recovery methods, such as the use of mnemonic words or the use of passwords plus local ciphertext files to restore private key data. But if your mnemonic is also lost, it means you lost everything.
Private key destruction
When the user needs to destroy the private key data, it is necessary to ensure that all the private key data stored in the backup are completely deleted and destroyed.
Private key update
In the field of blockchain, the private key is the only credential that represents the user’s identity or digital assets. If the private key needs to be updated, registration or digital asset transfer must be re-bound. Therefore, when you need to replace the private key, you need to ensure that the new private key is safely generated or imported, the assets have been safely transferred, and the old private key is safely destroyed. Everything starts with visibility. The security of the private key is related to the security of digital assets and the security of personal privacy, so it is very important to securely ensure every step of the life cycle of the private key.
Today we will talk about the security of using the Tkeycoin platform and the TKEYSPACE mobile blockchain wallet. Tkeycoin is a peer-to-peer payment system based on p2p principles and the concept of electronic cash. P2P technology is a fairer means of mutual settlements between users and companies around the world. Modern payment systems are imperfect and may depend on the will of high-ranking officials. We approached the market from an economic and scientific point of view, borrowing the best from Bitcoin, Ethereum, DASH, and other alternative currencies, mixing modern concepts and building on the global experience of IBM, Microsoft and a number of other companies and research. The Tkeycoin blockchain is protected by various mechanisms that include advanced cryptographic methods and mathematical models of behavior and decision-making. Blockchain technology prevents duplication or destruction of digital assets. https://i.redd.it/idy42g9rntx41.gif In addition to providing security and recording transactions in registers, cryptography also plays a role in ensuring the security of wallets used to store Tkeycoin. Paired public and private keys, which respectively allow users to receive and send payments, are created using asymmetric encryption or public-key cryptography. Public keys are used to generate digital signatures for transactions, which allows you to authenticate ownership of the coins being sent. https://i.redd.it/95yuky0tntx41.gif The asymmetric cryptography architecture does not allow anyone other than the owner of the private key to access funds stored in the cryptocurrency wallet, so these funds are kept safe until the owner decides to spend them. In simple words, in the Tkeycoin peer-to-peer system, only you are the real owner of your money and only You have access to it. Using tools such as a local Tkeycoin Core wallet or TkeySpace provides you with reliable storage, privacy, and security. TkeySpace, in turn, adds maximum usability by combining the highest level of security and easy intuitive design. https://i.redd.it/f0de51vuntx41.gif
How does TKEYSPACE provide security?
TKEYSPACE is one of the first applications that support blockchain in a mobile device and is also the first decentralized application of the TKEY platform. Its serverless architecture provides the highest level of security for storing all assets in the application. unlike centralized applications that are managed by companies, TkeySpace does not have a Central management authority and operates in accordance with all the principles of peer-to-peer networks. https://preview.redd.it/4bret8hwntx41.png?width=1253&format=png&auto=webp&s=535c5d879a36eac4ca8c807ee7af1b5fe05e12a9 As we said above, the wallets in the blockchain have a public and private key. Centralized applications usually store users ‘private keys on their servers, which makes users’ funds vulnerable to hacker attacks or theft. TkeySpace-stores the encrypted key only on the user’s device and in encrypted form. The encrypted key is displayed as a mnemonic phrase (backup phrase), which is very convenient for users. Unlike complex cryptographic ciphers, the phrase is easy to save or write. The backup phrase provides the maximum level of security and thanks to its usual appearance, an attacker is unlikely to ever guess what these words are and what they are for. A mnemonic phrase is 12 or 24 words that are generated using random number entropy. If the phrase consists of 12 words, then the number of possible combinations is 2048¹² or 211³² — the phrase will have 132 security bits. To restore the wallet, you must enter the mnemonic phrase in the strict order as it was presented after generation. And so that you do not get confused in the definitions and concepts, we will briefly describe simple and clear principles of how it all works. Let’s look briefly at the factors.
The simplest thing that protects your phone from unauthorized access is Pincode, a snake, a fingerprint or a Face Id login. And it would seem that this is related to TKEYSPACE? https://i.redd.it/sspjjsgyntx41.gif
At a minimum, it is almost impossible to open new mobile devices and pick up a pin code, even in the case of theft, most often the factory settings are reset, which leads to the deletion of all data on the phone, respectively-your funds are safe even for this reason.
Even if there was some “craftsman” and somehow managed to change the pin code on your device, the TKEYSPACE app will automatically delete all the keys and backup phrases, the wallet will simply be empty, and the attacker will be left with nothing.
As we can see, even a simple screen lock with a pin or fingerprint protects your data. It’s not as simple a screen lock as you and I might think. Every platform, whether it’s Android or AppStore, uses specialized key stores. Cryptography, symmetric and asymmetric encryption, keys, and certificates are directly related to this task. Keys and certificates that are used to protect information must also be securely protected. Android uses Keystore, a certificate and a Keystore, for this purpose. Keystore is a specialized secret data store that is used by Java applications to encrypt, authenticate, and establish HTTPS connections.
For two-way authentication, the client and server exchange certificates, respectively, and the server and client must have a Keystore with a private/public key pair and a certificate. In other words, the Keystore is used to store keys and certificates that are used to identify the key owner (client or server).
Starting with Android 8, the encryption systems have been upgraded, the system is checked for signs of hacking at startup, and the screen lock allows you to restrict access to the device. Data encryption and the use of keys ensure the security of information when it is stored and transmitted. https://i.redd.it/2c0b9re1otx41.gif In the new version of the OS — Android 9 (Pie) — the developers also added support for hardware to protect against unauthorized changes. Android apps run in an isolated software environment that restricts access to your information to other apps. OS components are also protected, which prevents attackers from exploiting system errors for their purposes. Android uses both hardware and software to protect users and their data. Therefore, even at the operating system level, there are a lot of security factors. Of course, if you “flash” the phone (change the factory firmware) and enable Root access, this will reduce the security of Your device, but this is more an exception than a rule and such changes are usually introduced by very experienced users. IOS uses Keychain — a specialized database for storing metadata and confidential information. Using a Keychain is the best practice for storing small pieces of data that are critical to your apps, such as secrets and passwords. In addition to the Keychain, Apple provides a full range of maximum protection for Your device. And so we will continue,
Passcode in the app
Now we understand that to get access to the tools, an attacker needs to hack the hardware security of the Google and Apple giants to somehow get access to the app, which is impossible. To increase security and eliminate other risk factors, we have included an access code (secret code) in the app. You set an additional level of security by enabling a pin code to log in to the app. The access code additionally encrypts all data stored in the app. Just so you understand — it’s not just numbers that you enter on the screen, this combination affects the ciphers inside the app. When creating a key, a user interface element is called. when the user swipes the screen, the application receives a random set of bytes — thus, all information is additionally covered by a new layer of cryptography. And as we said above, if you try to disable the pin code, the app will delete all the data, and the attacker will be left with nothing. As we have already realized, only 2 of these factors provide the maximum level of security for the TKEYSPACE application. And the most important thing is that the application runs on the blockchain, which guarantees its full Autonomous operation, data immutability, and privacy. Generation of new addresses, absence of accounts, phone numbers, e-mail and other personal data-provides you with a social level of security, which is a huge advantage in our time. In a world where security is based on the level of cryptography, attackers try to influence You with the human factor using social engineering, so when you use applications with accounts, phone numbers, you have more risks.
Social engineering is a method of obtaining the necessary access to information based on the characteristics of human psychology.
For example, a copy of a SIM-card has become a new tool for fraudsters, but there is no personal information in TKEYSPACE, so even such groups of fraudsters can’t get access to your funds.
You don’t have to worry about security — it’s already built into the TKEYSPACE system.
A mixed encryption system based on the principles of computational complexity, with the deterministic generation of signatures using elliptic curves, provides absolute security and safety of user funds, and reserve phrases will help you restore funds at any moment. A mnemonic phrase is 12 or 24 words that are generated using the entropy of random numbers. If the phrase consists of 12 words, then the number of possible combinations is 2048¹² or 211³² — the phrase will have 132 security bits. To restore the wallet, you must enter the mnemonic phrase in the strict order as it was presented after generation. Only you and no one else has access to the phrase. When you get the key, the app has restrictions on the screenshot, and the clipboard is disabled, which protects against malicious software. It is you, as a user, who sees the phrases, and everything in the device is encrypted, the blockchain architecture protects against hacker attacks, information forgery, and other hacks. For those who are a bit obsessed with persecution mania, we offer a small lifehack:
Buy several USB drives, connect them to a device that does not have access to the Internet, preferably on a clean operating system, create a text file, write backup phrases there, and encrypt the USB drives with passwords.
