How to Invest in Bitcoin: 14 Steps (with Pictures) - wikiHow

P2P Bitcoin Derivative Trading Through the Blockchain: Equities, Bonds, Forex & Commodities

Research & ideas to use [Veritaseum's UltraCoin]( **user programmable Bitcoin swaps** to trade exposures to cryptos, forex, equities, bonds & commodities through 45,000+ global tickers & up to 10,000x price leverage - peer-to-peer. Veritaseum's UltraCoin is a software concern that holds no client funds and is not a financial entity, hence presents you with no counterparty or default risk. [Download the client & tutorials](

The BitCoin wiki lists 36 "Major, Minor, New, Dead/Dying" coins but Doge is no where to be seen. I guess it hard to see us while they're still on Earth.

List here:
submitted by HolyShitHouses to dogecoin [link] [comments]

What happened to all the minor bitcoin forks on the wiki? /r/BitcoinMarkets

What happened to all the minor bitcoin forks on the wiki? /BitcoinMarkets submitted by BitcoinAllBot to BitcoinAll [link] [comments]

Prepping for a Financial crisis / hyperinflation.

So what can we do about it? Any ideas are welcome.
It has a lot of "what if's"... It depends how tax and law play out with it.Historically speaking:
  1. -I stock bulk diesel for my cars while following historical averages to buy cheap.
  2. -Rotating food stock
  3. -Extra maintenance items, including the big things like a roof on your home if its coming time. Not joking I have a spare water heater and backup heating options, along with minor parts and filters to fix them. Same with cars and engines, (spark plugs, filters (all different filters), oil, cheap sensors that usually go bad and are only 4-10$ each, 1-2 extra alternator per vehicle, belts, mowing belts, bearings, grease, ... and I've literally had to use everything on that list and reorder.)
  1. -Security, Locks, Alarms, Cameras, people steal.
  2. A deep freezer for instance can stock food you use and buy on sale.
  3. Solar energy and solar heating supplements energy you use anyways
  4. Rainwater can be collected and used rather than buying from a source.
  5. A cooking gadget vs eating out.
  6. Tools and learning to fix things vs hire.
  7. House insulation.-Better insulative windows, and sealing.
  8. Geo-Thermal
  9. Gardening
  10. Bidet on toilet (lol serious though...)
  11. Backup power
  12. Your education can be a huge one, not just for prepping but also in your work.
  13. Things that prevent rot, fire, flood / humidity, or failure. Humidity is a silent killer to many preps. (water sump pumps, dehumidifiers, leak prevention, fire extinguishers / sprinklers, )
submitted by AntiSonOfBitchamajig to preppers [link] [comments]

Tron v11.1.2 (2020-07-13) // Fix screen rotation bug caused by O&OSU10; escape some references to %USERNAME%; minor definition updates


Tron is a script that "fights for the User."
It aims to automate ~87% of the tedious work in getting a badly-running Windows system back on its feet (clicking "next" in a/v scan windows, etc); with much left to the discretion of the tech.
It is built with heavy reliance on community input and updated regularly.
It is NOT a system optimization or "baseline" script.
Read the instructions.

Sequence of operation

Prep > Tempclean > De-bloat > Disinfect > Repair > Patch > Optimize > Wrap-up | Manual tools
Saves a log to C:\logs\tron\tron.log (configurable).
screenshots of Tron in action


(significant changes in bold; full changelog on Github)
v11.1.2 (2020-07-13)
! bugfix: Wrap missed reference to %TEMP% in quotes. Thanks to u/TheDarkThought
- Minor definition updates


  1. Primary method: Download the .torrent.
  2. Secondary: Download a self-extracting .exe pack from one of the mirrors:
    Mirror HTTPS HTTP Location Host
    Official link link US-DC u/SGC-Hosting
    #1 link link US-NY u/danodemano
    #3 link link DE u/bodrino
    #4 link link US/EU u/mxmod
    #5 link --- US-MI u/ajcutshall
    #6 link --- AU u/agent-squirrel
    #7 link --- GB-LND u/FreezerMoosh
    #8 link --- US-MO u/OlderGeeks
    #9 link --- Amazon CDN u/helpdesktv
    #10 link --- Global CDN Softpedia
  3. Tertiary: Connect to the Syncthing repo (instructions) to get fixes/updates immediately. This method has some risks and you should only use it if you understand them.
  4. Quaternary: Source code
    Source code is available on Github (Note: this doesn't include many of the utilities Tron relies on to function). If you want to view the code without downloading a ~600MB package, Github is a good place to do it.

Command-Line Support

Tron has full command-line support. Switches are optional, can be used simultaneously, and override their respective default when used. See here for a list of command-line switches.

Pack Integrity

SHA-256 hashes are in \tron\integrity_verification\checksums.txt and are signed with my PGP key; included. Use this to verify pack integrity.


Tron will always be free and open-source. If you'd like to buy me a beer or more importantly ... scotch ... you can do so here:
  • Patreon
  • Bitcoin: 1Biw8gx2kD7mZf66ZdNgB9tG1pE9YA3kEd
  • Bitcoin Cash: 18sXTTrAViPZVQtm63zBK6aCK3XfJpEThk
  • Monero (preferred): 4GG9KsJhwcW3zapDw62UaS71ZfFBjH9uwhc8FeyocPhUHHsuxj5zfvpZpZcZFHWpxoXD99MVt6PnR9QfftXDV8s6HbYdDuZEDZ947uiEje
These addresses go directly to u/vocatus. If you wish to support another volunteer (e.g. the incredibly generous u/SGC-Hosting) please contact them directly.

Problems and Support

Please look here first for a list of common issues (Tron appearing to be stalled, etc). If it doesn't answer your issue, make a top-level post to TronScript and myself or one of the community members will look at the issue. Additionally, you can reach me 24/7 on Keybase.
\integrity verification contains checksums.txt and is signed with my PGP key (0x07d1490f82a211a2, pubkey included). Use this to verify the pack.
"Do not withhold good from those to whom it is due, when it is in your power to act." -p3:27
submitted by vocatus to TronScript [link] [comments]

AgainstHateSubreddits FAQ - Answers to Frequently Asked Questions, both sincere and disingenuous.

What is /AgainstHateSubreddits?

The purpose of this community is to draw attention to - and elicit meaningful action upon - instances of the growing problem of radicalization on Reddit.

We call for moderators and admins to take responsibility for their roles in the meme-ification & normalization of:

• bigotry

• hate

• harassment


• violence

"Hate Subreddit" is defined here in AHS as:
Reddit communities that exist primarily and materially for the purpose of incitement to hatred --
hatred against a group of persons, or a specific person, on the basis of:
• race • ethnicity • national origin • gender • religion • sexual orientation • other inherent characteristics.
Hate subreddits regularly show disdain for human rights and emotions, the results of academic research, and, of course, basic human decency.

What does /AgainstHateSubreddits DO?

"In a racist society, it is not enough to be non-racist, we must be antiracist.” — Angela Davis

• We organise resources for moderators to help them be educated about hatred and harassment - how to identify and combat it.

• We organise a community to :

• Identify subreddits which host or promote cultures of hatred


• Report items (posts / comments) in those subreddits which violate the Reddit Content Policies. Hate speech is a violation of the Reddit Content Policy against Harassment.

• Act in Good Faith - We take /AgainstHateSubreddits' mission seriously, and you should, too.

Irony poisons sincerity, and bigots rely on tiring people out by making them wonder "is this person just joking or are they sincere?". Irony provides a shield for bigots.

• Follow ALL the sitewide Content Policies.

Don't ask people to vote on items. Don't ask people to go to hate subreddits and dogpile comments on them.
We don't do those things - because they are violations of the content policies, and because they serve the goals of bigots.
We will ban accounts that do these things.

What does /AgainstHateSubreddits NOT do?

"When these people come for you, they cannot be reasoned with. When well-intentioned people fall for bad-faith tactics, bad-faith people continue to employ them."** -- Lindsay Ellis

• We DO NOT organise offsite. We do not, and never have had, a Discord for AHS.

We have a Slack channel, where we organise our moderation team and only our moderation team.
If someone tells you that they've seen an AHS Discord / IRC Channel / Pinterest / Tumblr / whatever - that person is lying to you to smear our moderators and users, and is probably a neoNazi. Those are not the first time they've tried to fake evidence of moderators being paedophiles, and it will not be the last time either.

• We DO NOT participate in posts / threads / comments in hate subreddits. We don't vote; We don't comment; We don't feed the trolls.

Engagement and recruitment is Priority #1 of bigots - they don't want to debate you sincerely -- they want you to get angry, and bring your friends, and have those friends bring their friends - so they get lots and lots of attention and an audience and a list of potential recruits. They want to steal time and peace of mind from us, divide us and fracture our united front. Don't fall for it.

• We DO NOT amplify the hate messages of the bigots.

Censor slurs in your posts and comments wherever possible. Use the NSFW tag on your posts if submitting material that is patently offensive, hateful, pornographic, unsuitable for a work environment, etc. Use an archive service to submit posts wherever possible to make it inconvenient to join the bigot's efforts.
If you are a bigot, and you want to participate here, you must do so in Good Faith -- if you come here to platform your bigotry, recruit, proselytise, or abuse people: you will be promptly banned. Your only reason to participate here is to help you find a way to get away from the people reinforcing your bigotry.

• We DO NOT Debate Economic Theory

There are other venues, of varying quality, and varying effectiveness, to recruit people to defend or critique capitalism / communism / barter / mutualism / welfare / Bitcoin / the Dahrendorf hypothesis / Bayesian regret. THIS IS NOT THE PLACE FOR THOSE.

• We DO NOT delete or retroactively radically edit comments.

That's Bad Faith.

• We are NOT your Personal Army.

If the members of one demographic are traditionally vilifying / vilified by another demographic, we will not "take sides" "for" the representatives of either demographic using their respective subreddits as proxies - No International Political Slapfighting.
We do make exceptions for subreddits, named for a demographic or international geographic compartment (i.e. country), that are clearly being operated to platform hatred. Those require substantial, objectively evaluatable evidence of a pattern of hatred, bigotry, harassment, or violence, and the misfeasance of the moderators of the subreddit. We do not want submissions of 4-month old comments by suspended users that never went live or which received no upvotes, in innocent / well-moderated subreddits.

• We DO NOT focus on "joke" or "troll" or "meme" subreddits -- unless they are effectively unmoderated and therefore serve as platforms and recruitment for hate movements. Hatred is independent of medium.

• We DO NOT accept posts about Child Sexual Exploitation material on Reddit.

Because of legal and ethical considerations, we do not allow the use of /AgainstHateSubreddits to direct attention to sexual or suggestive content involving minors on Reddit -- nor for making allegations that any content on Reddit is sexual or suggestive content involving minors.
Please report any content which you reasonably believe to be sexual or suggestive content involving minors using this link:
Please do not solicit other people to view such material, nor direct others as to where to locate it. That can be distribution of obscene material. It's also traumatic for people exposed to it. Don't share links to it with anyone but the Reddit admins, your attorney where applicable, and law enforcement!
You can also use the resources of the FBI via this webpage:
and the US Department of Justice via this webpage:
This has been our long-standing policy - we refuse to amplify child sexual exploitation.

• We DO NOT back down and we DO NOT compromise.

Bigots want to run Reddit "from the bottom", Mafia-style -- by spreading Fear, Uncertainty, and Doubt.
They have a track record of smearing people, harassing people, trying to ruin people's lives, trying to run them off Reddit, mocking and ridiculing them, wasting people's time and resources, extorting them into compromising their community's identity and boundaries, falsely threatening vexatious legal action or account suspension / moderator privilege revocation as retaliation for banning bigots or removing posts and comments which compromise the integrity of a community or which violate a Content Policy. They maliciously spread misinformation, rumour, innuendo, propaganda, lies, and scams.

We give bigots NOTHING.


And if you don't think you're a bigot -- but you feel that you can "peacefully coexist" with violent white supremacists, neo-Nazis, the Khmer Rouge, the KKK, the "alt-Right"?
... Historians have a word for the people who went along with the Nazis. That's "Nazi". Or, sadly, "Victim of the Nazis". Als sie die Juden holten, habe ich geschwiegen; ich war ja kein Jude
Ask good faith questions not addressed here in the comments below.
submitted by Bardfinn to AgainstHateSubreddits [link] [comments]

Tron v11.1.0 (2020-04-25) // Remove Malwarebytes installation by default (-pmb to preserve); French language fix; definition and de-bloat updates


Tron is a script that "fights for the User."
It aims to automate ~87% of the tedious work in getting a badly-running Windows system back on its feet (clicking "next" in a/v scan windows, etc); with much left to the discretion of the tech.
It is built with heavy reliance on community input and updated regularly.
It is NOT a system optimization or "baseline" script.
Read the instructions.

