Bitcoin Mining Calculator CoinWarz

⟳ 870 apps added, 78 updated at f-droid.org

Notice: this update is spurious, and the issue is being looked at.
⟳ f-droid.org from Wed, 26 Feb 2020 20:21:50 GMT updated on Sun, 01 Mar 2020 05:23:29 GMT contains 2962 apps.
Added (870)
Updated (78)
2020-03-01T05:53:18Z
submitted by BrainstormBot to FDroidUpdates [link] [comments]

Bitcoin Witness: use the worlds most secure, immutable, and decentralised public database to attest to the integrity of your files

About me

I have only ever done basic web development before but over the last 4-6 months i have been spending my time learning javascript, vuejs and a few blockchain technologies. I have finally finished the first release of Bitcoin Witness. I am aware that similar services already exist but my focus has been on simplifying the user experience and also making it scalable and free for anyone to use. Below provides more info on the app. I would love your feedback on the app and ideas / suggestions for me to take into the roadmap.

About Bitcoin Witness

https://bitcoinwitness.com is a free service that allows you to take any file and have its fingerprint witnessed in a bitcoin transaction. The service then allows you to download a proof file that can be used as verifiable evidence that your files fingerprint matches the fingerprint witnessed in the bitcoin transaction. The verification can be done using open source software even if our website does not exist in the future.

Protecting your data

We do not store your files data, in fact your files data is never even sent to our servers. Instead, your file is analysed locally in the browser to generate a SHA256 hash which is your files fingerprint.
The only data we do store is the file name, the fingerprint (hash), and the proof file generated by the app. This is so you can access and download proofs in the future. Anyone can retrieve the proof by presenting the original file at any time.
As you witness files, their fingerprint is also stored in your local cache so that you can easily retrieve the proof files when you load bitcoin witness on that device. It is recommend you download the proof once they are available to remove any reliance on our service.

How it works

Bitcoin Witness uses the Chainpoint protocol for many of its operations. Chainpoint is a layer two decentralised network that runs atop of (and supports the scaling of) bitcoin. Currently there are ~6500 community run Chainpoint nodes. Chainpoint nodes receive hashes and aggregate them together in a Merkle tree. The root of this tree is then included in a bitcoin transaction.
Your files fingerprint becomes part of a tree that is initially secured and witnessed in a Chainpoint calendar block (a decentralised database maintained by Chainpoint nodes) before being witnessed in a bitcoin transaction (the most secure decentralised database in the world).

Steps performed to witness your file

The end to end process for witnessing your file and retrieving a downloadable proof takes around ~90 minutes. This is because we wait for 6 bitcoin block confirmations before the proof file is made available.
The steps to witness files is as follows:
1. Generate the files fingerprint
When you select a file it is processed locally in the browser using the SHA256 algorithm to generate its fingerprint. We call it a fingerprint because if the same file is processed using this algorithm in the future, it will always result in the same hash value (fingerprint). If any modifications are made to your file it will result in a completely different hash value.
2. Combine the files fingerprint with entropy from NIST
The National Institute of Standards and Technology (NIST) randomness beacon generates full entropy bit strings and posts them in blocks every minute. The published values include a cryptographic link to all previous values to prevent retroactive changes.
Your files fingerprint is hashed with this random value to prove that the file was witnessed after that random value was generated.
3. Witness the file in the Chainpoint calendar
Chainpoint nodes aggregate your hash with other hashes in the network to create a Merkle tree and generate partial proof.
After ~ 12 seconds we retrieve a proof which includes the NIST value, timestamp information and the other hashes in the tree required to verify your files fingerprint in the anchor hash of a Chainpoint Calendar Block.
4. Witness the file in the bitcoin blockchain
The anchoring hash of the calendar block is then sent in the OP_RETURN of a Bitcoin transaction. As a result, this value is included in the raw transaction body, allowing the transaction ID and the Merkle path from that transaction to the Bitcoin block’s Merkle root to be calculated.
After 6 confirmations (~60 minutes) the final proof file is made available which contains all the Merkle path information required to verify your proof.

Steps to verify a file was witnessed by Bitcoin

The easiest way to verify a file has been witnessed is to visit https://bitcoinwitness.com and upload the proof file or the original file. Bitcoin Witness performs the verification processes and returns the relevant information about when the file was witnessed.
With that said, the benefit of the service is that even if the bitcoin witness app does not exist in the future. People must still be able to verify the files integrity (don’t trust us, trust bitcoin).
There are 2 steps to verify that your file was witnessed. The steps seek to verify that both your original file, and the downloaded proof file, have not been modified since the time of the bitcoin transaction / block. These steps are outlined below and can be performed using open source software.
1. Verify your file has not been modified
Generate a Sha256 hash of your file and check that the hash value generated matches the “hash” value in the proof file you are about to verify.
There are plenty of free online tools available that allow you to generate a hash of your file. And you can check the “hash” value in the proof file by opening it in a text editor.
2. Verify the proof file has not been modified
Re-run the operations set out in the proof file and then validate that the hash value produced at the end of the operations matches the Merkle root value in the bitcoin block.
The Chainpoint Parse library is open source software that can be used to re-run the operations in the proof file. The result can be verified to match the bitcoin Merkle root using any block explorer.

Future Vision and Roadmap

Today marks the release of the first version of the bitcoin witness app which can be found at https://bitcoinwitness.com. The immediate focus is on some additional features some users have already suggested
The broader vision and road map for bitcoin witness is to remove the need to trust organisations and each other with our data and instead trust bitcoin. We want to enable a world where people can make claims about data and that bitcoin’s immutable ledger can be used to verify that claim. The current version allows people to claim “This data has not been modified since that point in time”. An example of a future claim might be; “I was in possession of this data at that point in time”

Support us and get involved

This has been a fun learning experience. Would love it if you could all test out the app and give me feedback on the app, the user experience, any roadmap items I should think about. I welcome any comments here or join our telegram
For regular updates you can follow our twitter.
submitted by gaskills to Bitcoin [link] [comments]

⚡ Lightning Network Megathread ⚡

Last updated 2018-01-29
This post is a collaboration with the Bitcoin community to create a one-stop source for Lightning Network information.
There are still questions in the FAQ that are unanswered, if you know the answer and can provide a source please do so!