Dear Groestlers, it goes without saying that 2020 has been a difficult time for millions of people worldwide. The groestlcoin team would like to take this opportunity to wish everyone our best to everyone coping with the direct and indirect effects of COVID-19. Let it bring out the best in us all and show that collectively, we can conquer anything. The centralised banks and our national governments are facing unprecedented times with interest rates worldwide dropping to record lows in places. Rest assured that this can only strengthen the fundamentals of all decentralised cryptocurrencies and the vision that was seeded with Satoshi's Bitcoin whitepaper over 10 years ago. Despite everything that has been thrown at us this year, the show must go on and the team will still progress and advance to continue the momentum that we have developed over the past 6 years. In addition to this, we'd like to remind you all that this is Groestlcoin's 6th Birthday release! In terms of price there have been some crazy highs and lows over the years (with highs of around $2.60 and lows of $0.000077!), but in terms of value– Groestlcoin just keeps getting more valuable! In these uncertain times, one thing remains clear – Groestlcoin will keep going and keep innovating regardless. On with what has been worked on and completed over the past few months.
UPDATED - Groestlcoin Core 2.18.2
This is a major release of Groestlcoin Core with many protocol level improvements and code optimizations, featuring the technical equivalent of Bitcoin v0.18.2 but with Groestlcoin-specific patches. On a general level, most of what is new is a new 'Groestlcoin-wallet' tool which is now distributed alongside Groestlcoin Core's other executables. NOTE: The 'Account' API has been removed from this version which was typically used in some tip bots. Please ensure you check the release notes from 2.17.2 for details on replacing this functionality.
Builds are now done through Gitian
Calls to getblocktemplate will fail if the segwit rule is not specified. Calling getblocktemplate without segwit specified is almost certainly a misconfiguration since doing so results in lower rewards for the miner. Failed calls will produce an error message describing how to enable the segwit rule.
A warning is printed if an unrecognized section name is used in the configuration file. Recognized sections are [test], [main], and [regtest].
Four new options are available for configuring the maximum number of messages that ZMQ will queue in memory (the "high water mark") before dropping additional messages. The default value is 1,000, the same as was used for previous releases.
The rpcallowip option can no longer be used to automatically listen on all network interfaces. Instead, the rpcbind parameter must be used to specify the IP addresses to listen on. Listening for RPC commands over a public network connection is insecure and should be disabled, so a warning is now printed if a user selects such a configuration. If you need to expose RPC in order to use a tool like Docker, ensure you only bind RPC to your localhost, e.g. docker run [...] -p 127.0.0.1:1441:1441 (this is an extra :1441 over the normal Docker port specification).
The rpcpassword option now causes a startup error if the password set in the configuration file contains a hash character (#), as it's ambiguous whether the hash character is meant for the password or as a comment.
The whitelistforcerelay option is used to relay transactions from whitelisted peers even when not accepted to the mempool. This option now defaults to being off, so that changes in policy and disconnect/ban behavior will not cause a node that is whitelisting another to be dropped by peers.
A new short about the JSON-RPC interface describes cases where the results of anRPC might contain inconsistencies between data sourced from differentsubsystems, such as wallet state and mempool state.
A new document introduces Groestlcoin Core's BIP174 interface, which is used to allow multiple programs to collaboratively work to create, sign, and broadcast new transactions. This is useful for offline (cold storage) wallets, multisig wallets, coinjoin implementations, and many other cases where two or more programs need to interact to generate a complete transaction.
The output script descriptor (https://github.com/groestlcoin/groestlcoin/blob/mastedoc/descriptors.md) documentation has been updated with information about new features in this still-developing language for describing the output scripts that a wallet or other program wants to receive notifications for, such as which addresses it wants to know received payments. The language is currently used in multiple new and updated RPCs described in these release notes and is expected to be adapted to other RPCs and to the underlying wallet structure.
A new --disable-bip70 option may be passed to ./configure to prevent Groestlcoin-Qt from being built with support for the BIP70 payment protocol or from linking libssl. As the payment protocol has exposed Groestlcoin Core to libssl vulnerabilities in the past, builders who don't need BIP70 support are encouraged to use this option to reduce their exposure to future vulnerabilities.
The minimum required version of Qt (when building the GUI) has been increased from 5.2 to 5.5.1 (the depends system provides 5.9.7)
getnodeaddresses returns peer addresses known to this node. It may be used to find nodes to connect to without using a DNS seeder.
listwalletdir returns a list of wallets in the wallet directory (either the default wallet directory or the directory configured bythe -walletdir parameter).
getrpcinfo returns runtime details of the RPC server. Currently, it returns an array of the currently active commands and how long they've been running.
deriveaddresses returns one or more addresses corresponding to an output descriptor.
getdescriptorinfo accepts a descriptor and returns information aboutit, including its computed checksum.
joinpsbts merges multiple distinct PSBTs into a single PSBT. The multiple PSBTs must have different inputs. The resulting PSBT will contain every input and output from all the PSBTs. Any signatures provided in any of the PSBTs will be dropped.
analyzepsbt examines a PSBT and provides information about what the PSBT contains and the next steps that need to be taken in order to complete the transaction. For each input of a PSBT, analyze psbt provides information about what information is missing for that input, including whether a UTXO needs to be provided, what pubkeys still need to be provided, which scripts need to be provided, and what signatures are still needed. Every input will also list which role is needed to complete that input, and analyzepsbt will also list the next role in general needed to complete the PSBT. analyzepsbt will also provide the estimated fee rate and estimated virtual size of the completed transaction if it has enough information to do so.
utxoupdatepsbt searches the set of Unspent Transaction Outputs (UTXOs) to find the outputs being spent by the partial transaction. PSBTs need to have the UTXOs being spent to be provided because the signing algorithm requires information from the UTXO being spent. For segwit inputs, only the UTXO itself is necessary. For non-segwit outputs, the entire previous transaction is needed so that signers can be sure that they are signing the correct thing. Unfortunately, because the UTXO set only contains UTXOs and not full transactions, utxoupdatepsbt will only add the UTXO for segwit inputs.
getpeerinfo now returns an additional minfeefilter field set to the peer's BIP133 fee filter. You can use this to detect that you have peers that are willing to accept transactions below the default minimum relay fee.
The mempool RPCs, such as getrawmempool with verbose=true, now return an additional "bip125-replaceable" value indicating whether thetransaction (or its unconfirmed ancestors) opts-in to asking nodes and miners to replace it with a higher-feerate transaction spending any of the same inputs.
settxfee previously silently ignored attempts to set the fee below the allowed minimums. It now prints a warning. The special value of"0" may still be used to request the minimum value.
getaddressinfo now provides an ischange field indicating whether the wallet used the address in a change output.
importmulti has been updated to support P2WSH, P2WPKH, P2SH-P2WPKH, and P2SH-P2WSH. Requests for P2WSH and P2SH-P2WSH accept an additional witnessscript parameter.
importmulti now returns an additional warnings field for each request with an array of strings explaining when fields are being ignored or are inconsistent, if there are any.
getaddressinfo now returns an additional solvable Boolean field when Groestlcoin Core knows enough about the address's scriptPubKey, optional redeemScript, and optional witnessScript for the wallet to be able to generate an unsigned input spending funds sent to that address.
The getaddressinfo, listunspent, and scantxoutset RPCs now return an additional desc field that contains an output descriptor containing all key paths and signing information for the address (except for the private key). The desc field is only returned for getaddressinfo and listunspent when the address is solvable.
importprivkey will preserve previously-set labels for addresses or public keys corresponding to the private key being imported. For example, if you imported a watch-only address with the label "coldwallet" in earlier releases of Groestlcoin Core, subsequently importing the private key would default to resetting the address's label to the default empty-string label (""). In this release, the previous label of "cold wallet" will be retained. If you optionally specify any label besides the default when calling importprivkey, the new label will be applied to the address.
getmininginfo now omits currentblockweight and currentblocktx when a block was never assembled via RPC on this node.
The getrawtransaction RPC & REST endpoints no longer check the unspent UTXO set for a transaction. The remaining behaviors are as follows:
If a blockhash is provided, check the corresponding block.
If no blockhash is provided, check the mempool.
If no blockhash is provided but txindex is enabled, also check txindex.
unloadwallet is now synchronous, meaning it will not return until the wallet is fully unloaded.
importmulti now supports importing of addresses from descriptors. A desc parameter can be provided instead of the "scriptPubKey" in are quest, as well as an optional range for ranged descriptors to specify the start and end of the range to import. Descriptors with key origin information imported through importmulti will have their key origin information stored in the wallet for use with creating PSBTs.
listunspent has been modified so that it also returns witnessScript, the witness script in the case of a P2WSH orP2SH-P2WSH output.
createwallet now has an optional blank argument that can be used to create a blank wallet. Blank wallets do not have any keys or HDseed. They cannot be opened in software older than 2.18.2. Once a blank wallet has a HD seed set (by using sethdseed) or private keys, scripts, addresses, and other watch only things have been imported, the wallet is no longer blank and can be opened in 2.17.2. Encrypting a blank wallet will also set a HD seed for it.
signrawtransaction is removed after being deprecated and hidden behind a special configuration option in version 2.17.2.
