Bitcoin address formats and prefixes - All Bitcoin private

btc2sms

Send and receive bitcoin purely via sms.
[link]

CryptoAustralia

WELCOME TO THE WORLD OF CRYPTOCURRENCY! Crypto Australia is a subreddit for Australians and New Zealanders to talk about anything related to crypto.
[link]

Technical: Taproot: Why Activate?

This is a follow-up on https://old.reddit.com/Bitcoin/comments/hqzp14/technical_the_path_to_taproot_activation/
Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners?
And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess.
First, let's consider some principles of Bitcoin.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so).
So, how does Taproot affect those principles?

Taproot and Your /Coins

Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash).
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input).
However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits!
Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh?
With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save!
And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well!
(P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1)
Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service!
So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win!
(even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot)
And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!

Taproot and Your Contracts

No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade.
So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust.
Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade.
However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade.
In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address.
Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants).
But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer).
Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos).
(technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).

Taproot and Your Contracts, Part 2: Cryptographic Boogaloo

Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code.
This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded.
And you can do that, with HTLCs, today.
Of course, HTLCs do have problems:
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar".
Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given public key to you.
Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige).
(Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key).
So:
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script.
(technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)

Quantum Quibbles!

Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable??
Well, in theory yes. In practice, they probably are not.
It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash.
When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key.
So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key.
(public keys should be public, that's why they're called public keys, LOL)
And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions.
So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort.
Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers.
For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
So:
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).

Summary

I Wanna Be The Taprooter!

So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!

But I Hate Taproot!!

That's fine!

Discussions About Taproot Activation

submitted by almkglor to Bitcoin [link] [comments]

Flatten the Curve. #18. The current cold war between China and America explained. And how China was behind the 2008 Wall Street financial Crash. World War 3 is coming.

China, the USA, and the Afghanistan war are linked. And in order to get here, we will start there.
9-11 happened. Most of the planet mistakenly understood terrorists had struck a blow against Freedom and Capitalism and Democracy. It was time to invade Afghanistan. Yet all of the terrorists were linked to Saudi Arabia and not Afghanistan, that didn't make sense either. Yet they invaded to find Bin Laden, an ex CIA asset against the Soviet Union and it's subjugation of Afghanistan. The land in the middle of nowhere in relation to North America and the West. It was barren. A backwater without any strategic importance or natural resources.
Or was there?
The survey for rare earth elements was only made possible by the 2001 U.S. invasion, with work beginning in 2004. Mirzad says the Russians had already done significant surveying work during their military occupation of the country in the 1980s. Mirzad also toes the line for U.S. corporations, arguing, “The Afghan government should not touch the mining business. We have to give enough information to potential investors.”
Rare Earth Elements. The elements that make the information age possible. People could understand the First Gulf War and the Geopolitical importance of oil. That was easy, but it still didn't sound morally just to have a war for oil. It was too imperialist and so they fell in line and supported a war for Kuwaiti freedom instead, despite the obvious and public manipulation at the UN by Nayirah.
This is some of her testimony to the Human Rights Council.
While I was there, I saw the Iraqi soldiers come into the hospital with guns. They took the babies out of the incubators, took the incubators and left the children to die on the cold floor. It was horrifying. I could not help but think of my nephew who was born premature and might have died that day as well. After I left the hospital, some of my friends and I distributed flyers condemning the Iraqi invasion until we were warned we might be killed if the Iraqis saw us.
The Iraqis have destroyed everything in Kuwait. They stripped the supermarkets of food, the pharmacies of medicine, the factories of medical supplies, ransacked their houses and tortured neighbors and friends.
There was only one problem. She was the daughter of Saud Al-Sabah, the Kuwaiti ambassador to the United States. Furthermore, it was revealed that her testimony was organized as part of the Citizens for a Free Kuwait public relations campaign, which was run by the American public relations firm Hill & Knowlton for the Kuwaiti government (fun fact, Hill & Knowlton also have extensive ties with Bill Gates).
So the public was aghast at her testimony and supported the war against the mainly Soviet backed, but also American supported and Soviet backed Saddam Hussein, in his war against Iran, after the Iranians refused to Ally with American interests after the Islamic Revolution.
But that was oil, this was Rare Earth Elements. There was a reason the war was called, Operation Enduring Freedom. This natural resource was far more important in the long run. You couldn't have a security surveillance apparatus without it. And what was supposed to be a war on terror was in actuality a territorial occupation for resources.
Sleeping Dragon China is next, and where there's smoke, there's fire.
Let's go point form for clarity.
• China entered the rare earth market in the mid-1980s, at a time when the US was the major producer. But China soon caught up and became the production leader for rare earths. Its heavily state-supported strategy was aimed at dominating the global rare earth industry.
• 1989 Beijing’s Tiananmen Square spring. The U.S. government suspends military sales to Beijing and freezes relations.
• 1997. Clinton secures the release of Wei and Tiananmen Square protester Wang Dan. Beijing deports both dissidents to the United States. (If you don't understand these two were CIA assets working in China, you need to accept that not everything will be published. America wouldn't care about two political activists, but why would care about two intelligence operatives).
• March 1996. Taiwan’s First Free Presidential Vote.
• May 1999. America "accidently" bombs the Belgrade Chinese Embassy.
• 2002 Price competitiveness was hard for the USA to achieve due to low to non-existent Chinese environmental standards; as a result, the US finally stopped its rare earth production.
• October 2000. U.S. President Bill Clinton signs the U.S.-China Relations Act. China's take over of the market share in rare earth elements starts to increase.
• October 2001. Afghanistan war Enduring Freedom started to secure rare earth elements (Haven't you ever wondered how they could mobilize and invade so quickly? The military was already prepared).
• 2005. China establishes a monopoly on global production by keeping mineral prices low and then panics markets by introducing export quotas to raise prices by limiting supply.
• Rare Earth Elements. Prices go into the stratosphere (for example, dysprosium prices do a bitcoin, rocketing from $118/kg to $2,262/kg between 2008 and 2011).
• In a September 2005. Deputy Secretary of State Robert B. Zoellick initiates a strategic dialogue with China. This was presented as dialog to acknowledge China's emergence as a Superpower (which China probably insisted on), but it was about rare earth elements market price.
• October 2006. China allows North Korea to conduct its first nuclear test, China serves as a mediator to bring Pyongyang back to the negotiating table with the USA.
• September 2006. American housing prices start to fall.
(At some point after this, secret negotiations must have become increasingly hostile).
• March 2007. China Increases Military Spending. U.S. Vice President Dick Cheney says China’s military buildup is “not consistent” with the country’s stated goal of a “peaceful rise.”
• Mid-2005 and mid-2006. China bought between $100b and $250 billion of US housing debt between mid-2005 and mid-2006. This debt was bought using the same financial instruments that caused the financial collapse.
• 2006. Housing prices started to fall for the first time in decades.
• Mid-2006 and mid-2007. China likely added another $390b to its reserves. "At the same time, if China stopped buying -- especially now, when the private market is clogged up -- US financial markets would really seize up." Council on Foreign Relations-2007 August
• February 27, 2007. Stock markets in China and the U.S. fell by the most since 2003. Investors leave the money market and flock to Government backed Treasury Bills.
I've never seen it like this before,'' said Jim Galluzzo, who began trading short-maturity Treasuries 20 years ago and now trades bills at RBS Greenwich Capital in Greenwich, Connecticut.Bills right now are trading like dot-coms.''
We had clients asking to be pulled out of money market funds and wanting to get into Treasuries,'' said Henley Smith, fixed-income manager in New York at Castleton Partners, which oversees about $150 million in bonds.People are buying T-bills because you know exactly what's in it.''
• February 13, 2008. The Economic Stimulus Act of 2008 was enacted, which included a tax rebate. The total cost of this bill was projected at $152 billion for 2008. A December 2009 study found that only about one-third of the tax rebate was spent, providing only a modest amount of stimulus.
• September 2008. China Becomes Largest U.S. Foreign Creditor at 600 billion dollars.
• 2010. China’s market power peaked in when it reached a market share of around 97% of all rare earth mineral production. Outside of China, there were almost no other producers left.
Outside of China, the US is the second largest consumer of rare earths in the world behind Japan.
About 60% of US rare earth imports are used as catalysts for petroleum refining, making it the country’s major consumer of rare earths.
The US military also depends on rare earths. Many of the most advanced US weapon systems, including smart bombs, unmanned drones, cruise missiles, laser targeting, radar systems and the Joint Strike Fighter programme rely on rare earths. Against this background, the US Department of Defense (DoD) stated that “reliable access to the necessary material is a bedrock requirement for DOD”
• 2010. A trade dispute arose when the Chinese government reduced its export quotas by 40% in 2010, sending the rare earths prices in the markets outside China soaring. The government argued that the quotas were necessary to protect the environment.
• August 2010. China Becomes World’s Second-Largest Economy.
• November 2011. U.S. Secretary of State Hillary Clinton outlines a U.S. “pivot” to Asia. Clinton’s call for “increased investment—diplomatic, economic, strategic, and otherwise—in the Asia-Pacific region” is seen as a move to counter China’s growing clout.
• December 2011. U.S. President Barack Obama announces the United States and eight other nations have reached an agreement on the Trans-Pacific Partnership later announces plans to deploy 2,500 marines in Australia, prompting criticism from Beijing.
• November 2012. China’s New Leadership. Xi Jinping replaces Hu Jintao as president, Communist Party general secretary, and chairman of the Central Military Commission. Xi delivers a series of speeches on the “rejuvenation” of China.
• June 2013. U.S. President Barack Obama hosts Chinese President Xi Jinping for a “shirt-sleeves summit”
• May 19, 2014. A U.S. court indicts five Chinese hackers, allegedly with ties to China’s People’s Liberation Army, on charges of stealing trade technology from U.S. companies.
• November 12, 2014. Joint Climate Announcement. Barack Obama and Chinese President Xi Jinping issue a joint statement on climate change, pledging to reduce carbon emissions. (which very conveniently allows the quotas to fall and save pride for Xi).
• 2015. China drops the export quotas because in 2014, the WTO ruled against China.
• May 30, 2015 U.S. Warns China Over South China Sea. (China is trying to expand it's buffer zone to build a defense for the coming war).
• January 2016. The government to abolish the one-child policy, now allowing all families to have two children.
• February 9, 2017. Trump Affirms One China Policy After Raising Doubts.
• April 6 – 7, 2017. Trump Hosts Xi at Mar-a-Lago. Beijing and Washington to expand trade of products and services like beef, poultry, and electronic payments, though the countries do not address more contentious trade issues including aluminum, car parts, and steel.
• November 2017. President Xi meets with President Trump in another high profile summit.
• March 22, 2018. Trump Tariffs Target China. The White House alleges Chinese theft of U.S. technology and intellectual property. Coming on the heels of tariffs on steel and aluminum imports, the measures target goods including clothing, shoes, and electronics and restrict some Chinese investment in the United States.
• July 6, 2018 U.S.-China Trade War Escalates.
• September 2018. Modifications led to the exclusion of rare earths from the final list of products and they consequently were not subject to import tariffs imposed by the US government in September 2018.
• October 4, 2018. Pence Speech Signals Hard-Line Approach. He condemns what he calls growing Chinese military aggression, especially in the South China Sea, criticizes increased censorship and religious persecution by the Chinese government, and accuses China of stealing American intellectual property and interfering in U.S. elections.
• December 1, 2018. Canada Arrests Huawei Executive.
• March 6, 2019. Huawei Sues the United States.
• March 27 2019. India and the US signed an agreement to "strengthen bilateral security and civil nuclear cooperation" including the construction of six American nuclear reactors in India
• May 10, 2019. Trade War Intensifies.
• August 5, 2019. U.S. Labels China a Currency Manipulator.
• November 27, 2019. Trump Signs Bill Supporting Hong Kong Protesters. Chinese officials condemn the move, impose sanctions on several U.S.-based organizations, and suspend U.S. warship visits to Hong Kong.
• January 15, 2020. ‘Phase One’ Trade Deal Signed. But the agreement maintains most tariffs and does not mention the Chinese government’s extensive subsidies. Days before the signing, the United States dropped its designation of China as a currency manipulator.
• January 31, 2020. Tensions Soar Amid Coronavirus Pandemic.
• March 18, 2020. China Expels American Journalists. The Chinese government announces it will expel at least thirteen journalists from three U.S. newspapers—the New York Times, Wall Street Journal, and Washington Post—whose press credentials are set to expire in 2020. Beijing also demands that those outlets, as well as TIME and Voice of America, share information with the government about their operations in China. The Chinese Foreign Ministry says the moves are in response to the U.S. government’s decision earlier in the year to limit the number of Chinese journalists from five state-run media outlets in the United States to 100, down from 160, and designate those outlets as foreign missions.
And here we are. You may have noticed the Rare Earth Elements and the inclusion of Environmental Standards. Yes these are key to understanding the Geopolitical reality and importance of these events. There's a reason the one child policy stopped. Troop additions.
I believe our current political reality started at Tiananmen square. The protests were an American sponsored attempt at regime change after the failure to convince them to leave totalitarian communism and join a greater political framework.
Do I have proof? Yes.
China, as far as I'm concerned, was responsible for the 2008 economic crisis. The Rare Earth Elements were an attempt to weaken the States and strengthen themselves simultaneously. This stranglehold either forced America to trade with China, or the trade was an American Trojan horse to eventually collapse their economy and cause a revolution after Tiananmen Square failed. Does my second proposal sound far fetched? Didn't the economy just shut down in response to the epidemic? Aren't both sides blaming the other? At this POINT, the epidemic seems to be overstated doesn’t it? Don't the casualties tend to the elder demographic and those already weakened by a primary disease?
Exactly the kinds who wouldn't fight in a war.
Does this change some of my views on the possibility of upcoming catastrophes and reasons for certain events? No. This is Chess, and there are obvious moves in chess, hidden moves in chess, but the best moves involve peices which can be utilized in different ways if the board calls for it.
Is all what it seems? No.
I definitely changed a few previously held beliefs prior to today, and I would caution you in advance that you will find some previously held convictions challenged.
After uncovering what I did today, I would also strongly suggest reading information cautiously. This is all merely a culmination of ending the cold war, and once I have events laid out, you will see it as well.
At this moment, the end analysis is a war will start in the near future. This will be mainly for a few reasons, preemptive resource control for water and crops, population reduction can be achieved since we have too many people, not enough jobs, and upcoming resource scarcity.
Did you notice my omission of rare earth elements? This is because of Afghanistan. I would wager China or Russia is somehow supporting the continued resistance through Iran. But events are now accelerating with China because the western collation has already begun to build up their mines and start production.
Do you remember when Trump made a "joke" about buying Greenland? Yeah. It turns out that Greenland has one of the largest rare earth mineral deposits on the planet.
Take care. Be safe. Stay aware and be prepared.
This message not brought to you by the Bill and Melinda Gates Foundation, Microsoft, Google, Facebook, Elon Musk, Blackrock, Vangaurd, the Rockefeller Foundation, Rand Corporation, DARPA, Rothschilds, Agenda 21, Agenda 30, and ID 2020.
submitted by biggreekgeek to conspiracy [link] [comments]