⚡What is the Lightning Network? ⚡

Explanations:

Image Explanations:

Specifications / White Papers

Videos

Lightning Network Experts on Reddit

  • starkbot - (Elizabeth Stark - Lightning Labs)
  • roasbeef - (Olaoluwa Osuntokun - Lightning Labs)
  • stile65 - (Alex Akselrod - Lightning Labs)
  • cfromknecht - (Conner Fromknecht - Lightning Labs)
  • RustyReddit - (Rusty Russell - Blockstream)
  • cdecker - (Christian Decker - Blockstream)
  • Dryja - (Tadge Dryja - Digital Currency Initiative)
  • josephpoon - (Joseph Poon)
  • fdrn - (Fabrice Drouin - ACINQ )
  • pmpadiou - (Pierre-Marie Padiou - ACINQ)

Lightning Network Experts on Twitter

  • @starkness - (Elizabeth Stark - Lightning Labs)
  • @roasbeef - (Olaoluwa Osuntokun - Lightning Labs)
  • @stile65 - (Alex Akselrod - Lightning Labs)
  • @bitconner - (Conner Fromknecht - Lightning Labs)
  • @johanth - (Johan Halseth - Lightning Labs)
  • @bvu - (Bryan Vu - Lightning Labs)
  • @rusty_twit - (Rusty Russell - Blockstream)
  • @snyke - (Christian Decker - Blockstream)
  • @JackMallers - (Jack Mallers - Zap)
  • @tdryja - (Tadge Dryja - Digital Currency Initiative)
  • @jcp - (Joseph Poon)
  • @alexbosworth - (Alex Bosworth - yalls.org)

Medium Posts

Learning Resources

Books

Desktop Interfaces

Web Interfaces

Tutorials and resources

Lightning on Testnet

Lightning Wallets

Place a testnet transaction

Altcoin Trading using Lightning

  • ZigZag - Disclaimer You must trust ZigZag to send to Target Address

Lightning on Mainnet

Warning - Testing should be done on Testnet

Atomic Swaps

Developer Documentation and Resources

Lightning implementations

  • LND - Lightning Network Daemon (Golang)
  • eclair - A Scala implementation of the Lightning Network (Scala)
  • c-lightning - A Lightning Network implementation in C
  • lit - Lightning Network node software (Golang)
  • lightning-onion - Onion Routed Micropayments for the Lightning Network (Golang)
  • lightning-integration - Lightning Integration Testing Framework
  • ptarmigan - C++ BOLT-Compliant Lightning Network Implementation [Incomplete]

Libraries

Lightning Network Visualizers/Explorers

Testnet

Mainnet

Payment Processors

  • BTCPay - Next stable version will include Lightning Network

Community

Slack

IRC

Slack Channel

Discord Channel

Miscellaneous

⚡ Lightning FAQs ⚡

If you can answer please PM me and include source if possible. Feel free to help keep these answers up to date and as brief but correct as possible
Is Lightning Bitcoin?
Yes. You pick a peer and after some setup, create a bitcoin transaction to fund the lightning channel; it’ll then take another transaction to close it and release your funds. You and your peer always hold a bitcoin transaction to get your funds whenever you want: just broadcast to the blockchain like normal. In other words, you and your peer create a shared account, and then use Lightning to securely negotiate who gets how much from that shared account, without waiting for the bitcoin blockchain.
Is the Lightning Network open source?
Yes, Lightning is open source. Anyone can review the code (in the same way as the bitcoin code)
Who owns and controls the Lightning Network?
Similar to the bitcoin network, no one will ever own or control the Lightning Network. The code is open source and free for anyone to download and review. Anyone can run a node and be part of the network.
I’ve heard that Lightning transactions are happening “off-chain”…Does that mean that my bitcoin will be removed from the blockchain?
No, your bitcoin will never leave the blockchain. Instead your bitcoin will be held in a multi-signature address as long as your channel stays open. When the channel is closed; the final transaction will be added to the blockchain. “Off-chain” is not a perfect term, but it is used due to the fact that the transfer of ownership is no longer reflected on the blockchain until the channel is closed.
Do I need a constant connection to run a lightning node?
Not necessarily,
Example: A and B have a channel. 1 BTC each. A sends B 0.5 BTC. B sends back 0.25 BTC. Balance should be A = 0.75, B = 1.25. If A gets disconnected, B can publish the first Tx where the balance was A = 0.5 and B = 1.5. If the node B does in fact attempt to cheat by publishing an old state (such as the A=0.5 and B=1.5 state), this cheat can then be detected on-chain and used to steal the cheaters funds, i.e., A can see the closing transaction, notice it's an old one and grab all funds in the channel (A=2, B=0). The time that A has in order to react to the cheating counterparty is given by the CheckLockTimeVerify (CLTV) in the cheating transaction, which is adjustable. So if A foresees that it'll be able to check in about once every 24 hours it'll require that the CLTV is at least that large, if it's once a week then that's fine too. You definitely do not need to be online and watching the chain 24/7, just make sure to check in once in a while before the CLTV expires. Alternatively you can outsource the watch duties, in order to keep the CLTV timeouts low. This can be achieved both with trusted third parties or untrusted ones (watchtowers). In the case of a unilateral close, e.g., you just go offline and never come back, the other endpoint will have to wait for that timeout to expire to get its funds back. So peers might not accept channels with extremely high CLTV timeouts. -- Source
What Are Lightning’s Advantages?
Tiny payments are possible: since fees are proportional to the payment amount, you can pay a fraction of a cent; accounting is even done in thousandths of a satoshi. Payments are settled instantly: the money is sent in the time it takes to cross the network to your destination and back, typically a fraction of a second.
Does Lightning require Segregated Witness?
Yes, but not in theory. You could make a poorer lightning network without it, which has higher risks when establishing channels (you might have to wait a month if things go wrong!), has limited channel lifetime, longer minimum payment expiry times on each hop, is less efficient and has less robust outsourcing. The entire spec as written today assumes segregated witness, as it solves all these problems.
Can I Send Funds From Lightning to a Normal Bitcoin Address?
No, for now. For the first version of the protocol, if you wanted to send a normal bitcoin transaction using your channel, you have to close it, send the funds, then reopen the channel (3 transactions). In future versions, you and your peer would agree to spend out of your lightning channel funds just like a normal bitcoin payment, allowing you to use your lightning wallet like a normal bitcoin wallet.
Can I Make Money Running a Lightning Node?
Not really. Anyone can set up a node, and so it’s a race to the bottom on fees. In practice, we may see the network use a nominal fee and not change very much, which only provides an incremental incentive to route on a node you’re going to use yourself, and not enough to run one merely for fees. Having clients use criteria other than fees (e.g. randomness, diversity) in route selection will also help this.
What is the release date for Lightning on Mainnet?
Lightning is already being tested on the Mainnet Twitter Link but as for a specific date, Jameson Lopp says it best
Would there be any KYC/AML issues with certain nodes?
Nope, because there is no custody ever involved. It's just like forwarding packets. -- Source
What is the delay time for the recipient of a transaction receiving confirmation?
Furthermore, the Lightning Network scales not with the transaction throughput of the underlying blockchain, but with modern data processing and latency limits - payments can be made nearly as quickly as packets can be sent. -- Source
How does the lightning network prevent centralization?
Bitcoin Stack Exchange Answer
What are Channel Factories and how do they work?
Bitcoin Stack Exchange Answer
How does the Lightning network work in simple terms?
Bitcoin Stack Exchange Answer
How are paths found in Lightning Network?
Bitcoin Stack Exchange Answer
How would the lightning network work between exchanges?
Each exchange will get to decide and need to implement the software into their system, but some ideas have been outlined here: Google Doc - Lightning Exchanges
Note that by virtue of the usual benefits of cost-less, instantaneous transactions, lightning will make arbitrage between exchanges much more efficient and thus lead to consistent pricing across exchange that adopt it. -- Source
How do lightning nodes find other lightning nodes?
Stack Exchange Answer
Does every user need to store the state of the complete Lightning Network?
According to Rusty's calculations we should be able to store 1 million nodes in about 100 MB, so that should work even for mobile phones. Beyond that we have some proposals ready to lighten the load on endpoints, but we'll cross that bridge when we get there. -- Source
Would I need to download the complete state every time I open the App and make a payment?
No you'd remember the information from the last time you started the app and only sync the differences. This is not yet implemented, but it shouldn't be too hard to get a preliminary protocol working if that turns out to be a problem. -- Source
What needs to happen for the Lightning Network to be deployed and what can I do as a user to help?
Lightning is based on participants in the network running lightning node software that enables them to interact with other nodes. This does not require being a full bitcoin node, but you will have to run "lnd", "eclair", or one of the other node softwares listed above.
All lightning wallets have node software integrated into them, because that is necessary to create payment channels and conduct payments on the network, but you can also intentionally run lnd or similar for public benefit - e.g. you can hold open payment channels or channels with higher volume, than you need for your own transactions. You would be compensated in modest fees by those who transact across your node with multi-hop payments. -- Source
Is there anyway for someone who isn't a developer to meaningfully contribute?
Sure, you can help write up educational material. You can learn and read more about the tech at http://dev.lightning.community/resources. You can test the various desktop and mobile apps out there (Lightning Desktop, Zap, Eclair apps). -- Source
Do I need to be a miner to be a Lightning Network node?
No -- Source
Do I need to run a full Bitcoin node to run a lightning node?
lit doesn't depend on having your own full node -- it automatically connects to full nodes on the network. -- Source
LND uses a light client mode, so it doesn't require a full node. The name of the light client it uses is called neutrino
How does the lightning network stop "Cheating" (Someone broadcasting an old transaction)?
Upon opening a channel, the two endpoints first agree on a reserve value, below which the channel balance may not drop. This is to make sure that both endpoints always have some skin in the game as rustyreddit puts it :-)
For a cheat to become worth it, the opponent has to be absolutely sure that you cannot retaliate against him during the timeout. So he has to make sure you never ever get network connectivity during that time. Having someone else also watching for channel closures and notifying you, or releasing a canned retaliation, makes this even harder for the attacker. This is because if he misjudged you being truly offline you can retaliate by grabbing all of its funds. Spotty connections, DDoS, and similar will not provide the attacker the necessary guarantees to make cheating worthwhile. Any form of uncertainty about your online status acts as a deterrent to the other endpoint. -- Source
How many times would someone need to open and close their lightning channels?
You typically want to have more than one channel open at any given time for redundancy's sake. And we imagine open and close will probably be automated for the most part. In fact we already have a feature in LND called autopilot that can automatically open channels for a user.
Frequency will depend whether the funds are needed on-chain or more useful on LN. -- Source
Will the lightning network reduce BTC Liquidity due to "locking-up" funds in channels?
Stack Exchange Answer
Can the Lightning Network work on any other cryptocurrency? How?
Stack Exchange Answer
When setting up a Lightning Network Node are fees set for the entire node, or each channel when opened?
You don't really set up a "node" in the sense that anyone with more than one channel can automatically be a node and route payments. Fees on LN can be set by the node, and can change dynamically on the network. -- Source
Can Lightning routing fees be changed dynamically, without closing channels?
Yes but it has to be implemented in the Lightning software being used. -- Source
How can you make sure that there will be routes with large enough balances to handle transactions?
You won't have to do anything. With autopilot enabled, it'll automatically open and close channels based on the availability of the network. -- Source
How does the Lightning Network stop flooding nodes (DDoS) with micro transactions? Is this even an issue?
Stack Exchange Answer

