Elliptic Preventing and detecting criminal activity in ...

Elliptic, a bitcoin analytics and storage startup based in London, thinks it's just made a huge breakthrough that could make banks way more interested in bitcoin

Elliptic, a bitcoin analytics and storage startup based in London, thinks it's just made a huge breakthrough that could make banks way more interested in bitcoin submitted by finalhedge to Bitcoin [link] [comments]

Elliptic Vault - Insured Storage for Bitcoins

We're proud to announce Elliptic Vault - the world’s first insured Bitcoin storage service. Elliptic Vault offers protection against the loss or theft of Bitcoin holdings, with insurance underwritten by Lloyd's of London.
www.elliptic.co/vault
Elliptic Vault is the first service from Elliptic, a new, London-based digital currency company (previously known as BitPrice).
submitted by ellipticco to Bitcoin [link] [comments]

Elliptic Vault, the insured Bitcoin storage website just launched, but they currently only accept Bitcoin. They said they will support other currencies if you contact them. Let's do it!

submitted by SoapSuds-bitcoin to litecoin [link] [comments]

Dr. James Smith, CEO of Elliptic - $2MM Venture funded Bitcoin storage and insurance startup - on his path to Bitcoin and his view of the future of cryptocurrencies

Dr. James Smith, CEO of Elliptic - $2MM Venture funded Bitcoin storage and insurance startup - on his path to Bitcoin and his view of the future of cryptocurrencies submitted by duncesavant to Bitcoin [link] [comments]

Elliptic Vault insured storage announces new partnerships, plus Bitcoin payouts now available

Elliptic Vault insured storage announces new partnerships, plus Bitcoin payouts now available submitted by ellipticco to Bitcoin [link] [comments]

Customer Trust is Top Priority for Bitcoin Storage Firm Elliptic Vault

Customer Trust is Top Priority for Bitcoin Storage Firm Elliptic Vault submitted by ellipticco to Bitcoin [link] [comments]

Elliptic Secures $2M From Octopus For Its Insured Bitcoin Storage Service

Elliptic Secures $2M From Octopus For Its Insured Bitcoin Storage Service submitted by itsnotlupus to BitcoinNews [link] [comments]

Elliptic Vault offering insurance is 'world's first' for bitcoin secure storage.

Elliptic Vault offering insurance is 'world's first' for bitcoin secure storage. submitted by veritanuda to planbshow [link] [comments]

Decentr ($DEC) - foundational cross-chain and cross-platform DeFi protocol

  1. SUMMARY
Decentr is a protocol designed to make blockchain/DLT mainstream by allowing DeFi applications built on various blockchains to “talk to each other”. Decentr is a 100% secure and decentralised Web 3.0 protocol where users can apply PDV (personal data value) to increase APR on $DEC that users loan out as part of of our DeFi dLoan features, as well as it being applied at PoS when paying for stuff online. Decentr is also building a BAT competitor browser and Chrome/Firefox extension that acts as a gateway to 100% decentralised Web 3.0
Allows DeFi Dapps to access all Decentr’s dFintech features, including dLoan, dPay. Key innovation is that the protocols is based on a user’s ability to leverage the value of their data as exchangeable “currency”.
  1. KEY CONCEPTS

  1. REVENUE MODEL
A fee is charged for every transaction using dPay whereby an exchange takes place between money (fiat and digital) and data, and vice versa, either as part of DeFi features or via a dApp built on Decentr. They are launching pilot programmes in the following industries:
  1. Banking/PSP Industry: On Product launch, due to Decentr’s powerful PSP connections (including the worlds #2 PSP by volume), a medium-scale pilot program will be launched, which will seed the network with 150,000 PSP customers in primarily the Spanish/LAC markets, generating revenue from day one.
  2. “Bricks and Mortar” Supermarket/Grocery Industry: Decentr aims to ensure the long-term competitiveness of “bricks and mortar” supermarkets against online-only grocery retailers, such as Amazon, by a) building secure tech that allows supermarkets to digitise every aspect of their supply chains and operational functions, while b) allowing supermarkets to leverage this incredibly valuable data as a liquid asset class. Expected revenue by Year 5: $114Mn per year.
  3. Online Advertising Industry: Decentr’s 100% decentralised platform credits users secure data with payable value, in the form of PDV, for engaging with ads. The Brave browser was launched in 2012 and in 8 years has reached over 12 million monthly active users, accented by as many as 4.3 million daily active users.
  4. TOKEN $DEC AND SALE
Decentr recently complete their token sale on a purchase portal powered by Dolomite where they raised $974,000 in 10 minutes for a total sale hardcap of 1.25M. The $DEC token is actively trading on multiple exchanges including Uniswap and IDEX. Listed for free on IDEX, Hotbit, Hoo, Coinw, Tidex, BKex. Listed on CoinGecko and Coinmarketcap. Listed on Delta and Blockfolio apps.
➡️ Circulating supply: 61m $DEC.
➡️ Release schedule and token distribution LINK -> NO RELEASE UNTIL 2021.
➡️Contract Address - 0x30f271C9E86D2B7d00a6376Cd96A1cFBD5F0b9b3
➡️Decimals - 18, Ticker - DEC
➡️Uniswap link: https://uniswap.info/pai0x3AEEE5bA053eF8406420DbC5801fC95eC57b0E0A
⭐️ HOW TO BUY VIDEO: https://www.youtube.com/watch?v=iloAiv2oCRc&feature=youtu.be
$DEC Token utility:
A tradeable unit of value that is both internal and external to the Decentr platform.A unit of conversion between fiat entering and exiting the Decentr ecosystem.A way to capture the value of user data and combines the activity of every participant of the platform performing payment (dPay), or lending and borrowing (dLend), i.e a way to peg PDV to tangible/actionable value.Method of payment in the Decentr ecosystem.A method to internally underwrite the “Deconomy.
  1. NOTABLE SUPPORTERS
Simon Dedic - chief of Blockfyre: https://twitter.com/scoinaldo/status/1283787644221218817?s=20https://twitter.com/scoinaldo/status/1283719917657894912?s=21
Spectre Group Pick : https://twitter.com/SPECTREGRP/status/1284761576873041920https://twitter.com/llluckyl/status/1283765481716015111?s=21
Patrons of the Moon/Lil Uzi: https://t.me/patronsofthemoon/6764
CryptoGems: https://twitter.com/cryptogems_com/status/1283719318379925506?s=09t
tehMoonwalker pick who is a TOP 5 influencer per Binance:https://twitter.com/tehMoonwalkestatus/1284123961996050432?s=20https://twitter.com/binance/status/1279049822113198080
Holochain was one of their earliest supporters and they share a deep connection (recently an AMA was conducted in their TG group): https://medium.com/@DecentrNet/decentr-holochain-ama-29d662caed03
  1. UPCOMING NEWS
--------------------------------------------
  1. RESOURCES:
Website: https://decentr.net
Telegram: https://t.me/DecentrNet
Medium: https://medium.com/@DecentrNet
Twitter: https://twitter.com/DecentrNet
Whitepaper: https://decentr.net/files/Decentr_Whitepaper_V1.4.pdf
Technical Whitepaper: https://decentr.net/files/Decentr_Technical_Whitepaper_Data_As_Economic_Currency.pdf
Recent Articles:
⚡️- https://medium.com/@DecentrNet/decentr-token-sale-metrics-and-distribution-483bb3c58d05
⚡️- https://medium.com/@DecentrNet/how-decentrs-defi-dloan-function-benefits-dec-holders-97ff64a0c105
⚡️- https://medium.com/@DecentrNet/3-vertical-revenue-streams-decentr-is-targeting-4fa1f3dd62de
⚡️- https://medium.com/@DecentrNet/brave-browser-the-good-the-bad-and-the-fundamentally-misguided-8a8593b0ff5b
⚡️- https://medium.com/@DecentrNet/how-decentrs-dfintech-replaces-swift-sct-inst-clearing-house-and-other-payment-solutions-78acacbb4c3f
Chad Gang STRONG Community: https://t.me/decentrtrading
Community News Channel: https://t.me/chadnews
Recent Uniswap trades: https://t.me/dectrades
Wallet holder tracker: https://t.me/DEC_WALLETS_COUNT
submitted by ldd999 to CryptoMoonShots [link] [comments]

RiB Newsletter #14 – Are We Smart (Contract) Yet?

We’re seeing a bunch of interesting Rust blockchain and crypto projects, so this month the “Interesting Things” section is loaded up with news, papers, and project links.
This month, Elrond, appeared on our radar with the launch of their mainnet. Although not written in Rust, it runs Rust smart contracts on its Arwen WASM VM, which itself is based on the Rust Wasmer VM. Along with NEAR, Nervos, and Enigma (and probably others), this continues an encouraging trend of blockchains enabling smart contracts in Rust. See the “Interesting Things” section for examples of Elrond’s Rust contracts.
Rust continues to be popular for research into zero-knowledge proofs, with Microsoft releasing Spartan, a zk-SNARK system without trusted setup.
In RiB news, we published a late one-year anniversary blog post. It has some reflection on the changes to, and growth of, RiB over the last year.
The Awesome Blockchain Rust project, which is maintained by Sun under the rust-in-blockchain GitHub org, has received a stream of updates recently, and is now published as the Awesome-RiB page on rustinblockchain.org.
It’s a pretty good resource for finding blockchain-related Rust projects, with links to many of the more prominent and mature projects noted in the RiB newsletter. It could use more eyes on it though.

Project Spotlight

Each month we like to shine a light on a notable Rust blockchain project. This month that project is…
ethers.rs
ethers.rs is an Ethereum & Celo library and wallet implementation, implemented as a port of the ethers.js library to Rust.
Ethereum client programming is usually done in JavaScript with either web3.js or ethers.js, with ethers.js being the newer of the two. These clients communicate to an Ethereum node, typically via JSON-RPC (or, when in the browser, via an “injected” client provider that follows EIP-1193, like MetaMask).
ethers.rs then provides a strongly-typed alternative for writing software that interacts with the Ethereum network.
As of now it is only suited for non-browser use cases, but if you prefer hacking in Rust to JavaScript, as some of us surely do, it is worth looking into for your next Ethereum project.
The author of ethers.rs, Georgios Konstantopoulos, accepts donations to sponsor their work.
Note that there is also a Rust alternative to web3.js, rust-web3.