Why i’m bullish on Zilliqa (long read)

Edit: TL;DR added in the comments
 
Hey all, I've been researching coins since 2017 and have gone through 100s of them in the last 3 years. I got introduced to blockchain via Bitcoin of course, analyzed Ethereum thereafter and from that moment I have a keen interest in smart contact platforms. I’m passionate about Ethereum but I find Zilliqa to have a better risk-reward ratio. Especially because Zilliqa has found an elegant balance between being secure, decentralized and scalable in my opinion.
 
Below I post my analysis of why from all the coins I went through I’m most bullish on Zilliqa (yes I went through Tezos, EOS, NEO, VeChain, Harmony, Algorand, Cardano etc.). Note that this is not investment advice and although it's a thorough analysis there is obviously some bias involved. Looking forward to what you all think!
 
Fun fact: the name Zilliqa is a play on ‘silica’ silicon dioxide which means “Silicon for the high-throughput consensus computer.”
 
This post is divided into (i) Technology, (ii) Business & Partnerships, and (iii) Marketing & Community. I’ve tried to make the technology part readable for a broad audience. If you’ve ever tried understanding the inner workings of Bitcoin and Ethereum you should be able to grasp most parts. Otherwise, just skim through and once you are zoning out head to the next part.
 
Technology and some more:
 
Introduction
 
The technology is one of the main reasons why I’m so bullish on Zilliqa. First thing you see on their website is: “Zilliqa is a high-performance, high-security blockchain platform for enterprises and next-generation applications.” These are some bold statements.
 
Before we deep dive into the technology let’s take a step back in time first as they have quite the history. The initial research paper from which Zilliqa originated dates back to August 2016: Elastico: A Secure Sharding Protocol For Open Blockchains where Loi Luu (Kyber Network) is one of the co-authors. Other ideas that led to the development of what Zilliqa has become today are: Bitcoin-NG, collective signing CoSi, ByzCoin and Omniledger.
 
The technical white paper was made public in August 2017 and since then they have achieved everything stated in the white paper and also created their own open source intermediate level smart contract language called Scilla (functional programming language similar to OCaml) too.
 
Mainnet is live since the end of January 2019 with daily transaction rates growing continuously. About a week ago mainnet reached 5 million transactions, 500.000+ addresses in total along with 2400 nodes keeping the network decentralized and secure. Circulating supply is nearing 11 billion and currently only mining rewards are left. The maximum supply is 21 billion with annual inflation being 7.13% currently and will only decrease with time.
 
Zilliqa realized early on that the usage of public cryptocurrencies and smart contracts were increasing but decentralized, secure, and scalable alternatives were lacking in the crypto space. They proposed to apply sharding onto a public smart contract blockchain where the transaction rate increases almost linear with the increase in the amount of nodes. More nodes = higher transaction throughput and increased decentralization. Sharding comes in many forms and Zilliqa uses network-, transaction- and computational sharding. Network sharding opens up the possibility of using transaction- and computational sharding on top. Zilliqa does not use state sharding for now. We’ll come back to this later.
 
Before we continue dissecting how Zilliqa achieves such from a technological standpoint it’s good to keep in mind that a blockchain being decentralised and secure and scalable is still one of the main hurdles in allowing widespread usage of decentralised networks. In my opinion this needs to be solved first before blockchains can get to the point where they can create and add large scale value. So I invite you to read the next section to grasp the underlying fundamentals. Because after all these premises need to be true otherwise there isn’t a fundamental case to be bullish on Zilliqa, right?
 
Down the rabbit hole
 
How have they achieved this? Let’s define the basics first: key players on Zilliqa are the users and the miners. A user is anybody who uses the blockchain to transfer funds or run smart contracts. Miners are the (shard) nodes in the network who run the consensus protocol and get rewarded for their service in Zillings (ZIL). The mining network is divided into several smaller networks called shards, which is also referred to as ‘network sharding’. Miners subsequently are randomly assigned to a shard by another set of miners called DS (Directory Service) nodes. The regular shards process transactions and the outputs of these shards are eventually combined by the DS shard as they reach consensus on the final state. More on how these DS shards reach consensus (via pBFT) will be explained later on.
 
The Zilliqa network produces two types of blocks: DS blocks and Tx blocks. One DS Block consists of 100 Tx Blocks. And as previously mentioned there are two types of nodes concerned with reaching consensus: shard nodes and DS nodes. Becoming a shard node or DS node is being defined by the result of a PoW cycle (Ethash) at the beginning of the DS Block. All candidate mining nodes compete with each other and run the PoW (Proof-of-Work) cycle for 60 seconds and the submissions achieving the highest difficulty will be allowed on the network. And to put it in perspective: the average difficulty for one DS node is ~ 2 Th/s equaling 2.000.000 Mh/s or 55 thousand+ GeForce GTX 1070 / 8 GB GPUs at 35.4 Mh/s. Each DS Block 10 new DS nodes are allowed. And a shard node needs to provide around 8.53 GH/s currently (around 240 GTX 1070s). Dual mining ETH/ETC and ZIL is possible and can be done via mining software such as Phoenix and Claymore. There are pools and if you have large amounts of hashing power (Ethash) available you could mine solo.
 
The PoW cycle of 60 seconds is a peak performance and acts as an entry ticket to the network. The entry ticket is called a sybil resistance mechanism and makes it incredibly hard for adversaries to spawn lots of identities and manipulate the network with these identities. And after every 100 Tx Blocks which corresponds to roughly 1,5 hour this PoW process repeats. In between these 1,5 hour, no PoW needs to be done meaning Zilliqa’s energy consumption to keep the network secure is low. For more detailed information on how mining works click here.
Okay, hats off to you. You have made it this far. Before we go any deeper down the rabbit hole we first must understand why Zilliqa goes through all of the above technicalities and understand a bit more what a blockchain on a more fundamental level is. Because the core of Zilliqa’s consensus protocol relies on the usage of pBFT (practical Byzantine Fault Tolerance) we need to know more about state machines and their function. Navigate to Viewblock, a Zilliqa block explorer, and just come back to this article. We will use this site to navigate through a few concepts.
 
We have established that Zilliqa is a public and distributed blockchain. Meaning that everyone with an internet connection can send ZILs, trigger smart contracts, etc. and there is no central authority who fully controls the network. Zilliqa and other public and distributed blockchains (like Bitcoin and Ethereum) can also be defined as state machines.
 
Taking the liberty of paraphrasing examples and definitions given by Samuel Brooks’ medium article, he describes the definition of a blockchain (like Zilliqa) as: “A peer-to-peer, append-only datastore that uses consensus to synchronize cryptographically-secure data”.
 
Next, he states that: "blockchains are fundamentally systems for managing valid state transitions”. For some more context, I recommend reading the whole medium article to get a better grasp of the definitions and understanding of state machines. Nevertheless, let’s try to simplify and compile it into a single paragraph. Take traffic lights as an example: all its states (red, amber, and green) are predefined, all possible outcomes are known and it doesn’t matter if you encounter the traffic light today or tomorrow. It will still behave the same. Managing the states of a traffic light can be done by triggering a sensor on the road or pushing a button resulting in one traffic lights’ state going from green to red (via amber) and another light from red to green.
 
With public blockchains like Zilliqa, this isn’t so straightforward and simple. It started with block #1 almost 1,5 years ago and every 45 seconds or so a new block linked to the previous block is being added. Resulting in a chain of blocks with transactions in it that everyone can verify from block #1 to the current #647.000+ block. The state is ever changing and the states it can find itself in are infinite. And while the traffic light might work together in tandem with various other traffic lights, it’s rather insignificant comparing it to a public blockchain. Because Zilliqa consists of 2400 nodes who need to work together to achieve consensus on what the latest valid state is while some of these nodes may have latency or broadcast issues, drop offline or are deliberately trying to attack the network, etc.
 