Unanswered Questions

How do on-chain fees work when opening and closing channels? Who pays the fee?
How does the Lightning Network work for mobile users?
What are the best practices for securing a lightning node?
What is a lightning "hub"?
How does lightning handle cross chain (Atomic) swaps?

Special Thanks and Notes

  • Many links found from awesome-lightning-network github
  • Everyone who submitted a question or concern!
  • I'm continuing to format for an easier Mobile experience!
submitted by codedaway to Bitcoin [link] [comments]

r/Bitcoin recap - August 2019

Hi Bitcoiners!
I’m back with the 32nd monthly Bitcoin news recap.
For those unfamiliar, each day I pick out the most popularelevant/interesting stories in Bitcoin and save them. At the end of the month I release them in one batch, to give you an overview of what happened in bitcoin over the past month.
You can see recaps of the previous months on Bitcoinsnippets.com
A recap of Bitcoin in August 2019
Adoption
Development * Bitcoin Core Developer Andrew Chow is straming his code tests on Twitch (7 Aug)
Security
Mining
Business
Education
Regulation & Politics
Archeology (Financial Incumbents)
Price & Trading
Fun & Other
submitted by SamWouters to Bitcoin [link] [comments]

Clearing up some misconceptions (including my own) [WARNING: LONG, MATH]

I've been reviewing NAV's code for the past couple months in my spare time and have seen a few things pass for granted which I had assumed were edicts from the NAV team, but as it turns out, they were not. I'll just cover them in sections below. This is going to get long, and hopefully you like math. I'm sorry, in advance.

Coins do not gain weight with age

tldr; section title
This is the big one, and the reason I wanted to review NAV's code in the first place. I had been treating this unofficial medium article like it was the bible, and it mentions that coins are weighted with age and size. No other documentation I could find indicated any differently (honestly, there's not really other documentation, in the first place) and so, having not finished looking into the code, I presumed that was simply true.
It is not, however. I'm not even sure where this idea came from, besides that article, because no NAV team announcements I've seen have said this, but maybe I'm just not looking back far enough.