Interesting Things

News

Blog Posts

Papers

Projects

Podcasts and Videos


Read more: https://rustinblockchain.org/newsletters/2020-08-05-are-we-smart-contract-yet/
submitted by Aimeedeer to rust [link] [comments]

Introduction to Bitterfly: Butterfly Matrix Entropy Weight Consensus Algorithm

When Bitcoin launched 11 years ago, Satoshi Nakamoto had the vision of giving people power over their money. His vision lives on through BTC. However, the Bitcoin network has a few flaws. One of those flaws is the Proof of Work mechanism. Mining Bitcoin requires a huge amount of resources that are out of reach for most ordinary people. The result is that the BTC network is increasingly being placed in centralized control.The Bitterfly project hopes to change that using a revolutionary consensus mechanism called the Buttery that will be used on the Bitterfly blockchain.
About Bitterfly
Bitterfly wants to continue the vision that Nakamoto had for Bitcoin. The goal is to give power back to the people and place them in control of their finances. To do this, the Bitterfly team is working on three main areas that require improvement:
· The consensus mechanism
· The blockchain performance
· Community Governance
The Consensus Mechanism
To improve the consensus mechanism, the team behind Bitterfly has created the Butterfly algorithm that they will add to the PoW mechanism. Not only can it ensures that the hash rate is obtained fairly, it ensures that the hash rate of the whole network is enhanced via the butterfly effect.
Performance
In terms of performance, the Bitterfly blockchain has been upgraded to have a confirmed commercial speed of 5000TPS. Bitterfly is designed as a Blockchain As a Service open-source platform, which can be used in different applications.
Bitterfly will support different types of computing services that include cloud servers. As a result, it will utilize idle server resources to boost the hash rate support for the network.
Community Governance
When it comes to community Governance, Bitterfly plans to introduce a node competition mechanism that will release 210 nodes over time to enhance the butterfly effect. First, they will introduce the nodes via the Butterfly matrix network. Later, they will do so via a fair elimination process. The goal is to ensure that the nodes contribute to the success of Bitterfly.
The Encryption Algorithm
Encryption and decryption of data are at the core of the operation of any blockchain. It helps to guarantee the security of the whole blockchain. Only a corresponding private key can unlock data encrypted using a public key.
In most blockchains, the Hash Function and the Asymmetric Key Encryption Algorithm are used to encrypt and decrypt data. For the Hush Function, the main algorithms used are SHA and MD5.Bitterfly uses the SHA256 algorithm for encryption and RSA, DSA, and Elliptic curve algorithms for decryption. For the verification phase, Bitterfly developed the DFLYSChnorr, which is based on the SCHNOOR algorithm.
Consensus Algorithm
The consensus mechanism is used in the blockchain to ensure that each transaction is accurate. Bitterfly plans to operate within the enterprise space, which requires comprehensive and heterogeneous systems that are integrated with various communication protocols.
To deal with the challenges that might arise, Bitterfly developed a two-layer consensus algorithm for the PoW mechanism called the PBFT algorithm. Here is how the Bitterfly algorithm works:
· The network Structure
Bitterfly is designed as an internet payment and application protocol that is based on embracing the digital economy. It can facilitate value storage as well as the decentralized exchange of digital assets, payments, as well as clearing functions. Within Bitterfly, everyone can participate in productively. It will place a huge demand on Bitterfly. The network will offer performance guarantees as well as smart contracts.
· Bitterfly Consensus Algorithm
To meet the goal of decentralization and security, Bittefly wants to become a global computer instead of a P2P information system. Besides satisfying the decentralization and security needs of its users via PoW, the system will also need to perform at a high level.
As a result, the team opted to support smart contracts in commercial applications. To deal with the issue of energy consumption, the team came up with the Butterfly algorithm. The algorithm allows the use of PoW as well as other cross-chain methods such as the Layer 2 protocol. Confirmation of transactions is done via verification nodes.
Each node is preconfigured with a list of trusted nodes known as the Consensus Achievement List (CAL). The node list can be used to confirm transactions. Once a transaction is confirmed with the local ledger, it is integrated into the transaction candidate set while all illegal ones are discarded.
To improve the security of the network, the verification confirmation was raised to 60% unlike in other networks where it is 50% +1. A transaction is officially confirmed once it is confirmed by 80% of the CAL nodes. The process is known as the Last Closed Ledger, which represents the latest changes to the ledger.
Within Bitterfly, the identities of those taking part in the confirmation of transactions are known beforehand. AS a result, transactions are faster and the blockchain is more efficient.
Butterfly Matrix Entropy Weight Algorithm
Entropy is used to measure the level of uncertainty in the system. Bitterfly built a way to establish consensus using multiple factors. In the network, each data set has a corresponding weight.
Summary
For the past 11 years, Bitcoin has enjoyed tremendous success. The launch of Bitcoin ushered in a new era for humanity. For the first time in history, decentralized money that is outside the control of governments and other central entities is possible.
The new type of money gives people the power to control their finances and avoid the harsh effects of inflation caused by the wanton printing of government currency. When a new economic downturn hit the global economy, Bitcoin failed the litmus test. While Bitcoin should have helped to save people’s finances as the money printing began, it seemed to have followed the same trend as the sinking global economy.
It revealed that BTC still had numerous weaknesses that need to be corrected. Bitterfly wants to build on what Bitcoin has accomplished and do more with it. The team behind this project is quite optimistic. They believe that they can achieve what Bitcoin has achieved in the past 11 years. Besides that, they believe they can achieve where Bitcoin has failed in those past 11 years.
Social Media Links
TWITTER: https://twitter.com/BitterflyD
MEDIUM: https://medium.com/@BitterflyD
YOUTUBE: https://www.youtube.com/channel/UCxSNCzuQsNj-oCgepxzoXQg
TELEGRAM: https://t.me/Bitterfly_Disciples
submitted by Bitterfly_Disciples to u/Bitterfly_Disciples [link] [comments]

【NeoLine Talk】The life cycle of the private key

【NeoLine Talk】The life cycle of the private key

https://preview.redd.it/yeib74adcoy41.png?width=900&format=png&auto=webp&s=8e50b543a01a25860c7c732c17a1f2da338cd7c6
In the blockchain system, since there is no centralized organization responsible for managing the backup user sensitive data, the generation, storage, use, retrieval, destruction, and update of the user’s private key all need to be guaranteed by the user. Therefore, for the entire life cycle of the private key, there needs to be a strict way to manage and control it, to ensure the security of the asset.
Today ’s NeoLine Talk, let ’s talk about how to ensure the security of the private key life cycle.

Private key generation

Private key: A 256-bit binary random number whose quality depends entirely on the quality of the random number that generated the private key. If the randomness of the key generation process is insufficient to make it predictable, then all subsequent security protection measures will be in vain.
Random numbers are the cornerstone of information security systems based on modern cryptography. The security of the entire system depends entirely on the generation efficiency and quality of random number sequences. The core of high-quality random numbers is “unpredictability”. There are two types of random numbers: pseudo-random and true random.
Pseudo-random is also called pseudo-random. It generally relies on seeds and algorithms. Knowing the seeds or the random numbers that have been generated, you can get the next random numbers, which is predictable. The current mainstream blockchain system is the private key generated by this method …
True random numbers are generally based on the design of the hardware. Random numbers are generated according to the external temperature, voltage, electromagnetic field, environmental noise, etc., and the unpredictability of randomness is greatly increased. All security cryptographic chips in the financial field adopt this design.

Let’s see in detail how to generate a private key from a random number?

The first step in generating a private key is also the most important. It is to find a sufficiently secure source of entropy, that is, a source of randomness. Generating a Bitcoin private key is essentially the same as “choose a number between 1 and 2256”. As long as the selected results are unpredictable or unrepeatable, the specific method of selecting numbers is not important. Bitcoin software uses a random number generator at the bottom of the operating system to generate 256 bits of entropy (randomness). Normally, the operating system random number generator is initialized by an artificial random source, and it may also need to be initialized by shaking the mouse continuously within a few seconds.
More precisely, the private key can be any number between 1 and n-1, where n is a constant (n = 1.158 * 1077, slightly less than 2256) and is defined by the order of the elliptic curve used by Bitcoin. To generate such a private key, we randomly choose a 256-bit number and check whether it is less than n-1. From a programming point of view, it is generally by taking a long string of random bytes from a cryptographically secure random source and using the SHA256 hash algorithm to perform operations, so that a 256-bit number can be easily generated. If the operation result is less than n-1, we have a suitable private key. Otherwise, we repeat it with another random number.

Private key storage

Each bitcoin address corresponds to a private key, and mastering the private key means mastering the bitcoin in its corresponding address. In layman’s terms, a key opens a lock. If the Bitcoin address is a lock, then the private key is the key to the lock.
The storage and use of private keys are generally divided into soft and hard implementations.
Soft implementation, storage, and use are in the form of software. After the key is generated, it is stored in the user terminal or hosted on the server as a file or character string. When used, the private key plain text is read directly or through simple password control into the memory, and the private key calculation is completed by the CPU. This storage and use method has a lot of security risks and is easy to be copied, stolen, brute-forced by hackers or ghosts.
Hard implementation generally relies on a dedicated cryptographic security chip or cryptographic device as a carrier. There are generally mechanisms such as physical protection, sensitive data protection, and key protection to ensure that the private key must be generated by dedicated hardware. At any time and under any circumstances, the private key cannot appear outside the cryptographic device in clear text; the key stored inside the cryptographic device should have an effective key protection mechanism to prevent dissection, detection, and illegal reading. The private key cannot be exported, and only the signature value can be calculated and output.
But whether it is soft or hard, as long as others know your private key, you can transfer your assets. Remember, whoever holds the private key is the real owner of the asset.

Safe use of private keys

When using the private key, it is necessary to ensure the security of the use environment, and access, reading, and writing of the private key file need to have relevant permission control. After the use is completed, all sensitive data cached in the memory needs to be cleared using a dedicated function to prevent the leakage of sensitive data. From the perspective of password cracking, the private key should be replaced after a certain period of use. This is a problem involving the destruction and update of the private key, which we will introduce later.

Private key recovery

If a traditional centralized bank loses its U-shield or forgets its password, it can rebind a new U-shield (private key) through the account system. Accounts and private keys are logically bound and are operated by centralized banks while meeting risk control requirements. There are also some traditional centralized payment institutions. When the user’s asset certificate is lost, the centralized institution can retrieve the relevant data through its identity certificate.
But in the blockchain system, there is no centralized organization to help us back up sensitive data such as private keys. Therefore, when designing the system’s private key management scheme, it is necessary to provide multiple back-ups and recovery methods, such as the use of mnemonic words or the use of passwords plus local ciphertext files to restore private key data. But if your mnemonic is also lost, it means you lost everything.

Private key destruction

When the user needs to destroy the private key data, it is necessary to ensure that all the private key data stored in the backup are completely deleted and destroyed.

Private key update

In the field of blockchain, the private key is the only credential that represents the user’s identity or digital assets. If the private key needs to be updated, registration or digital asset transfer must be re-bound. Therefore, when you need to replace the private key, you need to ensure that the new private key is safely generated or imported, the assets have been safely transferred, and the old private key is safely destroyed.
Everything starts with visibility. The security of the private key is related to the security of digital assets and the security of personal privacy, so it is very important to securely ensure every step of the life cycle of the private key.
submitted by NeoLine_Wallet to NEO [link] [comments]

Tkeycoin — security, that’s what we’re betting on

Tkeycoin — security, that’s what we’re betting on
Today we will talk about the security of using the Tkeycoin platform and the TKEYSPACE mobile blockchain wallet.
Tkeycoin is a peer-to-peer payment system based on p2p principles and the concept of electronic cash. P2P technology is a fairer means of mutual settlements between users and companies around the world. Modern payment systems are imperfect and may depend on the will of high-ranking officials.
We approached the market from an economic and scientific point of view, borrowing the best from Bitcoin, Ethereum, DASH, and other alternative currencies, mixing modern concepts and building on the global experience of IBM, Microsoft and a number of other companies and research.
The Tkeycoin blockchain is protected by various mechanisms that include advanced cryptographic methods and mathematical models of behavior and decision-making. Blockchain technology prevents duplication or destruction of digital assets.

https://i.redd.it/idy42g9rntx41.gif
In addition to providing security and recording transactions in registers, cryptography also plays a role in ensuring the security of wallets used to store Tkeycoin. Paired public and private keys, which respectively allow users to receive and send payments, are created using asymmetric encryption or public-key cryptography. Public keys are used to generate digital signatures for transactions, which allows you to authenticate ownership of the coins being sent.

https://i.redd.it/95yuky0tntx41.gif
The asymmetric cryptography architecture does not allow anyone other than the owner of the private key to access funds stored in the cryptocurrency wallet, so these funds are kept safe until the owner decides to spend them.
In simple words, in the Tkeycoin peer-to-peer system, only you are the real owner of your money and only You have access to it.
Using tools such as a local Tkeycoin Core wallet or TkeySpace provides you with reliable storage, privacy, and security.
TkeySpace, in turn, adds maximum usability by combining the highest level of security and easy intuitive design.

https://i.redd.it/f0de51vuntx41.gif

How does TKEYSPACE provide security?