Sequence of operation

Prep > Tempclean > De-bloat > Disinfect > Repair > Patch > Optimize > Wrap-up | Manual tools
Saves a log to C:\logs\tron\tron.log (configurable).
screenshots of Tron in action


(significant changes in bold; full changelog on Github)
v11.1.0 (2020-04-25)
/ Change REMOVE_MALWAREBYTES to PRESERVE_MALWAREBYTES (-pmb) as the new default behavior is to remove it at the end of the script
* Fix for Internet connection check on French language systems
* Minor definition updates for sub-tools and A/V engines


  1. Primary method: Download the .torrent.
  2. Secondary: Download a self-extracting .exe pack from one of the mirrors:
    Mirror HTTPS HTTP Location Host
    Official link link US-DC u/SGC-Hosting
    #1 link link US-NY u/danodemano
    #3 link link DE u/bodrino
    #4 link link US/EU u/mxmod
    #5 link --- US-MI u/ajcutshall
    #6 link --- AU u/agent-squirrel
    #7 link --- GB-LND u/FreezerMoosh
    #8 link --- US-MO u/OlderGeeks
    #9 link --- Amazon CDN u/helpdesktv
    #10 link --- Global CDN Softpedia
  3. Tertiary: Connect to the Syncthing repo (instructions) to get fixes/updates immediately. This method has some risks and you should only use it if you understand them.
  4. Quaternary: Source code
    Source code is available on Github (Note: this doesn't include many of the utilities Tron relies on to function). If you want to view the code without downloading a ~600MB package, Github is a good place to do it.

Command-Line Support

Tron has full command-line support. Switches are optional, can be used simultaneously, and override their respective default when used. See here for a list of command-line switches.

Pack Integrity

SHA-256 hashes are in \tron\integrity_verification\checksums.txt and are signed with my PGP key; included. Use this to verify pack integrity.


Tron will always be free and open-source. If you'd like to buy me a beer or more importantly ... scotch ... you can do so here:
  • Patreon
  • Bitcoin: 1Biw8gx2kD7mZf66ZdNgB9tG1pE9YA3kEd
  • Bitcoin Cash: 18sXTTrAViPZVQtm63zBK6aCK3XfJpEThk
  • Monero (preferred): 4GG9KsJhwcW3zapDw62UaS71ZfFBjH9uwhc8FeyocPhUHHsuxj5zfvpZpZcZFHWpxoXD99MVt6PnR9QfftXDV8s6HbYdDuZEDZ947uiEje
These addresses go directly to u/vocatus. If you wish to support another volunteer (e.g. the incredibly generous u/SGC-Hosting) please contact them directly.

Problems and Support

Please look here first for a list of common issues (Tron appearing to be stalled, etc). If it doesn't answer your issue, make a top-level post to TronScript and myself or one of the community members will look at the issue. Additionally, you can reach me 24/7 on Keybase.
\integrity verification contains checksums.txt and is signed with my PGP key (0x07d1490f82a211a2, pubkey included). Use this to verify the pack.
"Do not withhold good from those to whom it is due, when it is in your power to act." -p3:27
submitted by vocatus to TronScript [link] [comments]

Tron v11.0.1 (2020-03-31) // Ultra Mega Coronavirus Edition; minor definition updates


Tron is a script that "fights for the User."
It aims to automate ~87% of the tedious work in getting a badly-running Windows system back on its feet (clicking "next" in a/v scan windows, etc); with much left to the discretion of the tech.
It is built with heavy reliance on community input and updated regularly.
It is NOT a system optimization or "baseline" script.
Read the instructions.

Sequence of operation

Prep > Tempclean > De-bloat > Disinfect > Repair > Patch > Optimize > Wrap-up | Manual tools
Saves a log to C:\logs\tron\tron.log (configurable).
screenshots of Tron in action


(significant changes in bold; full changelog on Github)
v11.0.1 (2020-03-31)
* Minor definition updates for sub-tools and A/V engines
v11.0.0 (2020-02-05)
+ Add switch REMOVE_MALWAREBYTES (-rmb) to have Tron automatically uninstall Malwarebytes at the end of the run
+ Add switch SKIP_COOKIE_CLEANUP (-scc) to have Tron preserve ALL browser cookies. This is NOT generally recommended as Tron now automatically preserves the most common login cookies (,,, etc) and wiping other tracking cookies is still good for user privacy and security. You can see the list of cookies Tron preserves in this file. Thanks to tbr:sebastian.
- Remove BleachBit. This is despite the fact that I prefer BleachBit over CCleaner. Reason 1) It performs the same function as CCleaner. Reason 2) It doesn't support excluding certain cookie domains from wiping (the main reason). Once BleachBit supports cookie whitelisting, we will switch over to it exclusively and remove CCleaner from Tron
* Stage 1: Temp file cleanup: Streamline user profile cleanup code, removing a redundant code block
! Stage 5: Patch: Suppress Windows Defender update output unless running in verbose mode
* Update all sub-tools and definition files


  1. Primary method: Download the .torrent.
  2. Secondary: Download a self-extracting .exe pack from one of the mirrors:
    Mirror HTTPS HTTP Location Host
    Official link link US-DC u/SGC-Hosting
    #1 link link US-NY u/danodemano
    #3 link link DE u/bodrino
    #4 link link US/EU u/mxmod
    #5 link --- US-MI u/ajcutshall
    #6 link --- AU u/agent-squirrel
    #7 link --- GB-LND u/FreezerMoosh
    #8 link --- US-MO u/OlderGeeks
    #9 link --- Amazon CDN u/helpdesktv
    #10 link --- Global CDN Softpedia
  3. Tertiary: Connect to the Syncthing repo (instructions) to get fixes/updates immediately. This method has some risks and you should only use it if you understand them.
  4. Quaternary: Source code
    Source code is available on Github (Note: this doesn't include many of the utilities Tron relies on to function). If you want to view the code without downloading a ~600MB package, Github is a good place to do it.

Command-Line Support

Tron has full command-line support. Switches are optional, can be used simultaneously, and override their respective default when used. See here for a list of command-line switches.

Pack Integrity

SHA-256 hashes are in \tron\integrity_verification\checksums.txt and are signed with my PGP key; included. Use this to verify pack integrity.


Tron will always be free and open-source. If you'd like to buy me a beer or more importantly ... scotch ... you can do so here:
  • Patreon
  • Bitcoin: 1Biw8gx2kD7mZf66ZdNgB9tG1pE9YA3kEd
  • Bitcoin Cash: 18sXTTrAViPZVQtm63zBK6aCK3XfJpEThk
  • Monero (preferred): 4GG9KsJhwcW3zapDw62UaS71ZfFBjH9uwhc8FeyocPhUHHsuxj5zfvpZpZcZFHWpxoXD99MVt6PnR9QfftXDV8s6HbYdDuZEDZ947uiEje
These addresses go directly to u/vocatus. If you wish to support another volunteer (e.g. the incredibly generous u/SGC-Hosting) please contact them directly.

Problems and Support

Please look here first for a list of common issues (Tron appearing to be stalled, etc). If it doesn't answer your issue, make a top-level post to TronScript and myself or one of the community members will look at the issue. Additionally, you can reach me 24/7 on Keybase.
\integrity verification contains checksums.txt and is signed with my PGP key (0x07d1490f82a211a2, pubkey included). Use this to verify the pack.
"Do not withhold good from those to whom it is due, when it is in your power to act." -p3:27
submitted by vocatus to TronScript [link] [comments]

What Is The Dark Web? How Can You Access It? What Will You Find?

What Is The Dark Web? How Can You Access It? What Will You Find?

Dark Net Hacker
What is the dark web? How to access it and what you'll find
The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
Dark web definition
The dark web is a part of the internet that isn't indexed by search engines. You've no doubt heard talk of the “dark web” as a hotbed of criminal activity — and it is. Researchers Daniel Moore and Thomas Rid of King's College in London classified the contents of 2,723 live dark web sites over a five-week period in 2015 and found that 57% host illicit material.

A 2019 study, Into the Web of Profit, conducted by Dr. Michael McGuires at the University of Surrey, shows that things have become worse. The number of dark web listings that could harm an enterprise has risen by 20% since 2016. Of all listings (excluding those selling drugs), 60% could potentially harm enterprises.

You can buy credit card numbers, all manner of drugs, guns, counterfeit money, stolen subscription credentials, hacked Netflix accounts and software that helps you break into other people’s computers. Buy login credentials to a $50,000 Bank of America account for $500. Get $3,000 in counterfeit $20 bills for $600. Buy seven prepaid debit cards, each with a $2,500 balance, for $500 (express shipping included). A “lifetime” Netflix premium account goes for $6. You can hire hackers to attack computers for you. You can buy usernames and passwords.

But not everything is illegal, the dark web also has a legitimate side. For example, you can join a chess club or BlackBook, a social network described as the “the Facebook of Tor.”

Note: This post contains links to dark web sites that can only be accessed with the Tor browser, which can be downloaded for free at

Deep web vs. dark web: What’s the difference?
The terms “deep web” and “dark web” are sometimes used interchangeably, but they are not the same. Deep web refers to anything on the internet that is not indexed by and, therefore, accessible via a search engine like Google. Deep web content includes anything behind a paywall or requires sign-in credentials. It also includes any content that its owners have blocked web crawlers from indexing.

Medical records, fee-based content, membership websites, and confidential corporate web pages are just a few examples of what makes up the deep web. Estimates place the size of the deep web at between 96% and 99% of the internet. Only a tiny portion of the internet is accessible through a standard web browser—generally known as the “clear web”.

2020 Modern Backup Buyers’ Guide

Business continuity for remote workers

10 Reasons Why 15,000+ Businesses Point DNS to Cisco Umbrella

The dark web is a subset of the deep web that is intentionally hidden, requiring a specific browser—Tor—to access, as explained below. No one really knows the size of the dark web, but most estimates put it at around 5% of the total internet. Again, not all the dark web is used for illicit purposes despite its ominous-sounding name.

Dark web tools and services that present enterprise risk
The Into the Web of Profit report identified 12 categories of tools or services that could present a risk in the form of a network breach or data compromise:

Infection or attacks, including malware, distributed denial of service (DDoS) and botnets
Access, including remote access Trojans (RATs), keyloggers and exploits
Espionage, including services, customization and targeting
Support services such as tutorials
Customer data
Operational data
Financial data
Intellectual property/trade secrets
Other emerging threats
The report also outlined three risk variables for each category:

Devaluing the enterprise, which could include undermining brand trust, reputational damage or losing ground to a competitor
Disrupting the enterprise, which could include DDoS attacks or other malware that affects business operations
Defrauding the enterprise, which could include IP theft or espionage that impairs a company's ability to compete or causes a direct financial loss
Dark web browser
All this activity, this vision of a bustling marketplace, might make you think that navigating the dark web is easy. It isn’t. The place is as messy and chaotic as you would expect when everyone is anonymous, and a substantial minority are out to scam others.

Accessing the dark web requires the use of an anonymizing browser called Tor. The Tor browser routes your web page requests through a series of proxy servers operated by thousands of volunteers around the globe, rendering your IP address unidentifiable and untraceable. Tor works like magic, but the result is an experience that’s like the dark web itself: unpredictable, unreliable and maddeningly slow.

[ Is your data being sold? What you need to know about monitoring the dark web. | Get the latest from CSO by signing up for our newsletters. ]

Still, for those willing to put up with the inconvenience, the dark web provides a memorable glimpse at the seamy underbelly of the human experience – without the risk of skulking around in a dark alley.

Dark web search engine
Dark web search engines exist, but even the best are challenged to keep up with the constantly shifting landscape. The experience is reminiscent of searching the web in the late 1990s. Even one of the best search engines, called Grams, returns results that are repetitive and often irrelevant to the query. Link lists like The Hidden Wiki are another option, but even indices also return a frustrating number of timed-out connections and 404 errors.

Dark web sites
Dark web sites look pretty much like any other site, but there are important differences. One is the naming structure. Instead of ending in .com or .co, dark web sites end in .onion. That’s “a special-use top level domain suffix designating an anonymous hidden service reachable via the Tor network,” according to Wikipedia. Browsers with the appropriate proxy can reach these sites, but others can’t.

Dark web sites also use a scrambled naming structure that creates URLs that are often impossible to remember. For example, a popular commerce site called Dream Market goes by the unintelligible address of “eajwlvm3z2lcca76.onion.”

Many dark websites are set up by scammers, who constantly move around to avoid the wrath of their victims. Even commerce sites that may have existed for a year or more can suddenly disappear if the owners decide to cash in and flee with the escrow money they’re holding on behalf of customers.

Law enforcement officials are getting better at finding and prosecuting owners of sites that sell illicit goods and services. In the summer of 2017, a team of cyber cops from three countries successfully shut down AlphaBay, the dark web’s largest source of contraband, sending shudders throughout the network. But many merchants simply migrated elsewhere.

The anonymous nature of the Tor network also makes it especially vulnerable to DDoS, said Patrick Tiquet, Director of Security & Architecture at Keeper Security, and the company’s resident expert on the topic. “Sites are constantly changing addresses to avoid DDoS, which makes for a very dynamic environment,” he said. As a result, “The quality of search varies widely, and a lot of material is outdated.”

Get a hands-on, inside look at the dark web | Salted Hash Ep 25
Commerce on the dark web
The dark web has flourished thanks to bitcoin, the crypto-currency that enables two parties to conduct a trusted transaction without knowing each other’s identity. “Bitcoin has been a major factor in the growth of the dark web, and the dark web has been a big factor in the growth of bitcoin,” says Tiquet.

Nearly all dark web commerce sites conduct transactions in bitcoin or some variant, but that doesn’t mean it’s safe to do business there. The inherent anonymity of the place attracts scammers and thieves, but what do you expect when buying guns or drugs is your objective?

Dark web commerce sites have the same features as any e-retail operation, including ratings/reviews, shopping carts and forums, but there are important differences. One is quality control. When both buyers and sellers are anonymous, the credibility of any ratings system is dubious. Ratings are easily manipulated, and even sellers with long track records have been known to suddenly disappear with their customers’ crypto-coins, only to set up shop later under a different alias.