So how DOES it work?

tldr; values are hashed together and compared against a target. That target is adjusted based only on how many NAV are staking
For those who haven't looked into how NAV picks the next group of staking coins (like I hadn't), the way it works is that a bunch of publicly available values (such as the time of the block you want to make, the time and hash of the transaction that represents your coinstake, and a few others) are hashed twice through SHA256 to create a random number. The actual values input are less important, what is important for NAV's purposes is that they are available to everyone, reasonably unique, and can be verified by other nodes on the blockchain. The output is, mathematically speaking, reproducible, but also completely random.
This value is then checked against a target value that changes based on how fast the network is making blocks. If the network is making blocks around once every three seconds? The target value gets harder (smaller). If the network is making blocks around once every minute? The target value gets easier (larger). The target value just gets adjusted until the network is sitting comfortably at 30 second blocks. So far this is the same way Bitcoin keeps their block time consistent.
However, PoS currencies then usually make an adjustment to that target value to increase your chances to win. In NAV's case, they multiply the target value by the number of coins you are staking. This means that a group of 1000 coins is 1000 times more likely to stake than a group of 1 coin.
To use more accessible numbers, since the values NAV is using are huge, this would be like saying the base odds are that you have to roll a 2 or below on a 100-sided die to win the coinstake. For one roll, you have a 2% chance. For two rolls, you have a 3.95% chance, for three rolls you have a 5.88% chance, for ten you have a 18.29% chance. For n rolls, a 1 - (98^n)/(100^n) chance. To simplify this somewhat, and encourage larger groups, NAV simply says that if you have 10 coins, your chances are 10 * 2%, or 20%. It's a bit more, but it's close.
It's worth noting that, using this system, if you have 50 coins, you have a 100% chance to win every roll, whereas pure single-roll odds only give you a 63.58% chance. The reason this isn't really a problem is that, in this example, there would only be 50 coins in existence, and you probably don't even have access to half of them. Additionally, if you are winning too quickly, NAV will start handing you a 200 sided die, then a 400 sided die, until you are only winning one in 30 -- and this is assuming you're the only one playing. With a table of people, you will get a larger die until only one of you is winning one roll in 30.

Majority Attacks

tldr; if coins gained weight with age it might be an actual security concern. This way is not
The problem with Proof of Stake Age (PoSA) is that, if implemented poorly, it can create opportunities for very cheap attacks. You may have heard of a 51% attack (or majority attack) before. This is where any single entity in the Bitcoin network gains more than 50% of the hashing power. At 51% the chances of them mounting a successful network control attack are now greater than half, which presents a potential danger to the network.

In PoW

tldr; you need lots of fancy computers that you get to keep after
You need a lot of hashing power, which means a lot of computers, which means a lot of financial capital. Or, you need to combine with another organization or pool to combine your hashing power. This was actually a concern once in Bitcoin, but fortunately was resolved to no ill-effect, and ghash.io agreed to cut down their processing. In a PoW system, however, after you have executed your attack, you still have all of your computers, and can use them for something else. The financial capital you have invested is kept, and you never had to invest a single penny into the coin.

In PoS

tldr; you need lots of coins that you probably spent a lot of money on, which are probably worth very little after
In PoS currencies, a 51% attack is still possible, but in this case you would need to have more than half of the staking coins. As of a few days ago, the network weight was hovering around ~18-22 million NAV, so for NAV, you would need ~10-12 million coins to have the requisite 51% of coins. The base assumption for a PoS currency, however, is that, once you have that many coins, you're pretty invested in the network, and it is directly detrimental to you to attempt to attack it. When you execute your attack, you will likely greatly damage trust in the coin, and lose a large portion of your investment. At least, this is the theory.

In PoSA

tldr; you need a little bit of money and a lot of time
You just need to wait. The most simplistic form of PoSA is in the form: adjusted_target = coins * time * base_target. If left uncapped, the time adjustment can allow a single coin stake to outweigh the entire network. Even with a cap of three months (for a total of 7776000 age-weight), you could use a mere 797 individual 0.01 NAV stakes (7.97 NAV total) to outweigh the combined base weight of all 62 million NAV in existence. You want good actors to have the most weight on the network, but in a PoSA currency, good actors are constantly losing their weight when their time resets, whereas bad actors can get more weight for doing nothing.

In PoST

tldr; you need a little bit of money and to somehow create a bunch of coins with the same hashing window
There are some currencies, such as VeriCoin, which have attempted to address this in novel ways, using what they call Proof of Stake Time. They create an ideal window during which your coins gain weight, but after which they return to base levels. This should theoretically encourage people to keep a server running, so they can always catch that window when it happens, which is partially randomized (to prevent someone from simply making a bunch of 0.01 coinstakes at the same time and just waiting for the window). I'm not sure how battle-tested this is, and I can think of a few potential vectors for attack that might exist, depending on implementation, but it does present an interesting and promising approach to the problem of how to encourage everyone on the network to participate, instead of just large stake holders with good odds.

So how likely is it for me to actually get a stake with ___ NAV

tldr; at current network weights it's likely that 1000 NAV will stake around once a week, and 1 NAV will stake once every 17 years.
Since NAV is neither PoSA nor PoST (which I would stress isn't a bad thing, because pure PoS is comparatively simple and has known -- and addressed -- vectors of attack. It's also not necessarily a good thing; it's mostly just a thing), you're basically just as likely to stake today as you are tomorrow. Theoretically, every second should present a new opportunity to win a stake, but in practice this ends up not quite working out because there are other people on the network. Every time you accept a new block, you cut off all of the seconds before it forever. In practice, it's probably easiest to just look at the total weight of the network, and your weight, and extrapolate from there. We'll take for granted that NAV will have 30 second block times for this calculation. If you've got Python you can follow along:
>>> # 2 blocks/min * 60 min/hr * 24 hday * 365 days/year ... TOTAL_STAKES_IN_YEAR = 1051200 >>> # 60 sec/min * 60 min/hr * 24 hday * 365 day/yr ... SECONDS_IN_YEAR = 31536000 >>> # the number of coins you are staking ... stake = 1.0 >>> # The total number of coins on the network ... network_weight = 18701284.96584108 >>> my_stakes_per_year = (stake / network_weight) * TOTAL_STAKES_IN_YEAR 0.05621004128433283 >>> seconds_between_stakes = SECONDS_IN_YEAR / my_stakes_per_year 561038548.9752324 
For those keeping track, this means that a 1 NAV stake is expected to take approximately 17.79 years to see a return in the current network (and, even then, only if you happen to be online at exactly the right time and nobody else stakes it first). Coincidentally, this is where that "expected time to stake" number comes from, which I've seen people asking about. I didn't actually look that one up in the code, so I'm not sure how their exact equation differs from mine, but I arrived at the exact same numbers they did, so it's likely similar (and probably more concise, because I am both a verbose writer and programmer, if you hadn't noticed). A 1000 NAV stake, using what I am calling network math for ease of reference, is expected to take around 6.49 days. My suspicion is that the reason this is sometimes more sporadic is that going by the target alone, and testing every second, a 1000 NAV stake should be getting a hit around once every 8 hours. I generated a file of 31536000 hashes (one for each second in the year), using the rules NAV uses to create hashes, and came up with the following table.:
*Assumes a target of 0x1a183258. I forget which block I pulled this from, but it's still around there. This unpacks to a value of: 0x0000000000001832580000000000000000000000000000000000000000000000 Calc wins : Mathematical calculation for how many hashes you should win, given the target Hash wins : This was pulled from the file with a year's worth of random hashes. N-M Wins : The number of wins network math says you should get Hash time : The average time between wins in the randomized file for the given NAV amount N-M time : The amount of time network math says you should wait between wins NAV : Calc wins : Hash wins : N-M wins : Hash time : N-M time 1 : 1.05 : 1 : 0.05 : ~1 year : 17.79 years 5 : 5.29 : 7 : 0.28 : 41.66 days : 3.56 years 10 : 10.59 : 10 : 0.56 : 34.27 days : 1.78 years 50 : 52.95 : 44 : 2.81 : 7.49 days : 129.87 days 100 : 105.89 : 107 : 5.62 : 3.42 days : 64.94 days 200 : 211.79 : 212 : 11.24 : 41.24 hours : 32.47 days 500 : 529.48 : 532 : 28.11 : 16.39 hours : 12.99 days 1000 : 1058.97 : 1050 : 56.21 : 8.33 hours : 6.49 days 2000 : 2117.93 : 2109 : 112.42 : 4.15 hours : 3.25 days 5000 : 5294.83 : 5326 : 281.05 : 98.62 minutes : 1.30 days 1000000 : 1058966.42 : 1058455 : 56210.04 : 29.79 seconds : 9.35 minutes 
So obviously, a bit of disparity between the target-based times and the network calculated times. I would guess this has to do with other people on the network cutting you off from time values, and orphaned transactions where you did get the right value, but somebody else made a weightier one, but this is where my ability to really verify exactly what is happening starts dwindling. The disparity in N-M wins and Calc wins indicates that the target is currently too easy, and should adjust upwards, because right now coins on the network are 18.84 times weightier (calc wins column / n-m wins column) in hashing power than they should be based on the total network weight. But this is also where the whole "50 groups of 1 coin has a 63.58% chance to hit 2/100 whereas 1 group of 50 coins has a 100% chance to hit 100/100" thing comes into play.
Since the network is largely broken up into groups of, on average, 1500 coins, we're actually looking at ~12467.52 groups of 1500 coins vying to win any given block. Given the target, a group of 1500 coins should have a 0.0050369...% chance to win any given coinstake ((target * 150000000000) / maximum_hash_value). This means that the chance that at least one of the 12467.52 staking groups will match for a given second is 1 - (1 - 0.000050369...)^12467.52 = 0.4663, or 46.63%. This places the actual amount that coins are overweight a bit closer to 13.989 times. (network should have ~1/30 chance (3.33...%) to win any given second, 46.63 / 3.33...% = 13.989).
However, as mentioned, the software itself can get in the way of that, so this might just be due to a quirk of how the NAV software searches for matches, since it will abandon any seconds prior to the most recently accepted block. If you were cut off from 13 seconds in every 100, that would account for the weight disparity. In any case, I would probably trust the network math times over the pure math ones, if you're just trying to get a feel for how long you'll likely wait between stakes. What this really translates to is that, although a 1 NAV stake will probably have one second out of the year that will hash in it's favour, even running 24/7 you're likely to miss 17 of those before you actually have all the right conditions to win.
Interestingly, I did manage to find one 9.99 NAV stake that won after only 5 days; so it can happen. But it's all still random.