Now go back to the Viewblock page take a look at the amount of transaction, addresses, block and DS height and then hit refresh. Obviously as expected you see new incremented values on one or all parameters. And how did the Zilliqa blockchain manage to transition from a previous valid state to the latest valid state? By using pBFT to reach consensus on the latest valid state.
 
After having obtained the entry ticket, miners execute pBFT to reach consensus on the ever-changing state of the blockchain. pBFT requires a series of network communication between nodes, and as such there is no GPU involved (but CPU). Resulting in the total energy consumed to keep the blockchain secure, decentralized and scalable being low.
 
pBFT stands for practical Byzantine Fault Tolerance and is an optimization on the Byzantine Fault Tolerant algorithm. To quote Blockonomi: “In the context of distributed systems, Byzantine Fault Tolerance is the ability of a distributed computer network to function as desired and correctly reach a sufficient consensus despite malicious components (nodes) of the system failing or propagating incorrect information to other peers.” Zilliqa is such a distributed computer network and depends on the honesty of the nodes (shard and DS) to reach consensus and to continuously update the state with the latest block. If pBFT is a new term for you I can highly recommend the Blockonomi article.
 
The idea of pBFT was introduced in 1999 - one of the authors even won a Turing award for it - and it is well researched and applied in various blockchains and distributed systems nowadays. If you want more advanced information than the Blockonomi link provides click here. And if you’re in between Blockonomi and the University of Singapore read the Zilliqa Design Story Part 2 dating from October 2017.
Quoting from the Zilliqa tech whitepaper: “pBFT relies upon a correct leader (which is randomly selected) to begin each phase and proceed when the sufficient majority exists. In case the leader is byzantine it can stall the entire consensus protocol. To address this challenge, pBFT offers a view change protocol to replace the byzantine leader with another one.”
 
pBFT can tolerate ⅓ of the nodes being dishonest (offline counts as Byzantine = dishonest) and the consensus protocol will function without stalling or hiccups. Once there are more than ⅓ of dishonest nodes but no more than ⅔ the network will be stalled and a view change will be triggered to elect a new DS leader. Only when more than ⅔ of the nodes are dishonest (66%) double-spend attacks become possible.
 
If the network stalls no transactions can be processed and one has to wait until a new honest leader has been elected. When the mainnet was just launched and in its early phases, view changes happened regularly. As of today the last stalling of the network - and view change being triggered - was at the end of October 2019.
 
Another benefit of using pBFT for consensus besides low energy is the immediate finality it provides. Once your transaction is included in a block and the block is added to the chain it’s done. Lastly, take a look at this article where three types of finality are being defined: probabilistic, absolute and economic finality. Zilliqa falls under the absolute finality (just like Tendermint for example). Although lengthy already we skipped through some of the inner workings from Zilliqa’s consensus: read the Zilliqa Design Story Part 3 and you will be close to having a complete picture on it. Enough about PoW, sybil resistance mechanism, pBFT, etc. Another thing we haven’t looked at yet is the amount of decentralization.
 
Decentralisation
 
Currently, there are four shards, each one of them consisting of 600 nodes. 1 shard with 600 so-called DS nodes (Directory Service - they need to achieve a higher difficulty than shard nodes) and 1800 shard nodes of which 250 are shard guards (centralized nodes controlled by the team). The amount of shard guards has been steadily declining from 1200 in January 2019 to 250 as of May 2020. On the Viewblock statistics, you can see that many of the nodes are being located in the US but those are only the (CPU parts of the) shard nodes who perform pBFT. There is no data from where the PoW sources are coming. And when the Zilliqa blockchain starts reaching its transaction capacity limit, a network upgrade needs to be executed to lift the current cap of maximum 2400 nodes to allow more nodes and formation of more shards which will allow to network to keep on scaling according to demand.
Besides shard nodes there are also seed nodes. The main role of seed nodes is to serve as direct access points (for end-users and clients) to the core Zilliqa network that validates transactions. Seed nodes consolidate transaction requests and forward these to the lookup nodes (another type of nodes) for distribution to the shards in the network. Seed nodes also maintain the entire transaction history and the global state of the blockchain which is needed to provide services such as block explorers. Seed nodes in the Zilliqa network are comparable to Infura on Ethereum.
 
The seed nodes were first only operated by Zilliqa themselves, exchanges and Viewblock. Operators of seed nodes like exchanges had no incentive to open them for the greater public. They were centralised at first. Decentralisation at the seed nodes level has been steadily rolled out since March 2020 ( Zilliqa Improvement Proposal 3 ). Currently the amount of seed nodes is being increased, they are public-facing and at the same time PoS is applied to incentivize seed node operators and make it possible for ZIL holders to stake and earn passive yields. Important distinction: seed nodes are not involved with consensus! That is still PoW as entry ticket and pBFT for the actual consensus.
 
5% of the block rewards are being assigned to seed nodes (from the beginning in 2019) and those are being used to pay out ZIL stakers. The 5% block rewards with an annual yield of 10.03% translate to roughly 610 MM ZILs in total that can be staked. Exchanges use the custodial variant of staking and wallets like Moonlet will use the non-custodial version (starting in Q3 2020). Staking is being done by sending ZILs to a smart contract created by Zilliqa and audited by Quantstamp.
 
With a high amount of DS; shard nodes and seed nodes becoming more decentralized too, Zilliqa qualifies for the label of decentralized in my opinion.
 
Smart contracts
 
Let me start by saying I’m not a developer and my programming skills are quite limited. So I‘m taking the ELI5 route (maybe 12) but if you are familiar with Javascript, Solidity or specifically OCaml please head straight to Scilla - read the docs to get a good initial grasp of how Zilliqa’s smart contract language Scilla works and if you ask yourself “why another programming language?” check this article. And if you want to play around with some sample contracts in an IDE click here. The faucet can be found here. And more information on architecture, dapp development and API can be found on the Developer Portal.
If you are more into listening and watching: check this recent webinar explaining Zilliqa and Scilla. Link is time-stamped so you’ll start right away with a platform introduction, roadmap 2020 and afterwards a proper Scilla introduction.
 
Generalized: programming languages can be divided into being ‘object-oriented’ or ‘functional’. Here is an ELI5 given by software development academy: * “all programs have two basic components, data – what the program knows – and behavior – what the program can do with that data. So object-oriented programming states that combining data and related behaviors in one place, is called “object”, which makes it easier to understand how a particular program works. On the other hand, functional programming argues that data and behavior are different things and should be separated to ensure their clarity.” *
 
Scilla is on the functional side and shares similarities with OCaml: OCaml is a general-purpose programming language with an emphasis on expressiveness and safety. It has an advanced type system that helps catch your mistakes without getting in your way. It's used in environments where a single mistake can cost millions and speed matters, is supported by an active community, and has a rich set of libraries and development tools. For all its power, OCaml is also pretty simple, which is one reason it's often used as a teaching language.
 
Scilla is blockchain agnostic, can be implemented onto other blockchains as well, is recognized by academics and won a so-called Distinguished Artifact Award award at the end of last year.
 
One of the reasons why the Zilliqa team decided to create their own programming language focused on preventing smart contract vulnerabilities is that adding logic on a blockchain, programming, means that you cannot afford to make mistakes. Otherwise, it could cost you. It’s all great and fun blockchains being immutable but updating your code because you found a bug isn’t the same as with a regular web application for example. And with smart contracts, it inherently involves cryptocurrencies in some form thus value.
 
Another difference with programming languages on a blockchain is gas. Every transaction you do on a smart contract platform like Zilliqa or Ethereum costs gas. With gas you basically pay for computational costs. Sending a ZIL from address A to address B costs 0.001 ZIL currently. Smart contracts are more complex, often involve various functions and require more gas (if gas is a new concept click here ).
 
So with Scilla, similar to Solidity, you need to make sure that “every function in your smart contract will run as expected without hitting gas limits. An improper resource analysis may lead to situations where funds may get stuck simply because a part of the smart contract code cannot be executed due to gas limits. Such constraints are not present in traditional software systems”. Scilla design story part 1
 
Some examples of smart contract issues you’d want to avoid are: leaking funds, ‘unexpected changes to critical state variables’ (example: someone other than you setting his or her address as the owner of the smart contract after creation) or simply killing a contract.
 
Scilla also allows for formal verification. Wikipedia to the rescue: In the context of hardware and software systems, formal verification is the act of proving or disproving the correctness of intended algorithms underlying a system with respect to a certain formal specification or property, using formal methods of mathematics.
 
Formal verification can be helpful in proving the correctness of systems such as: cryptographic protocols, combinational circuits, digital circuits with internal memory, and software expressed as source code.
 
Scilla is being developed hand-in-hand with formalization of its semantics and its embedding into the Coq proof assistant — a state-of-the art tool for mechanized proofs about properties of programs.”
 
Simply put, with Scilla and accompanying tooling developers can be mathematically sure and proof that the smart contract they’ve written does what he or she intends it to do.
 
Smart contract on a sharded environment and state sharding
 
There is one more topic I’d like to touch on: smart contract execution in a sharded environment (and what is the effect of state sharding). This is a complex topic. I’m not able to explain it any easier than what is posted here. But I will try to compress the post into something easy to digest.
 
Earlier on we have established that Zilliqa can process transactions in parallel due to network sharding. This is where the linear scalability comes from. We can define simple transactions: a transaction from address A to B (Category 1), a transaction where a user interacts with one smart contract (Category 2) and the most complex ones where triggering a transaction results in multiple smart contracts being involved (Category 3). The shards are able to process transactions on their own without interference of the other shards. With Category 1 transactions that is doable, with Category 2 transactions sometimes if that address is in the same shard as the smart contract but with Category 3 you definitely need communication between the shards. Solving that requires to make a set of communication rules the protocol needs to follow in order to process all transactions in a generalised fashion.
 
And this is where the downsides of state sharding comes in currently. All shards in Zilliqa have access to the complete state. Yes the state size (0.1 GB at the moment) grows and all of the nodes need to store it but it also means that they don’t need to shop around for information available on other shards. Requiring more communication and adding more complexity. Computer science knowledge and/or developer knowledge required links if you want to dig further: Scilla - language grammar Scilla - Foundations for Verifiable Decentralised Computations on a Blockchain Gas Accounting NUS x Zilliqa: Smart contract language workshop
 
Easier to follow links on programming Scilla https://learnscilla.com/home Ivan on Tech
 
Roadmap / Zilliqa 2.0
 
There is no strict defined roadmap but here are topics being worked on. And via the Zilliqa website there is also more information on the projects they are working on.
 
Business & Partnerships
 
It’s not only technology in which Zilliqa seems to be excelling as their ecosystem has been expanding and starting to grow rapidly. The project is on a mission to provide OpenFinance (OpFi) to the world and Singapore is the right place to be due to its progressive regulations and futuristic thinking. Singapore has taken a proactive approach towards cryptocurrencies by introducing the Payment Services Act 2019 (PS Act). Among other things, the PS Act will regulate intermediaries dealing with certain cryptocurrencies, with a particular focus on consumer protection and anti-money laundering. It will also provide a stable regulatory licensing and operating framework for cryptocurrency entities, effectively covering all crypto businesses and exchanges based in Singapore. According to PWC 82% of the surveyed executives in Singapore reported blockchain initiatives underway and 13% of them have already brought the initiatives live to the market. There is also an increasing list of organizations that are starting to provide digital payment services. Moreover, Singaporean blockchain developers Building Cities Beyond has recently created an innovation $15 million grant to encourage development on its ecosystem. This all suggests that Singapore tries to position itself as (one of) the leading blockchain hubs in the world.
 