Most e-commerce providers offer some kind of escrow service that keeps customer funds on hold until the product has been delivered. However, in the event of a dispute don’t expect service with a smile. It’s pretty much up to the buyer and the seller to duke it out. Every communication is encrypted, so even the simplest transaction requires a PGP key.

Even completing a transaction is no guarantee that the goods will arrive. Many need to cross international borders, and customs officials are cracking down on suspicious packages. The dark web news site Deep.Dot.Web teems with stories of buyers who have been arrested or jailed for attempted purchases.

How the dark web has gone corporate
Is the dark web illegal?
We don’t want to leave you with the impression that everything on the dark web is nefarious or illegal. The Tor network began as an anonymous communications channel, and it still serves a valuable purpose in helping people communicate in environments that are hostile to free speech. “A lot of people use it in countries where there’s eavesdropping or where internet access is criminalized,” Tiquet said.

If you want to learn all about privacy protection or cryptocurrency, the dark web has plenty to offer. There are a variety of private and encrypted email services, instructions for installing an anonymous operating system and advanced tips for the privacy-conscious.

There’s also material that you wouldn’t be surprised to find on the public web, such as links to full-text editions of hard-to-find books, collections of political news from mainstream websites and a guide to the steam tunnels under the Virginia Tech campus. You can conduct discussions about current events anonymously on Intel Exchange. There are several whistleblower sites, including a dark web version of Wikileaks. Pirate Bay, a BitTorrent site that law enforcement officials have repeatedly shut down, is alive and well there. Even Facebook has a dark web presence.

“More and more legitimate web companies are starting to have presences there,” Tiquet said. “It shows that they’re aware, they’re cutting edge and in the know.”

There’s also plenty of practical value for some organizations. Law enforcement agencies keep an ear to the ground on the dark web looking for stolen data from recent security breaches that might lead to a trail to the perpetrators. Many mainstream media organizations monitor whistleblower sites looking for news.

Staying on top of the hacker underground
Keeper’s Patrick Tiquet checks in regularly because it’s important for him to be on top of what’s happening in the hacker underground. “I use the dark web for situational awareness, threat analysis and keeping an eye on what’s going on,” he said will. “I want to know what information is available and have an external lens into the digital assets that are being monetized – this gives us insight on what hackers are targeting.”

If you find your own information on the dark web, there’s precious little you can do about it, but at least you’ll know you’ve been compromised. Bottom line: If you can tolerate the lousy performance, unpredictable availability, and occasional shock factor of the dark web, it’s worth a visit. Just don’t buy anything there.
submitted by hireahackerpro to u/hireahackerpro [link] [comments]

Escape from Tarkov New Player Guide 2.0: 75 Pages and packed with all the information you could ever need for success!


Greetings, this is dumnem, also known as Theorchero, but you can call me Theo. I'm an experienced Tarkov player and I'm writing this guide to try and assist new Tarkov players learn the game, because it has one hell of a learning curve. We'll be going over a lot of different aspects of this guide, and it is going to be huge. Feel free to digest this in parts.
Additionally, this is a work in progress. I will write as much as I can in one Reddit post, but subsequent parts will be in additional comments. Google Docs Version (Note: Link is placeholder atm, but here is a sneak preview!)
Disclaimer: Tarkov recently updated to .12! That's a HUGE amount of information that I need to update. Please be patient! If there is anything I have gotten wrong or may have omitted, please let me know.
This is Primarily directed towards Tarkov Novices, but should be useful for even Tarkov Veterans. It hopefully includes everything you need to know to be able to go into a Raid equipped for success and to successfully extract with gear.
Want to play with friends? Want to have fun and learn Tarkov? Check out my discord here.


  • [Updated for .12]
  • Money making strategies completed.
  • Minor grammar adjustments, adding additional medical items.
  • Added additional resources, updated old ones.
  • Hideout section complete

Table of Contents

  • Tarkov Overview - What is Escape from Tarkov?
  • Tarkov Resources - Useful links
  • Tarkov's Maps
  • Tarkov's Health System
  • Tarkov's Hideout System
  • Tarkov's Quest System and Progression
  • Tarkov's Hotkeys to Know
  • Getting Started
  • Player Scavs
  • New Player's loadouts - LL1 Traders
  • What to Loot - How to get the most money per slot
  • Stash Management - How to combat Gear Fear
  • Tarkov Economy - How do I make money?
  • What now?

Tarkov Overview - What is Escape from Tarkov?

Escape from Tarkov is a tactical, realistic, FPS with MMO elements developed by Battlestate Games. It is currently in closed Beta. The game features several maps in which your primary character, your PMC, goes into Raids in order to find and salvage loot and useful equipment to survive and thrive in Tarkov. Death is very punishing in Tarkov. If you die you lose everything you had on you when you die (with the exception of what's inside your Container and your melee weapon) including any equipment you brought with you or what you found inside the Raid.
Enemies can be players (PMCs) or Scavengers ('Scavs') that are either controlled by AI or by players. Unlike many shooters, AI enemies in Tarkov are deadly - they can and will kill you on sight. They have recently been upgraded to act more intelligently, shoot more accurately, and react to situations on the map, such as investigating noise of gunfire or searching. It features beautiful and immersive environments, intricate and in-depth weapon modification system, a complex health system, dynamic and specific loot placement, and multiple options for engagement. Do you want to play slow and stealthy, to avoid fights, or set up a deadly ambush on an unwary foe? Or do you prefer raw combat, where only your quick wit, placements of shots, and tenaciousness determines who gets out alive? It's your Tarkov. You make the rules.

Tarkov Resources - Useful links

I take no credit or responsibility for any of the content in these links. To the best of my knowledge, these are updated consistently and are accurate, but user beware.

Quick-Reference Ammo Chart

An updated ammo chart can be found on the wiki.

Tarkov Wiki

Absolutely fantastic resource. You can visit them here.
It is a massive collection of everything that we players have been able to find.
They contain trades, user-created maps, lists of ammo, parts, weapons, loot, etc. If it's in the game, it's on the Wiki, somewhere.
I highly recommend opening the wiki page for the Map that you plan on raiding in.
The Lab ('Labs')

Map Keys and You

Huge collection of all the keys in the game. These are also on the wiki, but this page has them all on one page, and tries to inform the user if the key is worth keeping or using.
Check it out here.
This section is open to revision. Mention me in a thread (or in the comments below) about a resource and I'll see about adding it here.

Tarkov's Weapon Compatibility Guide

Pretty self explanatory. Also includes a Key guide and a Mod guide.
Check it out here.

HUGE Reference Bible by Veritas

Courtesy of Veritas (Send me his reddit username?), It's located here. (Open in new tab.) Contains: Detailed information about: Ammunition, Health, Firearms, Body Armor, Helmets, Rigs & Backpacks, Labs & Quest keys. Outdated! Needs to be updated for .12

Offline Raids - Player Practice

Offline raids is a feature added for testing and learning purposes for both new and veteran players alike. It is an incredibly useful tool.
In an offline raid, your progress is not saved. This means you don't keep anything you find, keep any experience 'earned' if you successfully extract, or lose any gear when/if you die. To access OFFLINE Raids, head into a Raid normally until you see this screen. Then Check the box indicating that you want to do an OFFLINE raid and you're good to go! You even have a choice on whether or not to add AI. You can also control how many AI enemies spawn, fewer than normal or a great deal more! You can even make Scavs fight each other. (Framerates beware.)
You can control how many scavs spawn (if any) as well as a number of other paramaters. New players should use offline raids as a tool to practice shooting, controls, movement, etc.

Tarkov's Maps

Tarkov features several maps - ranging from wide, beautiful vistas to ruined factory districts, to an abandoned laboratory where illegal experiments were being conducted. It is important to learn the maps you intend to play. In order to keep your gear, you must 'extract' at one of your designated exfiltration points. Not all extracts will be active every game, and some are conditional.

To see what extracts are available to you, double tap 'O' to show raid time and your exfils. If it has a ???? it might not be open.


Gate 3 Extract
A small, fast-paced map that was primarily created for PvP. Scavs spawn in all the time. Very close quarters, shotguns and SMGs tend to dominate here. PMCs can only access one Exit (Gate 3) without the Factory Exit Key. Good place to go if you need PMC kills as action is pretty much guaranteed. It is recommended NOT to bring in a lot of gear to Factory until you are experienced.
Factory Map in PvP is best played in Duos - due to the layout of the map, a Maximum of 6 PMCs may be present in the game. Due to the split spawn points, you effectively have 'sides' that have up to 3 spawn locations that are close together. This is why it is recommended to secure/scout enemy spawn locations. If you go in with a Duo, you at max have 2 players on your side for an even 2v2, and if played smartly you can eliminate them and know your 'side' is secure from aggression for the time being.
Upon loading in, scavs usually take a couple minutes to spawn, though this depends on the server in question and isn't super reliable. For new players, the best loadout in Factory is going to be a MP-153 Loadout - using just an MBSS (or similar bag) and ammo in your pocket to fight other players and Scavs. Scavs will often spawn with AKs and other 'vendorable' weapons, so is a good source of income.
Factory is also one of the best maps to Scav into, as Scavs can typically avoid the Exit camping strategy employed by a lot of weaker or newer players in order to secure gear, because they typically have extra exfiltrations whereas PMCs without the Factory Exit Key are stuck using Gate 3.
If you go in with a modicum of gear, it is recommended to keep at least a flashbang (Zarya) in your container. This will allow you to quickly slot it into an empty chest rig or pocket so you can throw it into the exit door, this will flash enemies and is cheap to do - the one time you survive because you flashed the 3 exit campers using shotguns will make this strategy extremely valuable.


Extract map
A fairly large map that was recently expanded and is expected to receive an overhaul within a patch or two, due to the choke point design of the map. Essentially, players spawn either on 'warehouse' or 'boiler (stacks)' side. If you see a large red warehouse ('big red') near you (Customs Warehouse), then you spawned on the warehouse side. If you don't, you likely spawned near Boiler side. Players can also spawn in several places in the woods North of boilers.
This map has the most quests in the game. Geared players often come to customs to challenge other squads over Dorm loot and to fight a Scav boss. New players are usually trying to do one of several early quests, such as ‘Debut’ which tasks them with killing 5 scavs on Customs and acquiring 2 MR-133 shotguns (pump shotties) from their corpses. Construction is also a popular hotspot as it has a lot of scav spawns as well as the location for the Bronze Pocketwatch, which is Prapor’s second quest.
Customs itself does not offer very much loot on average. There are several spots which can contain decent, but the vast majority is located in a couple different locations.
Dorms is the best loot location for Customs. It has two sets, 2 story and 3 story dorms. They each have their own sections of good loot, but the best is considered to be 3 story dorms, due to the presence of the Marked Room. The marked room requires a marked key to open, and has a good chance to spawn rare loot, such as keytools, documents cases, weapons cases, and high-end weapons. Due to the nature of the high value of this room, it’s almost always contested and it’s one of the best rooms in the game to farm, albeit with difficulty to successfully extract with the loot found. Note, though the key required has a maximum amount of uses, it is a fairly cheap key, and worth buying if you like to run customs and go to Dorms.
Dorms also has a ton of early quests (Operation Aquarius, for one) with some keys being valuable to use, but most dorms keys aren’t worth that much on the market. There’s too many to list here, but make sure to check the Map Keys and You at the top of the guide to determine what the value of a particular key is.
Checkpoint (Military Checkpoint) is also a decent loot spot, though not nearly as good as Dorms. If you have the key, it has a grenade box and 2 ammo boxes which can spawn good ammo. The jacket in the blue car also can spawn good medical keys as well as medical items. It is very close to the gas station, so I’ll include that here as well.
The Gas Station is one of the possible spawn locations for the scav boss. It has loose food items, a weapon box in the side room, with two keyed rooms leading to a safe and a med bag and box. Also contains a couple registers and food spawns on the floor. The emercom key can spawn on the seat in the ambulance out front.
North of the gas station is the Antenna, which contains 3 weapon boxes, a tool box, and a med bag. Possible location for scav boss spawn, albeit rarely, and also spawns regular scavs, like checkpoint and gas station.
Beyond that, there’s scattered loot around the map in different places, but usually not enough to warrant going out of your way for. There’s also scav caches, mostly around the middle road outside construction and around the boiler area.
The scav boss for customs is 'Reshala.’ He has 5 guards that have above-average gear and can be tough to deal with solo. The guards tend to be more aggressive than normal scavs, so they can be a lot to handle but are vulnerable to fragmentation grenades or flashbangs due to their close proximity to one another. Reshala himself has a good chance to have one or more bitcoin in his pockets, as well as his unique Golden TT, which is required for a Jaegar quest and used in conjunction with other Golden TT's to purchase a Tactec, good plate carrier. Reshala may spawn either Dorms (either bldg), New Gas Station, or rarely the tower north of the gas station. Scav bosses are dangerous enemies with escorts that have above-average loot (sometimes great loot) and are hostile to everyone, Including player scavs. Scav guards will approach a player scav and basically tell them to leave the area, and if they walk closer towards the scav boss they turn hostile.
The ‘official’ spawn rate for Reshala is 35%.