TKEYSPACE is one of the first applications that support blockchain in a mobile device and is also the first decentralized application of the TKEY platform.
Its serverless architecture provides the highest level of security for storing all assets in the application. unlike centralized applications that are managed by companies, TkeySpace does not have a Central management authority and operates in accordance with all the principles of peer-to-peer networks.

https://preview.redd.it/4bret8hwntx41.png?width=1253&format=png&auto=webp&s=535c5d879a36eac4ca8c807ee7af1b5fe05e12a9
As we said above, the wallets in the blockchain have a public and private key. Centralized applications usually store users ‘private keys on their servers, which makes users’ funds vulnerable to hacker attacks or theft.
TkeySpace-stores the encrypted key only on the user’s device and in encrypted form. The encrypted key is displayed as a mnemonic phrase (backup phrase), which is very convenient for users. Unlike complex cryptographic ciphers, the phrase is easy to save or write. The backup phrase provides the maximum level of security and thanks to its usual appearance, an attacker is unlikely to ever guess what these words are and what they are for.
A mnemonic phrase is 12 or 24 words that are generated using random number entropy. If the phrase consists of 12 words, then the number of possible combinations is 2048¹² or 211³² — the phrase will have 132 security bits. To restore the wallet, you must enter the mnemonic phrase in the strict order as it was presented after generation.
And so that you do not get confused in the definitions and concepts, we will briefly describe simple and clear principles of how it all works. Let’s look briefly at the factors.

Lock Screen

The simplest thing that protects your phone from unauthorized access is Pincode, a snake, a fingerprint or a Face Id login. And it would seem that this is related to TKEYSPACE?
https://i.redd.it/sspjjsgyntx41.gif
  • At a minimum, it is almost impossible to open new mobile devices and pick up a pin code, even in the case of theft, most often the factory settings are reset, which leads to the deletion of all data on the phone, respectively-your funds are safe even for this reason.
  • Even if there was some “craftsman” and somehow managed to change the pin code on your device, the TKEYSPACE app will automatically delete all the keys and backup phrases, the wallet will simply be empty, and the attacker will be left with nothing.
As we can see, even a simple screen lock with a pin or fingerprint protects your data. It’s not as simple a screen lock as you and I might think.
Every platform, whether it’s Android or AppStore, uses specialized key stores. Cryptography, symmetric and asymmetric encryption, keys, and certificates are directly related to this task.
Keys and certificates that are used to protect information must also be securely protected. Android uses Keystore, a certificate and a Keystore, for this purpose.
Keystore is a specialized secret data store that is used by Java applications to encrypt, authenticate, and establish HTTPS connections.
For two-way authentication, the client and server exchange certificates, respectively, and the server and client must have a Keystore with a private/public key pair and a certificate. In other words, the Keystore is used to store keys and certificates that are used to identify the key owner (client or server).
Starting with Android 8, the encryption systems have been upgraded, the system is checked for signs of hacking at startup, and the screen lock allows you to restrict access to the device. Data encryption and the use of keys ensure the security of information when it is stored and transmitted.

https://i.redd.it/2c0b9re1otx41.gif
In the new version of the OS — Android 9 (Pie) — the developers also added support for hardware to protect against unauthorized changes.
Android apps run in an isolated software environment that restricts access to your information to other apps. OS components are also protected, which prevents attackers from exploiting system errors for their purposes.
Android uses both hardware and software to protect users and their data. Therefore, even at the operating system level, there are a lot of security factors. Of course, if you “flash” the phone (change the factory firmware) and enable Root access, this will reduce the security of Your device, but this is more an exception than a rule and such changes are usually introduced by very experienced users.
IOS uses Keychain — a specialized database for storing metadata and confidential information. Using a Keychain is the best practice for storing small pieces of data that are critical to your apps, such as secrets and passwords. In addition to the Keychain, Apple provides a full range of maximum protection for Your device.
And so we will continue,

Passcode in the app

Now we understand that to get access to the tools, an attacker needs to hack the hardware security of the Google and Apple giants to somehow get access to the app, which is impossible.
To increase security and eliminate other risk factors, we have included an access code (secret code) in the app.
You set an additional level of security by enabling a pin code to log in to the app. The access code additionally encrypts all data stored in the app.
Just so you understand — it’s not just numbers that you enter on the screen, this combination affects the ciphers inside the app. When creating a key, a user interface element is called. when the user swipes the screen, the application receives a random set of bytes — thus, all information is additionally covered by a new layer of cryptography.
And as we said above, if you try to disable the pin code, the app will delete all the data, and the attacker will be left with nothing.
As we have already realized, only 2 of these factors provide the maximum level of security for the TKEYSPACE application.
And the most important thing is that the application runs on the blockchain, which guarantees its full Autonomous operation, data immutability, and privacy.
Generation of new addresses, absence of accounts, phone numbers, e-mail and other personal data-provides you with a social level of security, which is a huge advantage in our time.
In a world where security is based on the level of cryptography, attackers try to influence You with the human factor using social engineering, so when you use applications with accounts, phone numbers, you have more risks.
Social engineering is a method of obtaining the necessary access to information based on the characteristics of human psychology.
For example, a copy of a SIM-card has become a new tool for fraudsters, but there is no personal information in TKEYSPACE, so even such groups of fraudsters can’t get access to your funds.

You don’t have to worry about security — it’s already built into the TKEYSPACE system.

A mixed encryption system based on the principles of computational complexity, with the deterministic generation of signatures using elliptic curves, provides absolute security and safety of user funds, and reserve phrases will help you restore funds at any moment.
A mnemonic phrase is 12 or 24 words that are generated using the entropy of random numbers.
If the phrase consists of 12 words, then the number of possible combinations is 2048¹² or 211³² — the phrase will have 132 security bits. To restore the wallet, you must enter the mnemonic phrase in the strict order as it was presented after generation.
Only you and no one else has access to the phrase. When you get the key, the app has restrictions on the screenshot, and the clipboard is disabled, which protects against malicious software.
It is you, as a user, who sees the phrases, and everything in the device is encrypted, the blockchain architecture protects against hacker attacks, information forgery, and other hacks.
For those who are a bit obsessed with persecution mania, we offer a small lifehack:
Buy several USB drives, connect them to a device that does not have access to the Internet, preferably on a clean operating system, create a text file, write backup phrases there, and encrypt the USB drives with passwords.

https://i.redd.it/shan90o4otx41.gif
Once again, to ensure security and easy recovery, it is enough to record backup phrases once and make several backups. you do not need to resort to an additional encryption method, because we have already done everything for you :)
https://i.redd.it/ogpu09l6otx41.gif
submitted by tkeycoin to Tkeycoin_Official [link] [comments]

Groestlcoin 6th Anniversary Release

Introduction

Dear Groestlers, it goes without saying that 2020 has been a difficult time for millions of people worldwide. The groestlcoin team would like to take this opportunity to wish everyone our best to everyone coping with the direct and indirect effects of COVID-19. Let it bring out the best in us all and show that collectively, we can conquer anything.
The centralised banks and our national governments are facing unprecedented times with interest rates worldwide dropping to record lows in places. Rest assured that this can only strengthen the fundamentals of all decentralised cryptocurrencies and the vision that was seeded with Satoshi's Bitcoin whitepaper over 10 years ago. Despite everything that has been thrown at us this year, the show must go on and the team will still progress and advance to continue the momentum that we have developed over the past 6 years.
In addition to this, we'd like to remind you all that this is Groestlcoin's 6th Birthday release! In terms of price there have been some crazy highs and lows over the years (with highs of around $2.60 and lows of $0.000077!), but in terms of value– Groestlcoin just keeps getting more valuable! In these uncertain times, one thing remains clear – Groestlcoin will keep going and keep innovating regardless. On with what has been worked on and completed over the past few months.

UPDATED - Groestlcoin Core 2.18.2

This is a major release of Groestlcoin Core with many protocol level improvements and code optimizations, featuring the technical equivalent of Bitcoin v0.18.2 but with Groestlcoin-specific patches. On a general level, most of what is new is a new 'Groestlcoin-wallet' tool which is now distributed alongside Groestlcoin Core's other executables.
NOTE: The 'Account' API has been removed from this version which was typically used in some tip bots. Please ensure you check the release notes from 2.17.2 for details on replacing this functionality.

How to Upgrade?

Windows
If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes for older versions), then run the installer.
OSX
If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes for older versions), run the dmg and drag Groestlcoin Core to Applications.
Ubuntu
http://groestlcoin.org/forum/index.php?topic=441.0

Other Linux

http://groestlcoin.org/forum/index.php?topic=97.0

Download

Download the Windows Installer (64 bit) here
Download the Windows Installer (32 bit) here
Download the Windows binaries (64 bit) here
Download the Windows binaries (32 bit) here
Download the OSX Installer here
Download the OSX binaries here
Download the Linux binaries (64 bit) here
Download the Linux binaries (32 bit) here
Download the ARM Linux binaries (64 bit) here
Download the ARM Linux binaries (32 bit) here

Source

ALL NEW - Groestlcoin Moonshine iOS/Android Wallet

Built with React Native, Moonshine utilizes Electrum-GRS's JSON-RPC methods to interact with the Groestlcoin network.
GRS Moonshine's intended use is as a hot wallet. Meaning, your keys are only as safe as the device you install this wallet on. As with any hot wallet, please ensure that you keep only a small, responsible amount of Groestlcoin on it at any given time.

Features

Download

iOS
Android

Source

ALL NEW! – HODL GRS Android Wallet

HODL GRS connects directly to the Groestlcoin network using SPV mode and doesn't rely on servers that can be hacked or disabled.
HODL GRS utilizes AES hardware encryption, app sandboxing, and the latest security features to protect users from malware, browser security holes, and even physical theft. Private keys are stored only in the secure enclave of the user's phone, inaccessible to anyone other than the user.
Simplicity and ease-of-use is the core design principle of HODL GRS. A simple recovery phrase (which we call a Backup Recovery Key) is all that is needed to restore the user's wallet if they ever lose or replace their device. HODL GRS is deterministic, which means the user's balance and transaction history can be recovered just from the backup recovery key.

Features

Download

Main Release (Main Net)
Testnet Release

Source

ALL NEW! – GroestlcoinSeed Savior

Groestlcoin Seed Savior is a tool for recovering BIP39 seed phrases.
This tool is meant to help users with recovering a slightly incorrect Groestlcoin mnemonic phrase (AKA backup or seed). You can enter an existing BIP39 mnemonic and get derived addresses in various formats.
To find out if one of the suggested addresses is the right one, you can click on the suggested address to check the address' transaction history on a block explorer.