The 'account' API is removed after being deprecated in v2.17.2 The 'label' API was introduced in v2.17.2 as a replacement for accounts. See the release notes from v2.17.2 for a full description of the changes from the 'account' API to the 'label' API.
addwitnessaddress is removed after being deprecated in version 2.16.0.
generate is deprecated and will be fully removed in a subsequent major version. This RPC is only used for testing, but its implementation reached across multiple subsystems (wallet and mining), so it is being deprecated to simplify the wallet-node interface. Projects that are using generate for testing purposes should transition to using the generatetoaddress RPC, which does not require or use the wallet component. Calling generatetoaddress with an address returned by the getnewaddress RPC gives the same functionality as the old generate RPC. To continue using generate in this version, restart groestlcoind with the -deprecatedrpc=generate configuration option.
Be reminded that parts of the validateaddress command have been deprecated and moved to getaddressinfo. The following deprecated fields have moved to getaddressinfo: ismine, iswatchonly,script, hex, pubkeys, sigsrequired, pubkey, embedded,iscompressed, label, timestamp, hdkeypath, hdmasterkeyid.
The addresses field has been removed from the validateaddressand getaddressinfo RPC methods. This field was confusing since it referred to public keys using their P2PKH address. Clients should use the embedded.address field for P2SH or P2WSH wrapped addresses, and pubkeys for inspecting multisig participants.
A new /rest/blockhashbyheight/ endpoint is added for fetching the hash of the block in the current best blockchain based on its height (how many blocks it is after the Genesis Block).
A new Window menu is added alongside the existing File, Settings, and Help menus. Several items from the other menus that opened new windows have been moved to this new Window menu.
In the Send tab, the checkbox for "pay only the required fee" has been removed. Instead, the user can simply decrease the value in the Custom Fee rate field all the way down to the node's configured minimumrelay fee.
In the Overview tab, the watch-only balance will be the only balance shown if the wallet was created using the createwallet RPC and thedisable_private_keys parameter was set to true.
The launch-on-startup option is no longer available on macOS if compiled with macosx min version greater than 10.11 (useCXXFLAGS="-mmacosx-version-min=10.11" CFLAGS="-mmacosx-version-min=10.11" for setting the deployment sdkversion)
A new groestlcoin-wallet tool is now distributed alongside Groestlcoin Core's other executables. Without needing to use any RPCs, this tool can currently create a new wallet file or display some basic information about an existing wallet, such as whether the wallet is encrypted, whether it uses an HD seed, how many transactions it contains, and how many address book entries it has.
Since version 2.16.0, Groestlcoin Core's built-in wallet has defaulted to generating P2SH-wrapped segwit addresses when users want to receive payments. These addresses are backwards compatible with all widely used software. Starting with Groestlcoin Core 2.20.1 (expected about a year after 2.18.2), Groestlcoin Core will default to native segwitaddresses (bech32) that provide additional fee savings and other benefits. Currently, many wallets and services already support sending to bech32 addresses, and if the Groestlcoin Core project sees enough additional adoption, it will instead default to bech32 receiving addresses in Groestlcoin Core 2.19.1. P2SH-wrapped segwit addresses will continue to be provided if the user requests them in the GUI or by RPC, and anyone who doesn't want the update will be able to configure their default address type. (Similarly, pioneering users who want to change their default now may set the addresstype=bech32 configuration option in any Groestlcoin Core release from 2.16.0 up.)
BIP 61 reject messages are now deprecated. Reject messages have no use case on the P2P network and are only logged for debugging by most network nodes. Furthermore, they increase bandwidth and can be harmful for privacy and security. It has been possible to disable BIP 61 messages since v2.17.2 with the -enablebip61=0 option. BIP 61 messages will be disabled by default in a future version, before being removed entirely.
The submitblock RPC previously returned the reason a rejected block was invalid the first time it processed that block but returned a generic "duplicate" rejection message on subsequent occasions it processed the same block. It now always returns the fundamental reason for rejecting an invalid block and only returns "duplicate" for valid blocks it has already accepted.
A new submitheader RPC allows submitting block headers independently from their block. This is likely only useful for testing.
The signrawtransactionwithkey and signrawtransactionwithwallet RPCs have been modified so that they also optionally accept a witnessScript, the witness script in the case of a P2WSH orP2SH-P2WSH output. This is compatible with the change to listunspent.
For the walletprocesspsbt and walletcreatefundedpsbt RPCs, if thebip32derivs parameter is set to true but the key metadata for a public key has not been updated yet, then that key will have a derivation path as if it were just an independent key (i.e. no derivation path and its master fingerprint is itself).
The -usehd configuration option was removed in version 2.16.0 From that version onwards, all new wallets created are hierarchical deterministic wallets. This release makes specifying -usehd an invalid configuration option.
This release allows peers that your node automatically disconnected for misbehaviour (e.g. sending invalid data) to reconnect to your node if you have unused incoming connection slots. If your slots fill up, a misbehaving node will be disconnected to make room for nodes without a history of problems (unless the misbehaving node helps your node in some other way, such as by connecting to a part of the Internet from which you don't have many other peers). Previously, Groestlcoin Core banned the IP addresses of misbehaving peers for a period (default of 1 day); this was easily circumvented by attackers with multiple IP addresses. If you manually ban a peer, such as by using the setban RPC, all connections from that peer will still be rejected.
The key metadata will need to be upgraded the first time that the HDseed is available. For unencrypted wallets this will occur on wallet loading. For encrypted wallets this will occur the first time the wallet is unlocked.
Newly encrypted wallets will no longer require restarting the software. Instead such wallets will be completely unloaded and reloaded to achieve the same effect.
A sub-project of Bitcoin Core now provides Hardware Wallet Interaction (HWI) scripts that allow command-line users to use several popular hardware key management devices with Groestlcoin Core. See their project page for details.
This release changes the Random Number Generator (RNG) used from OpenSSL to Groestlcoin Core's own implementation, although entropy gathered by Groestlcoin Core is fed out to OpenSSL and then read back in when the program needs strong randomness. This moves Groestlcoin Core a little closer to no longer needing to depend on OpenSSL, a dependency that has caused security issues in the past. The new implementation gathers entropy from multiple sources, including from hardware supporting the rdseed CPU instruction.
On macOS, Groestlcoin Core now opts out of application CPU throttling ("app nap") during initial blockchain download, when catching up from over 100 blocks behind the current chain tip, or when reindexing chain data. This helps prevent these operations from taking an excessively long time because the operating system is attempting to conserve power.
How to Upgrade?
Windows If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes for older versions), then run the installer. OSX If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes for older versions), run the dmg and drag Groestlcoin Core to Applications. Ubuntu http://groestlcoin.org/forum/index.php?topic=441.0
ALL NEW - Groestlcoin Moonshine iOS/Android Wallet
Built with React Native, Moonshine utilizes Electrum-GRS's JSON-RPC methods to interact with the Groestlcoin network. GRS Moonshine's intended use is as a hot wallet. Meaning, your keys are only as safe as the device you install this wallet on. As with any hot wallet, please ensure that you keep only a small, responsible amount of Groestlcoin on it at any given time.
Groestlcoin Mainnet & Testnet supported
Multiple wallet support
Electrum - Support for both random and custom peers
Biometric + Pin authentication
Custom fee selection
Import mnemonic phrases via manual entry or scanning
BIP39 Passphrase functionality
Support for Segwit-compatible & legacy addresses in settings
Support individual private key sweeping
UTXO blacklisting - Accessible via the Transaction Detail view, this allows users to blacklist any utxo that they do not wish to include in their list of available utxo's when sending transactions. Blacklisting a utxo excludes its amount from the wallet's total balance.
Ability to Sign & Verify Messages
Support BitID for password-free authentication
Coin Control - This can be accessed from the Send Transaction view and basically allows users to select from a list of available UTXO's to include in their transaction.
HODL GRS connects directly to the Groestlcoin network using SPV mode and doesn't rely on servers that can be hacked or disabled. HODL GRS utilizes AES hardware encryption, app sandboxing, and the latest security features to protect users from malware, browser security holes, and even physical theft. Private keys are stored only in the secure enclave of the user's phone, inaccessible to anyone other than the user. Simplicity and ease-of-use is the core design principle of HODL GRS. A simple recovery phrase (which we call a Backup Recovery Key) is all that is needed to restore the user's wallet if they ever lose or replace their device. HODL GRS is deterministic, which means the user's balance and transaction history can be recovered just from the backup recovery key.
Simplified payment verification for fast mobile performance
Groestlcoin Seed Savior is a tool for recovering BIP39 seed phrases. This tool is meant to help users with recovering a slightly incorrect Groestlcoin mnemonic phrase (AKA backup or seed). You can enter an existing BIP39 mnemonic and get derived addresses in various formats. To find out if one of the suggested addresses is the right one, you can click on the suggested address to check the address' transaction history on a block explorer.
If a word is wrong, the tool will try to suggest the closest option.