Woods Map with Exfil
A very large map that is mostly just a large forest, with the occasional bunker, and the Lumber Mill in the center. The Lumber Mill is the primary point of interest, as it contains a couple quest locations and is the primary location to farm Scavs, as Scavs killed on woods are a good source of end-game keys that are hard to find.
Since the map is so large and open, sniper rifles with scopes usually reign king here. You will see a lot of players with Mosin rifles as they are a cheap way to train the Sniper skill (for a quest later on) and are capable of killing geared players and scavs alike.
Overall, not usually very populated. An early quest from Prapor sends you here to kill a number of Scavs. A good map to learn the game, as although the loot is not fantastic, you can get experience with how the game runs and operates while fighting AI and possibly getting lucky with a key find off a scav.
As of .12, Woods now houses a Scav boss that acts as a Sniper scav. He is incredibly dangerous and usually carries a tricked-out SVDS. The 7.62x54 caliber is not to be underestimated. That caliber can and will wreck your shit through what most players are capable of wearing, especially early on in a wipe. He may also carry an AK-105, so he's going to be dangerous at both short and long ranges.
He has two guards, and he typically patrols the area around the Sawmill, and carries a key to a cache nearby full of goodies. His key is part of a quest for Jaegar.
Woods also has two bunkers, one of them being an extract and requiring a key. Both bunkers have some moderate loot in them, thus worth visiting, though not necessarily worth going out of your way for them. Several quests occur around the sawmill area, which contains a good couple keys that can spawn.


Shoreline Map, with Loot, Exfil, etc
A very large map, notorious for its FPS hit. Generally speaking, one of the better maps for loot. The primary point of interest is the Resort, but scavs spawn there, and is primarily occupied by hatchlings (players only with hatchet, ie melee weapon) and geared players. Resort has great loot, but requires keys to access most of it.
A great map to learn though from new players as the outskirts still contains plenty of loot and combat opportunities with AI scavs. You can hit Villa, Scav Island, Weather station, Docks, etc and come out with a backpack full of valuable gear fairly easily. The Village (Not to be confused with villa) contains a lot of toolboxes which can contain lots of parts used to upgrade your Hideout.
Location of many quests, including a large quest chain where players are required to kill many, many, scavs on Shoreline. For this and other reasons, probably the best map for new players to learn the game with.
A good loot route is to hit the village (caches in it), scav island (2 med bags, 2 toolboxes, 2 weapon boxes, 1 cache), burning gas station (weapon boxes and a safe), pier (potential extract, 2 pcs 2 safes and lots of filing cabinets), and weather station. Scavs may spawn around these areas, but most players just head straight for resort anyway, so you are much less likely to encounter them, especially if you avoid Mylta power (most players hit it on the way to or leaving from the resort). Excellent route as a player scav as well.


Detailed map
Great, great loot area, but very complex map. Old computers might face unique struggles with this map. Features a mostly-binary exfil system like Shoreline, but.. kinda worse. Exfil camping is fairly common on this map, but usually avoidable. Huge map with multiple floors and many many different stores. Communication with teammates is a challenge on this map, but the map is also fantastically detailed.
This map features a lot of loot that depends on the kind of store you're in. It's a great place to farm rare barter materials which are valuable to sell on the Flea market or to use for quests or for hideout upgrades. An early quest (from Ragman) sends you here to kill a large amount of Scavs. I'd recommend getting Ragman to level 2 and accepting his quest asap when going to Interchange, as getting this quest done can take a while as it is and you want all scav kills to count towards progress.
Both the tech stores (Techlight, Techxo, Rasmussen) and department stores (Groshan, Idea, OLI) are the primary places to hit. There’s also Kiba (weapons store) as well as Emercom and Mantis. Players have different strategies, but this map is unique in the sense that it really rewards exploring. Most stores will have things you can grab that are worth quite a bit but are often overlooked. Very popular place to go in as a Player Scav.


Brand new map, chock full of loot. Has more complex extracts than other maps, save for Labs. Excellent place to farm rare barter items, computer parts, and especially military hardware. PMCs have limited extracts, most being conditional, and the ones that aren’t require activation of ‘power’ to turn on the extract, which alerts the map the extract has been opened and can spawn Raiders (more on them below.)
Additionally, has a scav boss by the name of Glukhar, who has multiple heavily armed guards. He has multiple spawn locations and can arrive with the train.

The Lab ('Labs')

Here's a map.
DISCLAIMER: Labs, like much of Tarkov, is under constant development, so issues may be fixed or created without warning. Always check patch notes!
Labs is a very complex map compared to the rest of Tarkov. There is a great deal more exfiltrations but many of them have requirements or a sequence of events needed to be able to extract from them. It is recommended to read the Tarkov Wiki on Labs before raiding there.


Labs is a lucrative end-game raid location, comparable to 'dungeons' in other games. They are populated by tougher enemies that give greater rewards. In order to go to labs, you need to acquire a keycard, this functions like mechanical keys but instead of opening a door, they unlock your ability to select Labs for a raid.
They may be found in-raid in various locations, most notably in scavs backpacks, pockets, and in filing cabinets. They may be purchased from Therapist at LL4 for 189K Roubles. Labs are populated by a unique kind of AI enemy, Raiders.


Raiders are the Labs form of Scavs, or AI enemies. However, unlike other maps, they cannot contain player Scavs. Raiders have a much tougher than your average scav, they are capable of advanced tactics (such as flanking) and throw grenades and use other consumables as a player would. Once 'locked' onto you, they are typically capable of killing you very quickly, even if you are wearing high-end armor.
In Tarkov, Raiders act like the avatars of Death. They are clad in USEC and BEAR equipment, as they are effectively AI PMCs. Many changes have been made to labs and specifically how Raider AI works and to prevent exploits to easily farm them as well as bugs where they could be deadlier than intended.
A general rule of thumb is not to fight Raiders directly. They can and WILL kill you. Raiders can spawn with 7N9, or 'big boy' ammo. This ammunition type is incredibly lethal to players, even those wearing the toughest armor. If you get shot in the head, doesn't matter what kind of helmet, face shield, killa helmet, etc you are wearing, you will almost certainly die.
Because Raiders are controlled by AI, they have zero ping. They may also end to immediately respond as if you were aggressive even if they did not originally know you were there - ESP Raiders effectively will prone and return fire even as you ADS and put them in your sights.
This is why engaging a Raider must be done very, very carefully. There are a few strategies that you may employ, most commonly some form of baiting them towards an area and then killing them when they arrive. Players may accomplish this by generating noise - gunfire, melee weapon hitting walls, crates, etc, player deaths, players Mumbling (F1 by default) can all attract Raiders to investigate your area.
Due to the high power of Raiders, players often go in with minimal loadouts and seek to avoid conflict with other players, especially geared ones. Most players avoid PvP in Labs, though a good portion of the playerbase thoroughly enjoys hunting down poorly-geared players after they kill a few Raiders for them.
As such, players will lay prone in a hallway, or crouch in a room, and attract Raiders to enter their domicile by opening the door, and immediately headshotting them. Few Raiders actually wear helmets (though some do) so most players specialize in 'flesh ammo' or, ammunition that foregoes armor penetration in favor of raw damage in order to kill Raiders more reliably, because Raiders have slightly higher head health than PMCs do.
Raiders spawn with a great variety of equipment, weapons, armor, and materials such as medication or hideout parts. They tend to have chest armor and may have different helmets. Their pockets can contain Labs keycards, morphine, Ifaks, cash, and other items. They're always worth checking.
Raiders are a good source of grenades, they will often have F-1's and Zarya's in their rig or pockets that you can use to fight off players and Raiders alike.
Recently, changes have been made to Labs to make them less profitable so that other maps are more appealing. The cost and rarity of keycards increased, as well as reducing the frequency that raiders spawn, so that they come in more infrequent groups but also tighter in formation, while also lowering the overall output of individual Raiders, so that they are less likely to have a bunch of extra materials, such as grenades and other items.
Experience Farming on Labs
Labs is one of the best places to farm experience in the entire game. Killing a Raider with a headshot awards 1100 Experience. This does not include any looting, inspection (searching bodies), examine, streak, or other experience.
Killing a large sequence of Raiders gives additional bonus experience in the form of Streak rewards, usually 100 bonus exp per additional kill.
Surviving the raid multiplies all of these sources of experience by 1.5x
Changes coming to Labs
Disclaimer: I am not a BSG developer or employee. This is what I have seen on this subreddit and heard elsewhere. Some might be purely rumor, but other points are confirmed by Nikita Labs is undergoing constant changes. Nikita and BSG take feedback seriously, and always consider what the players are telling them. It known that Labs will eventually be accessed via the Streets of Tarkov map, and will require you to enter that map, make it to the labs entrance, and then extract from Labs to return to Streets of Tarkov and exfil from there as well. This will likely add an additional layer of risk to being ambushed for your goodies along your way out, as well as punishing damage taken in labs more severely. Additionally, keycards will have a limited number of uses, and may open more than one room.
The full extent of the changes coming is not known.
Remember, you can load a map in OFFLINE mode to practice against bots or to learn the map without fear of losing gear.

Tarkov's Health System

Tarkov Wiki Article
Tarkov has a very advanced health system, and while it might seem overwhelming at first, you'll get the hang of it rather quickly. It features a very wide variety of effects and injury, including hydration, energy, blood pressure, blood loss, fractures, contusion, intoxication, exhaustion, tremors and more.
Not all of the Health System is implemented yet. Expect changes!
Your character (PMC, or otherwise) has a combined Health of 435. Each of his limbs have separate health. Taking damage to a limb that reduces it to 0 'blacks' that limb. Blacked limbs are a problem. They greatly impair the activities your PMC performs, and taking damage in a blacked limb amplifies the damage by a multiplier and spreads that damage among your other non-black limbs equally. You cannot heal a blacked limb without the use of a Surgical Kit.
Notes: Bloodloss applies damage to the affected limb and can be spread like other damage to a blacked limb. Treat immediately. Also causes significant dehydration! Bloodloss also helps level your Vitality skill, which in turn gives you experience towards your Health skill, which is necessary to reach level 2 of in order to improve your hideout.
Losing a limb applies additional effects. Fractures also apply these effects but not the damage amplification (Except for damage if running on fractured leg.) Fractures require specialized medical kits to heal.
Dehydration is what happens when your Hydration level reaches 0. You can view your Hydration level in your gear page, at the bottom left. Becoming dehydrated is extremely bad. You take constant damage. Taking dehydration damage can kill you if you have a black chest or head. Restoring hydration helps train Metabolism, which improves positive effects from food and drink.
Head/Chest: Bullet damage resulting in losing your head or chest is instant death. Note: Bloodloss resulting in your Head/Chest being black does not result in death, but any damage to them beyond that point will! A back chest will causes you to cough (much like your stomach!)
Painkillers: Prevents coughing that comes from your chest. Doesn't help otherwise.
Stomach: Massively increased rate of dehydration and energy loss. You must find liquids or exit the Raid soon. Additionally, your PMC will cough sputter loudly, attracting attention. A black stomach multiplies damage taken by 1.5 and redistributes that damage across your entire health pool.
Painkillers: Significantly reduces the frequency and volume of the coughs.
Arms: Makes activities like searching, reloading, etc, take additional time, as well as adding a sway, reducing accuracy. Arms have a .7x damage multiplier.
Painkillers: Reduces sway, removes debuff Pain.
Legs: Blacked legs cause your PMC to stumble and be unable to run. Blacked legs have a 1x damage multiplier.
Painkillers: Allows you to walk at full speed and to run.
WARNING: Running while your legs are blacked or fractured WILL DAMAGE YOU.
Health Items
Tarkov features many health items - 'Aid' items, which can be used to restore your characters health and to fix ailments or injuries he receives as the result of combat or mishaps. The two most important health conditions to consider are bloodloss and fractures, which have both been covered above. Some food items may have ancillary effects, such as losing hydration.
Since in the current patch the only ailments to worry about are bleeding and fractures, it changes which health items are most necessary. We'll go over them below.