Features

Live Version (Not Recommended)

https://www.groestlcoin.org/recovery/

Download

https://github.com/Groestlcoin/mnemonic-recovery/archive/master.zip

Source

ALL NEW! – Vanity Search Vanity Address Generator

NOTE: NVidia GPU or any CPU only. AMD graphics cards will not work with this address generator.
VanitySearch is a command-line Segwit-capable vanity Groestlcoin address generator. Add unique flair when you tell people to send Groestlcoin. Alternatively, VanitySearch can be used to generate random addresses offline.
If you're tired of the random, cryptic addresses generated by regular groestlcoin clients, then VanitySearch is the right choice for you to create a more personalized address.
VanitySearch is a groestlcoin address prefix finder. If you want to generate safe private keys, use the -s option to enter your passphrase which will be used for generating a base key as for BIP38 standard (VanitySearch.exe -s "My PassPhrase" FXPref). You can also use VanitySearch.exe -ps "My PassPhrase" which will add a crypto secure seed to your passphrase.
VanitySearch may not compute a good grid size for your GPU, so try different values using -g option in order to get the best performances. If you want to use GPUs and CPUs together, you may have best performances by keeping one CPU core for handling GPU(s)/CPU exchanges (use -t option to set the number of CPU threads).

Features

Usage

https://github.com/Groestlcoin/VanitySearch#usage

Download

Source

ALL NEW! – Groestlcoin EasyVanity 2020

Groestlcoin EasyVanity 2020 is a windows app built from the ground-up and makes it easier than ever before to create your very own bespoke bech32 address(es) when whilst not connected to the internet.
If you're tired of the random, cryptic bech32 addresses generated by regular Groestlcoin clients, then Groestlcoin EasyVanity2020 is the right choice for you to create a more personalised bech32 address. This 2020 version uses the new VanitySearch to generate not only legacy addresses (F prefix) but also Bech32 addresses (grs1 prefix).

Features

Download

Source

Remastered! – Groestlcoin WPF Desktop Wallet (v2.19.0.18)

Groestlcoin WPF is an alternative full node client with optional lightweight 'thin-client' mode based on WPF. Windows Presentation Foundation (WPF) is one of Microsoft's latest approaches to a GUI framework, used with the .NET framework. Its main advantages over the original Groestlcoin client include support for exporting blockchain.dat and including a lite wallet mode.
This wallet was previously deprecated but has been brought back to life with modern standards.

Features

Remastered Improvements

Download

Source

ALL NEW! – BIP39 Key Tool

Groestlcoin BIP39 Key Tool is a GUI interface for generating Groestlcoin public and private keys. It is a standalone tool which can be used offline.

Features

Download

Windows
Linux :
 pip3 install -r requirements.txt python3 bip39\_gui.py 

Source

ALL NEW! – Electrum Personal Server

Groestlcoin Electrum Personal Server aims to make using Electrum Groestlcoin wallet more secure and more private. It makes it easy to connect your Electrum-GRS wallet to your own full node.
It is an implementation of the Electrum-grs server protocol which fulfils the specific need of using the Electrum-grs wallet backed by a full node, but without the heavyweight server backend, for a single user. It allows the user to benefit from all Groestlcoin Core's resource-saving features like pruning, blocks only and disabled txindex. All Electrum-GRS's feature-richness like hardware wallet integration, multi-signature wallets, offline signing, seed recovery phrases, coin control and so on can still be used, but connected only to the user's own full node.
Full node wallets are important in Groestlcoin because they are a big part of what makes the system be trust-less. No longer do people have to trust a financial institution like a bank or PayPal, they can run software on their own computers. If Groestlcoin is digital gold, then a full node wallet is your own personal goldsmith who checks for you that received payments are genuine.
Full node wallets are also important for privacy. Using Electrum-GRS under default configuration requires it to send (hashes of) all your Groestlcoin addresses to some server. That server can then easily spy on your transactions. Full node wallets like Groestlcoin Electrum Personal Server would download the entire blockchain and scan it for the user's own addresses, and therefore don't reveal to anyone else which Groestlcoin addresses they are interested in.
Groestlcoin Electrum Personal Server can also broadcast transactions through Tor which improves privacy by resisting traffic analysis for broadcasted transactions which can link the IP address of the user to the transaction. If enabled this would happen transparently whenever the user simply clicks "Send" on a transaction in Electrum-grs wallet.
Note: Currently Groestlcoin Electrum Personal Server can only accept one connection at a time.

Features

Download

Windows
Linux / OSX (Instructions)

Source

UPDATED – Android Wallet 7.38.1 - Main Net + Test Net

The app allows you to send and receive Groestlcoin on your device using QR codes and URI links.
When using this app, please back up your wallet and email them to yourself! This will save your wallet in a password protected file. Then your coins can be retrieved even if you lose your phone.

Changes

Download

Main Net
Main Net (FDroid)
Test Net

Source

UPDATED – Groestlcoin Sentinel 3.5.06 (Android)

Groestlcoin Sentinel is a great solution for anyone who wants the convenience and utility of a hot wallet for receiving payments directly into their cold storage (or hardware wallets).
Sentinel accepts XPUB's, YPUB'S, ZPUB's and individual Groestlcoin address. Once added you will be able to view balances, view transactions, and (in the case of XPUB's, YPUB's and ZPUB's) deterministically generate addresses for that wallet.
Groestlcoin Sentinel is a fork of Groestlcoin Samourai Wallet with all spending and transaction building code removed.

Changes

Download

Source

UPDATED – P2Pool Test Net

Changes

Download

Pre-Hosted Testnet P2Pool is available via http://testp2pool.groestlcoin.org:21330/static/

Source

submitted by Yokomoko_Saleen to groestlcoin [link] [comments]

Threshold Signature Explained— Bringing Exciting Applications with TSS

Threshold Signature Explained— Bringing Exciting Applications with TSS
— A deep dive into threshold signature without mathematics by ARPA’s cryptographer Dr. Alex Su

https://preview.redd.it/cp0wib2mk0q41.png?width=757&format=png&auto=webp&s=d42056f42fb16041bc512f10f10fed56a16dc279
Threshold signature is a distributed multi-party signature protocol that includes distributed key generation, signature, and verification algorithms.
In recent years, with the rapid development of blockchain technology, signature algorithms have gained widespread attention in both academic research and real-world applications. Its properties like security, practicability, scalability, and decentralization of signature are pored through.
Due to the fact that blockchain and signature are closely connected, the development of signature algorithms and the introduction of new signature paradigms will directly affect the characteristics and efficiency of blockchain networks.
In addition, institutional and personal account key management requirements stimulated by distributed ledgers have also spawned many wallet applications, and this change has also affected traditional enterprises. No matter in the blockchain or traditional financial institutions, the threshold signature scheme can bring security and privacy improvement in various scenarios. As an emerging technology, threshold signatures are still under academic research and discussions, among which there are unverified security risks and practical problems.
This article will start from the technical rationale and discuss about cryptography and blockchain. Then we will compare multi-party computation and threshold signature before discussing the pros and cons of different paradigms of signature. In the end, there will be a list of use cases of threshold signature. So that, the reader may quickly learn about the threshold signature.
I. Cryptography in Daily Life
Before introducing threshold signatures, let’s get a general understanding of cryptography. How does cryptography protect digital information? How to create an identity in the digital world? At the very beginning, people want secure storage and transmission. After one creates a key, he can use symmetric encryption to store secrets. If two people have the same key, they can achieve secure transmission between them. Like, the king encrypts a command and the general decrypts it with the corresponding key.
But when two people do not have a safe channel to use, how can they create a shared key? So, the key exchange protocol came into being. Analogously, if the king issues an order to all the people in the digital world, how can everyone proves that the sentence originated from the king? As such, the digital signature protocol was invented. Both protocols are based on public key cryptography, or asymmetric cryptographic algorithms.