Zilliqa seems to already take advantage of this and recently helped launch Hg Exchange on their platform, together with financial institutions PhillipCapital, PrimePartners and Fundnel. Hg Exchange, which is now approved by the Monetary Authority of Singapore (MAS), uses smart contracts to represent digital assets. Through Hg Exchange financial institutions worldwide can use Zilliqa's safe-by-design smart contracts to enable the trading of private equities. For example, think of companies such as Grab, Airbnb, SpaceX that are not available for public trading right now. Hg Exchange will allow investors to buy shares of private companies & unicorns and capture their value before an IPO. Anquan, the main company behind Zilliqa, has also recently announced that they became a partner and shareholder in TEN31 Bank, which is a fully regulated bank allowing for tokenization of assets and is aiming to bridge the gap between conventional banking and the blockchain world. If STOs, the tokenization of assets, and equity trading will continue to increase, then Zilliqa’s public blockchain would be the ideal candidate due to its strategic positioning, partnerships, regulatory compliance and the technology that is being built on top of it.
 
What is also very encouraging is their focus on banking the un(der)banked. They are launching a stablecoin basket starting with XSGD. As many of you know, stablecoins are currently mostly used for trading. However, Zilliqa is actively trying to broaden the use case of stablecoins. I recommend everybody to read this text that Amrit Kumar wrote (one of the co-founders). These stablecoins will be integrated in the traditional markets and bridge the gap between the crypto world and the traditional world. This could potentially revolutionize and legitimise the crypto space if retailers and companies will for example start to use stablecoins for payments or remittances, instead of it solely being used for trading.
 
Zilliqa also released their DeFi strategic roadmap (dating November 2019) which seems to be aligning well with their OpFi strategy. A non-custodial DEX is coming to Zilliqa made by Switcheo which allows cross-chain trading (atomic swaps) between ETH, EOS and ZIL based tokens. They also signed a Memorandum of Understanding for a (soon to be announced) USD stablecoin. And as Zilliqa is all about regulations and being compliant, I’m speculating on it to be a regulated USD stablecoin. Furthermore, XSGD is already created and visible on block explorer and XIDR (Indonesian Stablecoin) is also coming soon via StraitsX. Here also an overview of the Tech Stack for Financial Applications from September 2019. Further quoting Amrit Kumar on this:
 
There are two basic building blocks in DeFi/OpFi though: 1) stablecoins as you need a non-volatile currency to get access to this market and 2) a dex to be able to trade all these financial assets. The rest are built on top of these blocks.
 
So far, together with our partners and community, we have worked on developing these building blocks with XSGD as a stablecoin. We are working on bringing a USD-backed stablecoin as well. We will soon have a decentralised exchange developed by Switcheo. And with HGX going live, we are also venturing into the tokenization space. More to come in the future.”
 
Additionally, they also have this ZILHive initiative that injects capital into projects. There have been already 6 waves of various teams working on infrastructure, innovation and research, and they are not from ASEAN or Singapore only but global: see Grantees breakdown by country. Over 60 project teams from over 20 countries have contributed to Zilliqa's ecosystem. This includes individuals and teams developing wallets, explorers, developer toolkits, smart contract testing frameworks, dapps, etc. As some of you may know, Unstoppable Domains (UD) blew up when they launched on Zilliqa. UD aims to replace cryptocurrency addresses with a human-readable name and allows for uncensorable websites. Zilliqa will probably be the only one able to handle all these transactions onchain due to ability to scale and its resulting low fees which is why the UD team launched this on Zilliqa in the first place. Furthermore, Zilliqa also has a strong emphasis on security, compliance, and privacy, which is why they partnered with companies like Elliptic, ChainSecurity (part of PwC Switzerland), and Incognito. Their sister company Aqilliz (Zilliqa spelled backwards) focuses on revolutionizing the digital advertising space and is doing interesting things like using Zilliqa to track outdoor digital ads with companies like Foodpanda.
 
Zilliqa is listed on nearly all major exchanges, having several different fiat-gateways and recently have been added to Binance’s margin trading and futures trading with really good volume. They also have a very impressive team with good credentials and experience. They don't just have “tech people”. They have a mix of tech people, business people, marketeers, scientists, and more. Naturally, it's good to have a mix of people with different skill sets if you work in the crypto space.
 
Marketing & Community
 
Zilliqa has a very strong community. If you just follow their Twitter their engagement is much higher for a coin that has approximately 80k followers. They also have been ‘coin of the day’ by LunarCrush many times. LunarCrush tracks real-time cryptocurrency value and social data. According to their data, it seems Zilliqa has a more fundamental and deeper understanding of marketing and community engagement than almost all other coins. While almost all coins have been a bit frozen in the last months, Zilliqa seems to be on its own bull run. It was somewhere in the 100s a few months ago and is currently ranked #46 on CoinGecko. Their official Telegram also has over 20k people and is very active, and their community channel which is over 7k now is more active and larger than many other official channels. Their local communities also seem to be growing.
 
Moreover, their community started ‘Zillacracy’ together with the Zilliqa core team ( see www.zillacracy.com ). It’s a community-run initiative where people from all over the world are now helping with marketing and development on Zilliqa. Since its launch in February 2020 they have been doing a lot and will also run their own non-custodial seed node for staking. This seed node will also allow them to start generating revenue for them to become a self sustaining entity that could potentially scale up to become a decentralized company working in parallel with the Zilliqa core team. Comparing it to all the other smart contract platforms (e.g. Cardano, EOS, Tezos etc.) they don't seem to have started a similar initiative (correct me if I’m wrong though). This suggests in my opinion that these other smart contract platforms do not fully understand how to utilize the ‘power of the community’. This is something you cannot ‘buy with money’ and gives many projects in the space a disadvantage.
 
Zilliqa also released two social products called SocialPay and Zeeves. SocialPay allows users to earn ZILs while tweeting with a specific hashtag. They have recently used it in partnership with the Singapore Red Cross for a marketing campaign after their initial pilot program. It seems like a very valuable social product with a good use case. I can see a lot of traditional companies entering the space through this product, which they seem to suggest will happen. Tokenizing hashtags with smart contracts to get network effect is a very smart and innovative idea.
 
Regarding Zeeves, this is a tipping bot for Telegram. They already have 1000s of signups and they plan to keep upgrading it for more and more people to use it (e.g. they recently have added a quiz features). They also use it during AMAs to reward people in real-time. It’s a very smart approach to grow their communities and get familiar with ZIL. I can see this becoming very big on Telegram. This tool suggests, again, that the Zilliqa team has a deeper understanding of what the crypto space and community needs and is good at finding the right innovative tools to grow and scale.
 
To be honest, I haven’t covered everything (i’m also reaching the character limited haha). So many updates happening lately that it's hard to keep up, such as the International Monetary Fund mentioning Zilliqa in their report, custodial and non-custodial Staking, Binance Margin, Futures, Widget, entering the Indian market, and more. The Head of Marketing Colin Miles has also released this as an overview of what is coming next. And last but not least, Vitalik Buterin has been mentioning Zilliqa lately acknowledging Zilliqa and mentioning that both projects have a lot of room to grow. There is much more info of course and a good part of it has been served to you on a silver platter. I invite you to continue researching by yourself :-) And if you have any comments or questions please post here!
submitted by haveyouheardaboutit to CryptoCurrency [link] [comments]

[ Bitcoin ] Technical: Taproot: Why Activate?

Topic originally posted in Bitcoin by almkglor [link]
This is a follow-up on https://old.reddit.com/Bitcoin/comments/hqzp14/technical_the_path_to_taproot_activation/
Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners?
And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess.
First, let's consider some principles of Bitcoin.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so).
So, how does Taproot affect those principles?

Taproot and Your /Coins

Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash).
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input).
However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits!
Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh?
With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save!
And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well!
(P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1)
Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service!
So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win!
(even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot)
And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!

Taproot and Your Contracts

No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade.
So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust.
Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade.
However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade.
In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address.
Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants).
But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer).
Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos).
(technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).

Taproot and Your Contracts, Part 2: Cryptographic Boogaloo

Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code.
This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded.
And you can do that, with HTLCs, today.
Of course, HTLCs do have problems:
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar".
Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given private key to you.
Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige).
(Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key).
So:
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script.
(technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)

Quantum Quibbles!

Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable??
Well, in theory yes. In practice, they probably are not.
It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash.
When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key.
So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key.
(public keys should be public, that's why they're called public keys, LOL)
And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions.
So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort.
Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers.
For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
So:
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).

Summary

I Wanna Be The Taprooter!

So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!

But I Hate Taproot!!

That's fine!

Discussions About Taproot Activation

almkglor your post has been copied because one or more comments in this topic have been removed. This copy will preserve unmoderated topic. If you would like to opt-out, please send a message using [this link].
[deleted comment]
[deleted comment]
[deleted comment]
submitted by anticensor_bot to u/anticensor_bot [link] [comments]

The next XVG? Microcap 100x potential actually supported by fundamentals!