Health Restoration

Medical Items on Wiki
AI-2 medkit
The newb's medical kit. You receive several of these when you start Tarkov - they'll already be in your stash. Available from Level I Therapist, they are cheap and effective way of healing early in the game. They will not stop bloodloss. Because of this, you also need to bring bandages or a higher-grade medical kit. Affectionately called 'little cheeses' by the Tarkov community. Using it takes 2 seconds, and because of how cheap it is, it's often brought in by higher level players to supplement their healing without draining their main kit (which is capable of healing bloodloss or sometimes fractures). Due to its short use time, it's often very useful during combat as you can take cover and quickly recover damage taken to a vital limb. They're also useful as you can buy them from Therapist to heal yourself if you died in a raid.
The newb's bloodloss solution. Available from Therapist at Level I. A better version, the Army Bandage is available at Level II, after a quest. Mostly obsolete after unlocking the Car Medical kit, but some players value them due to the Car's overall low health pool. Activating takes 4 seconds, and removes bloodloss to one limb.
The newb's solution to fractures. Cheap, takes five seconds to use, and takes up 1 slot. Fractures are much more common this patch, due to them being added back in the game from standard bullet wounds, not just drops. Available from Therapist at Level I, no quest needed. Can be used to craft a Salewa.
Alu Splint
More advanced form of the normal split. Works the same, but has up to 5 uses. Recommended to carry in your container if possible, due to frequency of fractures from gunfire.
CMS (Compact Medical Surgery) Kit
New medical item added in .12, fantastic item. Allows you to perform field surgery, removing the black limb state and allowing you to heal it beyond 0 hp. Takes 16 seconds to use, and cannot be cancelled so make sure you are safe if you are using it! Will reduce the maximum health of the limb it's used on by 40-55%, but will effectively remove all negative effects incurred by having a black limb. Highly recommended to carry in your container for emergencies. Can be bartered from Jaeger LL1, and purchased for roubles LL2.
Surv12 field surgical kit
Same as the compact surgical kit, but takes 4 seconds longer, and the health penalty is reduces to 10-20% max health of the limb. Considering this kit is 1x3, taking up a huge amount of space, it's probably not worth using. It's just too large. Better this than nothing, though.
Car Medical Kit
The newb's first real medical solution. Available LL1 as a barter (2 Duct Tape) and available for Roubles after completing Therapist's second quest. Has a larger health pool than AI-2's (220, vs AI-2's 100), and removes bloodloss. Takes up a 1x2 slot, so requires to be placed in a tactical rig in order to be used effectively. Cheap and fairly efficient, takes a standard 4 seconds to use. Rendered effectively obsolete when the Salewa is unlocked.
Often kept in a player's secure container as a backup health pool, before IFAKs are unlocked.
Good medkit for use in mid and end-game. Contains 400 total health and can remove bloodloss. More rouble efficient form of a healing due to its high health pool, costs 13k roubles. Same size as the Car medical kit, so requires a tactical rig to use effectively. Because Tarkov does not currently have effects like Toxication in the game at the moment, this kit is favored by most players who go into a raid with at least a moderate level of gear. With a high health pool and relatively low cost, it's also a more efficient way of healing damage sustained while in raids. Unlocked at Therapist Level II after completing a level 10 Prapor quest, Postman Pat Part II. Required as part of Therapist's first quest, Shortage. This makes Salewas very valuable early on in a wipe as it gatekeeps the rest of Therapist's quests, most of which occur on Customs early on. Can be crafted in your meds station with a painkiller, splint, and bandage.
Fantastic medical kit, and is the one preferred by most players. Features 300 health and the ability to remove bloodloss and a host of other negative effects that are not yet implemented into the game. It does not, however, remove fractures. Taking up only a single slot, it is favored by players in all stages of gear, and it is recommend to carry one in your Secure Container in case of emergencies. Is available at Therapist Level II for a barter (Sugar + Sodium), and may be purchased for Roubles at Level III after completing Healthcare Privacy, Part I. It is a fairly expensive kit, but due to its durability, its small size, and ability to remove bloodloss, it is a very common medical item used by players of all levels. Can be crafted in Lvl 2 medstation.
The 'big daddy' medical kit, boasting an impressive total health resource of 1800. It is also a very large kit, taking up 4 slots (2x2) - in order to be able to use this quickly, it would require specialized tactical rigs that feature a 2x2 slot. It removes all negative effects (some costing HP resource), including fractures. Used by highly-geared players who intend on staying in raids for an extended period of time, or by players with additional Secure Container space available in case of emergencies. It is available for barter at Therapist Level II, and purchase at Therapist Level 4. Due to its price point from Therapist at just under 23k Roubles and its healthpool of 1800, it is by far the most efficient method of healing from raid damage, at a 1.3 roubles per health, dramatically lower than other options available. Can be crafted in Lvl 3 medstation.

Pain Management

Using any of these items results in your character being 'On Painkillers' which allows you to sprint on fractured and blacked legs, as well as reducing effects of fractures and blacked limbs, and removing the debuff Pain. Essentially, the only difference between most of these items are the speed of use, price, availability, and duration of the effect. Note that the Hideout has changed how some of these items are used, and because Tarkov is under constant development, it is very likely that these materials may be used to create higher-grade medkits or to upgrade your medstation. That being the case, it's best to hoard the unknown items for now as efficiently as possible until you know you don't need them.
Analgin Painkillers
The holy grail of pain medication. "Painkillers" have 4 total uses. The total duration is greater than Morphine and less risk of waste. Takes a short time to use, and is available from Therapist Level 1 for both barter and Roubles. Makes a loud, distinctive gulping noise. Can be used to craft Salewa kits.
Quick application of painkillers. Favored by some highly geared players as it has greater usability in combat then it's typical counterpart, Painkillers. Has a longer duration, but only one use. It is required for a fairly early Therapist (and a late Peacekeeper) Quest, so it is recommend to hoard 10 of them, then sell the rest unless you intend on using them. They are worth a good amount to Therapist and take up little space so they are a valuable loot item. Available from Therapist for Roubles at Level 4, after completing Healthcare Privacy, Part 3.
Basically a cheaper Morphine. One use, 205s. Not recommended over Painkillers due to its cost. No current barter for this item, so usually it's just a fairly expensive, small loot item. Most likely a component of a medstation manufacturing process or upgrade. Keep it.
Powerful painkiller. Lasts 500 seconds and has 12 uses. This item is recommended as your long-term solution for painkillers. While it is valuable because it's used to trade for THICC items case, it's the cheapest component and is very useful as a painkiller. It has a long duration and a large amount of uses, so keep it in your container for use as a painkiller if your primary painkillers wear off. Don't use it completely up, though. Keep the 1/12 bottles for the trade.
Powerful medical item. Cannot be purchased from dealers. Has a maximum of 10 uses. Removes Pain, applies Painkillers for 500 seconds (8.3 minutes). Useful to keep in your container as an alternative to Painkillers, though it takes 6 seconds to use, which is longer than other painkillers. Used as part of a barter trade for the Medcase.
Golden Star Balm
Fairly useful medical item. It can remove Pain and Contusion (not a big deal of a debuff, goes away on its own shortly) and provides a small bonus to hydration and energy. It also removes toxication and Radiation exposure, both of which are not yet implemented into the game. Like Vaseline, has a maximum of 10 uses. Painkiller effect lasts for 10 minutes, and takes 7 seconds to apply. Recommended to take only if you are going on large maps and you have extra room in your container. Can be used with Ibuprofen and 5x Med parts to craft 7 Propital.

Continued below in a series of comments, due to character limit.

submitted by dumnem to EscapefromTarkov [link] [comments]

PoW or PoS: The Difference Between Mined and Non-Mined Crypto

PoW or PoS: The Difference Between Mined and Non-Mined Crypto
The whole crypto world discusses how Ethereum will switch from Proof of Work to Proof of Stake now. This change can significantly affect the cryptocurrency market. What are the positive and negative sides of PoW and PoS?
Cryptocurrencies can be divided into two types: those that can be mined (Bitcoin, Litecoin, Monero) and pre-mined ones (Ripple, Stellar, Cardano, EOS, NEO).

What is the big difference?

Although they differ in the method of generation, the basis of both types of crypto is the same: verification. Every transaction processed by the network must be verified by someone to ensure that virtual money has not been spent twice. Here we are talking about the difference in the verification process. Transaction groups are combined into a block; after verification, the block joins other previously confirmed blocks, and create a chain of transactions, or blockchain.

PoW: Mined Crypto

Mining is a process in which individuals, groups, or companies solve complex mathematical equations to verify transaction blocks using powerful computers. These math problems are part of the encryption process that protects transactions from cybercriminals and third party access.
The first who solves the problem and signs a block of transactions receives a reward. The miner, who confirmed the block of transactions e.g. in the Bitcoin network, receives a reward in BTC.

Disadvantages of Mined Crypto

  • Mining can be very expensive due to the large amounts of electricity consumed. In mined crypto with less capitalization, competition is usually lower than in BTC.
  • BTC mining requires special ASIC chips, that are combined into huge farms. Electricity is one of the main expenses for these projects. That is why China, where electricity is relatively cheap, has become a home to four of the five largest Bitcoin mining companies in the world.
  • Mining farms have to spend significant money funds on new equipment, which becomes out of date very fast.
  • Large projects need additional cooling, as servers and graphics cards heat up to high temperatures during operations.
  • The Proof-of-Work model is potentially vulnerable to a 51% attack (when a group of people with 51% of the computing power gains control of the network and its participants). For popular cryptocurrencies such as Bitcoin (BTC), Litecoin (LTC), and Monero (XMR) this is not a problem due to their large capitalization. However, minor cryptocurrencies with long block processing times and low daily volumes are risking a lot.

PoS: Non-Mined Crypto

At the other end of the spectrum are pre-mined cryptocurrencies such as Ripple (XRP), Stellar, Cardano, EOS, and NEO.
In the PoS model, super-powered computers are not needed, and participants do not compete for the right to sign the next block. Thus, the costs of this approach are significantly lower. Transaction verification is carried out by cryptocurrency owners. The more cryptocurrencies you have, the longer you own it, the higher the probability that you will be selected to check the transaction block.
Certain mechanisms are built into the system that prevents the dominance of large cryptocurrency holders over the verification process. There are many random ways to select owners who get the right to sign a transaction block. This ensures that small holders have a chance to participate in the process.

Disadvantages of Non-Mined Crypto

Despite the fact that the costs of the Proof-of-Stake method are lower, PoS has its drawbacks.
  • Such cryptocurrencies are not threatened by an attack of 51%, however, another trouble replaces it — a person who posses 51% of all tokens in circulation can gain control of the network and its participants. Of course, in the case of cryptocurrencies with high capitalization, the possibility of this scenario is low, but small partners may suffer from this vulnerability.
  • The Proof-of-Stake model also gives major owners additional votes in determining the future development of the network. Most NEO tokens) belong to several founders, for instance. This helps increase transaction speed and reduces consensus-building time, but also makes cryptocurrency too centralized. In other words, in the PoS model, large players gain significant power, which is theoretically impossible with the PoW model.

Which method is better?

Both methods have their pros and cons. Nevertheless, sooner or later, some of the largest mined currencies (e.g. BTC) will reach their token limit. At this point, they will have to switch to Proof-of-Stake. Since it significantly reduces power consumption and doesn't require powerful computers, gradually all crypto including BTC will switch to a non-mined model just like Ether did.

Keep up with the news of the crypto world at
Follow us on Twitter, Medium.
Subscribe to our YouTube channel.
Join our Telegram channel.
For any inquiries mail us at [[email protected]](mailto:[email protected]).
submitted by CoinjoyAssistant to ethtrader [link] [comments]

Bitcoin (BTC)A Peer-to-Peer Electronic Cash System.

Bitcoin (BTC)A Peer-to-Peer Electronic Cash System.
  • Bitcoin (BTC) is a peer-to-peer cryptocurrency that aims to function as a means of exchange that is independent of any central authority. BTC can be transferred electronically in a secure, verifiable, and immutable way.
  • Launched in 2009, BTC is the first virtual currency to solve the double-spending issue by timestamping transactions before broadcasting them to all of the nodes in the Bitcoin network. The Bitcoin Protocol offered a solution to the Byzantine Generals’ Problem with a blockchain network structure, a notion first created by Stuart Haber and W. Scott Stornetta in 1991.
  • Bitcoin’s whitepaper was published pseudonymously in 2008 by an individual, or a group, with the pseudonym “Satoshi Nakamoto”, whose underlying identity has still not been verified.
  • The Bitcoin protocol uses an SHA-256d-based Proof-of-Work (PoW) algorithm to reach network consensus. Its network has a target block time of 10 minutes and a maximum supply of 21 million tokens, with a decaying token emission rate. To prevent fluctuation of the block time, the network’s block difficulty is re-adjusted through an algorithm based on the past 2016 block times.
  • With a block size limit capped at 1 megabyte, the Bitcoin Protocol has supported both the Lightning Network, a second-layer infrastructure for payment channels, and Segregated Witness, a soft-fork to increase the number of transactions on a block, as solutions to network scalability.

1. What is Bitcoin (BTC)?

  • Bitcoin is a peer-to-peer cryptocurrency that aims to function as a means of exchange and is independent of any central authority. Bitcoins are transferred electronically in a secure, verifiable, and immutable way.
  • Network validators, whom are often referred to as miners, participate in the SHA-256d-based Proof-of-Work consensus mechanism to determine the next global state of the blockchain.
  • The Bitcoin protocol has a target block time of 10 minutes, and a maximum supply of 21 million tokens. The only way new bitcoins can be produced is when a block producer generates a new valid block.
  • The protocol has a token emission rate that halves every 210,000 blocks, or approximately every 4 years.
  • Unlike public blockchain infrastructures supporting the development of decentralized applications (Ethereum), the Bitcoin protocol is primarily used only for payments, and has only very limited support for smart contract-like functionalities (Bitcoin “Script” is mostly used to create certain conditions before bitcoins are used to be spent).

2. Bitcoin’s core features

For a more beginner’s introduction to Bitcoin, please visit Binance Academy’s guide to Bitcoin.

Unspent Transaction Output (UTXO) model

A UTXO transaction works like cash payment between two parties: Alice gives money to Bob and receives change (i.e., unspent amount). In comparison, blockchains like Ethereum rely on the account model.