“Tiger Rune” is a troop deployment tool used by ancient emperor’s, made of bronze or gold tokens in the shape of a tiger, split in half, half of which is given to the general and the other half is saved by the emperor. Only when two tiger amulets are combined and used at the same time, will the amulet holder get the right to dispatch troops.
Symmetric and asymmetric encryption constitute the main components of modern cryptography. They both have three fixed parts: key generation, encryption, and decryption. Here, we focus on digital signature protocols. The key generation process generates a pair of associated keys: the public key and the private key. The public key is open to everyone, and the private key represents the identity and is only revealed to the owner. Whoever owns the private key has the identity represented by the key. The encryption algorithm, or signature algorithm, takes the private key as input and generate a signature on a piece of information. The decryption algorithm, or signature verification algorithm, uses public keys to verify the validity of the signature and the correctness of the information.
II. Signature in the Blockchain
Looking back on blockchain, it uses consensus algorithm to construct distributed books, and signature provides identity information for blockchain. All the transaction information on the blockchain is identified by the signature of the transaction initiator. The blockchain can verify the signature according to specific rules to check the transaction validity, all thanks to the immutability and verifiability of the signature.
For cryptography, the blockchain is more than using signature protocol, or that the consensus algorithm based on Proof-of-Work uses a hash function. Blockchain builds an infrastructure layer of consensus and transaction through. On top of that, the novel cryptographic protocols such as secure multi-party computation, zero-knowledge proof, homomorphic encryption thrives. For example, secure multi-party computation, which is naturally adapted to distributed networks, can build secure data transfer and machine learning platforms on the blockchain. The special nature of zero-knowledge proof provides feasibility for verifiable anonymous transactions. The combination of these cutting-edge cryptographic protocols and blockchain technology will drive the development of the digital world in the next decade, leading to secure data sharing, privacy protection, or more applications now unimaginable.
III. Secure Multi-party Computation and Threshold Signature
After introducing how digital signature protocol affects our lives, and how to help the blockchain build identities and record transactions, we will mention secure multi-party computation (MPC), from where we can see how threshold signatures achieve decentralization. For more about MPC, please refer to our previous posts which detailed the technical background and application scenarios.
MPC, by definition, is a secure computation that several participants jointly execute. Security here means that, in one computation, all participants provide their own private input, and can obtain results from the calculation. It is not possible to get any private information entered by other parties. In 1982, when Prof. Yao proposed the concept of MPC, he gave an example called the “Millionaires Problem” — two millionaires who want to know who is richer than the other without telling the true amount of assets. Specifically, the secure multiparty computation would care about the following properties:
  • Privacy: Any participant cannot obtain any private input of other participants, except for information that can be inferred from the computation results.
  • Correctness and verifiability: The computation should ensure correct execution, and the legitimacy and correctness of this process should be verifiable by participants or third parties.
  • Fairness or robustness: All parties involved in the calculation, if not agreed in advance, should be able to obtain the computation results at the same time or cannot obtain the results.
Supposing we use secure multi-party computation to make a digital signature in a general sense, we will proceed as follows:
  • Key generation phase: all future participants will be involved together to do two things: 1) each involved party generates a secret private key; 2) The public key is calculated according to the sequence of private keys.
  • Signature phase: Participants joining in a certain signature use their own private keys as private inputs, and the information to be signed as a public input to perform a joint signature operation to obtain a signature. In this process, the privacy of secure multi-party computing ensures the security of private keys. The correctness and robustness guarantee the unforgeability of the signature and everyone can all get signatures.
  • Verification phase: Use the public key corresponding to the transaction to verify the signature as traditional algorithm. There is no “secret input” during the verification, this means that the verification can be performed without multi-party computation, which will become an advantage of multi-party computation type distributed signature.
The signature protocol constructed on the idea of ​​secure multiparty computing is the threshold signature. It should be noted that we have omitted some details, because secure multiparty computing is actually a collective name for a type of cryptographic protocol. For different security assumptions and threshold settings, there are different construction methods. Therefore, the threshold signatures of different settings will also have distinctive properties, this article will not explain each setting, but the comparative result with other signature schemes will be introduced in the next section.
IV. Single Signature, Multi-Signature and Threshold Signature
Besides the threshold signature, what other methods can we choose?
Bitcoin at the beginning, uses single signature which allocates each account with one private key. The message signed by this key is considered legitimate. Later, in order to avoid single point of failure, or introduce account management by multiple people, Bitcoin provides a multi-signature function. Multi-signature can be simply understood as each account owner signs successively and post all signatures to the chain. Then signatures are verified in order on the chain. When certain conditions are met, the transaction is legitimate. This method achieves a multiple private keys control purpose.
So, what’s the difference between multi-signature and threshold signature?
Several constraints of multi-signature are:
  1. The access structure is not flexible. If an account’s access structure is given, that is, which private keys can complete a legal signature, this structure cannot be adjusted at a later stage. For example, a participant withdraws, or a new involved party needs to change the access structure. If you must change, you need to complete the initial setup process again, which will change the public key and account address as well.
  2. Less efficiency. The first is that the verification on chain consumes power of all nodes, and therefore requires a processing fee. The verification of multiple signatures is equivalent to multiple single signatures. The second is performance. The verification obviously takes more time.
  3. Requirements of smart contract support and algorithm adaptation that varies from chain to chain. Because multi-sig is not naturally supported. Due to the possible vulnerabilities in smart contracts, this support is considered risky.
  4. No anonymity, this is not able to be trivially called disadvantage or advantage, because anonymity is required for specific conditions. Anonymity here means that multi-signature directly exposes all participating signers of the transaction.
Correspondingly, the threshold signature has the following features:
  1. The access structure is flexible. Through an additional multi-party computation, the existing private key sequence can be expanded to assign private keys to new participants. This process will not expose the old and newly generated private key, nor will it change the public key and account address.
  2. It provides more efficiency. For the chain, the signature generated by the threshold signature is not different from a single signature, which means the following improvements : a) The verification is the same as the single signature, and needs no additional fee; b ) the information of the signer is invisible, because for other nodes, the information is decrypted with the same public key; c) No smart contract on chain is needed to provide additional support.
In addition to the above discussion, there is a distributed signature scheme supported by Shamir secret sharing. Secret sharing algorithm has a long history which is used to slice information storage and perform error correction information. From the underlying algorithm of secure computation to the error correction of the disc. This technology has always played an important role, but the main problem is that when used in a signature protocol, Shamir secret sharing needs to recover the master private key.
As for multiple signatures or threshold signature, the master private key has never been reconstructed, even if it is in memory or cache. this short-term reconstruction is not tolerable for vital accounts.
V. Limitations
Just like other secure multi-party computation protocols, the introduction of other participants makes security model different with traditional point-to-point encrypted transmission. The problem of conspiracy and malicious participants were not taken into account in algorithms before. The behavior of physical entities cannot be restricted, and perpetrators are introduced into participating groups.
Therefore, multi-party cryptographic protocols cannot obtain the security strength as before. Effort is needed to develop threshold signature applications, integrate existing infrastructure, and test the true strength of threshold signature scheme.
VI. Scenarios
1. Key Management
The use of threshold signature in key management system can achieve a more flexible administration, such as ARPA’s enterprise key management API. One can use the access structure to design authorization pattern for users with different priorities. In addition, for the entry of new entities, the threshold signature can quickly refresh the key. This operation can also be performed periodically to level up the difficulty of hacking multiple private keys at the same time. Finally, for the verifier, the threshold signature is not different from the traditional signature, so it is compatible with old equipments and reduces the update cost. ARPA enterprise key management modules already support Elliptic Curve Digital Signature Scheme secp256k1 and ed25519 parameters. In the future, it will be compatible with more parameters.

https://preview.redd.it/c27zuuhdl0q41.png?width=757&format=png&auto=webp&s=26d46e871dadbbd4e3bea74d840e0198dec8eb1c
2. Crypto Wallet
Wallets based on threshold signature are more secure because the private key doesn’t need to be rebuilt. Also, without all signatures posted publicly, anonymity can be achieved. Compared to the multi-signature, threshold signature needs less transaction fees. Similar to key management applications, the administration of digital asset accounts can also be more flexible. Furthermore, threshold signature wallet can support various blockchains that do not natively support multi-signature, which reduces the risk of smart contracts bugs.

Conclusion

This article describes why people need the threshold signature, and what inspiring properties it may bring. One can see that threshold signature has higher security, more flexible control, more efficient verification process. In fact, different signature technologies have different application scenarios, such as aggregate signatures not mentioned in the article, and BLS-based multi-signature. At the same time, readers are also welcomed to read more about secure multi-party computation. Secure computation is the holy grail of cryptographic protocols. It can accomplish much more than the application of threshold signatures. In the near future, secure computation will solve more specific application questions in the digital world.

About Author

Dr. Alex Su works for ARPA as the cryptography researcher. He got his Bachelor’s degree in Electronic Engineering and Ph.D. in Cryptography from Tsinghua University. Dr. Su’s research interests include multi-party computation and post-quantum cryptography implementation and acceleration.

About ARPA

ARPA is committed to providing secure data transfer solutions based on cryptographic operations for businesses and individuals.
The ARPA secure multi-party computing network can be used as a protocol layer to implement privacy computing capabilities for public chains, and it enables developers to build efficient, secure, and data-protected business applications on private smart contracts. Enterprise and personal data can, therefore, be analyzed securely on the ARPA computing network without fear of exposing the data to any third party.
ARPA’s multi-party computing technology supports secure data markets, precision marketing, credit score calculations, and even the safe realization of personal data.
ARPA’s core team is international, with PhDs in cryptography from Tsinghua University, experienced systems engineers from Google, Uber, Amazon, Huawei and Mitsubishi, blockchain experts from the University of Tokyo, AIG, and the World Bank. We also have hired data scientists from CircleUp, as well as financial and data professionals from Fosun and Fidelity Investments.
For more information about ARPA, or to join our team, please contact us at [email protected].
Learn about ARPA’s recent official news:
Telegram (English): https://t.me/arpa_community
Telegram (Việt Nam): https://t.me/ARPAVietnam
Telegram (Russian): https://t.me/arpa_community_ru
Telegram (Indonesian): https://t.me/Arpa_Indonesia
Telegram (Thai): https://t.me/Arpa_Thai
Telegram (Philippines):https://t.me/ARPA_Philippines
Telegram (Turkish): https://t.me/Arpa_Turkey
Korean Chats: https://open.kakao.com/o/giExbhmb (Kakao) & https://t.me/arpakoreanofficial (Telegram, new)
Medium: https://medium.com/@arpa
Twitter: u/arpaofficial
Reddit: https://www.reddit.com/arpachain/
Facebook: https://www.facebook.com/ARPA-317434982266680/54
submitted by arpaofficial to u/arpaofficial [link] [comments]

Interest in a Bitcoin Wallet based on Multi Party Computation?

I'm Ari, a dev from a cybersecurity platform, and we are toying with the idea of creating a bitcoin wallet. Our distributed storage platform built with threshold cryptography (bunkr) is able to issue digital signatures without ever recomposing a signing key. Instead, the key remains distributed among a number of shareholding parties and signatures are computed with secure multi party computation. We have a very beta command line bitcoin wallet as a proof of concept. Our command line prototype currently isn't too different from standard desktop wallets, but the threshold signatures happening under the hood means we could potentially take this in some interesting directions. Some possibilities: 1. Extending the multi-signature possibilities of a bitcoin wallet (arbitrary size t-of-n wallets, plus its privacy preserving to signers since one key is split rather than there being multiple keys). 2. Contracts that control the circumstances under which different parties are authorized to query signatures from a bitcoin wallet (which is distributedly stored). 3. Supporting more cryptocurrencies, elliptic curves, and BIP standards.
What is still to be desired in wallet solutions (if anything) for different facets of the bitcoin community? What directions seem potentially valuable for exploring how threshold cryptography and SMPC can support cryptocurrency custody issues? Interest in demo-ing our wallet?
submitted by superarius to Bitcoin [link] [comments]

My growing collection of info about NEO Vol. 2

It can be very time consuming to keep up to date on a single blockchain. If you just heard about NEO a few weeks ago it would be impossible catch up on past occurrences. I’m going to try and simplify the past, present and future as much as I can into one well thought-out post.
 
I made the first Volume around 6 weeks ago
https://www.reddit.com/CryptoCurrency/comments/75mul5/my_growing_collection_of_info_about_neo/
 
I felt it was time for an update since so much has happened.
If you want the up to date version in between Vol updates visit NEO and its located on the #3 top post of all time.
[Note: This Post is at max characters (40,000), some information will be left out]
 
https://imgur.com/a/NBI7S (img for mobile backround)
 

NEO dApps / Partnerships / ICO's

https://neo.org/dapps
 
Red Pulse $RPX (ICO Completed)
A next generation intelligence and content ecosystem for China markets
https://coin.red-pulse.com/
 
Neon Exchange $NEX (Upcoming ICO on NEO) (strategic collaboration with NEO)
NEX is a platform for complex decentralized cryptographic trade and payment service creation
https://twitter.com/neonexchange
https://neonexchange.org/
https://neonexchange.org/pdfs/whitepaper_v1.1.pdf
 
Elastos $ELA (strategic collaboration with NEO)
Blockchain Driven Internet
NEO will make itself compatible with Elastos, and Elastos will also support NEOVM, and allow the writing of smart contracts with established languages, such as C# and Java. Elastos will be an OS for the Blockchain, and NEO can help developers quickly create Blockchain applications. The combination of the two could connect different developers from around the world, forming a strong ecosystem for application development―all to better serve a Smart Economy.
http://www.elastos.org/
https://twitter.com/ElastosI
https://www.reddit.com/NEO/comments/6r1a6f/neo_and_elastos_reaching_strategic_collaboration/
 
Ontology $ONT (Partnership with NEO)
Ontology Network (ONT) is a blockchain/distributed ledger network which combines distributed identity verification, data exchange, data collaboration, procedure protocols, communities, attestation, and various industry-specific modules. Together this builds the infrastructure for a peer-to-peer trust network which is cross-chain, cross-system, cross-industry, cross-application, and cross-device.
 