If a word is missing or unknown, please type "?" instead and the tool will find all relevant options.
NOTE: NVidia GPU or any CPU only. AMD graphics cards will not work with this address generator. VanitySearch is a command-line Segwit-capable vanity Groestlcoin address generator. Add unique flair when you tell people to send Groestlcoin. Alternatively, VanitySearch can be used to generate random addresses offline. If you're tired of the random, cryptic addresses generated by regular groestlcoin clients, then VanitySearch is the right choice for you to create a more personalized address. VanitySearch is a groestlcoin address prefix finder. If you want to generate safe private keys, use the -s option to enter your passphrase which will be used for generating a base key as for BIP38 standard (VanitySearch.exe -s "My PassPhrase" FXPref). You can also use VanitySearch.exe -ps "My PassPhrase" which will add a crypto secure seed to your passphrase. VanitySearch may not compute a good grid size for your GPU, so try different values using -g option in order to get the best performances. If you want to use GPUs and CPUs together, you may have best performances by keeping one CPU core for handling GPU(s)/CPU exchanges (use -t option to set the number of CPU threads).
Fixed size arithmetic
Fast Modular Inversion (Delayed Right Shift 62 bits)
SecpK1 Fast modular multiplication (2 steps folding 512bits to 256bits using 64 bits digits)
Use some properties of elliptic curve to generate more keys
SSE Secure Hash Algorithm SHA256 and RIPEMD160 (CPU)
Groestlcoin EasyVanity 2020 is a windows app built from the ground-up and makes it easier than ever before to create your very own bespoke bech32 address(es) when whilst not connected to the internet. If you're tired of the random, cryptic bech32 addresses generated by regular Groestlcoin clients, then Groestlcoin EasyVanity2020 is the right choice for you to create a more personalised bech32 address. This 2020 version uses the new VanitySearch to generate not only legacy addresses (F prefix) but also Bech32 addresses (grs1 prefix).
Ability to continue finding keys after first one is found
Includes warning on start-up if connected to the internet
Ability to output keys to a text file (And shows button to open that directory)
Show and hide the private key with a simple toggle switch
Show full output of commands
Ability to choose between Processor (CPU) and Graphics Card (GPU) ( NVidia ONLY! )
Features both a Light and Dark Material Design-Style Themes
Free software - MIT. Anyone can audit the code.
Written in C# - The code is short, and easy to review.
Groestlcoin WPF is an alternative full node client with optional lightweight 'thin-client' mode based on WPF. Windows Presentation Foundation (WPF) is one of Microsoft's latest approaches to a GUI framework, used with the .NET framework. Its main advantages over the original Groestlcoin client include support for exporting blockchain.dat and including a lite wallet mode. This wallet was previously deprecated but has been brought back to life with modern standards.
Works via TOR or SOCKS5 proxy
Can use bootstrap.dat format as blockchain database
Import/Export blockchain to/from bootstrap.dat
Import wallet.dat from Groestlcoin-qt wallet
Export wallet to wallet.dat
Use both groestlcoin-wpf and groestlcoin-qt with the same addresses in parallel. When you send money from one program, the transaction will automatically be visible on the other wallet.
Rescan blockchain with a simple mouse click
Works as a full node and listens to port 1331 (listening port can be changed)
Fast Block verifying, parallel processing on multi-core CPUs
Mine Groestlcoins with your CPU by a simple mouse click
All private keys are kept encrypted on your local machine (or on a USB stick)
Lite - Has a lightweight "thin client" mode which does not require a new user to download the entire Groestlcoin chain and store it
Free and decentralised - Open Source under GNU license
Fixed Import/Export to wallet.dat
Rescan wallet option
Change wallet password option
Address type and Change type options through *.conf file
Import from bootstrap.dat - It is a flat, binary file containing Groestlcoin blockchain data, from the genesis block through a recent height. All versions automatically validate and import the file "grs.bootstrap.dat" in the GRS directory. Grs.bootstrap.dat is compatible with Qt wallet. GroestlCoin-Qt can load from it.
In Full mode file %APPDATA%\Groestlcoin-WPF\GRS\GRS.bootstrap.dat is full blockchain in standard bootstrap.dat format and can be used with other clients.
Groestlcoin Electrum Personal Server aims to make using Electrum Groestlcoin wallet more secure and more private. It makes it easy to connect your Electrum-GRS wallet to your own full node. It is an implementation of the Electrum-grs server protocol which fulfils the specific need of using the Electrum-grs wallet backed by a full node, but without the heavyweight server backend, for a single user. It allows the user to benefit from all Groestlcoin Core's resource-saving features like pruning, blocks only and disabled txindex. All Electrum-GRS's feature-richness like hardware wallet integration, multi-signature wallets, offline signing, seed recovery phrases, coin control and so on can still be used, but connected only to the user's own full node. Full node wallets are important in Groestlcoin because they are a big part of what makes the system be trust-less. No longer do people have to trust a financial institution like a bank or PayPal, they can run software on their own computers. If Groestlcoin is digital gold, then a full node wallet is your own personal goldsmith who checks for you that received payments are genuine. Full node wallets are also important for privacy. Using Electrum-GRS under default configuration requires it to send (hashes of) all your Groestlcoin addresses to some server. That server can then easily spy on your transactions. Full node wallets like Groestlcoin Electrum Personal Server would download the entire blockchain and scan it for the user's own addresses, and therefore don't reveal to anyone else which Groestlcoin addresses they are interested in. Groestlcoin Electrum Personal Server can also broadcast transactions through Tor which improves privacy by resisting traffic analysis for broadcasted transactions which can link the IP address of the user to the transaction. If enabled this would happen transparently whenever the user simply clicks "Send" on a transaction in Electrum-grs wallet. Note: Currently Groestlcoin Electrum Personal Server can only accept one connection at a time.
Use your own node
Uses less CPU and RAM than ElectrumX
Used intermittently rather than needing to be always-on
Doesn't require an index of every Groestlcoin address ever used like on ElectrumX
UPDATED – Android Wallet 7.38.1 - Main Net + Test Net
The app allows you to send and receive Groestlcoin on your device using QR codes and URI links. When using this app, please back up your wallet and email them to yourself! This will save your wallet in a password protected file. Then your coins can be retrieved even if you lose your phone.
Add confidence messages, helping users to understand the confidence state of their payments.
Handle edge case when restoring via an external app.
Count devices with a memory class of 128 MB as low ram.
Introduce dark mode on Android 10 devices.
Reduce memory usage of PIN-protected wallets.
Tapping on the app's version will reveal a checksum of the APK that was installed.
Fix issue with confirmation of transactions that empty your wallet.
Groestlcoin Sentinel is a great solution for anyone who wants the convenience and utility of a hot wallet for receiving payments directly into their cold storage (or hardware wallets). Sentinel accepts XPUB's, YPUB'S, ZPUB's and individual Groestlcoin address. Once added you will be able to view balances, view transactions, and (in the case of XPUB's, YPUB's and ZPUB's) deterministically generate addresses for that wallet. Groestlcoin Sentinel is a fork of Groestlcoin Samourai Wallet with all spending and transaction building code removed.