Nakamoto consensus

In the Bitcoin network, anyone can join the network and become a bookkeeping service provider i.e., a validator. All validators are allowed in the race to become the block producer for the next block, yet only the first to complete a computationally heavy task will win. This feature is called Proof of Work (PoW).
The probability of any single validator to finish the task first is equal to the percentage of the total network computation power, or hash power, the validator has. For instance, a validator with 5% of the total network computation power will have a 5% chance of completing the task first, and therefore becoming the next block producer.
Since anyone can join the race, competition is prone to increase. In the early days, Bitcoin mining was mostly done by personal computer CPUs.
As of today, Bitcoin validators, or miners, have opted for dedicated and more powerful devices such as machines based on Application-Specific Integrated Circuit (“ASIC”).
Proof of Work secures the network as block producers must have spent resources external to the network (i.e., money to pay electricity), and can provide proof to other participants that they did so.
With various miners competing for block rewards, it becomes difficult for one single malicious party to gain network majority (defined as more than 51% of the network’s hash power in the Nakamoto consensus mechanism). The ability to rearrange transactions via 51% attacks indicates another feature of the Nakamoto consensus: the finality of transactions is only probabilistic.
Once a block is produced, it is then propagated by the block producer to all other validators to check on the validity of all transactions in that block. The block producer will receive rewards in the network’s native currency (i.e., bitcoin) as all validators approve the block and update their ledgers.

The blockchain

Block production

The Bitcoin protocol utilizes the Merkle tree data structure in order to organize hashes of numerous individual transactions into each block. This concept is named after Ralph Merkle, who patented it in 1979.
With the use of a Merkle tree, though each block might contain thousands of transactions, it will have the ability to combine all of their hashes and condense them into one, allowing efficient and secure verification of this group of transactions. This single hash called is a Merkle root, which is stored in the Block Header of a block. The Block Header also stores other meta information of a block, such as a hash of the previous Block Header, which enables blocks to be associated in a chain-like structure (hence the name “blockchain”).
An illustration of block production in the Bitcoin Protocol is demonstrated below.

Block time and mining difficulty

Block time is the period required to create the next block in a network. As mentioned above, the node who solves the computationally intensive task will be allowed to produce the next block. Therefore, block time is directly correlated to the amount of time it takes for a node to find a solution to the task. The Bitcoin protocol sets a target block time of 10 minutes, and attempts to achieve this by introducing a variable named mining difficulty.
Mining difficulty refers to how difficult it is for the node to solve the computationally intensive task. If the network sets a high difficulty for the task, while miners have low computational power, which is often referred to as “hashrate”, it would statistically take longer for the nodes to get an answer for the task. If the difficulty is low, but miners have rather strong computational power, statistically, some nodes will be able to solve the task quickly.
Therefore, the 10 minute target block time is achieved by constantly and automatically adjusting the mining difficulty according to how much computational power there is amongst the nodes. The average block time of the network is evaluated after a certain number of blocks, and if it is greater than the expected block time, the difficulty level will decrease; if it is less than the expected block time, the difficulty level will increase.

What are orphan blocks?

In a PoW blockchain network, if the block time is too low, it would increase the likelihood of nodes producingorphan blocks, for which they would receive no reward. Orphan blocks are produced by nodes who solved the task but did not broadcast their results to the whole network the quickest due to network latency.
It takes time for a message to travel through a network, and it is entirely possible for 2 nodes to complete the task and start to broadcast their results to the network at roughly the same time, while one’s messages are received by all other nodes earlier as the node has low latency.
Imagine there is a network latency of 1 minute and a target block time of 2 minutes. A node could solve the task in around 1 minute but his message would take 1 minute to reach the rest of the nodes that are still working on the solution. While his message travels through the network, all the work done by all other nodes during that 1 minute, even if these nodes also complete the task, would go to waste. In this case, 50% of the computational power contributed to the network is wasted.
The percentage of wasted computational power would proportionally decrease if the mining difficulty were higher, as it would statistically take longer for miners to complete the task. In other words, if the mining difficulty, and therefore targeted block time is low, miners with powerful and often centralized mining facilities would get a higher chance of becoming the block producer, while the participation of weaker miners would become in vain. This introduces possible centralization and weakens the overall security of the network.
However, given a limited amount of transactions that can be stored in a block, making the block time too longwould decrease the number of transactions the network can process per second, negatively affecting network scalability.

3. Bitcoin’s additional features

Segregated Witness (SegWit)

Segregated Witness, often abbreviated as SegWit, is a protocol upgrade proposal that went live in August 2017.
SegWit separates witness signatures from transaction-related data. Witness signatures in legacy Bitcoin blocks often take more than 50% of the block size. By removing witness signatures from the transaction block, this protocol upgrade effectively increases the number of transactions that can be stored in a single block, enabling the network to handle more transactions per second. As a result, SegWit increases the scalability of Nakamoto consensus-based blockchain networks like Bitcoin and Litecoin.
SegWit also makes transactions cheaper. Since transaction fees are derived from how much data is being processed by the block producer, the more transactions that can be stored in a 1MB block, the cheaper individual transactions become.
The legacy Bitcoin block has a block size limit of 1 megabyte, and any change on the block size would require a network hard-fork. On August 1st 2017, the first hard-fork occurred, leading to the creation of Bitcoin Cash (“BCH”), which introduced an 8 megabyte block size limit.
Conversely, Segregated Witness was a soft-fork: it never changed the transaction block size limit of the network. Instead, it added an extended block with an upper limit of 3 megabytes, which contains solely witness signatures, to the 1 megabyte block that contains only transaction data. This new block type can be processed even by nodes that have not completed the SegWit protocol upgrade.
Furthermore, the separation of witness signatures from transaction data solves the malleability issue with the original Bitcoin protocol. Without Segregated Witness, these signatures could be altered before the block is validated by miners. Indeed, alterations can be done in such a way that if the system does a mathematical check, the signature would still be valid. However, since the values in the signature are changed, the two signatures would create vastly different hash values.
For instance, if a witness signature states “6,” it has a mathematical value of 6, and would create a hash value of 12345. However, if the witness signature were changed to “06”, it would maintain a mathematical value of 6 while creating a (faulty) hash value of 67890.
Since the mathematical values are the same, the altered signature remains a valid signature. This would create a bookkeeping issue, as transactions in Nakamoto consensus-based blockchain networks are documented with these hash values, or transaction IDs. Effectively, one can alter a transaction ID to a new one, and the new ID can still be valid.
This can create many issues, as illustrated in the below example:
  1. Alice sends Bob 1 BTC, and Bob sends Merchant Carol this 1 BTC for some goods.
  2. Bob sends Carols this 1 BTC, while the transaction from Alice to Bob is not yet validated. Carol sees this incoming transaction of 1 BTC to him, and immediately ships goods to B.
  3. At the moment, the transaction from Alice to Bob is still not confirmed by the network, and Bob can change the witness signature, therefore changing this transaction ID from 12345 to 67890.
  4. Now Carol will not receive his 1 BTC, as the network looks for transaction 12345 to ensure that Bob’s wallet balance is valid.
  5. As this particular transaction ID changed from 12345 to 67890, the transaction from Bob to Carol will fail, and Bob will get his goods while still holding his BTC.
With the Segregated Witness upgrade, such instances can not happen again. This is because the witness signatures are moved outside of the transaction block into an extended block, and altering the witness signature won’t affect the transaction ID.
Since the transaction malleability issue is fixed, Segregated Witness also enables the proper functioning of second-layer scalability solutions on the Bitcoin protocol, such as the Lightning Network.

Lightning Network

Lightning Network is a second-layer micropayment solution for scalability.
Specifically, Lightning Network aims to enable near-instant and low-cost payments between merchants and customers that wish to use bitcoins.
Lightning Network was conceptualized in a whitepaper by Joseph Poon and Thaddeus Dryja in 2015. Since then, it has been implemented by multiple companies. The most prominent of them include Blockstream, Lightning Labs, and ACINQ.
A list of curated resources relevant to Lightning Network can be found here.
In the Lightning Network, if a customer wishes to transact with a merchant, both of them need to open a payment channel, which operates off the Bitcoin blockchain (i.e., off-chain vs. on-chain). None of the transaction details from this payment channel are recorded on the blockchain, and only when the channel is closed will the end result of both party’s wallet balances be updated to the blockchain. The blockchain only serves as a settlement layer for Lightning transactions.
Since all transactions done via the payment channel are conducted independently of the Nakamoto consensus, both parties involved in transactions do not need to wait for network confirmation on transactions. Instead, transacting parties would pay transaction fees to Bitcoin miners only when they decide to close the channel.
One limitation to the Lightning Network is that it requires a person to be online to receive transactions attributing towards him. Another limitation in user experience could be that one needs to lock up some funds every time he wishes to open a payment channel, and is only able to use that fund within the channel.
However, this does not mean he needs to create new channels every time he wishes to transact with a different person on the Lightning Network. If Alice wants to send money to Carol, but they do not have a payment channel open, they can ask Bob, who has payment channels open to both Alice and Carol, to help make that transaction. Alice will be able to send funds to Bob, and Bob to Carol. Hence, the number of “payment hubs” (i.e., Bob in the previous example) correlates with both the convenience and the usability of the Lightning Network for real-world applications.

Schnorr Signature upgrade proposal

Elliptic Curve Digital Signature Algorithm (“ECDSA”) signatures are used to sign transactions on the Bitcoin blockchain.
However, many developers now advocate for replacing ECDSA with Schnorr Signature. Once Schnorr Signatures are implemented, multiple parties can collaborate in producing a signature that is valid for the sum of their public keys.
This would primarily be beneficial for network scalability. When multiple addresses were to conduct transactions to a single address, each transaction would require their own signature. With Schnorr Signature, all these signatures would be combined into one. As a result, the network would be able to store more transactions in a single block.
The reduced size in signatures implies a reduced cost on transaction fees. The group of senders can split the transaction fees for that one group signature, instead of paying for one personal signature individually.
Schnorr Signature also improves network privacy and token fungibility. A third-party observer will not be able to detect if a user is sending a multi-signature transaction, since the signature will be in the same format as a single-signature transaction.

4. Economics and supply distribution

The Bitcoin protocol utilizes the Nakamoto consensus, and nodes validate blocks via Proof-of-Work mining. The bitcoin token was not pre-mined, and has a maximum supply of 21 million. The initial reward for a block was 50 BTC per block. Block mining rewards halve every 210,000 blocks. Since the average time for block production on the blockchain is 10 minutes, it implies that the block reward halving events will approximately take place every 4 years.
As of May 12th 2020, the block mining rewards are 6.25 BTC per block. Transaction fees also represent a minor revenue stream for miners.
submitted by D-platform to u/D-platform [link] [comments]

Overcoming Identity Crisis of Today, while Taking a Matrix Pill 2020 and Affecting the Social Trends