NEO will be the primary digital assets service provider for clearing and settlement on Ontology. There is no contract between Ontology and NEO now, though Ontology and NEO already have an established partnership. One thing on the roadmap is that in the future business scenarios on Ontology want to hold ICOs they will be able to on NEO.
https://ont.io/#/home
https://www.reddit.com/NEO/comments/7f8bvb/ontology_network_ama_answers/
https://www.youtube.com/watch?v=lPWwcgpc3P0
https://twitter.com/OntologyNetwork?lang=en
https://imgur.com/a/Emo4Q
 
The Key $TKY (Upcoming ICO ) (strategic cooperation with NEO)
THEKEY is a Decentralized Ecosystem of Identity Verification Tool Using National Big-data and Blockchain. THEKEY team is now developing second generation on-line identify verification technology. NEO Smart Economy = Digital Asset + Smart Contract + Digital Identity, while digital identity is an indispensable element. With NEO technical support, the strategic corporation between THEKEY and NEO will provide better protection to your digital asset.
https://www.thekey.vip/
https://www.reddit.com/NEO/comments/7areac/ama_on_9th_nov_thekey_a_decentralized_ecosystem/
 
Qlink $QLC (Partnership with NEO) (Multi-chain) (Upcoming ICO on NEO)
World’s First Decentralized Mobile Network
Qlink, a decentralized mobile network, is dedicated to constructing an open-source telecom infrastructure on blockchain.
https://twitter.com/QlinkMobi
https://www.qlink.mobi/f/qlink
https://neonewstoday.com/general/qlink-partner-with-neo/
 
PeerAtlas $ATLAS (Upcoming ICO on NEO)
ATLAS: A Digital Token Supporting an Open-Source Medical Encyclopedia
http://www.peeratlas.com/
http://www.peeratlas.com/whitepaper.pdf
https://neonewstoday.com/interviews/peeratlas-q-a-colin-closse
 
High Performance Blockchain $HPB (ICO Completed)
HPB is a new blockchain architecture, positioned as an easy-to-use, highperformance blockchain platform. It aims to extend the performance of distributed applications to meet real world business needs. This is achieved by creating an architecture similar to an API operating system. The software architecture provides accounts, identity and authorization management, policy management, databases, and asynchronous communication on thousands of CPUs, FPGAs or clustered program schedulers. This blockchain is a new architecture that can support millions of transactions per second and support authorizations within seconds.
http://www.gxn.io/en.html
http://www.gxn.io/files/hpb_white_paper_en.pdf
https://www.allcoin.com/markets/HPB-BTC/0/
 
Aphelion $APH (ICO In Progress)
A Revolutionary Decentralized P2P Exchange Solution
https://aphelion.org/
https://aphelion.org/wp.html
https://github.com/Aphelion
 
Zeepin $ZPT (Crowd sale will start Jan 18, 2018) (Upcoming ICO on NEO)
The Distributed Creative New Economy.
Zeepin, a decentralized innovation community, is dedicated to promoting highly efficient circulation of innovation assets.
https://www.zeepin.io/
https://www.zeepin.io/Whitepaper_En_v1.0.pdf
https://github.com/zeepin
https://www.reddit.com/NEO/comments/7f94vs/ama_from_today_nov_24th_zeepin_the_distributed/
 
Stokit (Upcoming ICO on NEO)
Decentralized cloud storage
https://stokit.io/
Whitepaper release: 30th of November 2017
 
Universal Health Coin (Upcoming ICO on NEO )
http://www.universalhealthcoin.com/
 
AdEx (dApp built on NEO)
http://adex.network/
https://twitter.com/AdEx_Network/status/897529249661423616
 
 
Alphacat
More Information to come soon after Video is released from the Meetup
https://www.meetup.com/de-DE/Onchains-Blockchain-Project-Launch-NEO-Ecosystem-Sharing/events/245101761/
 
DeepBrain
More Information to come soon after Video is released from the Meetup
https://www.meetup.com/de-DE/Onchains-Blockchain-Project-Launch-NEO-Ecosystem-Sharing/events/245101761/
 
 

City of Zion (CoZ)

https://cityofzion.io/
https://medium.com/@cityofzion
https://medium.com/proof-of-working
https://steemit.com/@canesin
 
City of Zion (CoZ) is an independent group of open source developers, designers and translators formed to support the NEO BlockChain core and ecosystem.
CoZ primarily operates through the community Slack and CoZ Github, central places where the community shares knowledge and contributes to projects.
CoZ is neither a corporation, nor a consulting firm or a devshop / for-hire group.
Members
https://imgur.com/a/Gc9jT
CoZ aims to be low barrier of entry, the process is straightforward:
  1. Join the channel #develop.
  2. Fork or create a project.
  3. Publish as open source.
  4. After a couple of contributions a CoZ council member will invite you to the proper channel for your contributions.
  5. Receive rewards and back to 3.
Unit testing - Ongoing effort to implement code coverage for the core
Integration testing - Tools for automated testing, performance metrics and functionality validation on private test nets
Continuous integration - Automated multi-platform testing of all pull requests at GitHub.
Deployment pipeline - Automated tools and processes to ensure fast and reliable updates upon code changes
New C# implementation (NEO2) - Improve code quality, speed & testability
 
Roadmap
https://imgur.com/a/4CDhw
 
dApps competition
https://cityofzion.io/dapps/1
10 prizes of 1350 GAS, with 500 GAS to be used for smart contract deployment.
Deadline was the 16 of November 11:59 EST.
http://cityofzion.io/dapps/1 (Check out page to view websites / Githubs)
1st: NEO Smart IoT
2nd: imusify
3rd: Chain Line
4th: BlockAuth
5th: Phantasma
6th: NeoTrade
7th: Turing Complete Smart Contract
8th: KRYPTON
9th: Switcheo
10th: TripShares
https://drive.google.com/drive/folders/0B4wu5lNlukwybEstaEJMZ19kbjQ
 

NEO and Microsoft China Dev Competition

 

Competition Rules

  1. The competition will open on November 20, 2017 and close at 11:59 PM Beijing time (GMT+8), March 10, 2018. Please sign up and submit your work before the deadline.
  2. Participants are required to develop on the NEO blockchain. Please refer to github.com/neo-project and docs.neo.org for relevant codes and technical documents.
  3. During the competition, developers are free to collaborate and to submit their work as a team.
  4. Teams or individuals who fail to submit their work before 11:59 PM Beijing time (GMT+8), March 10, 2018 will not be eligible for prizes.
  5. Your submission must contain executable programs and codes.
 
$150,000 First prize(1 team)
$50,000 Second prize(2 teams)
$30,000 Third prize(3 teams)
$15,000 Award of merit(10 teams)
 
A judging panel made up of NEO founder Da Hongfei,NEO Founder & Core Developer Erik Zhang, CoZ founder Fabio, Elastos founder Chen Rong,ONT Founder Li Jun and experts from Microsoft China will select 16 winners out of all the contestants for a bounty pool worth a total of USD 490,000.
 
Total sign-ups :194 Data collected as of 2017/11/28
 
Country Sign-ups
China 48
USA 31
India 12
Norway 7
France 6
Other 90
 
https://neo.org/competition.html
 
 

ICO Firm

 
Projectico
A service that helps others launch a token sale if it is right for their cause and will be using NEO in most instances going forward. We have created a foundation that is bringing compliance and trust to the marketplace for ICOs and allowing international people to still participate.
https://www.projectico.io/
https://www.reddit.com/NEO/comments/7dd3s0/ama_on_20_nov_projectico_a_us_based_turnkey_token/
 
 

Key notes from the White Paper

http://docs.neo.org/en-us/
 
Digital Assets
Digital assets are programmable assets that exist in the form of electronic data. With blockchain technology, the digitization of assets can be decentralized, trustful, traceable, highly transparent, and free of intermediaries.
 
Digital Identity
Digital identity refers to the identity information of individuals, organizations, and other entities that exist in electronic form.
Our verification of identity when issuing or using digital identities includes the use of facial features, fingerprint, voice, SMS and other multi-factor authentication methods.
 
Smart Contracts
The NeoContract smart contract system is the biggest feature of the seamless integration of the existing developer ecosystem. Developers do not need to learn a new programming language but use C#, Java and other mainstream programming languages in their familiar IDE environments (Visual Studio, Eclipse, etc.) for smart contract development, debugging and compilation. NEO's Universal Lightweight Virtual Machine, NeoVM, has the advantages of high certainty, high concurrency, and high scalability. The NeoContract smart contract system will allow millions of developers around the world to quickly carry out the development of smart contracts.
 
Economic Model
NEO has two native tokens, NEOand NeoGas NEO represents the right to manage the network. Management rights include voting for bookkeeping, NEO network parameter changes, and so on. The minimum unit of NEO is 1 and tokens cannot be subdivided. GAS is the fuel token for the realization of NEO network resource control. The NEO network charges for the operation and storage of tokens and smart contracts, thereby creating economic incentives for bookkeepers and preventing the abuse of resources. The minimum unit of GAS is 0.00000001.
 
Distribution Mechanism
NEO's 100 million tokens are divided into two portions. The first portion is 50 million tokens distributed proportionally to supporters of NEO during the crowdfunding. This portion has been distributed.
The second portion is 50 million NEO managed by the NEO Council to support NEO's long-term development, operation and maintenance and ecosystem. The NEO in this portion has a lockout period of 1 year and is unlocked only after October 16, 2017. This portion will NOT enter the exchanges and is only for long-term support of NEO projects. The plans for it are as below:
▪ 10 million tokens (10% total) will be used to motivate NEO developers and members of the NEO Council
▪ 10 million tokens (10% total) will be used to motivate developers in the NEO ecosystem
▪ 15 million tokens (15% total) will be used to cross-invest in other block-chain projects, which are owned by the NEO Council and are used only for NEO projects
▪ 15 million (15% total) will be retained as contingency
▪ The annual use of NEO in principle shall NOT exceed 15 million tokens
 
GAS distribution
GAS is generated with each new block. The initial total amount of GAS is zero. With the increasing rate of new block generation, the total limit of 100 million GAS will be achieved in about 22 years. The interval between each block is about 15-20 seconds, and 2 million blocks are generated in about one year. According to this release curve, 16% of the GAS will be created in the first year, 52% of the GAS will be created in the first four years, and 80% of the GAS will be created in the first 12 years. GAS will be distributed proportionally in accordance with the NEO holding ratio, recorded in the corresponding addresses. NEO holders can initiate a claim transaction at any time and claim these GAS tokens at their holding addresses.
 
Consensus mechanism: dBFT
The dBFT is called the Delegated Byzantine Fault Tolerant, a Byzantine fault-tolerant consensus mechanism that enables large-scale participation in consensus through proxy voting. The holder of the NEO token can, by voting, pick the bookkeeper it supports. The selected group of bookkeepers, through BFT algorithm, reach a consensus and generate new blocks. Voting in the NEO network continues in real time, rather than in accordance with a fixed term.
 
Cross-chain assets exchange agreement
NeoX has been extended on existing double-stranded atomic assets exchange protocols to allow multiple participants to exchange assets across different chains and to ensure that all steps in the entire transaction process succeed or fail together. In order to achieve this function, we need to use NeoContract function to create a contract account for each participant. If other blockchains are not compatible with NeoContract, they can be compatible with NeoX as long as they can provide simple smart contract functionality.
 
Cross-chain distributed transaction protocol
Cross-chain distributed transactions mean that multiple steps of a transaction are scattered across different blockchains and that the consistency of the entire transaction is ensured. This is an extension of cross-chain assets exchange, extending the behavior of assets exchange into arbitrary behavior. In layman's terms, NeoX makes it possible for cross-chain smart contracts where a smart contract can perform different parts on multiple chains, either succeeding or reverting as a whole. This gives excellent possibilities for cross-chain collaborations and we are exploring cross-chain smart contract application scenarios.
 
Distributed Storage Protocol: NeoFS
NeoFS is a distributed storage protocol that utilizes Distributed Hash Table technology. NeoFS indexes the data through file content (Hash) rather than file path (URI). Large files will be divided into fixed-size data blocks that are distributed and stored in many different nodes
 
Anti-quantum cryptography mechanism: NeoQS
The emergence of quantum computers poses a major challenge to RSA and ECC-based cryptographic mechanisms. Quantum computers can solve the large number of decomposition problems (which RSA relies on) and the elliptic curve discrete logarithm (which ECC relies on) in a very short time. NeoQS (Quantum Safe) is a lattice-based cryptographic mechanism.
 