Threshold Signature Explained— Bringing Exciting Applications with TSS
— A deep dive into threshold signature without mathematics by ARPA’s cryptographer Dr. Alex Su https://preview.redd.it/cp0wib2mk0q41.png?width=757&format=png&auto=webp&s=d42056f42fb16041bc512f10f10fed56a16dc279 Threshold signature is a distributed multi-party signature protocol that includes distributed key generation, signature, and verification algorithms. In recent years, with the rapid development of blockchain technology, signature algorithms have gained widespread attention in both academic research and real-world applications. Its properties like security, practicability, scalability, and decentralization of signature are pored through. Due to the fact that blockchain and signature are closely connected, the development of signature algorithms and the introduction of new signature paradigms will directly affect the characteristics and efficiency of blockchain networks. In addition, institutional and personal account key management requirements stimulated by distributed ledgers have also spawned many wallet applications, and this change has also affected traditional enterprises. No matter in the blockchain or traditional financial institutions, the threshold signature scheme can bring security and privacy improvement in various scenarios. As an emerging technology, threshold signatures are still under academic research and discussions, among which there are unverified security risks and practical problems. This article will start from the technical rationale and discuss about cryptography and blockchain. Then we will compare multi-party computation and threshold signature before discussing the pros and cons of different paradigms of signature. In the end, there will be a list of use cases of threshold signature. So that, the reader may quickly learn about the threshold signature. I. Cryptography in Daily Life Before introducing threshold signatures, let’s get a general understanding of cryptography. How does cryptography protect digital information? How to create an identity in the digital world? At the very beginning, people want secure storage and transmission. After one creates a key, he can use symmetric encryption to store secrets. If two people have the same key, they can achieve secure transmission between them. Like, the king encrypts a command and the general decrypts it with the corresponding key. But when two people do not have a safe channel to use, how can they create a shared key? So, the key exchange protocol came into being. Analogously, if the king issues an order to all the people in the digital world, how can everyone proves that the sentence originated from the king? As such, the digital signature protocol was invented. Both protocols are based on public key cryptography, or asymmetric cryptographic algorithms. “Tiger Rune” is a troop deployment tool used by ancient emperor’s, made of bronze or gold tokens in the shape of a tiger, split in half, half of which is given to the general and the other half is saved by the emperor. Only when two tiger amulets are combined and used at the same time, will the amulet holder get the right to dispatch troops. Symmetric and asymmetric encryption constitute the main components of modern cryptography. They both have three fixed parts: key generation, encryption, and decryption. Here, we focus on digital signature protocols. The key generation process generates a pair of associated keys: the public key and the private key. The public key is open to everyone, and the private key represents the identity and is only revealed to the owner. Whoever owns the private key has the identity represented by the key. The encryption algorithm, or signature algorithm, takes the private key as input and generate a signature on a piece of information. The decryption algorithm, or signature verification algorithm, uses public keys to verify the validity of the signature and the correctness of the information. II. Signature in the Blockchain Looking back on blockchain, it uses consensus algorithm to construct distributed books, and signature provides identity information for blockchain. All the transaction information on the blockchain is identified by the signature of the transaction initiator. The blockchain can verify the signature according to specific rules to check the transaction validity, all thanks to the immutability and verifiability of the signature. For cryptography, the blockchain is more than using signature protocol, or that the consensus algorithm based on Proof-of-Work uses a hash function. Blockchain builds an infrastructure layer of consensus and transaction through. On top of that, the novel cryptographic protocols such as secure multi-party computation, zero-knowledge proof, homomorphic encryption thrives. For example, secure multi-party computation, which is naturally adapted to distributed networks, can build secure data transfer and machine learning platforms on the blockchain. The special nature of zero-knowledge proof provides feasibility for verifiable anonymous transactions. The combination of these cutting-edge cryptographic protocols and blockchain technology will drive the development of the digital world in the next decade, leading to secure data sharing, privacy protection, or more applications now unimaginable. III. Secure Multi-party Computation and Threshold Signature After introducing how digital signature protocol affects our lives, and how to help the blockchain build identities and record transactions, we will mention secure multi-party computation (MPC), from where we can see how threshold signatures achieve decentralization. For more about MPC, please refer to our previous posts which detailed the technical background and application scenarios. MPC, by definition, is a secure computation that several participants jointly execute. Security here means that, in one computation, all participants provide their own private input, and can obtain results from the calculation. It is not possible to get any private information entered by other parties. In 1982, when Prof. Yao proposed the concept of MPC, he gave an example called the “Millionaires Problem” — two millionaires who want to know who is richer than the other without telling the true amount of assets. Specifically, the secure multiparty computation would care about the following properties:
Privacy: Any participant cannot obtain any private input of other participants, except for information that can be inferred from the computation results.
Correctness and verifiability: The computation should ensure correct execution, and the legitimacy and correctness of this process should be verifiable by participants or third parties.
Fairness or robustness: All parties involved in the calculation, if not agreed in advance, should be able to obtain the computation results at the same time or cannot obtain the results.
Supposing we use secure multi-party computation to make a digital signature in a general sense, we will proceed as follows:
Key generation phase: all future participants will be involved together to do two things: 1) each involved party generates a secret private key; 2) The public key is calculated according to the sequence of private keys.
Signature phase: Participants joining in a certain signature use their own private keys as private inputs, and the information to be signed as a public input to perform a joint signature operation to obtain a signature. In this process, the privacy of secure multi-party computing ensures the security of private keys. The correctness and robustness guarantee the unforgeability of the signature and everyone can all get signatures.
Verification phase: Use the public key corresponding to the transaction to verify the signature as traditional algorithm. There is no “secret input” during the verification, this means that the verification can be performed without multi-party computation, which will become an advantage of multi-party computation type distributed signature.
The signature protocol constructed on the idea of secure multiparty computing is the threshold signature. It should be noted that we have omitted some details, because secure multiparty computing is actually a collective name for a type of cryptographic protocol. For different security assumptions and threshold settings, there are different construction methods. Therefore, the threshold signatures of different settings will also have distinctive properties, this article will not explain each setting, but the comparative result with other signature schemes will be introduced in the next section. IV. Single Signature, Multi-Signature and Threshold Signature Besides the threshold signature, what other methods can we choose? Bitcoin at the beginning, uses single signature which allocates each account with one private key. The message signed by this key is considered legitimate. Later, in order to avoid single point of failure, or introduce account management by multiple people, Bitcoin provides a multi-signature function. Multi-signature can be simply understood as each account owner signs successively and post all signatures to the chain. Then signatures are verified in order on the chain. When certain conditions are met, the transaction is legitimate. This method achieves a multiple private keys control purpose. So, what’s the difference between multi-signature and threshold signature? Several constraints of multi-signature are:
The access structure is not flexible. If an account’s access structure is given, that is, which private keys can complete a legal signature, this structure cannot be adjusted at a later stage. For example, a participant withdraws, or a new involved party needs to change the access structure. If you must change, you need to complete the initial setup process again, which will change the public key and account address as well.
Less efficiency. The first is that the verification on chain consumes power of all nodes, and therefore requires a processing fee. The verification of multiple signatures is equivalent to multiple single signatures. The second is performance. The verification obviously takes more time.
Requirements of smart contract support and algorithm adaptation that varies from chain to chain. Because multi-sig is not naturally supported. Due to the possible vulnerabilities in smart contracts, this support is considered risky.
No anonymity, this is not able to be trivially called disadvantage or advantage, because anonymity is required for specific conditions. Anonymity here means that multi-signature directly exposes all participating signers of the transaction.
Correspondingly, the threshold signature has the following features:
The access structure is flexible. Through an additional multi-party computation, the existing private key sequence can be expanded to assign private keys to new participants. This process will not expose the old and newly generated private key, nor will it change the public key and account address.
It provides more efficiency. For the chain, the signature generated by the threshold signature is not different from a single signature, which means the following improvements : a) The verification is the same as the single signature, and needs no additional fee; b ) the information of the signer is invisible, because for other nodes, the information is decrypted with the same public key; c) No smart contract on chain is needed to provide additional support.
In addition to the above discussion, there is a distributed signature scheme supported by Shamir secret sharing. Secret sharing algorithm has a long history which is used to slice information storage and perform error correction information. From the underlying algorithm of secure computation to the error correction of the disc. This technology has always played an important role, but the main problem is that when used in a signature protocol, Shamir secret sharing needs to recover the master private key. As for multiple signatures or threshold signature, the master private key has never been reconstructed, even if it is in memory or cache. this short-term reconstruction is not tolerable for vital accounts. V. Limitations Just like other secure multi-party computation protocols, the introduction of other participants makes security model different with traditional point-to-point encrypted transmission. The problem of conspiracy and malicious participants were not taken into account in algorithms before. The behavior of physical entities cannot be restricted, and perpetrators are introduced into participating groups. Therefore, multi-party cryptographic protocols cannot obtain the security strength as before. Effort is needed to develop threshold signature applications, integrate existing infrastructure, and test the true strength of threshold signature scheme. VI. Scenarios 1. Key Management The use of threshold signature in key management system can achieve a more flexible administration, such as ARPA’s enterprise key management API. One can use the access structure to design authorization pattern for users with different priorities. In addition, for the entry of new entities, the threshold signature can quickly refresh the key. This operation can also be performed periodically to level up the difficulty of hacking multiple private keys at the same time. Finally, for the verifier, the threshold signature is not different from the traditional signature, so it is compatible with old equipments and reduces the update cost. ARPA enterprise key management modules already support Elliptic Curve Digital Signature Scheme secp256k1 and ed25519 parameters. In the future, it will be compatible with more parameters. https://preview.redd.it/c27zuuhdl0q41.png?width=757&format=png&auto=webp&s=26d46e871dadbbd4e3bea74d840e0198dec8eb1c 2. Crypto Wallet Wallets based on threshold signature are more secure because the private key doesn’t need to be rebuilt. Also, without all signatures posted publicly, anonymity can be achieved. Compared to the multi-signature, threshold signature needs less transaction fees. Similar to key management applications, the administration of digital asset accounts can also be more flexible. Furthermore, threshold signature wallet can support various blockchains that do not natively support multi-signature, which reduces the risk of smart contracts bugs.
This article describes why people need the threshold signature, and what inspiring properties it may bring. One can see that threshold signature has higher security, more flexible control, more efficient verification process. In fact, different signature technologies have different application scenarios, such as aggregate signatures not mentioned in the article, and BLS-based multi-signature. At the same time, readers are also welcomed to read more about secure multi-party computation. Secure computation is the holy grail of cryptographic protocols. It can accomplish much more than the application of threshold signatures. In the near future, secure computation will solve more specific application questions in the digital world.