The Matrix has you…
The cultural overview over "The Matrix Trilogy" and how it foresaw the social trends.
"The Matrix" trilogy by the Wachowski brothers is the most iconic and groundbreaking movie trilogies in cinema history. Terms like "The red pill", "Dessert of the real", "There is no spoon", "Follow the white rabbit", "Why, Mr. Anderson? Why?" and many other phrases from the film became the golden quotes of the new millennium, shaping the entire culture of the "generation Y"… also known as "the millennials". "The bullet time" effect with fancy acrobatic moves and bullet waves turned into the most quoted gimmick for decades in action films, parodies and video games. The slow motion has never been so cool and slick, as it was after "The Matrix", not to mention sunglasses at night and dark looks with fashionable black leather tailored coats.
Its been 21 years since the theatrical release of the first "The Matrix" film. It came out in November of 1999 (the most revolutionary year in cinema history, since it is the release year of such groundbreaking hit titles like "Star Wars: Episode I. The Phantom Menace" by George Lucas, "Fight Club" by David Fincher, and "The Matrix", of course, by the Wachowski brothers). Four years after the great success of the film, "The Matrix" was reloaded with two worthy sequels: "The Matrix Reloaded" and "The Matrix Revolutions" — turning a movie franchise into a full-time trilogy. There was also "The Animatrix" — an anthology of animated short films set in "The Matrix Universe" directed by highly acclaimed Japanese animators, and a video-game "Enter the Matrix" which told a story that went parallel to the story of sequels, explaining some of the unanswered questions in the films. Thus "The Matrix" franchise has become one of the first inter-media franchises where all available storytelling formats told one epic story from different angles and points of view. And unlike other attempts of creating such inter-media franchise around movies (like it was with "Star Wars Expended Universe" or "The Terminator" franchise) it wasn't just pure merchandising and cash-grabbing schemes with questionable product quality having a famous brand logo on it… no, '"The Matrix" franchise was one well thought out project and story from the very beginning, created and curated by the Wachowski brothers. Nothing more or less.
In the year of 2020 "The Matrix" is being reloaded once again with its new instalment being in production. Internet is filled with shaky mobile phone behind the scenes footage of "The Matrix 4". We see Neo, played by actor Keanu Reeves and his stunt double, jumping of high buildings and riding fancy motorcycle with Trinity, played by Carrie Ann-Moss, while the streets of San-Francisco are being turned into a chaotic war zone with explosions, car chases, extras running all over the streets and helicopters flying.
Usually such big blockbuster film productions are being held in secret in order to prevent unnecessary leaks and story spoilers… most of the extras and crew members don't even know what movie they are filming up until the very end. During such big productions fake movie titles are made. But this time, as it seams, filmmakers don't really care about production secrecy, as actor Keanu Reeves and film director Lana Wachowski keep on hanging out with random people on a street during the filmmaking process. What is it? A new viral social media format of film advertising? Or the new way of entire filmmaking approach? Or maybe both?
Either way — Lana Wachowski is the visionary artist that is going to bring something fresh and unexpected into the cinema format and into the new "Generation Z" culture. The Wachowski brothers have foreseen the future with "The Matrix" film almost in every way possible… and I'm pretty sure they are going to do so again. They spoke of cyber-crimes, data privacy and internet control long before Edward Snowden incident, WikiLeaks, Anonymous group, social medias and etc. They showed aircraft controlled by so called "terrorists" hitting skyscrapers years before 9/11. "The Matrix" also tried to warn us about the dangers of virtual realities, and here we are 20 years later using VR systems and spending our lives in endless MMO RPG games (by the way, "The Matrix" franchise even had its own MMO RPG video game "The Matrix Online"). The virtual values have become much more valuable that the material ones. Bitcoins and Facebook likes are considered to be much more precious then real money and even gold by many. Instagram pages are viewed as the only true portraits of their users, however bright filters, happy faces, flattering camera lenses and photoshop have nothing to do with reality. It is merely a "Residual self-image", as it was named in the film, "A mental projection of your digital self". The person sees himself whom he wants him to be, not whom he really is.
And I think that this topic is the most overlooked topic by critics and contemporary culture scholars.
Just think about it — the Wachowski brothers are the physical manifestation of their own concept of "Residual self-image", as both of them saw themselves as someone different. Both brothers were men, but they considered themselves to be women. Their physical reality didn't match with their mental projection of virtual self. Thus they had to do surgeries and go through sex change procedures. The Wachowski brothers are officially sisters. Nowadays in 2020 it is a common practice that can't surprise anyone, however in 1990s during the production of the first "The Matrix" film it was a big deal… so big that Wachowski brothers had to rewrite the screenplay. In the earlier drafts of the script there was a fully flashed out transgender character. She is still present in the final film, but her role and concept has been reduced. Character Switch — portrayed by Belinda McClory — was a transgender, and her name "Switch" meant too illustrate her constant transitions from one form into another, as she was a female in the real world, but in the Matrix her personal "Residual self-image" switched her into a masculine male. For Wachowski brothers it was a very important topic to explore, since both of them dedicated their lives to transgender worldview, but in 1990's the film studio and producers thought that such concepts would be too confusing for average film viewers and difficult to follow, thus it was all cut out during pre-production. Even their first film "Bound" that featured lesbian love story was met with numerous misunderstandings during pre-production, during its filming and, of course, during its release, since such themes were considered too risky… almost taboo, as they could easily put off many unprepared audiences.
But now… look how the world and culture has changed?! In 21 years everything is upside down. It is almost impossible to find a big blockbuster film or franchise or T.V. series or even a video-game that has no lesbian, gay, transgender, bisexual, pansexual or any other "something"-sexual character. It is true for both "rated R" and "rated M" media and for media oriented for children. Disney's life adaptation of animated classic "Beauty and the Beast" is the prime example… not to mention more.
I must say that unorthodox sexual orientation of characters were always present in cinema, they were never the subject of prohibition and never will be, however before "Wachowski era" their orientation always played some sort of narrative purpose. No character was supposed to be gay or transexual just for that sake of being such. But nowadays we see LGBT characters all over visual media… and the fact of their orientation rarely enhance the story or add anything to it. For the most part it is just being there for no reason other then being there. No wonder we have so many poorly written stories today. "Chekhov's gun" is the key to good storytelling, isn't it? If you put something into a story, it must heave a purpose, because without purpose it's just a filler, a white noise… this means it shouldn't be there at all. And here I'd like to quote Agent Smith from "The Matrix" films:
"But, as you well know, appearances can be deceiving…" — even here Wachowski brothers point out the previous "Residual self-image" topic. "…which brings me back to the reason why we're here. We're not here because we're free. We're here because we're not free. There is no escaping reason; no denying purpose. Because as we both know, without purpose, we would not exist."
Curious… Wachowski brothers were pioneers in LGBT mass-media, yet even they were smart enough to exclude these themes from "The Matrix trilogy", even having a total creative freedom over the sequels, as they knew that it would serve no purpose in their story. Yet they used much more sophisticated tricks to pinpoint their agenda and worldview. Get ready for some hard drugs! Wachowski brothers urged the protagonist and film viewers to take "The red pill" and "Free our minds". They also urged us to fight against all rules and stereotypes, and young generation loved it. In the film it simply meant "rage against the machines", but in our world where this film was "The red pill" for young people, this fight against the established order had much deeper purpose.
Upon the quick view on the lives of the Wachowski brothers over these two decades we can tell that their "red pill" they were giving us, was simply a androgyne hormone for transgenders and their main "Matrix" they were fighting against, was the sexual orientation stereotypes. They succeeded in their revolution, as LGBT themes are no longer taboo in mass-media. But there were also other important cultural topics Wachowski brothers presented with their trilogy: multiculturalism, racial diversity, feminism and even "toxic masculinity" and war against white men and patriarchy… long before these themes became mainstream in pop-culture.
"The Matrix" franchise had always a diverse cast, didn't it? It also has strong and independent female characters right from the start. And it wasn't just a copycat trend to appeal some social minorities, as it happens today. It was the personal philosophy of the authors. However, despite all their diversity and equality, one social group was shown deliberately one-sided. Just think about it. All evil characters in all three films were male and white. Agents are white middle aged men, Cypher — white middle aged man, Merovingian — white middle aged man, Architect — white man, Bane — white middle aged man, etc. Some can argue on this topic, since white men where also on the side of good guys. True, "but, as you well know, appearances can be deceiving…" says Smith. All white men on the good side of the story are… well, questionable. Whom can we name? Councillor Hamann — played by Anthony Zerbe — is a white man… a father figure in Zion, however he is shown to be an irrational and rhetorical weak old man. Comparing him to other leaders of Zion we can easily see his incompetence. Even Neo makes fun of him, pointing out on a fact that Hamann's solid age doesn't make him wiser (and it is the only time in the whole trilogy when the main protagonist ever trolls anyone). Then there is the Kid — played by Clayton Watson — another white man good guy, but he is just an immature naive boy… in "The Animatrix" he in the moment of danger finds no better way out then a suicide… a very questionable role model, don't you think? Who's next? Mouse — portrayed by Matt Doran — once again a young teenager full of sexual hormones and nothing more. There is also Captain Roland — played by David Roberts — and his ship crew, but a single black woman Niobe — played by Jada Pinkett Smith — turns out to be wiser and much more competent then any of them. Meanwhile all non-white and non-male characters are shown in the positive light. Wait… but what about Neo — the one himself — played by Keanu Reeves — he is a white man — the hero of the trilogy. True. However originally "The Matrix" creators wanted to cast Will Smith for the role of Neo, but Will Smith declined the role and chose to act in "Wild Wild West".
In other words Wachowski brothers brought up anti-white men SJW themes in their films long before such topics became mainstream and part of pop-culture. Thus they weren't even noticed by the time of film release. But it is worth mentioning that Wachowski brothers were depicting anti-white men subplots not because they were following some kind of fashion or social agenda like mass-media does today, but because brothers WERE white and men, and they wanted to do something about it. And they did. For real.
However next generation of filmmakers and artists took the Wachowski brothers' personal issues and turned it into a viral trend, changing the culture forever. It can be even said that the modern SJW and LGBT hysteria is the Matrix, created by Wachowski brothers. I wonder, will their new "The Matrix" film change the world once again?.. and how?
Text: Jurii Kirnev
Omnifinery Editorial: Article 003
submitted by SelfMadeAsia to OMNIFINERY [link] [comments]

Post-Battle Assessments, Future Possibilities, Meta, Mission Creep, Commentary and Ideas

I've been sick for a few days and I'm a little fuzzy right now, so please forgive any typos and so forth. I find when I'm not feeling well and need to occupy my brain with something is the best time to ponder about big ideas and events and the meanings and possibilities thereof, and I actually have the time to put fingers to keys and try to make sense of such things with my typical walls of text. I'd like to address several things here, so let's get started.
First off, is a postmortem of the Wiki Month celebration for #GG's 5th anniversary. I'm proud to say that most of my "big ideas" have lead to success in one degree or another over the past half decade, but this was not one of them. Apart from our resident hero u/Mikisayaka33 and a few others, turnout for the #GG Wiki party was very small. This is mitigated by several factors including:
The deplatforming of 8chan and scattering of the #GG community there The split between KiA and KiA2 absorbing a ton of the Reddit community's creative energy The banning of Mombot and with her the last major central node in the old #GG Twitter network
With so much going on, I couldn't expect that many people were going to take a great deal of time to do the fiddly, exacting work needed to make good articles on a Wiki about troubles in the world of interactive Mongolian flipbook paintings. Nevertheless, good work has been done there. Hopefully it will continue to pay dividends.
Secondly, let's talk about 8chan. As many of you are doubtlessly aware, 8chan was taken offline by Cloudflare around August 10th, as we were in the middle of planning for #GG's anniversary events and shitposting away. Almost simultaneously, the Reddit community 8chan was shut down and a huge schism erupted here over the board staff's behavior, leading to the explosive growth of KiA2. In the month of August, almost on top of the 5th year anniversary, an entire #GG hub community found itself scattered to the wind and another fractured in half. Shortly thereafter, the last BIG #GG voice on social media was suspended. To top it all off 8chan's previous owner, Frederick (Hotwheels) Brennan, pulled a face-heel turn and went on a crusade against 8chan. He went so far as to team up with corrupt journalists on Twitter to put pressure on the site owners, to such an extent as to file paperwork to get the owner's citizenship requests revoked in the Philippines. He has alluded to using the substantial Bitcoin donations that 8chan users once contributed to him to pay for DDoS attacks on the site, threatened to write and release an open source flood script to keep it offline, completely reversed his stances on Internet censorship and free speech, and recently came out as a furry. It's been a rough four months for the goodguys. Maybe by design, as #GG as a whole seemed to suffer a "perfect storm" of events that disrupted us in ways very convenient for certain parties.
All that being said, 8chan is finally back online and recovering at its new address of /gamergatehq/ has returned as well, addressed in the customary fashion. The site is working out a few minor bugs, but the communities are finally starting to recover, and the site now has its own in-house DDoS prevention software that is keeping the jackals mostly at bay. Our large communities survived in the interim by turning to the darknet as well as a self-healing clearnet Webring of "bunker" sites. The second largest of these bunkers is still online and holding a significant part of 8chan's old userbase, and it remains to be seen if they will be coming home or staying put. For #GG's part we should be recovered enough to get some things done within the coming weeks, probably after the Christmas Stalingrad season. Related to the subject of 8chan and #GG, I think its finally time for me to weigh in a bit on the KiA meta issues in a public manner. Lord knows I don't have to tell anybody here, mods or users, anything about the problems your board is facing. I have my private thoughts on that and I've made them known to the staff already. But what hasn't ever been addressed amounts to a pair of elephants in the room, and I would like to spare some oxygen to talk about them.
The first thing is a brief reminder of who your allies are. When #GamerGate kicked off, the pro-#GG side began as a huge coalition centered around three hubs: The imageboard community, KiA, and Twitter Front. Each served a different purpose: Small and classically nasty, 8chan did most of the planning and think-tank work, and had an informal network of people (including yours truly) carrying information back and forth between the three hubs and helping everyone coordinate. Huge and mild-mannered KiA could throw weight of numbers behind operations and served as a fantastic recruitment ground on the normie Internet. And chaotic Twitter could raise hell, apply social pressure, and grant massive public exposure to our efforts. A great system that we all collectively leveraged to great effect. There's just one problem: KiA seems to have forgotten who the 8chan hub is made up of. 8chan #GG was comprised of three factions. A hidden hub (/v/ #GG), a public "honeypot" hub (/gg/ - /gghq/), and the "Shekel Shoah" operation (/pol/).
Yes, THAT /pol/
Not to put too fine a point on it, but your allies in this thing from day one, including the minds behind Operation Disrespectful Nod, have been /pol/ in all their warts and triumphs, and to this day 8chan #GG remains a joint /pol/-/v/ project. How this was common knowledge in 2014-2015 and has somehow slipped beyond the veil of the obvious here beats me. You already know, in your heart of hearts, why I'm bringing this up. As a moderate lurker with intimate knowledge of the hub communities it has become quite apparent to me that the KiA of today has manifested something beyond the "agree to disagree" deference that signified that branch of the alliance for the first few years. There is a certain visible intolerance of "/pol/-types" on the part of both the mods and the community that has taken root here, that was not here in the first two or three years, and that is (at least in my opinion) fueling a good portion of your community fracture. /pol/, for their part, has never liked Reddit, but have always been happy to work together with this specific community in accomplishing a common goal. It is with high irony that I can state that they are more tolerant than you are, at this point. Those are sharp words, but they're sharp for the sake of honesty and not for the sake of insult. In the beginning we all set our political and cultural differences aside and became one community. Now something has elevated political differences in importance and we are fracturing as a result. From my experience, KiA2 resonates with more of the original "attitude" that once defined KiA. A certain moderated rowdiness and willingness to disregard our differences that I can't quite put to words. And yet it still feels like it is missing something from the absence of respectable viewpoints and personae that remain cloistered here. Pause and give that some thought if you will, before you read into the next paragraph.
Much has been said, including by myself, on the subject of "mission creep." We had no shortage of people pushing for #GG to be about more than just gaming media, even as far back as December of the first year. They were roundly, and loudly, and repeatedly, and rightly told to stuff it by the majority. To paraphrase IA in the Quinnspiracy videos, "if all of us together can't even clean up something as puny as the gaming media, what hope does anyone have of fixing the bigger issues?" Keep focus. Stay on target. Keep digging. Send those emails. And damn if we didn't! Millions in ad revenue up in flames, Gawker torpedoed, enough corporate fear and fury to deluge us in hitpieces and hate articles and we just surfed the wave higher as we watched them sink all the while. Any suggested diversion from that path immediately reeked of shill tactics. An underhanded effort to unfocus the autism laser. Indeed we had a traitor faction within our own ranks create and propagate the "ethics cuck" meme specifically to split our community and drive us toward politics and anti-SJW warfare instead of fighting our war in gaming. I personally fought alongside many others to put a stop to that. That happened in 2015! But whereas our victories are almost universally counted in what we have destroyed, not much gets said about the culture #GamerGate created.
Tech-savvy and Internet savvy meme connoisseurs Wide awake and aware of media propaganda and bias (redpilled) A developed taste for grassroots activism A developed hatred for censorship, whether in art or points of view
One quarter million people, with a reach of over three million. That's how big #GG was at our peak. Smaller forces have toppled governments. Now consider the state of the gaming media today, compared to pre-#GG. Yes, its still trash. But for years now the likes of Kotaku haven't dared to antagonize and demonize gamers the way they did to us in 2014. They learned a very painful lesson. Undisclosed conflicts of interest are much more rare now as well. While they're still pumping out "woke" garbage articles and clickbait, the original cassus belli of #GG has largely gone away since the fight was never about their generic quality but rather their brazen collusion to attack and silence gamer culture. Its only if you're holding out for vindication of #GG, an apology for their past behavior, or engaging (as in my case with Kuchera) a blood vendetta against the few remaining figures in our rogue's gallery that #GG's original conflict really has any gas left in it. We've been in "watchdog mode" for nearly four years, and there has been comparatively little to watch. That isn't a judgement, but I think its a valid (and somewhat welcome) observation. We have no realistic power to make the games media good, but we succeeded in hurting them as payback, and making them more ethical to prevent further big issues. For the main, basic, simplest goal that more or less everyone agreed with in 2014, #GamerGate has apparently won the war. Or at least reduced it to no more than an occasional mopping-up operation. Now all those SJW-aware, redpilled, Internet savvy gamers who hate media bias and censorship and have a taste for activism can just go home.
There is a fly in that ointment, however. Over the long course of #GG we learned something about our opponents in the media. Both in the games media that created the lies about us from whole cloth, and the mainstream media who happily backed their play to spin a narrative: We learned their motivations. Beginning with GamesJournoPros we learned that the major players and gatekeepers in the games media shared certain political sensibilities that justified everything they did. When they colluded behind closed doors, it was with other people who shared their political sensibilities. When they circled the wagons and defended each other from criticism, it was on the basis of their political sensibilities. When they lashed out at gamer culture it was to direct others who shared their political sensibilities to attack us. When we appealed to higher authorities we were denied on the basis of different political sensibilities. When our voices were censored from seemingly the entire Internet, it was on the basis of not having the right political sensibilities. When Wikileaks took notice of us, they warned us that the corruption and bias we were seeing was "mirrored at the very top." And for #GG's culture who is now aware and sensitive to the presence of media bias and corruption and who have knowledge of these motivations, we can now see those same political sensibilities driving enormous problems at every level of life from local politics to Hollywood to Presidential elections. And for people with a taste for activism, it is not something that can be dismissed as "not my problem" while still being true to yourself. There are four lights, afterall. With this state of affairs looming in the foreground, there is a very reasonable appeal in using the downtime resident in "watchdog mode" #GG to think and talk about the bigger problems stemming from the same sources, and perhaps eventually formulating some sort of activist solutions to improve the situation. In 2014, 2015, or in my opinion even 2016 I would argue that this would be "mission creep." Premature and dangerous with so much still up in the air. Today, five years hence and with so little on our plate, it now seems much more like a natural evolution of goals driven by the core culture of #GamerGate itself. The community is changing its goals because it has grown into change, and not because its hand is being forced or manipulated. Take a moment to reflect on this, and then consider the events and attitudes that split your community in light of it, and perhaps things will become more understandable without the animosity. Its better to have strange bedfellows than to fight alone.
Finally I would like to address something that I think is sorely needed. The few of you who know me personally know I already have more project irons in the fire than I can handle on a given day, so I'd like to pitch this as an idea to the more Reddit-savvy technical folks here. I call the concept "Salvation." Imagine a custom fork of Gab's open-source Dissenter application, but tailor-made for Reddit. Allowing anyone to comment and reply to any Reddit thread via a third party overlay that the Reddit admins have no power to enforce against.
Imagine it. You could post whatever you wanted "on Reddit" again. The use of such an app could be integrated into a board's culture. On the surface where normies lurk you would see only the clean, advertiser friendly milquetoast nonsense of the Reddit administrators. Yet then established members of the community could go beneath and say what they really think with no oversight from Reddit's admin staff. Real discussions and activism could happen again, using Reddits infrastructure to build and maintain communities, and yet placing the dedicated members beyond the reach of Reddits Byzantine TOS and redname whimsy. Free speech could be restored sitewide for the cost of a browser app and a sticky telling everyone where to find it.
Thank you as always for reading. Cheers, KiA.
submitted by AcidOverlord to KotakuInAction [link] [comments]