Reasons for choosing dBFT over PoW and PoS

 
With the phenomenal success of Bitcoin and its increasing mainstream adoption, the project’s unbounded appetite for energy grew accordingly. Today, the average Bitcoin transaction costs as much energy as powering 9.3 average American homes for 1 day.
https://digiconomist.net/bitcoin-energy-consumption#assumptions
This mind boggling amount of energy is not, as it is commonly believed, being wasted. It is put to good use: securing the Bitcoin network and rendering attacks on it infeasible. However, the cost of this security mechanism and its implications for an increasingly warming and resource hungry planet led almost the entire crypto industry to the understanding that an alternative has to be found, at least if we’re interested in seeing blockchain technology gaining overwhelming mainstream adoption.
The most popular alternative to PoW, used by most alternative cryptocurrency systems, is called Proof-of-Stake, or PoS. PoS is highly promising in the sense that it doesn’t require blockchain nodes to perform arduous, and otherwise useless, cryptographic tasks in order to render potential attacks costly and infeasible. Hence, this algorithm cuts the power requirements of PoS blockchains down to sane and manageable amounts, allowing them to be more scalable without guzzling up the planet's energy reserves.
As the name suggests, instead of requiring proof of cryptographic work, PoS requires blockchain nodes to proof stake in the currency itself. This means that in order for a blockchain node to be eligible for a verification reward, the node has to hold a certain amount of currency in the wallet associated with it. This way, in order to execute an attack, a malevolent node would have to acquire the majority of the existing coin supply, rendering attacks not only costly but also meaningless, since the attackers would primarily harm themselves.
PoS, as well as PoW, simply cause the blockchain to fork into two alternative versions if for some reason consensus breaks. In fact, most blockchains fork most of the time, only to converge back to a single source of truth a short while afterwards.
By many crypto enthusiasts, this obvious bug is very often regarded as a feature, allowing several versions of the truth to survive and compete for public adoption until a resolution is generated. This sounds nice in theory, but if we want to see blockchain technology seriously disrupt and/or augment the financial sector, this ever lurking possibility of the blockchain splitting into two alternative versions cannot be tolerated.
Furthermore, even the fastest PoS blockchains out there can accomodate a few hundred transactions per second, compare that to Visa’s 56,000 tx/s and the need for an alternative becomes clear as day.
A blockchain securing global stock markets does not have the privilege to fork into two alternative versions and just sit and wait it out until the market (or what’s left of it) declares a winner. What belongs to whom should be engraved in an immutable record, functioning as a single source of truth with no glitches permitted.
After investigating and studying the crypto industry and blockchain technologies for several years, we came to the conclusion that the delegated Byzantine Fault Tolerance alternative (or dBFT) is best suited for such a system. It provides swift transaction verification times, de-incentivises most attack vectors and upholds a single blockchain version with no risk of forks or alternative blockchain records emerging - regardless of how much computing power, or coins an attacker possesses.
The term Byzantine Fault Tolerance (BFT) derives its name from the Byzantine Generals problem in Game Theory and Computer Science, describing the problematic nature of achieving consensus in a distributed system with suboptimal communication between agents which do not necessarily trust each other.
The BFT algorithm arranges the relationship between blockchain nodes in such a way that the network becomes as good as resilient to the Byzantine Generals problem, and allows the system to remain consensus even if some nodes bare malicious intentions or simply malfunction.
To achieve this, Antshare’s version of the delegated BFT (or dBFT) algorithm acknowledges two kinds of players in the blockchain space: professional node operators, called bookkeeping nodes, who run nodes as a source of income, and users who are interested in accessing blockchain advantages. Theoretically, this differentiation does not exist in PoW and most PoS environments, practically, however, most Bitcoin users do not operate miners, which are mostly located in specialized venues run by professionals. At Antshares we understand the importance of this naturally occurring division of labor and use it to provide better security for our blockchain platform.
Accordingly, block verification is achieved through a consensus game held between specialized bookkeeping nodes, which are appointed by ordinary nodes through a form of delegated voting process. In every verification round one of the bookkeeping nodes is pseudo-randomly appointed to broadcast its version of the blockchain to the rest of the network. If ⅔ of the remaining nodes agree with this version, consensus is secured and the blockchain marches on. If less than ⅔ of the network agrees, a different node is appointed to broadcast its version of the truth to the rest of the system, and so forth until consensus is established.
In this way, successful system attacks are almost impossible to execute unless the overwhelming majority of the network is interested in committing financial suicide. Additionally, the system is fork proof, and at every given moment only one version of the truth exists. Without complicated cryptographic puzzles to solve, nodes operate much faster and are able to compete with centralized transaction methods.
https://www.econotimes.com/Blockchain-project-Antshares-explains-reasons-for-choosing-dBFT-over-PoW-and-PoS-659275
 

OnChain

 
It is important to note the technical difference between Onchain and NEO. Onchain is a private VC-backed company with over 40 employees. NEO is a public platform with different community-led groups contributing to this public project. There exists NEO council comprised of the original NEO creators, employees from Onchain, full time NEO council members and there is also the first Western based group called City of Zion.
Onchain, a Shanghai-based blockchain R&D company, first started developing Antshares in February of 2014 which will eventually become the foundation of DNA. Onchain was founded by CEO Da HongFei and CTO Erik Zhang in response to the attention from private companies garnered by the development of Antshares, China’s first public blockchain. In contrast to the weeks-old start-ups launching ICOs that is happening currently in the blockchain world, it took them 22 long months of R&D to even begin providing services to their first customers. Finally, in April 2016, the first whitepaper on consensus protocol from China was born — the dBFT (delegated Byzantine Fault Tolerance) protocol.
2016 was a busy year for Onchain and they really picked up the pace that year. Other than continuing the development of Antshares, brushing shoulders with Fortune 500 companies, Onchain became the first Chinese blockchain company to join Hyperledger — an open source blockchain project started by the Linux Foundation specifically focusing on the development of private and consortium chains for businesses.
In June of 2016, during the first of many future partnerships with Microsoft China, Onchain founded Legal Chain specifically targeting the inadequacies of the digital applications within the legal system. In 2005, (Digital Signature Act) was passed into national law which permitted an effective digital signatures to gain the same legal rights as a real signature.
In company with Microsoft China, they are also aiming to integrate the technology with Microsoft’s face and voice recognition API function to kick start this digital revolution within the legal system. At the same time, a partnership was formed with FaDaDa, a third-party platform for electronic contracts that has processed over 27 million contracts to date, to provide secure evidence storage with DNA. If that’s not enough, they were also voted as KPMG’s top 50 Fintech Company in China and established a relationship with the Japanese Ministry of Economy, Trade and Industry which led to the recent tour to Japan. Finally, at the end of 2016 they announced a partnership with Alibaba to provide attested email service for Ali Cloud with Legal Chain where it provides a proof-of-existence for a blockchain-powered email evidence repository for enterprise-level use.
Fosun Group, China’s largest private conglomerate, have recently invested into Onchain in order to apply DNA across all of its businesses. Currently, Fosun International has a market cap of 102.98 billion dollars on the Hong Kong Stock Exchange and that is only its international branch.
The role of Onchain so far is reminiscent of Ethereum’s EEA in addition to a stronger emphasis of governmental cooperation. Onchain has identified the shortcomings of present laser focus of hype on public platforms such as NEO and Ethereum and addressing that with DNA. DNA envisions a future where a network of assorted, specifically designed blockchains serving private enterprises, consortiums, government and the public communicating with each other forming an interconnected blockchain network.
This is the goal of DNA — infiltrating every little inefficient niche that had no better alternatives before the invention of blockchain. What is especially critical to remember during this explosive time of hype driven partly by the obscene degree of greed is that not every little niche that blockchain can fill will be holding its own little ICO. Some of those efficiencies gained will simply be consumed by companies privately or by public systems such as the legal system.
 
https://hackernoon.com/neo-onchain-and-its-ultimate-plan-dna-4c33e9b6bfaa
http://www.onchain.com/
https://github.com/DNAProject/DNA
https://siliconangle.com/blog/2016/10/20/onchain-partners-with-alibaba-for-blockchain-powered-email-evidence-repository/
https://www.reuters.com/article/us-fosun-blockchain/chinas-fosun-invests-in-local-version-of-bitcoin-tech-blockchain-idUSKCN1B30KM
 

Traveling

 
August 8th to August 12th
From August 8th to August 12th, 2017, the NEO core team, led by founder & CEO Da Hongfei will travel to Japan to explore the forefront of Japan's Blockchain innovation. This trip represents the first in a series of trips around the world with the goal to foster international cooperation's and to keep up with the fast pace in Blockchain innovation. Starting in Japan, the NEO core team will visit famous local Blockchain research institutions and active communities to engage in bilateral communication. NEO will meet with Japanese tech-celebrities to gain insights about the latest developments in the Japanese Blockchain and digital currency community. Additionally, Japanese local tech media will conduct an interview allowing NEO to present its development status and its latest technological innovations.
 
https://www.reddit.com/NEO/comments/6ry4s9/japan_the_neo_core_team_starts_out_on_an/
https://www.youtube.com/watch?v=SgTQ32CkxlU
https://www.reddit.com/NEO/comments/6ssfx1/neo_meetup_in_tokyo_august_10th_2017_2100h/
 
19th August, 2017
Blockchain X Series - NEO example applications
 
20th August, 2017
NEO and Microsoft Azure host a blockchain programming training in Shanghai
 
23rd August, 2017
INNOxNEO Blockchain Open Nights: 2nd Meeting
 
24th August, 2017
NEO Meetup in Taipei
 
13th September, 2017
INNOxNEO Blockchain Open Nights: 3rd Meeting
 
14th September, 2017
NEO Shanghai Meetup with NEO team
 
24th September, 2017
NEO Blockchain Programming Day - Hangzhou Station
 
27th September, 2017
INNOxNEO Blockchain Open Nights: 4th Meeting
 
27th September, 2017
First London NEO Developer Meetup!
 
4th October, 2017
First San Francisco NEO Developer Social!
 
14th-16th October, 2017
GNOME.Asia Summit 2017, Chongqing, China
 
21st October, 2017
NEO JOY, Exploring Blockchain application, Nanjing, China
 
26th October, 2017
Inaugural Global Fintech & Blockchain China Summit 2017
 
28th October, 2017
NEO meetup in Seoul, Korea:
 
28th October, 2017
NEO Blockchain Programming Day - Beijing Railway Station:
 
November 12th, 2017
NEO JOY in Hangzhou: Considerations on Basic Service Facilities in Blockchains:
 
November 18th - 19th, 2017
NEO attending China open source conference 2017:
 
November 21st, 2017
NEO attending swissnex China in Shanghai:
 
November 27th, 2017
ONCHAIN meetup NYC, Onchain's Blockchain Project Launch + NEO Ecosystem Sharing Session
 
November 27th, 2017
China&USA NEO blockchain meetup in Manhattan NYC
 
November 30th, 2017
Meetup San Francisco: The Future Of Blockchain With The Founders of NEO, Elastos, & Stellar
 
December 4th, 2017
NEO attending Blockchain World Conference in Bangkok:
 
December 7th, 2017
NEO meetup Singapore:
 
December 13th, 2017
NEO meetup at Cambridge:
 

Networks proves itself with the first ICO

 
ICOs, on other platforms such as Ethereum, often resulted in a sluggish network and transaction delays. While NEO’s dBFT consensus algorithm is designed to achieve consensus with higher efficency and greater network throughputt, no amount of theoretical calculations can simulate the reality of real-life conditions.
 