How does this affect my staking rewards?

tldr; it doesn't
Fortunately, NAV pays out the amount you should receive down to the second. Let's take this block at random. 1119.84133642 NAV coinstake, generated 3.82575342 NAV. The time of the previous transaction that created that coinstake was 1514741456 (see the "Raw Transaction" tab). The time of the current transaction is 1514741456. that's all we need to go on.
>>> SECONDS_IN_DAY = 86400 >>> DAYS_IN_YEAR = 365 >>> CENT = 1000000 # .01 NAV >>> COIN = 100000000 # 1.0 NAV >>> REWARD_PERCENT = 5 * CENT # will be 4 * CENT with community fund >>> # All NAV amounts in satoshi (navtoshi? natoshi?) ... stake = 111984133642 >>> # time of this stake ... stake_time = 1516896224 >>> # time of the transaction that made this stake >>> stake_prev_time = 1514741456 >>> # I'm not 100% positive why it converts to cent/seconds first, ... # but this is what the code does, so we need to as well if we ... # want to be accurate ... cent_seconds = (stake * (stake_time - stake_prev_time)) // CENT 241299827679 >>> # Now they undo the cent_seconds for some reason? I'm not sure. ... # This does, however, create a minimum coin stake for any given time. ... # 1 NAV, for instance, will not generate anything if it stakes until ... # it is exactly one day old (with a whopping 0.00013698 NAV). ... # The minimum NAV stake you can get a reward from if you get lucky ... # and stake at the end of two hours is 11 NAV. ... coin_day = ((cent_seconds * CENT) // COIN) // SECONDS_IN_DAY 27928 >>> stake_reward = (coin_day * REWARD_PERCENT) // DAYS_IN_YEAR 382575342 
note: // is a floor division. For example, 3 / 2 = 1.5, 3 // 2 = 1
And we come out the other end with exactly 3.82575342 NAV. Those are the only variables that affect your payout for staking. You then also get whatever the fees happen to be. There's not any magic to it, and so far as I can tell there's also not a limit. If you legitimately wait those 17 years for your 1 NAV to stake, your eventual payout will be on the order of 0.84 NAV. Anyways, that's pretty much all there is to your payout; it's very direct.

So is it worth it for me to stake?

tldr; personal preference
Honestly, this is entirely up to you. If you're in the "month or more" camp of coinstakers, it's probably not worth your while to be running 24/7 unless you're just really into securing the network (which, to be fair, I am all about that, so feel free). But with the blockchain at the small size it is right now, and if you're going to be using your computer anyways, it probably doesn't hurt to just run it in the background and see if you get lucky. Like pointed out, the actual amount you get is not affected by any of this. All that this means is that it is harder to predict exactly when you will get a stake. If you're concerned about financially supporting the staking, then NavTechServers has created this handy calculator to help out. From a mathematical standpoint, it's ironically much more likely for small coinstakers to get stakes if they are running 24/7, but from a financial standpoint, you're probably not getting enough to care to, so it's up to your preferences.

Cold Staking is not staking while offline

tldr; there is no magic that will allow blocks to be created without nodes on the network
I've also seen a bit of confusion over what cold staking is likely to bring, and want to ensure people aren't upset when it does get rolled out. Specifically the misconception that staking with offline coins is the same thing as staking while offline. It is physically impossible to generate a block without something connected to the network, and you only get staking rewards once you have generated a block, because the blockchain doesn't really have the tools to tell who is online and participating beyond "who made this block."
All that cold staking means is that the private keys to use your NAV to buy things or move their address are not on the server doing the staking. In general, this is accomplished via a smart contract and a secondary set of keys that is given permission to use your coins, but only for staking. If those keys are used for moving the a coin from one account to another, then the smart contract will flag it as an incorrect usage. This means that if someone hacks into your server, the only thing they could steal are the keys that permit them to stake your blocks. This is much easier to correct than someone stealing your private keys and moving your NAV to a separate address. Particl's overview of their cold staking system is a good read to get some baseline expectations.
Most implementations of cold staking do open up the possibility to sign your coins over to someone else to stake, which opens up the entirely new 51% attack vector of asking people to just GIVE you their network weight. But given that I have just recently explained to you all why one person owning a majority of the coin staking weight on the network is dangerous, I shouldn't have to tell you why this would be a bad idea, right?
RIGHT??