[UPDATE][M] Ryo Currency "Fermi Paradox"

[UPDATE][M] Ryo Currency
[M] - Mandatory. The update contains security fixes or contains fork update (wallet will stop working after some height reach).
IMPORTANT: The latest version is (contains minor update after
Meet Ryo Currency update - Fermi Paradox. In this update we will discuss 3 updates and do one announcement in the source code, 2 of them will be the first among any Cryptonote projects:
  • Wallet Scan speedup thanks to ECC and multi-threading library. Increased wallet scan speed when processing blockchain. New Elliptic Curve Cryptography library combined with implemented multi-threading that ustilises user's CPU results in reduced block verification up to 5x times compared with previous modes.
  • Plateau emission curve. Ryo's block reward changes every 6-months following a "Plateau Curve" distribution model. The modification of emission curve was initiated and debated with Ryo community. The following fork will finalise and implement that change.Notice: the difference between previous and this model will take effect at block height 394470.Read more about Ryo plateau emission curve
  • Various code edits, refactoring and minor fixes. There are multiple code fixes and edits that could be considered minor when looked in particular, but when looked in general - result in more than 35.000 lines of code being changed making core code more clean, optimised and bugfixed.Check Ryo Github repository
Research and studies of Ryo Dev team showed that current ring signature technology as it is - is obsolete and has too many flaws to be considered as a means for reaching the goal of the second level of of privacy. Therefore we will be replacing ring signatures with second generation ZK-proofs technology in observable future and temporarily downgrade privacy level to 1.
In general, you can consider privacy levels like that:
  • level 0 - everyone can look into your wallet and know your transactions (BTC level)
  • level 1 - nobody can see inside of your wallet, but each note has a serial number (yes, this is real life money level and in CN coins is implemented using stealth addresses)
  • level 2 - notes you have don't have a serial number to a guy that gave you one, and no-one can't know if you spent it later (In CN coins it is implemented using ring signatures - which are the failing ones)
What we are saying is over the past year or two, researches stripped ring signatures of their privacy properties so much, that we think it is no longer fair to say that we (or Monero, which is even worse since it has even smaller ring size compared to Ryo) or any other CN project that uses it - meet the level 2 of privacy.
So, summarising in non-tech words what does it mean - when you are doing a transaction and want to imagine how it looks like in system:
  • bitcoin - "I spent output 10, worth 1 BTC and output 22, worth 0.5 BTC"
  • ring signature (current CN coins) - "I spent output 10, 14, 18 or 20, and output 16, 18, 19, or 22"
  • zk-proof - "I spent something."

Fork is scheduled on block 362000: you can check fork countdown on Ryo Currency website

Please update your wallets before this block, or your previous wallet will stop synchronising after the block 362000:
  • Ryo Wallet Atom: download latest Atom installer when annouced update to version 1.5.0, start it and perform reinstall.
  • Ryo cli binaries: download or compile from source updated binaries from Github version and unzip it, and place your wallet key files in new folder.
  • Pool owners and exchanges are notified about updating their nodes to the latest version before the fork.
Questions you might have regarding the fork:
  • What will happen with mining algorithm - will it change or what does "fork" mean - coin is split on 2? No, "fork" basically means major code update that is being activated on a specified block height. There will be no mining algorithm change or chainsplit.
  • Ryo roadmap indicates that you had in plans reaching 100x ring sizes. In light of future introduction of ZK-proofs does it mean that this is not aplicable? Yes, we eventually will be replacing ring signature technology on ZK-proofs, which is more fundamental change than trying to "beat dead horse" with ring signatures.
  • What about atomic swaps? Ryo roadmap indicates it being planned, is it still possible with introducing ZK-proofs? Yes it is! And we aim to implement this feature after all necessary updates in core code. It is important to have everything implemented and tested before adding that feature.
  • What is a ZK-proof? ZK stands for zero-knowledge. In cryptography, a zero-knowledge proof is a method by which one party (the prover) can prove to another party (the verifier) that they know a value x, without conveying any information apart from the fact that they know the value xYou can read more about zero-knowledge proof (with real life examples) here.
  • Will blockchain grow faster (what about tx size) when moving to ZK-proofs? Overall, transactions and blocks using ZK-proofs will be even smaller in size than pre-fork ring signatures with bulletproofs! Plus it enables transactions to be aggregated together - this is obviously a major scalability gain for Ryo Currency.
  • I heard or as far I understand that ZK-proofs are somewhat less private? Does it mean that you are not privacy-oriented project anymore? No, in short - we decided to do this change to second gen. ZK-proofs, because ring signatures as is are too weak on providing enough for us default level of privacy and overall are considered now as an obsolete technology. So we don't want to say that we have a privacy level of 2, when research shows that it is not.
  • Ok, after fork - will we be using uniform payment ID-s to do transactions on exchanges? Yes. There are no changes regarding usage of payment ID-s and integrated addresses. We will be still using ring signatures, but also are announcing our goal on moving to ZK-proofs.
  • What else is there in plans/ideas you have in development of Ryo? Besides all plans and development ongoing with Ryo (wallets, infrastructure, core code and researches) we also developed and improve Mining platform RagerX. It is a all-in-one mining platform that unites a miner, pplns pool, OS, GUI flasher utillity, pool frontend and has advanced social features as well as 2 level affiliate program. In observable future we will add Cryptonight-GPU mining possibillity.We are implementing RagerX so people can mine CPU coins and Ryo simultaneously. Which means more eyes on Ryo, especially from fresh members.
  • Are the ring signature issues that have been discovered are applicable to other ring signature based coins like Monero? Yes.
submitted by RyocurrencyRu to ryocurrency [link] [comments]

New Free Bitcoin Mining Website 2020  New Free Bitcoin Cloud Mining Website Proof BitProfitsMining - New Free Bitcoin Cloud Mining Site 2020 I Earn 0.002 Bitcoin without investment New BTC Mining Site  New Free Bitcoin Cloud Mining Site  Free BTC Miner  New BTC Earning Site The Of Bitcoin - Wikipedia New 2020 Best Bitcoin Minor  BTC MINOR ULTIMATE  Live 0.5 BTC Payment Proof!

Free Bitcoin Mining takes a lot of electricity and effort, and huge competition so it is difficult for newbies to enter in free bitcoin mining race and get profit. Even newbies don't have enough computing power or knowledge to outrank your competitors. So you need to join well experience and old free bitcoin mining companies like QuickBTC. You've heard of Bitcoin and you're ready to get your hands on some digital wealth. However, this may be easier said than done. When you "mine" Bitcoin, you actually verify Bitcoin transactions in the public, decentralized ledger of Bitcoin transactions (called the blockchain).Every time you find a new block to add to the chain, the system gives you some Bitcoin as a reward. Bitcoin mining is a transaction record process with bitcoins to blockchain – the public database of all the operations with Bitcoin, which is responsible for the transaction confirmation. Network nodes use blockchain to differ the real transactions from the attempt to spend the same facilities twice. The main mining objective is reaching a consensus between network nodes on which Withdrawals from Wiki-Miner wallet are sent to your external wallet within 12 hours from the time of your withdrawal. Purchase a plan according to your budget with the Bitcoin . 3. Get Daily Returns. Start getting daily returns from the next day after your purchase and enjoy your profit. About Company. Address. A GUI frontend for Windows. Developed in cooperation with bitcoin pool 50BTC Only username and password to start mining on 50BTC pool. Miner automatically

[index] [5126] [23898] [8000] [7089] [2561] [1203] [25061] [6372] [16541] [5744]

New Free Bitcoin Mining Website 2020 New Free Bitcoin Cloud Mining Website Proof

New BTC Mining Site New Free Bitcoin Cloud Mining Site Free BTC Miner New BTC Earning Site - Duration: 9:32. Wiki Online 443 views. New Inside a Bitcoin mine that earns $70K a day - Duration: 5:09. Digital Trends 1,155,343 views. 5:09. What Do YOU Need to MINE ONE BITCOIN In 2020?! - Duration: 13:38. The online news portals bringing the latest Bitcoin news also analyze the fluctuating prices, what are the major indicators that are affecting the Bitcoin market, what will the future be of this ... BitProfitsMining - New Free Bitcoin Cloud Mining Site 2020 I Earn 0.002 Bitcoin without investment » Join= Turn on notifications and never miss a video! CREATE ACCOUNT AND ... 100% working Bitcoin minor software in 2020. If you want to get this software for $30 contact me via my email address [email protected] Or I sell 1 BTC for $20 you can contact me and ...

Flag Counter