Dr. Alex Su works for ARPA as the cryptography researcher. He got his Bachelor’s degree in Electronic Engineering and Ph.D. in Cryptography from Tsinghua University. Dr. Su’s research interests include multi-party computation and post-quantum cryptography implementation and acceleration.
Interest in a Bitcoin Wallet based on Multi Party Computation?
I'm Ari, a dev from a cybersecurity platform, and we are toying with the idea of creating a bitcoin wallet. Our distributed storage platform built with threshold cryptography (bunkr) is able to issue digital signatures without ever recomposing a signing key. Instead, the key remains distributed among a number of shareholding parties and signatures are computed with secure multi party computation. We have a very beta command line bitcoin wallet as a proof of concept. Our command line prototype currently isn't too different from standard desktop wallets, but the threshold signatures happening under the hood means we could potentially take this in some interesting directions. Some possibilities: 1. Extending the multi-signature possibilities of a bitcoin wallet (arbitrary size t-of-n wallets, plus its privacy preserving to signers since one key is split rather than there being multiple keys). 2. Contracts that control the circumstances under which different parties are authorized to query signatures from a bitcoin wallet (which is distributedly stored). 3. Supporting more cryptocurrencies, elliptic curves, and BIP standards. What is still to be desired in wallet solutions (if anything) for different facets of the bitcoin community? What directions seem potentially valuable for exploring how threshold cryptography and SMPC can support cryptocurrency custody issues? Interest in demo-ing our wallet?
It can be very time consuming to keep up to date on a single blockchain. If you just heard about NEO a few weeks ago it would be impossible catch up on past occurrences. I’m going to try and simplify the past, present and future as much as I can into one well thought-out post.
I felt it was time for an update since so much has happened. If you want the up to date version in between Vol updates visit NEO and its located on the #3 top post of all time. [Note: This Post is at max characters (40,000), some information will be left out]
Ontology $ONT (Partnership with NEO) Ontology Network (ONT) is a blockchain/distributed ledger network which combines distributed identity verification, data exchange, data collaboration, procedure protocols, communities, attestation, and various industry-specific modules. Together this builds the infrastructure for a peer-to-peer trust network which is cross-chain, cross-system, cross-industry, cross-application, and cross-device.
The Key $TKY (Upcoming ICO ) (strategic cooperation with NEO) THEKEY is a Decentralized Ecosystem of Identity Verification Tool Using National Big-data and Blockchain. THEKEY team is now developing second generation on-line identify verification technology. NEO Smart Economy = Digital Asset + Smart Contract + Digital Identity, while digital identity is an indispensable element. With NEO technical support, the strategic corporation between THEKEY and NEO will provide better protection to your digital asset. https://www.thekey.vip/ https://www.reddit.com/NEO/comments/7areac/ama_on_9th_nov_thekey_a_decentralized_ecosystem/
High Performance Blockchain $HPB (ICO Completed) HPB is a new blockchain architecture, positioned as an easy-to-use, highperformance blockchain platform. It aims to extend the performance of distributed applications to meet real world business needs. This is achieved by creating an architecture similar to an API operating system. The software architecture provides accounts, identity and authorization management, policy management, databases, and asynchronous communication on thousands of CPUs, FPGAs or clustered program schedulers. This blockchain is a new architecture that can support millions of transactions per second and support authorizations within seconds. http://www.gxn.io/en.html http://www.gxn.io/files/hpb_white_paper_en.pdf https://www.allcoin.com/markets/HPB-BTC/0/
City of Zion (CoZ) is an independent group of open source developers, designers and translators formed to support the NEO BlockChain core and ecosystem. CoZ primarily operates through the community Slack and CoZ Github, central places where the community shares knowledge and contributes to projects. CoZ is neither a corporation, nor a consulting firm or a devshop / for-hire group. Members https://imgur.com/a/Gc9jT CoZ aims to be low barrier of entry, the process is straightforward:
Join the channel #develop.
Fork or create a project.
Publish as open source.
After a couple of contributions a CoZ council member will invite you to the proper channel for your contributions.
Receive rewards and back to 3.
Unit testing - Ongoing effort to implement code coverage for the core Integration testing - Tools for automated testing, performance metrics and functionality validation on private test nets Continuous integration - Automated multi-platform testing of all pull requests at GitHub. Deployment pipeline - Automated tools and processes to ensure fast and reliable updates upon code changes New C# implementation (NEO2) - Improve code quality, speed & testability
The competition will open on November 20, 2017 and close at 11:59 PM Beijing time (GMT+8), March 10, 2018. Please sign up and submit your work before the deadline.
Participants are required to develop on the NEO blockchain. Please refer to github.com/neo-project and docs.neo.org for relevant codes and technical documents.
During the competition, developers are free to collaborate and to submit their work as a team.
Teams or individuals who fail to submit their work before 11:59 PM Beijing time (GMT+8), March 10, 2018 will not be eligible for prizes.
Your submission must contain executable programs and codes.
$150,000 First prize(1 team) $50,000 Second prize(2 teams) $30,000 Third prize(3 teams) $15,000 Award of merit(10 teams)
A judging panel made up of NEO founder Da Hongfei,NEO Founder & Core Developer Erik Zhang, CoZ founder Fabio, Elastos founder Chen Rong,ONT Founder Li Jun and experts from Microsoft China will select 16 winners out of all the contestants for a bounty pool worth a total of USD 490,000.
Total sign-ups :194 Data collected as of 2017/11/28
Digital Assets Digital assets are programmable assets that exist in the form of electronic data. With blockchain technology, the digitization of assets can be decentralized, trustful, traceable, highly transparent, and free of intermediaries.
Digital Identity Digital identity refers to the identity information of individuals, organizations, and other entities that exist in electronic form. Our verification of identity when issuing or using digital identities includes the use of facial features, fingerprint, voice, SMS and other multi-factor authentication methods.
Smart Contracts The NeoContract smart contract system is the biggest feature of the seamless integration of the existing developer ecosystem. Developers do not need to learn a new programming language but use C#, Java and other mainstream programming languages in their familiar IDE environments (Visual Studio, Eclipse, etc.) for smart contract development, debugging and compilation. NEO's Universal Lightweight Virtual Machine, NeoVM, has the advantages of high certainty, high concurrency, and high scalability. The NeoContract smart contract system will allow millions of developers around the world to quickly carry out the development of smart contracts.
Economic Model NEO has two native tokens, NEOand NeoGas NEO represents the right to manage the network. Management rights include voting for bookkeeping, NEO network parameter changes, and so on. The minimum unit of NEO is 1 and tokens cannot be subdivided. GAS is the fuel token for the realization of NEO network resource control. The NEO network charges for the operation and storage of tokens and smart contracts, thereby creating economic incentives for bookkeepers and preventing the abuse of resources. The minimum unit of GAS is 0.00000001.
Distribution Mechanism NEO's 100 million tokens are divided into two portions. The first portion is 50 million tokens distributed proportionally to supporters of NEO during the crowdfunding. This portion has been distributed. The second portion is 50 million NEO managed by the NEO Council to support NEO's long-term development, operation and maintenance and ecosystem. The NEO in this portion has a lockout period of 1 year and is unlocked only after October 16, 2017. This portion will NOT enter the exchanges and is only for long-term support of NEO projects. The plans for it are as below: ▪ 10 million tokens (10% total) will be used to motivate NEO developers and members of the NEO Council ▪ 10 million tokens (10% total) will be used to motivate developers in the NEO ecosystem ▪ 15 million tokens (15% total) will be used to cross-invest in other block-chain projects, which are owned by the NEO Council and are used only for NEO projects ▪ 15 million (15% total) will be retained as contingency ▪ The annual use of NEO in principle shall NOT exceed 15 million tokens
GAS distribution GAS is generated with each new block. The initial total amount of GAS is zero. With the increasing rate of new block generation, the total limit of 100 million GAS will be achieved in about 22 years. The interval between each block is about 15-20 seconds, and 2 million blocks are generated in about one year. According to this release curve, 16% of the GAS will be created in the first year, 52% of the GAS will be created in the first four years, and 80% of the GAS will be created in the first 12 years. GAS will be distributed proportionally in accordance with the NEO holding ratio, recorded in the corresponding addresses. NEO holders can initiate a claim transaction at any time and claim these GAS tokens at their holding addresses.
Consensus mechanism: dBFT The dBFT is called the Delegated Byzantine Fault Tolerant, a Byzantine fault-tolerant consensus mechanism that enables large-scale participation in consensus through proxy voting. The holder of the NEO token can, by voting, pick the bookkeeper it supports. The selected group of bookkeepers, through BFT algorithm, reach a consensus and generate new blocks. Voting in the NEO network continues in real time, rather than in accordance with a fixed term.
Cross-chain assets exchange agreement NeoX has been extended on existing double-stranded atomic assets exchange protocols to allow multiple participants to exchange assets across different chains and to ensure that all steps in the entire transaction process succeed or fail together. In order to achieve this function, we need to use NeoContract function to create a contract account for each participant. If other blockchains are not compatible with NeoContract, they can be compatible with NeoX as long as they can provide simple smart contract functionality.