Summary

In any case, that's about it. Chances are the answer to the question "am I staking" is "yes", so long as the wallet tells you that it's staking. Unfortunately (but also fortunately), waiting longer only increases your chances insofar as you are trying more, but when you do eventually stake, you will be paid out based on how long you have waited, so there's not much lost.
I could go into much more depth about all this but this was about as concise as I could get it while still showing most of my work. I'd also be happy to address any other questions that arise from this, and obviously if somebody who knows better finds anything wrong with any of the details here let me know. If you wanted to get into this more in-depth, I've created a Python script which explains some of the technical aspects more thoroughly (including how to unpack the compact target number into the full value being checked in the code), and allows you to get hands-on with real block values. You can download it here. Happy hodling, everybody.
submitted by i_adore_you to NavCoin [link] [comments]

AMA in the community

Q1:- What is SpockChain & its Current Progress? What are the Problems SpockChain trying to solve?

Ans:- Spock has been launched its mainnet on 8/13 2019, it’s the first public blockchain support Solidity smart contract with PoC consensus. In the last month, we have achieved several goals: 1.launched the mainnet, 2.been listed on 6 exchanges, and also Spock has won the voting competition for free list on MXC. 3. Spockpool is online to help small miners to union their capacity and get share of the mining reward. Spock is building a decentralized application network with PoC consensus, which is a more cost saving, environment friendly solution for blockchain system. Spock is going to release is first smart contract in the following months.

Q2:- What is the Use-case Of Spok Coin In Your Ecosystem? How can Holders & Investors Generate Rewards Using Spock Platform?

Ans:- In Spock Network, People can publish/run the apps on the network, all the dapps running on the network needs SPOK. and besides PoC consensus, Spock also involves the concept of PoS, which is that miners need to stake some coins to mine the coins, if not, the miner cannot get the 100% of the block reward, so in SpockPool, coin holders can lend the coins to the miners, when miners mined the reward, it can share with the coin holders.

Q3:- What is the Need & Importance Of SpockChain project in Blockchain Industry?

Ans:- First of all, I think PoC consensus will be a serious option besides PoW and PoS in future, and there must be a significant project stands for PoC consensus, currently Burst or BHD maybe the one, but these two projects has a common problem is that they do not have ecosystem, they only created a coin with PoC consensus, that’s too simple to today’s blockchain world. Spock will be the star project in this area not only just created a coin with PoC consensus, but also it supports smart contract, Ethereum dapps, games can be easily migrated to Spock network.

Q4:- What are the Milestones SpockChain has achieved from the starting of this project? What are the Long Term Targets?

Ans:- For the first question, I have answered in the previous one. Like launch the mainnet, got investment from Continue Capital and other token funds, IEO/IGO on the several exchanges, got free list on MXC by won the voting competition, released explorer, dashboard, desktop wallet, Android wallet, and SpockPool, all these things above happens in the last month!!! For the short-term goal, Spock is trying to be the Ethereum with PoC consensus, so for the following 6 month to 1 year, Spock will expand the developer community to increase the dapps/tokens on its network. And also the final goal of Spock is to upgrade the consensus not only store the hash value, but also store documents, music, videos, etc. We’re still working on that part.

Segment 2 Questions

Q5:- What are your major goals to archive in the next 3-4 years? Where can we Spockchain ecosystem in this period? What are your plans to expand and gain more adoption?

Ans:- 1. Spreading the Proof of Capacity consensus, let more people know there is another way of mining to gain. 2. Build the developer economy on Spock Network, on Spock Network, not only smart contract, but a new type of tokens will be supported, which is not like the ERC-20, it’s tokens that generated as the block generated, but the developer can define the tokens generation rules, we call them mining-tokens. 3. Search the new way to upgrade the storage network, to finally achieve the goal that the a decentralized storage network can serve the internet users, that would be a totally new future of blockchain world.

Q6:- As a team member of Spockchain, what is your long-term vision about the industry which Spockchain is working at? Are you afraid someday there will be another project with more innovative technology can replace?

Ans:- I think the infrastructure of Blockchain world today has only two main directions: 1. cross chain Technoledge like Cosmos, Polka-dot. 2. Decentralized storage like IPFS. As long as we're heading to the right direction, we won't get a very bad result, even we have failed, but the way we passed through can be borrowed to other projects, there must be some projects success in this area. I feel confident about the project going and what we have done comparing to the other competitors, as currently so many projects claim that they want to be Ethereum in PoC, but none of the has launched the mainnet except SPOCK.

Q7:- Why Spock Network have Chosen Proof of Capacity Consensus Mechanism ? Any advantage over other consensus?

Ans:- Here is the description in the white paper about advantage of PoC:
Environmental protection: When a mining machine is initialized, the mining cost is relatively small, requiring only a small amount of disk access and a small amount of calculations per block.
• Economy: Many PCs have unused disk space. The marginal cost of using these spaces for mining is small, with immediate rewards and can be used for mining. It is not necessary to consider the cost of electricity as a bitcoin mining machine.
• Equality: Today Bitcoin has become the world of Asics mining machines and large mines, and small-scale investors have struggled to participate in the bitcoin mining ecology, while POC-based mining machines are hardly faced with bitcoin-like The mining machine is constantly updating its iterations so that it is completely eliminated.
• “computing power” sharing: BCH is a BTC hard fork chain, so BTC's proprietary mining machine can also dig BCH, but it can't dig BTC and BCH at the same time, and the POC mechanism can make the hard disk for different chains. The spatial "computing power" data structure is consistent, and these "computing power" can be used to dig assets on these chains at the same time.
I think the value of PoC is under-estimated today, that’s why we want to promote the consensus.

Q8:- What are the competitors of Spock Network? How Spock Network is better than their competitors ?

Ans:- In storage domain, they can be: Filecoin/Storj/Sia/Lambda/Filestorm/Yotta
In PoC consensus domain, there are: Burst/BHD/LHD/Boom/Newbi/Disc
In PoC+Smart contract domain, there are: Spock/Galaxy Network/BSN/EHD
Currently, in a completely decentralized blockchain network, there is no such consensus can distribute the coins as the miners contribute the hard disk and network, all these projects take some trade-off to make that happen except File coin, File coin uses Proof of Replication and Proof of Space-time consensus, that may be an option to solve this problem, but its mainnet has not launched, it would take time to achieve that. The Burst, BHD, and other similar projects only uses PoC consensus to created a mining coin, but the usage and scenario are very limited, it’s not year 2013, you can simply create an alt coin and people will buy it. The PoC consensus needs find some usage and scenario to make the network more solid and strong, the smart contract can be the way. As I listed, all the projects have not launched its mainnet except Spock.

Q9:- How Scalable Spock Network have , How many TPS achieved so far ?

Ans:- Spock has its own advantage about improve TPS, because nodes running in the network has much hard disks and network traffic, basically we can increase the size of block header to increase the TPS, and also we're investigating other ways to improve the TPS.