Key Observations

 
Smart Contract Invocations:
A total of 13,966 smart contracts invocations were executed on the NEO network over this time period, of which, nearly all called the RPX smart contract method mintTokens. A total of 543,348,500 RPX tokens were successfully minted and transferred to user accounts, totalling 10,097 smart contract executions.
 
Refunded Invocations:
A total of 4182 refund events were triggered by the smart contract method mintTokens. (Note: RPX has stated that these refunds will be processed within the next two weeks.)
 
Crowdsale Statistics:
A successful mintTokens execution used around 1043 VM operations, while an execution that resulted in a refund used 809 VM operations. Within the hour and six minutes that the token sale was active, a total of 12,296,409 VM operations were executed. A total of 9,575 unique addresses participated in the RPX ICO. Half of these, approximately 4,800 unique addresses, participated through CoZ’s Neon wallet. The top 3 blocks with the most transactions were block 1445025 (3,242 transactions), block 1444902 (2,951 transactions), and block 1444903 (1609 transactions).
 
Conclusion on Network Performance
At the moment, the consensus nodes for the NEO network are operated by the NEO Council in China. By Q1 2018, NEO Council aims to control less than two-thirds of the consensus nodes.
We are pleased to note that the NEO network continuted to operate efficiently with minimal network impact, even under extreme network events. Block generation time initially slowed down to 3 minutes to process the largest block, but quickly recovered to approximately 25 seconds. Throughout the entire RPX ICO, consensus nodes were able to achieve consensus and propagate new block transactions to the rest of the network. In closing, while we consider this performance to be excellent, NEO Council and City of Zion areworking closely together on upgrades, that will increase the throughputs of the NEO network.
 

Hyperledger

 
Members and governance of Hyperledger:
Early members of the initiative included blockchain ISVs, (Blockchain, ConsenSys, Digital Asset, R3, Onchain), well-known technology platform companies (Cisco, Fujitsu, Hitachi, IBM, Intel, NEC, NTT DATA, Red Hat, VMware), financial services firms (ABN AMRO, ANZ Bank, BNY Mellon, CLS Group, CME Group, the Depository Trust & Clearing Corporation (DTCC), Deutsche Börse Group, J.P. Morgan, State Street, SWIFT, Wells Fargo), Business Software companies like SAP, Systems integrators and others such as: (Accenture, Calastone, Credits, Guardtime, IntellectEU, Nxt Foundation, Symbiont).
The governing board of the Hyperledger Project consists of twenty members chaired by Blythe Masters, (CEO of Digital Asset), and a twelve-member Technical Steering Committee chaired by Christopher Ferris, CTO of Open Technology at IBM.
http://www.8btc.com/onchain-hyperledger
https://en.wikipedia.org/wiki/Hyperledger
 
“As a leading open-source contributor in China’s blockchain community, Onchain shares the same values as the Linux Foundation and the Hyperledger project intrinsically. We believe international collaboration plus local experience are key to the adoption of distributed ledger technology in China; we are also very excited to see other Chinese blockchain startups join Hyperledger and look forward to adding our combined expertise to the project.” Da Hongfei, Founder and CEO of Onchain
https://hyperledger.org/testimonials/onchain
 

Important Articles

 
Response to baseless FUD
https://medium.com/@MalcolmLerideresponse-to-baseless-fud-9b7e5e2eeeea
 
Distribution technology DNA framework went through the national block chain standard test On May 16th, the first China block chain development competition in Hangzhou announced that Onchain, became the first through the national standard test block system.
http://www.51cto.com/art/201705/539824.htm?mobile
 
Da Hongfei and OnChain working relationship with Chinese Government
https://finance.sina.cn/2017-04-13/detail-ifyeifqx5554606.d.html?from=wap
http://www.gz.chinanews.com/content/2017/05-28/73545.shtml
 
The Chinese government is reportedly preparing to allow the resumption of cryptocurrency trading in the country in the coming months, with the required anti-money laundering (AML) systems and licensing programs in place.
https://coingeek.com/cryptocurrency-trading-poised-to-make-a-return-in-china-report/
 
Japanese Ministry of Economy, Trade and Industry - Working with OnChain and NEO
http://www.8btc.com/onchain-ribenjingjichanyesheng
 
Notice NEO will be invited to attend the INNO x Austrade China-Australia chain high-end exchange
AUSTRADE - The Australian Trade and Investment Commission is the official government, education and investment promotion agency of the Australian Government
https://mp.weixin.qq.com/s/LmXnW7MtzOX_fqIo7diU9A
 
Source for NEO/OnChain Microsoft Cooperation:
http://www.8btc.com/onchain-microsoft
 

Da Hongfei quotes

 
"There is no direct cooperation between Alibaba and NEO/Onchain, other than their mailbox service is using Law Chain to provide attested email service. In terms of Microsoft, yes we have cooperation with Microsoft China because NEO is built with C# and .NET Core, and NeoContract is the first in the world to support writing smart contract with C#"
https://www.reddit.com/NEO/comments/6puffo/we_are_da_hongfei_and_erik_zhang_founders_of_neo/dksm5ga/
 
"We have pretty good communication with government, with regulators. They don't have any negative impression with NEO and they like our technology and the way we deal with things. Regulation is not an issue for us"
https://www.youtube.com/watch?v=qpUdTIQdjVE&feature=youtu.be&t=1m16s
 
“Before they started cleaning up the market, I was asked for information and suggestions” “I do not expect the government to call me in the short-term and say, ‘Let’s use NEO as the blockchain technology infrastructure of China.’ But in the medium term? Why not? I think it’s possible.”
https://medium.com/@TheCoinEconomy/neo-founder-da-hongfei-advised-china-on-ico-exchange-ban-says-govt-4631b9f7971
 

Upcoming Roadmap

 
Decentralization of consensus nodes
▪ P2P Network optimization – Network optimizations to ensure fast block generation after decentralization.
▪ Voting Algorithm Optimization – Adjustments in voting algorithm to prevent identified attack vectors.
▪ Candidate List Website – Published list of candidates so that voters know who they are voting for.
▪ NEO Council Consensus Node < 2/3 – NEO Council shall operate less than two thirds of consensus nodes by the end of quarter 1, 2018.
 
Our original plan was to start decentralize in Q1 2018. We are however growing faster than expected and cannot accept the risk with being as centralized as we currently are. The conclusion is that we re-prioritize and start the process of decentralizing today. We believe that NEO community groups and exchanges will be suitable to run consensus nodes; community groups already know the technology, and exchanges are already running full nodes with high uptime and monitoring. We welcome interested parties to reach out to us on [email protected]. A NEP to encourage voting will be presented in the coming weeks.
https://neo.org/blog/Details/3016
 
Universal Data Format for Wallet/Node Prog.
▪ NEP2 – Private Key Encryption/Decryption (2017Q4) - Method for encrypting and encoding a passphrase-protected private key.
▪ NEP3 – Universal Data Format (2017Q4) – Standard data format to allow easier wallet and node programming.
https://neo.org/en-us/blog/details/65
 
Promotion/Ecosystem
▪ Globally Legal Token-raising Framework (2017Q4) – Following government interest to regulate ICO’s, NEO will complete a framework to raise tokens legally in all major markets by the end of 2017.
▪ NEO DevCon 1 (2017Q4) – First NEO Development Conference! More details at later date.
▪ CoZ Funding (2017Q4) – Continuous funding plan for CoZ covering next 5 years.
▪ Seed Projects (2017Q4) – First seed projects to be cross-invested with the dedicated NEO pool.
https://neo.org/en-us/blog/details/65
 

NEO Github

https://github.com/neo-project
 
NEO Smart Economy https://github.com/neo-project/neo
1.2k Stars
383 Forks
327 commits
17 contributors
 
neo-gui https://github.com/neo-project/neo-gui
 
examples-csharp https://github.com/neo-project/examples-csharp
 
proposals https://github.com/neo-project/proposals
 
 

CityOfZion Github

https://github.com/CityOfZion
 
awesome-neo https://github.com/CityOfZion/awesome-neo
A curated list of awesome NEO libraries, applications and resources.
14 contributors
 
neon-wallet https://github.com/CityOfZion/neon-wallet
380 Stars
118 Forks
392 commits
29 contributors
 

DNAProject Github

https://github.com/DNAProject/DNA
 
NEO/GAS Donations welcome: ASdNxSa3E8bsxCE9KFKBMm3NA43sYJU9qZ
submitted by NEOcryptotrader to CryptoCurrency [link] [comments]

TRON CLASS 096 - What is Elliptic Curve? Elliptic Curve Cryptography Overview - YouTube 'Dope' Becomes First Film to Accept Bitcoin Elliptic-Curve Cryptography  Part 3: Elliptic Curves over Finite Fields  Cryptography Meet the Blockchain Startups (Elliptic, Coin Sciences, Blockchain), London Blockchain Conference

And there is no recourse because Bitcoin is unregulated. 51 Percent Attacks. The so-called over 50 percent or 51 percent attack is a security concern for Bitcoin though not one that is easy to carry out. The increasing difficulty of mining Bitcoin has meant that miners get into pools to harmonize their computational power. Wir wollen Elliptic mit unseren Kontakten zur Strafverfolgungsbehörde und der Regierung bei der Expansion in den USA helfen.” Das in England ansässige Startup hatte bereits im Jahr 2014 für einen versicherten Bitcoin-Storage Dienst 2 Mio US-Dollar erhalten. Bitcoin storage service Elliptic has obtained ISAE 3402 accreditation from auditing specialist KPMG. ECC is Public-Key Cryptography. There are many types of public-key cryptography, and Elliptic Curve Cryptography is just one flavor. Other algorithms include RSA, Diffie-Helman, etc.I’m going to give a very simple background of public-key cryptography as a jumping-off point so that we can discuss ECC and build on top of these ideas. Elliptic Vault - Insured Storage for Bitcoins We're proud to announce Elliptic Vault - the world’s first insured Bitcoin storage service. Elliptic Vault offers protection against the loss or theft of Bitcoin holdings, with insurance underwritten by Lloyd's of London.

[index] [42706] [21356] [29331] [47727] [50085] [34084] [47187] [16991] [12879] [47025]

TRON CLASS 096 - What is Elliptic Curve?

How are cryptographic primitives employed in Bitcoin? What are hashes and digital signatures? How does elliptic curve cryptography work? See details in Chapters 4 and 6 of 'Mastering Bitcoin ... Simon Hamblin (CEO, Netagio), James Smith (CEO, Elliptic), Will O'Brien (CEO, Bitgo) and Frederic Thenault (CEO, iceVault) discuss the future of Bitcoin Storage New bitcoin technology can tell banks where coins come from with ... Elliptic, a bitcoin analytics and storage startup based in London, thinks it's just made a huge breakthrough that could make ... What is Elliptic Curve? Public-key cryptography sometimes uses data storage based on the algebra behind elliptic curves. This is because this type of data storage detects common corruption issues. This video is unavailable. Watch Queue Queue. Watch Queue Queue

#