Cross-chain distributed transaction protocol Cross-chain distributed transactions mean that multiple steps of a transaction are scattered across different blockchains and that the consistency of the entire transaction is ensured. This is an extension of cross-chain assets exchange, extending the behavior of assets exchange into arbitrary behavior. In layman's terms, NeoX makes it possible for cross-chain smart contracts where a smart contract can perform different parts on multiple chains, either succeeding or reverting as a whole. This gives excellent possibilities for cross-chain collaborations and we are exploring cross-chain smart contract application scenarios.
Distributed Storage Protocol: NeoFS NeoFS is a distributed storage protocol that utilizes Distributed Hash Table technology. NeoFS indexes the data through file content (Hash) rather than file path (URI). Large files will be divided into fixed-size data blocks that are distributed and stored in many different nodes
Anti-quantum cryptography mechanism: NeoQS The emergence of quantum computers poses a major challenge to RSA and ECC-based cryptographic mechanisms. Quantum computers can solve the large number of decomposition problems (which RSA relies on) and the elliptic curve discrete logarithm (which ECC relies on) in a very short time. NeoQS (Quantum Safe) is a lattice-based cryptographic mechanism.
Reasons for choosing dBFT over PoW and PoS
With the phenomenal success of Bitcoin and its increasing mainstream adoption, the project’s unbounded appetite for energy grew accordingly. Today, the average Bitcoin transaction costs as much energy as powering 9.3 average American homes for 1 day. https://digiconomist.net/bitcoin-energy-consumption#assumptions This mind boggling amount of energy is not, as it is commonly believed, being wasted. It is put to good use: securing the Bitcoin network and rendering attacks on it infeasible. However, the cost of this security mechanism and its implications for an increasingly warming and resource hungry planet led almost the entire crypto industry to the understanding that an alternative has to be found, at least if we’re interested in seeing blockchain technology gaining overwhelming mainstream adoption. The most popular alternative to PoW, used by most alternative cryptocurrency systems, is called Proof-of-Stake, or PoS. PoS is highly promising in the sense that it doesn’t require blockchain nodes to perform arduous, and otherwise useless, cryptographic tasks in order to render potential attacks costly and infeasible. Hence, this algorithm cuts the power requirements of PoS blockchains down to sane and manageable amounts, allowing them to be more scalable without guzzling up the planet's energy reserves. As the name suggests, instead of requiring proof of cryptographic work, PoS requires blockchain nodes to proof stake in the currency itself. This means that in order for a blockchain node to be eligible for a verification reward, the node has to hold a certain amount of currency in the wallet associated with it. This way, in order to execute an attack, a malevolent node would have to acquire the majority of the existing coin supply, rendering attacks not only costly but also meaningless, since the attackers would primarily harm themselves. PoS, as well as PoW, simply cause the blockchain to fork into two alternative versions if for some reason consensus breaks. In fact, most blockchains fork most of the time, only to converge back to a single source of truth a short while afterwards. By many crypto enthusiasts, this obvious bug is very often regarded as a feature, allowing several versions of the truth to survive and compete for public adoption until a resolution is generated. This sounds nice in theory, but if we want to see blockchain technology seriously disrupt and/or augment the financial sector, this ever lurking possibility of the blockchain splitting into two alternative versions cannot be tolerated. Furthermore, even the fastest PoS blockchains out there can accomodate a few hundred transactions per second, compare that to Visa’s 56,000 tx/s and the need for an alternative becomes clear as day. A blockchain securing global stock markets does not have the privilege to fork into two alternative versions and just sit and wait it out until the market (or what’s left of it) declares a winner. What belongs to whom should be engraved in an immutable record, functioning as a single source of truth with no glitches permitted. After investigating and studying the crypto industry and blockchain technologies for several years, we came to the conclusion that the delegated Byzantine Fault Tolerance alternative (or dBFT) is best suited for such a system. It provides swift transaction verification times, de-incentivises most attack vectors and upholds a single blockchain version with no risk of forks or alternative blockchain records emerging - regardless of how much computing power, or coins an attacker possesses. The term Byzantine Fault Tolerance (BFT) derives its name from the Byzantine Generals problem in Game Theory and Computer Science, describing the problematic nature of achieving consensus in a distributed system with suboptimal communication between agents which do not necessarily trust each other. The BFT algorithm arranges the relationship between blockchain nodes in such a way that the network becomes as good as resilient to the Byzantine Generals problem, and allows the system to remain consensus even if some nodes bare malicious intentions or simply malfunction. To achieve this, Antshare’s version of the delegated BFT (or dBFT) algorithm acknowledges two kinds of players in the blockchain space: professional node operators, called bookkeeping nodes, who run nodes as a source of income, and users who are interested in accessing blockchain advantages. Theoretically, this differentiation does not exist in PoW and most PoS environments, practically, however, most Bitcoin users do not operate miners, which are mostly located in specialized venues run by professionals. At Antshares we understand the importance of this naturally occurring division of labor and use it to provide better security for our blockchain platform. Accordingly, block verification is achieved through a consensus game held between specialized bookkeeping nodes, which are appointed by ordinary nodes through a form of delegated voting process. In every verification round one of the bookkeeping nodes is pseudo-randomly appointed to broadcast its version of the blockchain to the rest of the network. If ⅔ of the remaining nodes agree with this version, consensus is secured and the blockchain marches on. If less than ⅔ of the network agrees, a different node is appointed to broadcast its version of the truth to the rest of the system, and so forth until consensus is established. In this way, successful system attacks are almost impossible to execute unless the overwhelming majority of the network is interested in committing financial suicide. Additionally, the system is fork proof, and at every given moment only one version of the truth exists. Without complicated cryptographic puzzles to solve, nodes operate much faster and are able to compete with centralized transaction methods. https://www.econotimes.com/Blockchain-project-Antshares-explains-reasons-for-choosing-dBFT-over-PoW-and-PoS-659275
It is important to note the technical difference between Onchain and NEO. Onchain is a private VC-backed company with over 40 employees. NEO is a public platform with different community-led groups contributing to this public project. There exists NEO council comprised of the original NEO creators, employees from Onchain, full time NEO council members and there is also the first Western based group called City of Zion. Onchain, a Shanghai-based blockchain R&D company, first started developing Antshares in February of 2014 which will eventually become the foundation of DNA. Onchain was founded by CEO Da HongFei and CTO Erik Zhang in response to the attention from private companies garnered by the development of Antshares, China’s first public blockchain. In contrast to the weeks-old start-ups launching ICOs that is happening currently in the blockchain world, it took them 22 long months of R&D to even begin providing services to their first customers. Finally, in April 2016, the first whitepaper on consensus protocol from China was born — the dBFT (delegated Byzantine Fault Tolerance) protocol. 2016 was a busy year for Onchain and they really picked up the pace that year. Other than continuing the development of Antshares, brushing shoulders with Fortune 500 companies, Onchain became the first Chinese blockchain company to join Hyperledger — an open source blockchain project started by the Linux Foundation specifically focusing on the development of private and consortium chains for businesses. In June of 2016, during the first of many future partnerships with Microsoft China, Onchain founded Legal Chain specifically targeting the inadequacies of the digital applications within the legal system. In 2005, (Digital Signature Act) was passed into national law which permitted an effective digital signatures to gain the same legal rights as a real signature. In company with Microsoft China, they are also aiming to integrate the technology with Microsoft’s face and voice recognition API function to kick start this digital revolution within the legal system. At the same time, a partnership was formed with FaDaDa, a third-party platform for electronic contracts that has processed over 27 million contracts to date, to provide secure evidence storage with DNA. If that’s not enough, they were also voted as KPMG’s top 50 Fintech Company in China and established a relationship with the Japanese Ministry of Economy, Trade and Industry which led to the recent tour to Japan. Finally, at the end of 2016 they announced a partnership with Alibaba to provide attested email service for Ali Cloud with Legal Chain where it provides a proof-of-existence for a blockchain-powered email evidence repository for enterprise-level use. Fosun Group, China’s largest private conglomerate, have recently invested into Onchain in order to apply DNA across all of its businesses. Currently, Fosun International has a market cap of 102.98 billion dollars on the Hong Kong Stock Exchange and that is only its international branch. The role of Onchain so far is reminiscent of Ethereum’s EEA in addition to a stronger emphasis of governmental cooperation. Onchain has identified the shortcomings of present laser focus of hype on public platforms such as NEO and Ethereum and addressing that with DNA. DNA envisions a future where a network of assorted, specifically designed blockchains serving private enterprises, consortiums, government and the public communicating with each other forming an interconnected blockchain network. This is the goal of DNA — infiltrating every little inefficient niche that had no better alternatives before the invention of blockchain. What is especially critical to remember during this explosive time of hype driven partly by the obscene degree of greed is that not every little niche that blockchain can fill will be holding its own little ICO. Some of those efficiencies gained will simply be consumed by companies privately or by public systems such as the legal system.