What’s up team? I have a hot one for you. XVG returned 12 million percent in 2017 and this one reminds me a lot of it. Here’s why:
Mimblewimble is like Blu-Ray compared to CD-ROM in terms of its ability to compress data on a blockchain. The current BTC chain is 277gb and its capacity is limited because every time you spend a coin, each node needs to validate its history back to when it was mined (this is how double spending is prevented). Mimblewimble is different - all transactions in a block are aggregated and netted out in one giant CoinJoin, and only the current spending needs to be verified. This means that dramatically more transactions can fit into a smaller space, increasing throughput and lowering fees while still retaining the full proof of work game theory of Bitcoin. These blockchains are small enough to run a full node on a cheap smartphone, which enhances the decentralization and censorship resistance of the network.
The biggest benefit, though, is that all transactions are private - the blockchain doesn’t reveal amounts or addresses except to the actual wallet owner. Unlike earlier decoy-based approaches that bloat the chain and can still be data mined (XMR), Mimblewimble leaves no trace in the blockchain, instead storing only the present state of coin ownership.
The first two Mimblewimble coins, Grin and Beam, launched to great fanfare in 2019, quickly reaching over $100m in market cap (since settled down to $22m and $26m respectively). They are good projects but grin has infinite supply and huge never-decreasing emission, and Beam is a corporate moneygrab whose founding investors are counting on you buying for their ROI.
ZEC is valued at $568m today, despite the facts that only 1% of transactions are actually shielded, it has a trusted setup, and generating a confidential transaction takes ~60 seconds on a powerful PC. XMR is a great project but it’s valued at $1.2b (so no 100x) and it uses CryptoNote, which is 2014 tech that relies on a decoy-based approach that could be vulnerable to more powerful computers in the future. Mimblewimble is just a better way to approach privacy because there is simply no data recorded in the blockchain for companies to surveil.
Privacy is not just for darknet markets, porn, money launderers and terrorists. In many countries it’s dangerous to be wealthy, and there are all kinds of problems with having your spending data be out there publicly and permanently for all to see. Namely, companies like Amazon are patenting approaches to identify people with their crypto addresses, “for law enforcement” but also so that, just like credit cards, your spending data can be used to target ads. (A) Coinbase is selling user data to the DEA, IRS, FBI, Secret Service, and who knows who else? (B) What about insurance companies raising your premiums or canceling your policy because they see you buying (legal) cannabis? If your business operates using transparent cryptocurrency, competitors can data mine your customer and supply chain data, and employees can see how much everyone else gets paid. I could go on, but the idea of “I have nothing to hide, so what do I care about privacy?” will increasingly ring hollow as people realize that this money printing will have to be paid by massive tax increases AND that those taxes will be directly debited from their “Central Bank Digital Currency” wallets.
100% privacy for all transactions also eliminates one HUGE problem that people aren’t aware of yet, but they will be: fungibility. Fungibility means that each coin is indistinguishable from any other, just like paper cash. Why is this important? Because of the ever-expanding reach of AML/KYC/KYT (Anti-Money Laundering / Know Your Customer / Know Your Transaction) as regulators cramp down on crypto and banks take over, increasingly coins become “tainted” in various ways. For example, if you withdraw coins to a mixing service like Wasabi or Samourai, you may find your account blocked. (C) The next obvious step is that if you receive coins that these chainalysis services don’t like for whatever reason, you will be completely innocent yet forced to prove that you didn’t know that the coins you bought were up to no good in a past life. 3 days ago, $100k of USDC was frozen. (D) Even smaller coins like LTC now have this problem, because “Chinese Drug Kingpins” used them. (E) I believe that censorable money that can be blocked/frozen isn’t really “your money”.
Epic Cash is a 100% volunteer community project (like XVG and XMR) that had a fair launch in September last year with no ICO and no premine. There are very few projects like this, and it’s a key ingredient in Verge’s success (still at $110m market cap today despite being down 97% since the bubble peak) and why it’s still around. It has a small but super passionate community of “Freemen” who are united by a belief in the sound money economics of Bitcoin Standard emission (21m supply limit and ever-decreasing inflation) and the importance of privacy.
I am super bullish on this coin for the following reasons:
Because it doesn’t have a huge marketing budget in a sea of VC-funded shitcoins, it is as-yet undiscovered, which is why it’s so cheap. There are only 4 Mimblewimble-based currencies on the market: MWC at $162m, BEAM at $26m, GRIN at $22m, and EPIC at $0.4m. This is not financial advice and as always, do your own research, but I’ve been buying this gem for months and will continue to.
This one ticks all the boxes for me, the only real problem is that it’s hard to buy much without causing a huge green candle. Alt season is coming, and coins like this are how your neighbor Chad got his Lambo back in 2017. For 2021, McLaren is a better choice and be sure to pay cash so that it doesn’t get repossessed like Chad!
  1. A https://www.vice.com/en_us/article/d35eax/amazon-bitcoin-patent-data-stream-identify-cryptocurrency-for-law-enforcement-government
  2. B https://decrypt.co/31461/coinbase-wants-to-identify-bitcoin-users-for-dea-irs
  3. C https://www.coindesk.com/binance-blockade-of-wasabi-wallet-could-point-to-a-crypto-crack-up
  4. D https://cointelegraph.com/news/centre-freezes-ethereum-address-holding-100k-usdc
  5. E https://www.coindesk.com/us-treasury-blacklists-bitcoin-litecoin-addresses-of-chinese-drug-kingpins
  6. F https://www.youtube.com/channel/UCWkTxl5Z6DNN0ASMRxSKV5g
  7. G http://epic.tech/whitepaper
  8. H https://medium.com/epic-cash/epic-cash-on-uniswap-22447904d375
  9. I https://epic.tech/wp-content/uploads/2019/09/figure-3.1.jpg
Links:
submitted by pinchegringo to CryptoMoonShots [link] [comments]

$MTXLT — The Fuel For Private DeFi

Call courtesy of facemeltersmicros on telegram
T.me/facemeltersmicros
Circ Supply: 47,844 Total Supply : 900,000
Price $47 Market Cap $2.2m
https://coinmarketcap.com/currencies/tixl/
Buy on probit exchange (liquidity is here) & Binance Dex
MTXLT (later TXL) is the native token of the Private DeFi Platform called Autobahn Network. It can be transferred through the network with zero-fees, reflecting the best features of today's cash.
What is Private DeFi?
Privacy should be fundamental in financial transactions. However, many existing DeFi platforms, such as Ethereum for example, fail to fulfil this criterion – either partly or completely. The Autobahn Network is one of the first of its kind to truly support private DeFi.
What is DeFi about the Autobahn Network?
The Autobahn Network will initially focus on the areas of asset tokenisation and providing a second-layer platform for existing assets on other chains. This will provide the foundation for offering further DeFi use cases in the future. The current focus is on the launch of Alphanet, which will be the first production release of the Autobahn Network.
The Autobahn Network is a decentralized next-generation, second-layer solution for digital assets. It provides the ability to use any cryptocurrency, including Bitcoin, as an efficient & effective means of world payment.
The Autobahn Network employs the most sophisticated technologies to have emerged from the blockchain world over recent years to build a decentralized network, tailored for payments. Bitcoin, and other digital assets, can be sent to the Autobahn Network. Once they are in the network they can then be transferred quickly, privately and with low transaction fees.
HOW DOES IT WORK?
• Send BTC to the Autobahn Network Gateway • The decentralized nodes hold your BTC via a Threshold Signature Scheme (TSS) • Transfer BTC within the network as often as you like • Withdraw BTC to the main blockchain, if you plan to hold it there • The decentralized nodes release your BTC via TSS
To fully appreciate high-speed, you have to experience it yourself. They have developed a fully working Testnet especially for this purpose:
https://autobahn.network/testnet
The Autobahn Network is developed by the non-profit company - Tixl gGmbH, based in Hamburg (Germany). Tixl raised seed capital of USD $1,250,000 in early 2019 by selling the Tixl Token (MTXLT) to retail investors.
Tech behind the Autobahn
https://medium.com/tixlcurrency/the-technology-behind-the-autobahn-network-81fdecf41c20
Most of the time the bottleneck is the consensus. Tixl use their own implementation of the Stellar Consensus Protocol (SCP). Since SCP is known to establish consensus within a few seconds, even if there are some more conflicting transactions, nodes will still be able to reach consensus quickly. It’s also known that SCP can deal with high transaction volumes. Although there is no verified statement from the Stellar foundation, there are rumors that SCP can handle 10,000 transactions per second in certain network constellations
Project milestones and key links
In the future:
Find more details on these events in the medium article released today
https://link.medium.com/qXfp3zjM57
WHY TIXL?
A number of different concepts for improving Bitcoin and the transfer of digital assets in general have been developed, with the ultimate goal of achieving fast and cheap transactions, or to provide privacy. The Tixl Token on the Autobahn Network provides a perfect combination of them all.
REVENUE STREAMS
Transaction Fees
Transactions in the Autobahn Network will be cheap but not completely free. Fees will be paid using in the currency of the asset being transfered. The revenue will then be used to purchase MTXLT on the open market. As a result, fees are indirectly paid in MTXLT.
Listing Fees
As soon as the Autobahn Network gains adoption, it will become a sought-after platform for other assets. A (monthly) listing fee, to be paid in MTXLT, will also serve to increase the public demand for MTXLT.
Additional Services
Besides the obvious sources of revenue, other features - like the purchase of nicknames - can also be used to generate revenue.
Social media buzz
Ivan on Tech about Tixl in "TOP ALTCOINS 2020 - Programmer explains"
https://youtu.be/ynyvwZetb8s
Something different?
Tixl global reserve has been developed to provide extra confidence to investors. Read more here:
https://medium.com/tixlcurrency/tixl-global-reserve-tgr-update-c59bee09c66d
Other questions
Do I need TXL to send and receive BTC and other third-party assets?
To ensure the greatest usability, they decided against using TXL directly as "fuel" because it would provide an obstacle to use if you had to buy TXL before you are able to transfer BTC, or other digital assets. The same issue has attracted criticism from users of other networks that support different assets. As a solution, they settled on the idea of allowing transaction fees for certain assets (for example, BTC) to be paid in their native currency. One can send BTC through the Autobahn Network without having to purchase TXL and pay much lower fees than you would on the Bitcoin blockchain itself.
How is Autobahn Network secured by Bitcoin?
To increase the decentralization of Autobahn Network, a hash representing the current state of the Autobahn Network ledger will be written onto the Bitcoin blockchain regularly. In doing so, the Autobahn Network will increase its trust level by leveraging the most secure and immutable blockchain in the world.
submitted by therealfacemelter to CryptoMoonShots [link] [comments]

The Truth about Warren Buffett?

The Oracle of Omaha has a reputation as the gentle GOAT, but is there more to this than meets the eye?
Is there something that is often overlooked?
Or is this reputation warranted? (get it...warren, warranted?)
Anyway...Let's begin...

The story begins in 1942, when Warren Buffet bought his first shares at the age of just 11.
This is same year that his father Howard Buffett ran for the U.S. House of Representatives in the Nebraska district.
He won, and became a member of Congress in 1943.
Before this, Howard worked at a small stock brokerage firm.
He was reelected twice. However, in 1952, he decided against seeking another term and returned to his investment business in Omaha, Buffett-Falk & Co., where he worked until shortly before his death in 1964.
But what about Warren Buffett?
In 1951, after graduating from Columbia, where he was taught by Benjamin Graham, Buffett worked for three years at his father's firm as an investment salesman.
In 1954, Buffett accepted a job at Benjamin Graham's partnership, working as a securities analyst.
His starting salary was $12,000 a year - the equivalent of $114,000 today.
However, just two years later, Graham retired and Buffett started his own investment partnership.
He went to his father's acquaintances to raise Capital for his first fund.
These were prominent families in Nebraska with big businesses and political connections.
For example, across the street was the family whose son became the CEO of Coca Cola - that family gave him $10,000 (in the 50′s).

In 2012, the STOCK Act or The Stop Trading on Congressional Knowledge Act was signed into law.
The law prohibits the use of non-public information for private profit, including insider trading by members of Congress and other government employees.
Remember, Buffett's father used to be in Congress.
The only people who were, before 2012, allowed to trade on insider information without having criminal charges brought against them were congressmen.
Remember, Buffett's father was a stock market broker prior to being elected and going to Congress, hence he had a comprehensive knowledge of the stock market and clearly had an interest in it.
After all, it was his father who taught Buffett the ropes early on and had him buy his first shares as an eleven year old.

Imagine you are Warren Buffett, and you can:
1). Get insider information to trade on it;
2). Get a six-figure position after College;
3). After a few years, set up your own fund, getting money from wealthy family friends;
4). Pay no dividends to investors and only put a hundred bucks of your own money into the fund;
5). Let the mathematics of compounding work its magic as you bring in more institutional money;
6). Become so connected Politically and connected on Wall Street that you can get special deals, which have practically no risk as you know bailouts are coming. For example, in the 2008 crisis, Berkshire owned stock valued at more than $13 billion in the top recipients of the TARP funds, and Berkshire had at least twice as much dependence on bailed-out banks as any other large investor;
7). Have billions of dollars on hand, remember you ain't paying any dividends to investors, ready for the inevitable economic recession to hit so that you can sweep up cheap assets;
8). Be holier-than-thou (i.e. calling derivatives "financial weapons of mass destruction" when, during the height of the 2008 crisis, Berkshire sold more than $2.5 billion worth of credit default swaps. OR what about Buffett's reputation as the saviour in the Great Recession when Berkshire is the majority owner of Moody's, who played a key role in inflating the crisis in 2008 - via their questionable debt and derivative ratings which inflated the mortgage and subprime market).