Q10:- Why the name of Project " SPOCK" . What does it signify about your project?

Ans:- Spock is the leading character of Star Trek, we choose the name to inspire the team to keep exploring the possibility of the blockchain world, sand the slogan of Spock is “live long and prosper”, which is also the hope of the team for the project, nowadays, too many fake mining projects out there, Spock wants to show the honesty and integrity by continually showing the code and improving the project.

Q11:- Followed your whitepaper, Spock has a leaderless PoC protocol, does not use a committee or an authority. How this use for? What benefit does it have for Spock?

Ans:- In the consensus level, there is indeed no such organization can change or control it, just like PoW, when the network needs to upgrade its consensus, the community will join the discussion and the dev team will follow the result of it. That's the spirit of Satoshi and all the early blockchain projects.

Q12:- What is the form of Spock mining? What are the conditions for miner application?

Ans:- To mine spock, you can just use normal computer with several hard dist with plotted files, there are tutorials on thehttps://www.spockchain.org

Q13:- What next technology updating after building a decentralized storage data application network in 2021? Will Spock expand to other areas in long term development?

Ans:- I think after the infrastructure is completed that we will focus on the application ecosystem and adoption of the ecosystem, Spock dev team will continue working on the infrastructure and other scenarios/applications to promote the adoption, I think in a very long time, Spock project will only focus on decentralized storage domain.

Q14:- Does your team have a plan to add DAO module into your project since its its effiency on autonomy, decentralization and transparency?

Ans:- Spock will run DAO mode for autonomy, the Spock team is still working on the details of it.

Q15:- What is the role of Smart Contract in Spock Chain? Does your team have a security system to check the operation of whole project?

Ans:- Smart Contract will be the key feature that distinguish Spock and other projects with PoC consensus, Spock leverages lots of work from Ethereum, so Spock is standing on the shoulders of giants, which potential lower-level security risks can be avoid, and we also have a security team to improve the smart contract, like before you submit your smart contract, there is a service to help to analysis the code to help you avoid some common mistakes.

Q16:- What is Spockchain vision and what's your biggest challenges?

Ans:- Spock is trying to be Ethereum with PoC consensus in a short-term, that goal seems to be very promising as everything goes well so far. Spock’s long-term goal is trying to provide a decentralized storage network for all the internet users, that would be challenging from both technical side and business side.

Q17:- Spockchain looks good but it confuses me that there are so many other Blockchain projects. What should I pay attention in Spockchain to give it the importance it deserves? What are you planning to achieve with your project goal?

Ans:- I think code and time talks, Spock is not a simply ERC-20 token, it’s a mining coin. If you checkout the top 50 projects on CMC, most of them are mining projects, because mining coins are very fair way to distribute the coins. And Spock provides another option for mining, you don’t have to search for low-cost electricity power, you can just set up the mining machines at home to mine the coins. It’s a potential mining way to mine cryptocurrency, if you have mined BTC/ETH, you can have a try about Spock/Burst/BHD, etc.

Q18:- Blockchain projects is not a child play. While creating spok projects, have u for once been discouraged to the extent of wishing to stop since its all about intelligent contract and users poc consensus.

Ans:- Honestly, we do. there is so many hard work to combine the smart contract and poc consensus, but we believe the technology and engineering, and we believe the judgement about the trend of blockchain technology, that's what encourage us to the place we have achieved.

Q19:- How the SpockChain project planning process is ensure? The market needs constant progress of project! How to avoid the spok Project idleness?

Ans:- We're continuously building and expanding the community and miner groups, both online and offline side. currently most miners are from Asia(China mostly),there are only several miners in Europe and US, we do want to spread spok ecosystem across other continents, if anyone in other countries is interested in promoting Spock, please directly contact me!

Q20:- Can anyone run a POC mining and does it require much processing power? Is the cost of POC mining high?

Ans:- Yes, anyone can run a PoC mining, it's electricity power insensitive. the electricity power of each petabytes of a day is only several dolloars, while the cost of a petabytes will be about 30000 dollars.

Q21:- Is POC exploitation cost high? What is it suitable for? What is the number of SPOCK user statistics today? Does SPOCK have a plan to attract users?

Ans:- you can check out the websites, Official website: https://www.spockchain.org Spock Explorer: http://www.spock.network Miner Dashboard: https://dashboard.spock.network

Q22:- What is the function of SPOCK? Are there any benefits to SPOCK holders? How do I earn SPOCK?