August 8th to August 12th From August 8th to August 12th, 2017, the NEO core team, led by founder & CEO Da Hongfei will travel to Japan to explore the forefront of Japan's Blockchain innovation. This trip represents the first in a series of trips around the world with the goal to foster international cooperation's and to keep up with the fast pace in Blockchain innovation. Starting in Japan, the NEO core team will visit famous local Blockchain research institutions and active communities to engage in bilateral communication. NEO will meet with Japanese tech-celebrities to gain insights about the latest developments in the Japanese Blockchain and digital currency community. Additionally, Japanese local tech media will conduct an interview allowing NEO to present its development status and its latest technological innovations.
November 27th, 2017 China&USA NEO blockchain meetup in Manhattan NYC
November 30th, 2017 Meetup San Francisco: The Future Of Blockchain With The Founders of NEO, Elastos, & Stellar
December 4th, 2017 NEO attending Blockchain World Conference in Bangkok:
December 7th, 2017 NEO meetup Singapore:
December 13th, 2017 NEO meetup at Cambridge:
Networks proves itself with the first ICO
ICOs, on other platforms such as Ethereum, often resulted in a sluggish network and transaction delays. While NEO’s dBFT consensus algorithm is designed to achieve consensus with higher efficency and greater network throughputt, no amount of theoretical calculations can simulate the reality of real-life conditions.
Smart Contract Invocations: A total of 13,966 smart contracts invocations were executed on the NEO network over this time period, of which, nearly all called the RPX smart contract method mintTokens. A total of 543,348,500 RPX tokens were successfully minted and transferred to user accounts, totalling 10,097 smart contract executions.
Refunded Invocations: A total of 4182 refund events were triggered by the smart contract method mintTokens. (Note: RPX has stated that these refunds will be processed within the next two weeks.)
Crowdsale Statistics: A successful mintTokens execution used around 1043 VM operations, while an execution that resulted in a refund used 809 VM operations. Within the hour and six minutes that the token sale was active, a total of 12,296,409 VM operations were executed. A total of 9,575 unique addresses participated in the RPX ICO. Half of these, approximately 4,800 unique addresses, participated through CoZ’s Neon wallet. The top 3 blocks with the most transactions were block 1445025 (3,242 transactions), block 1444902 (2,951 transactions), and block 1444903 (1609 transactions).
Conclusion on Network Performance At the moment, the consensus nodes for the NEO network are operated by the NEO Council in China. By Q1 2018, NEO Council aims to control less than two-thirds of the consensus nodes. We are pleased to note that the NEO network continuted to operate efficiently with minimal network impact, even under extreme network events. Block generation time initially slowed down to 3 minutes to process the largest block, but quickly recovered to approximately 25 seconds. Throughout the entire RPX ICO, consensus nodes were able to achieve consensus and propagate new block transactions to the rest of the network. In closing, while we consider this performance to be excellent, NEO Council and City of Zion areworking closely together on upgrades, that will increase the throughputs of the NEO network.
Members and governance of Hyperledger: Early members of the initiative included blockchain ISVs, (Blockchain, ConsenSys, Digital Asset, R3, Onchain), well-known technology platform companies (Cisco, Fujitsu, Hitachi, IBM, Intel, NEC, NTT DATA, Red Hat, VMware), financial services firms (ABN AMRO, ANZ Bank, BNY Mellon, CLS Group, CME Group, the Depository Trust & Clearing Corporation (DTCC), Deutsche Börse Group, J.P. Morgan, State Street, SWIFT, Wells Fargo), Business Software companies like SAP, Systems integrators and others such as: (Accenture, Calastone, Credits, Guardtime, IntellectEU, Nxt Foundation, Symbiont). The governing board of the Hyperledger Project consists of twenty members chaired by Blythe Masters, (CEO of Digital Asset), and a twelve-member Technical Steering Committee chaired by Christopher Ferris, CTO of Open Technology at IBM. http://www.8btc.com/onchain-hyperledger https://en.wikipedia.org/wiki/Hyperledger
“As a leading open-source contributor in China’s blockchain community, Onchain shares the same values as the Linux Foundation and the Hyperledger project intrinsically. We believe international collaboration plus local experience are key to the adoption of distributed ledger technology in China; we are also very excited to see other Chinese blockchain startups join Hyperledger and look forward to adding our combined expertise to the project.” Da Hongfei, Founder and CEO of Onchain https://hyperledger.org/testimonials/onchain
"There is no direct cooperation between Alibaba and NEO/Onchain, other than their mailbox service is using Law Chain to provide attested email service. In terms of Microsoft, yes we have cooperation with Microsoft China because NEO is built with C# and .NET Core, and NeoContract is the first in the world to support writing smart contract with C#"
"We have pretty good communication with government, with regulators. They don't have any negative impression with NEO and they like our technology and the way we deal with things. Regulation is not an issue for us"
“Before they started cleaning up the market, I was asked for information and suggestions” “I do not expect the government to call me in the short-term and say, ‘Let’s use NEO as the blockchain technology infrastructure of China.’ But in the medium term? Why not? I think it’s possible.”
Decentralization of consensus nodes ▪ P2P Network optimization – Network optimizations to ensure fast block generation after decentralization. ▪ Voting Algorithm Optimization – Adjustments in voting algorithm to prevent identified attack vectors. ▪ Candidate List Website – Published list of candidates so that voters know who they are voting for. ▪ NEO Council Consensus Node < 2/3 – NEO Council shall operate less than two thirds of consensus nodes by the end of quarter 1, 2018.
Our original plan was to start decentralize in Q1 2018. We are however growing faster than expected and cannot accept the risk with being as centralized as we currently are. The conclusion is that we re-prioritize and start the process of decentralizing today. We believe that NEO community groups and exchanges will be suitable to run consensus nodes; community groups already know the technology, and exchanges are already running full nodes with high uptime and monitoring. We welcome interested parties to reach out to us on [email protected]. A NEP to encourage voting will be presented in the coming weeks. https://neo.org/blog/Details/3016
Universal Data Format for Wallet/Node Prog. ▪ NEP2 – Private Key Encryption/Decryption (2017Q4) - Method for encrypting and encoding a passphrase-protected private key. ▪ NEP3 – Universal Data Format (2017Q4) – Standard data format to allow easier wallet and node programming. https://neo.org/en-us/blog/details/65
Promotion/Ecosystem ▪ Globally Legal Token-raising Framework (2017Q4) – Following government interest to regulate ICO’s, NEO will complete a framework to raise tokens legally in all major markets by the end of 2017. ▪ NEO DevCon 1 (2017Q4) – First NEO Development Conference! More details at later date. ▪ CoZ Funding (2017Q4) – Continuous funding plan for CoZ covering next 5 years. ▪ Seed Projects (2017Q4) – First seed projects to be cross-invested with the dedicated NEO pool. https://neo.org/en-us/blog/details/65
And there is no recourse because Bitcoin is unregulated. 51 Percent Attacks. The so-called over 50 percent or 51 percent attack is a security concern for Bitcoin though not one that is easy to carry out. The increasing difficulty of mining Bitcoin has meant that miners get into pools to harmonize their computational power. Wir wollen Elliptic mit unseren Kontakten zur Strafverfolgungsbehörde und der Regierung bei der Expansion in den USA helfen.” Das in England ansässige Startup hatte bereits im Jahr 2014 für einen versicherten Bitcoin-Storage Dienst 2 Mio US-Dollar erhalten. Bitcoin storage service Elliptic has obtained ISAE 3402 accreditation from auditing specialist KPMG. ECC is Public-Key Cryptography. There are many types of public-key cryptography, and Elliptic Curve Cryptography is just one flavor. Other algorithms include RSA, Diffie-Helman, etc.I’m going to give a very simple background of public-key cryptography as a jumping-off point so that we can discuss ECC and build on top of these ideas. Elliptic Vault - Insured Storage for Bitcoins We're proud to announce Elliptic Vault - the world’s first insured Bitcoin storage service. Elliptic Vault offers protection against the loss or theft of Bitcoin holdings, with insurance underwritten by Lloyd's of London.
How are cryptographic primitives employed in Bitcoin? What are hashes and digital signatures? How does elliptic curve cryptography work? See details in Chapters 4 and 6 of 'Mastering Bitcoin ... Simon Hamblin (CEO, Netagio), James Smith (CEO, Elliptic), Will O'Brien (CEO, Bitgo) and Frederic Thenault (CEO, iceVault) discuss the future of Bitcoin Storage New bitcoin technology can tell banks where coins come from with ... Elliptic, a bitcoin analytics and storage startup based in London, thinks it's just made a huge breakthrough that could make ... What is Elliptic Curve? Public-key cryptography sometimes uses data storage based on the algebra behind elliptic curves. This is because this type of data storage detects common corruption issues. This video is unavailable. Watch Queue Queue. Watch Queue Queue