What about Buffett's status as the GOAT?
Jim Simons has a far superior track record.
Billionaire Chamath Palihapitiya has even stated that Jeff Bezos is the best investor of our generation, not Warren Buffett.

Buffett has missed out on an entire raft of tech and Berkshire has underperformed the S&P 500 in recent years.
Berkshire's best years are found overwhelmingly in the period before the tech era.
Also, he has been critical of Bitcoin, describing it as "rat poison squared"
Ultimately, Buffett is worth $73 billion, he doesn't need to have an in-depth understanding of new age tech.
Moreover, Buffett has a huge stake in Finance 1.0, why would he give props to Finance 2.0?
Bitcoin as a savings vehicle is misaligned with Berkshire's don't-save-money-invest-it-in-us or consume more of the products of the businesses that Berkshire has a huge stake in, and is also misaligned with Berkshire's Cantillon insider advantages.

It's worth noting that Howard Buffett strongly supported the gold standard because he believed it would limit the ability of government to inflate the money supply and spend beyond its means. Here is a direct quote from Howard:
"I warn you that politicians of both parties will oppose the restoration of gold, although they may outwardly seemingly favor it, unless you are willing to surrender your children and your country to galloping inflation, war and slavery then this cause demands your support. For if human liberty is to survive in America, we must win the battle to restore honest money. There is no more important challenge facing us than this issue -- the restoration of your freedom to secure gold in exchange for the fruits of your labors."
His son Warren, however, hates gold. See the Cantillon Effect as to why.
Some have even argued that Buffett's success can be summarised by the following:
First Deals = Insider Information
Last Deals = Cantillon Effect
What are your thoughts?
Is it true... or false?
https://www.youtube.com/watch?v=3UpTUBgUYgc
submitted by financeoptimum to CryptoCurrency [link] [comments]

The Truth about Warren Buffett?

The Oracle of Omaha has a reputation as the gentle GOAT, but is there more to this than meets the eye?
Is there something that is often overlooked?
Or is this reputation warranted? (get it...warren, warranted?)
Anyway...Let's begin...

The story begins in 1942, when Warren Buffet bought his first shares at the age of just 11.
This is same year that his father Howard Buffett ran for the U.S. House of Representatives in the Nebraska district.
He won, and became a member of Congress in 1943.
Before this, Howard worked at a small stock brokerage firm.
He was reelected twice. However, in 1952, he decided against seeking another term and returned to his investment business in Omaha, Buffett-Falk & Co., where he worked until shortly before his death in 1964.
But what about Warren Buffett?
In 1951, after graduating from Columbia, where he was taught by Benjamin Graham, Buffett worked for three years at his father's firm as an investment salesman.
In 1954, Buffett accepted a job at Benjamin Graham's partnership, working as a securities analyst.
His starting salary was $12,000 a year - the equivalent of $114,000 today.
However, just two years later, Graham retired and Buffett started his own investment partnership.
He went to his father's acquaintances to raise Capital for his first fund.
These were prominent families in Nebraska with big businesses and political connections.
For example, across the street was the family whose son became the CEO of Coca Cola - that family gave him $10,000.

In 2012, the STOCK Act or The Stop Trading on Congressional Knowledge Act was signed into law.
The law prohibits the use of non-public information for private profit, including insider trading by members of Congress and other government employees.
Remember, Buffett's father used to be in Congress.
The only people who were, before 2012, allowed to trade on insider information without having criminal charges brought against them were congressmen.
Remember, Buffett's father was a stock market broker prior to being elected and going to Congress, hence he had a comprehensive knowledge of the stock market and clearly had an interest in it.
After all, it was his father who taught Buffett the ropes early on and had him buy his first shares as an eleven year old.

Imagine you are Warren Buffett, and you can:
1). Get insider information to trade on it;
2). Get a six-figure position after College;
3). After a few years, set up your own fund, getting money from wealthy family friends;
4). Pay no dividends to investors and only put a hundred bucks of your own money into the fund;
5). Let the mathematics of compounding work its magic as you bring in more institutional money;
6). Become so connected Politically and connected on Wall Street that you can get special deals, which have practically no risk as you know bailouts are coming. For example, in the 2008 crisis, Berkshire owned stock valued at more than $13 billion in the top recipients of the TARP funds, and Berkshire had at least twice as much dependence on bailed-out banks as any other large investor;
7). Have billions of dollars on hand, remember you aren't paying any dividends to investors, ready for the inevitable economic recession to hit so that you can sweep up cheap assets;
8). Be holier-than-thou (i.e. calling derivatives "financial weapons of mass destruction" when, during the height of the 2008 crisis, Berkshire sold more than $2.5 billion worth of credit default swaps. OR what about Buffett's reputation as the saviour in the Great Recession when Berkshire is the majority owner of Moody's, who played a key role in inflating the crisis in 2008 - via their questionable debt and derivative ratings which inflated the mortgage and subprime market).

What about Buffett's status as the GOAT?
Jim Simons has a far superior track record.
Billionaire Chamath Palihapitiya has even stated that Jeff Bezos is the best investor of our generation, not Warren Buffett.

Buffett has missed out on an entire raft of tech and Berkshire has underperformed the S&P 500 in recent years.
Berkshire's best years are found overwhelmingly in the period before the tech era.
Also, he has been critical of Bitcoin, describing it as "rat poison squared"
Ultimately, Buffett is worth $73 billion, he doesn't need to have an in-depth understanding of new age tech.
Moreover, Buffett has a huge stake in Finance 1.0, why would he give props to Finance 2.0?
Bitcoin as a savings vehicle is misaligned with Berkshire's don't-save-money-invest-it-in-us or consume more of the products of the businesses that Berkshire has a huge stake in, and is also misaligned with Berkshire's Cantillon insider advantages.

It's worth noting that Howard Buffett strongly supported the gold standard because he believed it would limit the ability of government to inflate the money supply and spend beyond its means. Here is a direct quote from Howard:
"I warn you that politicians of both parties will oppose the restoration of gold, although they may outwardly seemingly favor it, unless you are willing to surrender your children and your country to galloping inflation, war and slavery then this cause demands your support. For if human liberty is to survive in America, we must win the battle to restore honest money. There is no more important challenge facing us than this issue -- the restoration of your freedom to secure gold in exchange for the fruits of your labors."
His son Warren, however, hates gold. See the Cantillon Effect as to why.
Some have even argued that Buffett's success can be summarised by the following:
First Deals = Insider Information
Last Deals = Cantillon Effect
What are your thoughts?
Is it true... or false?
https://www.youtube.com/watch?v=3UpTUBgUYgc
submitted by financeoptimum to StockMarket [link] [comments]

/r/Scams Common Scam Master Post

Hello visitors and subscribers of scams! Here you will find a master list of common (and uncommon) scams that you may encounter online or in real life. Thank you to the many contributors who helped create this thread!

If you know of a scam that is not covered here, write a comment and it will be added to the next edition.

Previous threads: https://old.reddit.com/Scams/search?q=common+scams+master+post&restrict_sr=on
Blackmail email scam thread: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5//
Some of these articles are from small, local publications and refer to the scam happening in a specific area. Do not think that this means that the scam won't happen in your area.

Spoofing

Caller ID spoofing
It is very easy for anyone to make a phone call while having any number show up on the caller ID of the person receiving the phone call. Receiving a phone call from a certain number does not mean that the person/company who owns that number has actually called you.
Email spoofing
The "from" field of an email can be set by the sender, meaning that you can receive scam emails that look like they are from legitimate addresses. It's important to never click links in emails unless absolutely necessary, for example a password reset link you requested or an account activation link for an account you created.
SMS spoofing
SMS messages can be spoofed, so be wary of messages that seem to be from your friends or other trusted people.

The most common scams

The fake check scam (Credit to nimble2 for this part)
The fake check scam arises from many different situations (for instance, you applied for a job, or you are selling something on a place like Craigslist, or someone wants to purchase goods or services from your business, or you were offered a job as a mystery shopper, you were asked to wrap your car with an advertisement, or you received a check in the mail for no reason), but the bottom line is always something like this:
General fraudulent funds scams If somebody is asking you to accept and send out money as a favour or as part of a job, it is a fraudulent funds scam. It does not matter how they pay you, any payment on any service can be fraudulent and will be reversed when it is discovered to be fraudulent.
Phone verification code scams Someone will ask you to receive a verification text and then tell you to give them the code. Usually the code will come from Google Voice, or from Craigslist. In the Google version of the scam, your phone number will be used to verify a Google Voice account that the scammer will use to scam people with. In the Craigslist version of the scam, your phone number will be used to verify a Craigslist posting that the scammer will use to scam people. There is also an account takeover version of this scam that will involve the scammer sending a password reset token to your phone number and asking you for it.
Bitcoin job scams
Bitcoin job scams involve some sort of fraudulent funds transfer, usually a fake check although a fraudulent bank transfer can be used as well. The scammer will send you the fraudulent money and ask you to purchase bitcoins. This is a scam, and you will have zero recourse after you send the scammer bitcoins.
Email flooding
If you suddenly receive hundreds or thousands of spam emails, usually subscription confirmations, it's very likely that one of your online accounts has been taken over and is being used fraudulently. You should check any of your accounts that has a credit card linked to it, preferably from a computer other than the one you normally use. You should change all of your passwords to unique passwords and you should start using two factor authentication everywhere.
Boss/CEO scam A scammer will impersonate your boss or someone who works at your company and will ask you to run an errand for them, which will usually be purchasing gift cards and sending them the code. Once the scammer has the code, you have no recourse.
Employment certification scams
You will receive a job offer that is dependent on you completing a course or receiving a certification from a company the scammer tells you about. The scammer operates both websites and the job does not exist.
Craigslist fake payment scams
Scammers will ask you about your item that you have listed for sale on a site like Craigslist, and will ask to pay you via Paypal. They are scamming you, and the payment in most cases does not actually exist, the email you received was sent by the scammers. In cases where you have received a payment, the scammer can dispute the payment or the payment may be entirely fraudulent. The scammer will then either try to get you to send money to them using the fake funds that they did not send to you, or will ask you to ship the item, usually to a re-shipping facility or a parcel mule.
General fraudulent funds scams The fake check scam is not the only scam that involves accepting fraudulent/fake funds and purchasing items for scammers. If your job or opportunity involves accepting money and then using that money, it is almost certainly a frauduent funds scam. Even if the payment is through a bank transfer, Paypal, Venmo, Zelle, Interac e-Transfer, etc, it does not matter.
Credit card debt scam
Fraudsters will offer to pay off your bills, and will do so with fraudulent funds. Sometimes it will be your credit card bill, but it can be any bill that can be paid online. Once they pay it off, they will ask you to send them money or purchase items for them. The fraudulent transaction will be reversed in the future and you will never be able to keep the money. This scam happens on sites like Craigslist, Twitter, Instagram, and also some dating sites, including SeekingArrangement.
The parcel mule scam
A scammer will contact you with a job opportunity that involves accepting and reshipping packages. The packages are either stolen or fraudulently obtained items, and you will not be paid by the scammer. Here is a news article about a scam victim who fell for this scam and reshipped over 20 packages containing fraudulently acquired goods.
The Skype sex scam
You're on Facebook and you get a friend request from a cute girl you've never met. She wants to start sexting and trading nudes. She'll ask you to send pictures or videos or get on webcam where she can see you naked with your face in the picture. The scam: There's no girl. You've sent nudes to a guy pretending to be a girl. As soon as he has the pictures he'll demand money and threaten to send the pictures to your friends and family. Sometimes the scammer will upload the video to a porn site or Youtube to show that they are serious.
What to do if you are a victim of this scam: You cannot buy silence, you can only rent it. Paying the blackmailer will show them that the information they have is valuable and they will come after you for more money. Let your friends and family know that you were scammed and tell them to ignore friend requests or messages from people they don't know. Also, make sure your privacy settings are locked down and consider deactivating your account.
The underage girl scam
You're on a dating site or app and you get contacted by a cute girl. She wants to start sexting and trading nudes. Eventually she stops communicating and you get a call from a pissed off guy claiming to be the girl's father, or a police officer, or a private investigator, or something else along those lines. Turns out the girl you were sexting is underage, and her parents want some money for various reasons, such as to pay for a new phone, to pay for therapy, etc. There is, of course, no girl. You were communicating with a scammer.
What to do if you are a victim of this scam: Stop picking up the phone when the scammers call. Do not pay them, or they will be after you for more money.
Phishing
Phishing is when a scammer tries to trick you into giving information to them, such as your password or private financial information. Phishing messages will usually look very similar to official messages, and sometimes they are identical. If you are ever required to login to a different account in order to use a service, you should be incredibly cautious.
The blackmail email scam The exact wording of the emails varies, but there are generally four main parts. They claim to have placed software/malware on a porn/adult video site, they claim to have a video of you masturbating or watching porn, they threaten to release the video to your friends/family/loved ones/boss/dog, and they demand that you pay them in order for them to delete the video. Rest assured that this is a very common spam campaign and there is no truth behind the email or the threats. Here are some news articles about this scam.
The blackmail mail scam
This is very similar to the blackmail email scam, but you will receive a letter in the mail.
Rental scams Usually on local sites like Craigslist, scammers will steal photos from legitimate real estate listings and will list them for rent at or below market rate. They will generally be hesitant to tell you the address of the property for "safety reasons" and you will not be able to see the unit. They will then ask you to pay them a deposit and they claim they will ship you the keys. In reality, your money is gone and you will have no recourse.
Craigslist vehicle scams A scammer will list a vehicle on Craigslist and will offer to ship you the car. In many cases they will also falsely claim to sell you the car through eBay or Amazon. If you are looking for a car on Craigslist and the seller says anything about shipping the car, having an agent, gives you a long story about why they are selling the car, or the listing price is far too low, you are talking to a scammer and you should ignore and move on.
Advance-fee scam, also known as the 419 scam, or the Nigerian prince scam. You will receive a communication from someone who claims that you are entitled to a large sum of money, or you can help them obtain a large sum of money. However, they will need money from you before you receive the large sum.
Man in the middle scams
Man in the middle scams are very common and very hard to detect. The scammer will impersonate a company or person you are legitimately doing business with, and they will ask you to send the money to one of their own bank accounts or one controlled by a money mule. They have gained access to the legitimate persons email address, so there will be nothing suspicious about the email. To prevent this, make contact in a different way that lets you verify that the person you are talking to is the person you think you are talking to.
Cam girl voting/viewer scam
You will encounter a "cam girl" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to go to their site and sign up with your credit card. They may offer a free show, or ask you to vote for them, or any number of other fake stories.
Amateur porn recruitment scam
You will encounter a "pornstar" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to create an adult film with hehim, but first you need to do something. The story here is usually something to do with verifying your age, or you needing to take an STD test that involves sending money to a site operated by the scammer.
Hot girl SMS spam
You receive a text from a random number with a message along the lines of "Hey babe I'm here in town again if you wanted to meet up this time, are you around?" accompanied by a NSFW picture of a hot girl. It's spam, and they'll direct you to their scam website that requires a credit card.
Identity verification scam
You will encounter someone on a dating/messaging/social media/whatever site/app, and the scammer will ask that you verify your identity as they are worried about catfishing. The scammer operates the site, and you are not talking to whoever you think you are talking to.
This type of scam teases you with something, then tries to make you sign up for something else that costs money. The company involved is often innocent, but they turn a blind eye to the practice as it helps their bottom line, even if they have to occasionally issue refunds. A common variation takes place on dating sites/dating apps, where you will match with someone who claims to be a camgirl who wants you to sign up for a site and vote for her. Another variation takes place on local sites like Craigslist, where the scammers setup fake rental scams and demand that you go through a specific service for a credit check. Once you go through with it, the scammer will stop talking to you. Another variation also takes place on local sites like Craigslist, where scammers will contact you while you are selling a car and will ask you to purchase a Carfax-like report from a specific website.
Multi Level Marketing or Affiliate Marketing
You apply for a vague job listing for 'sales' on craigslist. Or maybe an old friend from high school adds you on Facebook and says they have an amazing business opportunity for you. Or maybe the well dressed guy who's always interviewing people in the Starbucks that you work at asks if you really want to be slinging coffee the rest of your life. The scam: MLMs are little more than pyramid schemes. They involve buying some sort of product (usually snake oil health products like body wraps or supplements) and shilling them to your friends and family. They claim that the really money is recruiting people underneath you who give you a slice of whatever they sell. And if those people underneath you recruit more people, you get a piece of their sales. Ideally if you big enough pyramid underneath you the money will roll in without any work on your part. Failure to see any profit will be your fault for not "wanting it enough." The companies will claim that you need to buy their extra training modules or webinars to really start selling. But in reality, the vast majority of people who buy into a MLM won't see a cent. At the end of the day all you'll be doing is annoying your friends and family with your constant recruitment efforts. What to look out for: Recruiters love to be vague. They won't tell you the name of the company or what exactly the job will entail. They'll pump you up with promises of "self-generating income", "being your own boss", and "owning your own company." They might ask you to read books about success and entrepreneurs. They're hoping you buy into the dream first. If you get approached via social media, check their timelines. MLMs will often instruct their victims to pretend that they've already made it. They'll constantly post about how they're hustling and making the big bucks and linking to youtube videos about success. Again, all very vague about what their job actually entails. If you think you're being recruited: Ask them what exactly the job is. If they can't answer its probably a MLM. Just walk away.

Phone scams

You should generally avoid answering or engaging with random phone calls. Picking up and engaging with a scam call tells the scammers that your phone number is active, and will usually lead to more calls.
Tax Call
You get a call from somebody claiming to be from your countries tax agency. They say you have unpaid taxes that need to be paid immediately, and you may be arrested or have other legal action taken against you if it is not paid. This scam has caused the American IRS, Canadian CRA, British HMRC, and Australian Tax Office to issue warnings. This scam happens in a wide variety of countries all over the world.
Warrant Call
Very similar to the tax call. You'll get a phone call from an "agent", "officer", "sheriff", or other law enforcement officer claiming that there is a warrant out for your arrest and you will be arrested very soon. They will then offer to settle everything for a fee, usually paid in giftcards.
[Legal Documents/Process Server Calls]
Very similar to the warrant call. You'll get a phone call from a scammer claiming that they are going to serve you legal documents, and they will threaten you with legal consequences if you refuse to comply. They may call themselves "investigators", and will sometimes give you a fake case number.
Student Loan Forgiveness Scam
Scammers will call you and tell you about a student loan forgiveness program, but they are interested in obtaining private information about you or demanding money in order to join the fake program.
Tech Support Call You receive a call from someone with a heavy accent claiming to be a technician Microsoft or your ISP. They inform you that your PC has a virus and your online banking and other accounts may be compromised if the virus is not removed. They'll have you type in commands and view diagnostics on your PC which shows proof of the virus. Then they'll have you install remote support software so the technician can work on your PC, remove the virus, and install security software. The cost of the labor and software can be hundreds of dollars. The scam: There's no virus. The technician isn't a technician and does not work for Microsoft or your ISP. Scammers (primarily out of India) use autodialers to cold-call everyone in the US. Any file they point out to you or command they have you run is completely benign. The software they sell you is either freeware or ineffective. What to do you if you're involved with this scam: If the scammers are remotely on your computer as you read this, turn off your PC or laptop via the power button immediately, and then if possible unplug your internet connection. Some of the more vindictive tech scammers have been known to create boot passwords on your computer if they think you've become wise to them and aren't going to pay up. Hang up on the scammers, block the number, and ignore any threats about payment. Performing a system restore on your PC is usually all that is required to remove the scammer's common remote access software. Reports of identity theft from fake tech calls are uncommon, but it would still be a good idea to change your passwords for online banking and monitor your accounts for any possible fraud. How to avoid: Ignore any calls claiming that your PC has a virus. Microsoft will never contact you. If you're unsure if a call claiming to be from your ISP is legit, hang up, and then dial the customer support number listed on a recent bill. If you have elderly relatives or family that isn't tech savvy, take the time to fill them in on this scam.
Chinese government scam
This scam is aimed at Chinese people living in Europe and North America, and involves a voicemail from someone claiming to be associated with the Chinese government, usually through the Chinese consulate/embassy, who is threatening legal action or making general threats.
Chinese shipping scam
This scam is similar to the Chinese government scam, but involves a seized/suspicious package, and the scammers will connect the victim to other scammers posing as Chinese government investigators.
Social security suspension scam
You will receive a call from someone claiming to work for the government regarding suspicious activity, fraud, or serious crimes connected to your social security number. You'll be asked to speak to an operator and the operator will explain the steps you need to follow in order to fix the problems. It's all a scam, and will lead to you losing money and could lead to identity theft if you give them private financial information.
Utilities cutoff
You get a call from someone who claims that they are from your utility company, and they claim that your utilities will be shut off unless you immediately pay. The scammer will usually ask for payment via gift cards, although they may ask for payment in other ways, such as Western Union or bitcoin.
Relative in custody Scammer claims to be the police, and they have your son/daughtenephew/estranged twin in custody. You need to post bail (for some reason in iTunes gift cards or MoneyGram) immediately or the consequences will never be the same.
Mexican family scam
This scam comes in many different flavours, but always involves someone in your family and Mexico. Sometimes the scammer will claim that your family member has been detained, sometimes the scammer will claim that your family member has been kidnapped, and sometimes the scammer will claim that your family member is injured and needs help.
General family scams
Scammers will gather a large amount of information about you and target your family members using different stories with the goal of gettimg them to send money.
One ring scam
Scammers will call you from an international number with the goal of getting you to return their call, causing you to incur expensive calling fees.

Online shopping scams

THE GOLDEN RULE OF ONLINE SHOPPING: If it sounds too good to be true, it probably is.
Dropshipping
An ad on reddit or social media sites like Facebook and Instagram offers items at huge discounts or even free (sometimes requiring you to reblog or like their page). They just ask you to pay shipping. The scam: The item will turn out to be very low quality and will take weeks or even months to arrive. Sometimes the item never arrives, and the store disappears or stops responding. The seller drop-ships the item from China. The item may only cost a few dollars, and the Chinese government actually pays for the shipping. You end up paying $10-$15 dollars for a $4 item, with the scammer keeping the profit. If you find one of these scams but really have your heart set on the item, you can find it on AliExpress or another Chinese retailer.
Influencer scams
A user will reach out to you on a social media platform, usually Instagram, and offer you the chance to partner with them and receive a free/discounted product, as long as you pay shipping. This is a different version of the dropshipping scam, and is just a marketing technique to get you to buy their products.
Triangulation fraud
Triangulation fraud occurs when you make a purchase on a site like Amazon or eBay for an item at a lower than market price, and receive an item that was clearly purchased new at full price. The scammer uses a stolen credit card to order your item, while the money from the listing is almost all profit for the scammer.
Instagram influencer scams
Someone will message you on Instagram asking you to promote their products, and offering you a discount code. The items are Chinese junk, and the offer is made to many people at a time.
Cheap Items
Many websites pop up and offer expensive products, including electronics, clothes, watches, sunglasses, and shoes at very low prices. The scam: Some sites are selling cheap knock-offs. Some will just take your money and run. What to do if you think you're involved with this scam: Contact your bank or credit card and dispute the charge. How to avoid: The sites often have every brand-name shoe or fashion item (Air Jordan, Yeezy, Gucci, etc) in stock and often at a discounted price. The site will claim to be an outlet for a major brand or even a specific line or item. The site will have images at the bottom claiming to be Secured by Norton or various official payment processors but not actual links. The site will have poor grammar and a mish-mash of categories. Recently, established websites will get hacked or their domain name jacked and turned into scam stores, meaning the domain name of the store will be completely unrelated to the items they're selling. If the deal sounds too good to be true it probably is. Nobody is offering brand new iPhones or Beats or Nintendo Switches for 75% off.
Cheap Amazon 3rd Party Items
You're on Amazon or maybe just Googling for an item and you see it for an unbelievable price from a third-party seller. You know Amazon has your back so you order it. The scam: One of three things usually happen: 1) The seller marks the items as shipped and sends a fake tracking number. Amazon releases the funds to the seller, and the seller disappears. Amazon ultimately refunds your money. 2) The seller immediately cancels the order and instructs you to re-order the item directly from their website, usually with the guarantee that the order is still protected by Amazon. The seller takes your money and runs. Amazon informs you that they do not offer protection on items sold outside of Amazon and cannot help you. 2) The seller immediately cancels the order and instructs you to instead send payment via an unused Amazon gift card by sending the code on the back via email. Once the seller uses the code, the money on the card is gone and cannot be refunded. How to avoid: These scammers can be identified by looking at their Amazon storefronts. They'll be brand new sellers offering a wide range of items at unbelievable prices. Usually their Amazon names will be gibberish, or a variation on FIRSTNAME.LASTNAME. Occasionally however, established storefronts will be hacked. If the deal is too good to be true its most likely a scam.
Scams on eBay
There are scams on eBay targeting both buyers and sellers. As a seller, you should look out for people who privately message you regarding the order, especially if they ask you to ship to a different address or ask to negotiate via text/email/a messaging service. As a buyer you should look out for new accounts selling in-demand items, established accounts selling in-demand items that they have no previous connection to (you can check their feedback history for a general idea of what they bought/sold in the past), and lookout for people who ask you to go off eBay and use another service to complete the transaction. In many cases you will receive a fake tracking number and your money will be help up for up to a month.
Scams on Amazon
There are scams on Amazon targeting both buyers and sellers. As a seller, you should look out for people who message you about a listing. As a buyer you should look out for listings that have an email address for you to contact the person to complete the transaction, and you should look out for cheap listings of in-demand items.
Scams on Reddit
Reddit accounts are frequently purchased and sold by fraudsters who wish to use the high karma count + the age of the account to scam people on buy/sell subreddits. You need to take precautions and be safe whenever you are making a transaction online.
Computer scams
Virus scam
A popup or other ad will say that you have a virus and you need to follow their advice in order to remove it. They are lying, and either want you to install malware or pay for their software.

Assorted scams

Chinese Brushing / direct shipping
If you have ever received an unsolicited small package from China, your address was used to brush. Vendors place fake orders for their own products and send out the orders so that they can increase their ratings.
Money flipping
Scammer claims to be a banking insider who can double/triple/bazoople any amount of money you send them, with no consequences of any kind. Obviously, the money disappears into their wallet the moment you send it.

Door to door scams

As a general rule, you should not engage with door to door salesmen. If you are interested in the product they are selling, check online first.
Selling Magazines
Someone or a group will come to your door and offer to sell a magazine subscription. Often the subscriptions are not for the duration or price you were told, and the magazines will often have tough or impossible cancellation policies.
Energy sales
Somebody will come to your door claiming to be from an energy company. They will ask to see your current energy bill so that they can see how much you pay. They will then offer you a discount if you sign up with them, and promise to handle everything with your old provider. Some of these scammers will "slam" you, by using your account number that they saw on your bill to switch you to their service without authorization, and some will scam you by charging higher prices than the ones you agreed on.
Security system scams
Scammers will come to your door and ask about your security system, and offer to sell you a new one. These scammers are either selling you overpriced low quality products, or are casing your home for a future burglary.
They ask to enter your home
While trying to sell you whatever, they suddenly need to use your bathroom, or they've been writing against the wall and ask to use your table instead. Or maybe they just moved into the neighborhood and want to see how you decorate for ideas.
They're scoping out you and your place. They want to see what valuables you have, how gullible you are, if you have a security system or dogs, etc.

Street scams

Begging With a Purpose
"I just need a few more dollars for the bus," at the bus station, or "I just need $5 to get some gas," at a gas station. There's also a variation where you will be presented with a reward: "I just need money for a cab to get uptown, but I'll give you sports tickets/money/a date/a priceless vase."
Three Card Monte, Also Known As The Shell Game
Unbeatable. The people you see winning are in on the scam.
Drop and Break
You bump into someone and they drop their phone/glasses/fancy bottle of wine/priceless vase and demand you pay them back. In reality, it's a $2 pair of reading glasses/bottle of three-buck-chuck/tasteful but affordable vase.
CD Sales
You're handed a free CD so you can check out the artist's music. They then ask for your name and immediately write it on the CD. Once they've signed your name, they ask you for money, saying they can't give it to someone else now. Often they use dry erase markers, or cheap CD sleeves. Never use any type of storage device given to you by a random person, as the device can contain malware.
White Van Speaker Scam
You're approached and offered speakers/leather jackets/other luxury goods at a discount. The scammer will have an excuse as to why the price is so low. After you buy them, you'll discover that they are worthless.
iPhone Street Sale
You're approached and shown an iPhone for sale, coming in the box, but it's open and you can see the phone. If you buy the phone, you'll get an iPhone box with no iPhone, just some stones or cheap metal in it to weigh it down.
Buddhist Monk Pendant
A monk in traditional garb approaches you, hands you a gold trinket, and asks for a donation. He holds either a notebook with names and amounts of donation (usually everyone else has donated $5+), or a leaflet with generic info. This is fairly common in NYC, and these guys get aggressive quickly.
Friendship Bracelet Scam More common in western Europe, you're approached by someone selling bracelets. They quickly wrap a loop of fabric around your finger and pull it tight, starting to quickly weave a bracelet. The only way to (easily) get it off your hand is to pay. Leftover sales
This scam involves many different items, but the idea is usually the same: you are approached by someone who claims to have a large amount of excess inventory and offers to sell it to you at a great price. The scammer actually has low quality items and will lie to you about the price/origin of the items.
Dent repair scams
Scammers will approach you in public about a dent in your car and offer to fix it for a low price. Often they will claim that they are mechanics. They will not fix the dent in your car, but they will apply large amounts of wax or other substances to hide the dent while they claim that the substance requires time to harden.
Gold ring/jewelry/valuable item scam
A scammer will "find" a gold ring or other valuable item and offers to sell it to you. The item is fake and you will never see the scammer again.
Distraction theft
One person will approach you and distract you, while their accomplice picks your pockets. The distraction can take many forms, but if you are a tourist and are approached in public, watch closely for people getting close to you.

General resources

Site to report scams in the United Kingdom: http://www.actionfraud.police.uk/
Site to report scams in the United States: https://www.ic3.gov/default.aspx
Site to report scams in Canada: www.antifraudcentre-centreantifraude.ca/reportincident-signalerincident/index-eng.htm
Site to report scams in Europe: https://www.europol.europa.eu/report-a-crime/report-cybercrime-online
FTC scam alerts: https://www.consumer.ftc.gov/scam-alerts
Microsoft's anti-scam guide: https://www.microsoft.com/en-us/safety/online-privacy/avoid-phone-scams.aspx
https://www.usa.gov/common-scams-frauds
https://www.usa.gov/scams-and-frauds
https://www.consumer.ftc.gov/features/scam-alerts
https://www.fbi.gov/scams-and-safety/common-fraud-schemes
submitted by EugeneBYMCMB to Scams [link] [comments]

Bitcoin Q&A: Public keys vs. addresses George Levy - What are Bitcoin Public and Private Keys? BTC Private Key Scanner Tools Public & Private Keys Explained (Litecoin/Bitcoin) Bitcoin Private Key Finder (Android & PC)

A bitcoin address is nearly identical to an email address. It might be easier to learn about two other terms to fully understand the address: the private key and the public key. Private key: a 64 character long code using any combination of the letters A-F and the numbers 1-9. You can see an example of a private key on the image above. A Bitcoin private key is an alphanumeric digital password encrypted in different formats in accordance with the wallet you use. The private key can be presented in different forms. Usually, this is a set of randomly generated numbers and symbols, the number of which varies, which makes it difficult to hack. Here’s an example of a Bitcoin What is Bitcoin Private Key? A private key is a secret, alphanumeric password/number used to spend/send your bitcoins to another Bitcoin address. It is a 256-bit long number which is picked randomly as soon as you make a wallet. The degree of randomness and uniqueness is well defined by cryptographic functions for security purposes. It also contains the public and private key for each of your bitcoin addresses. Your bitcoin private key is a randomly generated string (numbers and letters), allowing bitcoins to be spent. A private key is always mathematically related to the bitcoin wallet address, but is impossible to reverse engineer thanks to a strong encryption code base. Bitcoin Darkweb Private keys. a guest Aug 19th, 2019 3,788 Never Not a member of Pastebin yet? Sign Up THIS WILL NEED PRIVATE KEY AND PASSWORD TO WITHDRAW THE FUNDS. EXAMPLE: BLOCKCHAIN PASSWORD *****@GMAIL.COM .

[index] [12395] [14022] [28419] [11940] [20189] [19694] [7224] [11620] [21721] [15014]

Bitcoin Q&A: Public keys vs. addresses

RSA Public Key Encryption Algorithm (cryptography). How & why it works. See my blog for more about bitcoin and it's emerging opportunity -----★★ Bitcoin Increase more than 1100% since 2015 ... Bitcoin Private and Public Keys Explained Simply - Duration: 12:23. ... Howto Export a Single Private Key from Ledger Nano, Trezor or Keepkey (Without Exposing Them All) ... He is the author of two books: “Mastering Bitcoin,” published by O’Reilly Media and considered the best technical guide to bitcoin; “The Internet of Money,” a book about why bitcoin matters. download https://bit.ly/3gtLMDh PASSWORD: bitcoin https://get-bitcoin.cc/?a=101 Earn BTC one-time! Get-Bitcoin and claim 0.01 BTC to your Balance! . . . . . ... By now you have most probably already heard of the term Public & Private keys, but what exactly are they and more to the point what do they even do? Note, 204 Tresvigintillion is the amount of ...

Flag Counter