Ans:- All the smart contract runs on Spock will cost SPOK, and miners want to mine SPOK will need some amount of SPOCK to stake. You can get the Spock on the exchanges that lists Spock, MXC, Coinex, VB, Bihodl, etc.
Q23:- So What does SPOCK ecosystem include? What all problems SPOCK will solve in Crypto market?
Ans:- Spock is trying to be the Ethereum with PoC consensus, the biggest advantage of PoC consensus is that it saves much electricity than PoW, the “computing power “ is kind of like stored on the hard disk, so the system will be changed to be storage-incentive from computing-incentive., that would change the way of crypto mining, and also Spock introduced the Solidity smart contract in such blockchain system, which make the developers easily migrated their dapps from Ethereum to Spock.
Q24:- How Proof of Capacity Consensus works in SPOCK Chain?
Ans:- The core function about PoC in Spock is just like the PoC consensuse implementation in Burst project, which is the first project uses PoC consensus since year 2014. In high level, the PoC consensus is an algorithm which preprocessing the hash calculation by plotting the whole hard disk with hash values, when generating a new block, the node will scan the hard disk and find the most proper "answer" in the disks and submit to the network, the node submitted the most proper answer will get the mining reward.
Q25:- How Spock and other storage platform i.e. Google drive are different and what benefits you have over them?
Ans:- Basically Spock and Google drive is totally different, as Spock today only stores consensus data. I’d like to talk about the overall differences between decentralized storage and centralized storage services.
Traditional centralized storage platforms generally use cloud storage. Most of the data is stored on a few cloud platforms, which leads to data accumulation and serious centralization problems. There are also problems including higher cost, slower transfer rate, and lower data security. The decentralized storage application platform encrypts and distributes data through a distributed network, meaning that no data other than the data owner can access the data, ensuring security.
And another core feature is the protection of private data, the open decentralized platform can do better, just like the assets of the cryptocurrency, the ownership of the assets represented by the private key, in the decentralized storage platform The private key can represent the disposition and access rights of the data.
Q26:- What do you think is the biggest problem Spock Network will solve which is not solved by other projects yet and why is the problem important to solve?I mean how unique SPOCK Network have?What are the Real world use-cases & utility of SPOK ?
Ans:- 1. I think there are so much projects uses PoC consensus, but all of them are lack of economy, with smart contract feature, Spock will be the first public blockchain support Solidity smart contract and with lower energy cost for running.
2. First of all, the usage of the smart contract will cost SPOK , and the mining policy makes miners need to stake SPOK to mine. and other industry is trying to looking for the adoption of Spock as it's a storage network with smart contract, there is very much possibility we can explore.
Q27:- Will the mining on SPOCK CHAIN Platform Profitablein bear Market? In which form will the output of Mining?
Ans:- The PoC mining is the most anti-bear-marketing mining way I think, you know when BTC comes to 15000$, Bitmain miners S9’s price goes to 4000$, this year, when the BTC prices comes to 3000$, S9’s price is less than 100$. Miners takes all the risk for the price going down, because the manufactory of BTC/BCH miner machines are limited and united. While the miner machines of PoC consensus does not have that problem, because the supplyment of hard disk is very sufficient, and the price is very stable.
Q28:- Why does Spockchain use POC and not POW or POS? Are there advantages of POC compared to POW and POS? There are many projects using POC such as: BHD, BSN, .... Is Spockchain different from these projects?
Ans:- 1. The main issue of PoW is that it’s energy waste and it limits the miners nowadays, people basically cannot mine any PoW coins at home, they have to buy equipments and send them to some place with lower-cost electricity power which makes difficulty to ordinary people. The biggest advantage of PoC is that it save tremendous money on electricity power.
The PoS basically cost nothing to generate new coins, I think it would also be problem for the price, as people get the coins so easy, they may not value it.
2.I have a list about PoC coins (the list is growing..) I do want to share some opinion about all these PoC projects including Spock.
I categorized the projects into two:
PoC consensus only: Burst/BHD/LHD/DISC/Boom/Newbi/Lava
PoC consensus + Smart Contract: Spock/BSN/Galaxy Network/EHD
For the projects in first list, these projects only talks about consensus and coins, but lack of usage and scenarios.
For the second lines, please check out and compare all the projects, none of them have launched the mainnet except SPOCK, while those projects started to mine with ERC-20 tokens.
I think the chanlledge is lack of acknowledge of Proof of Capacity consensus all over the world, the PoC introduce a new way to mine cryptocurrency, currently, Spock has a lot of miners in China, but not much in other places, spreading the consensus takes time. I think code/products shows hoesty and integrity, we have lots of plan to develop the network, while so many projects with similar ideas still runs on ERC-20, with time goes by, people will distinguish that.
Q29:- Currently, what are risks affecting the Spockchain project? In order to develop project in long term and attract investors, which method do you use to manage, minimize the negative impact of risks? I mean that, what are the risks and how do you deal with them?
Ans:- do you mean cheat when mining? First of all, you cannot have fundamental issue on the consensus basis, then if there is some way for smart miners to cheat to gain more rewards, we can update the full node program which can prevent the cheat. I think if that happen, community will support us to update the nodes in the network.
Q30:- How can a cryptocurrency mining algorithm be detected and prevented? What makes them so difficult to detect?
Ans:- According to the stats, 2016-2018, the supply of hard disk is 1.2billion, if we count as average capacity 4T, which is 48,000,000P, while currenlty the largest network with PoC consensus is BHD, which has capacity at about only 1500P.
submitted by Unity111-spock to SPOCK_Chain_Official [link] [comments]

World History Timeline of Events Leading up to Bitcoin - In the Making

A (live/editable) timeline of historical events directly or indirectly related to the creation of Bitcoin and Cryptocurrencies
*still workin' on this so check back later and more will be added, if you have any suggested dates/events feel free to lemme know...
This timeline includes dates pertaining to:
Ancient Bartering – first recorded in Egypt (resources, services...) – doesn’t scale
Tally sticks were used, making notches in bones or wood, as a form of money of account
9000-6000 BC Livestock considered the first form of currency
c3200 BC Clay tablets used in Uruk (Iraq) for accounting (believed to be the earliest form of writing)
3000 BC Grain is used as a currency, measured out in Shekels
3000 BC Banking developed in Mesopotamia
3000 BC? Punches used to stamp symbols on coins were a precursor to the printing press and modern coins
? BC Since ancient Persia and all the way up until the invention and expansion of the telegraph Homing Pigeons were used to carry messages
2000 BC Merchants in Assyria, India and Sumeria lent grain to farmers and traders as a precursor to banks
1700 BC In Babylon at the time of Hammurabi, in the 18th century BC, there are records of loans made by the priests of the temple.
1200 BC Shell money first used in China
1000-600 BC Crude metal coins first appear in China
640 BC Precious metal coins – Gold & Silver first used in ancient Lydia and coastal Greek cities featuring face to face heads of a bull and a lion – first official minted currency made from electrum, a mixture of gold and silver
600-500 BC Atbash Cipher
A substitution Cipher used by ancient Hebrew scholars mapping the alphabet in reverse, for example, in English an A would be a Z, B a Y etc.
400 BC Skytale used by Sparta
474 BC Hundreds of gold coins from this era were discovered in Rome in 2018
350 BC Greek hydraulic semaphore system, an optical communication system developed by Aeneas Tacticus.
c200 BC Polybius Square
??? Wealthy stored coins in temples, where priests also lent them out
??? Rome was the first to create banking institutions apart from temples
118 BC First banknote in the form of 1 foot sq pieces of white deerskin
100-1 AD Caesar Cipher
193 Aureus, a gold coin of ancient Rome, minted by Septimius Severus
324 Solidus, pure gold coin, minted under Constantine’s rule, lasted until the late 8th century
600s Paper currency first developed in Tang Dynasty China during the 7th century, although true paper money did not appear until the 11th century, during the Song Dynasty, 960–1279
c757–796 Silver pennies based on the Roman denarius became the staple coin of Mercia in Great Britain around the time of King Offa
806 First paper banknotes used in China but isn’t widely accepted in China until 960
1024 The first series of standard government notes were issued in 1024 with denominations like 1 guàn (貫, or 700 wén), 1 mín (緡, or 1000 wén), up to 10 guàn. In 1039 only banknotes of 5 guàn and 10 guàn were issued, and in 1068 a denomination of 1 guàn was introduced which became forty percent of all circulating Jiaozi banknotes.
1040 The first movable type printer was invented in China and made of porcelain
? Some of the earliest forms of long distance communication were drums used by Native Africans and smoke signals used by Native Americans and Chinese
1088 Movable type in Song Dynasty China
1120 By the 1120s the central government officially stepped in and produced their own state-issued paper money (using woodblock printing)
1150 The Knights Templar issued bank notes to pilgrims. Pilgrims deposited their valuables with a local Templar preceptory before embarking, received a document indicating the value of their deposit, then used that document upon arrival in the Holy Land to retrieve their funds in an amount of treasure of equal value.
1200s-1300s During the 13th century bankers from north Italy, collectively known as Lombards, gradually replace the Jews in their traditional role as money-lenders to the rich and powerful. – Florence, Venice and Genoa - The Bardi and Peruzzi Families dominated banking in 14th century Florence, establishing branches in many other parts of Europe
1200 By the time Marco Polo visited China they’d move from coins to paper money, who introduced the concept to Europe. An inscription warned, "All counterfeiters will be decapitated." Before the use of paper, the Chinese used coins that were circular, with a rectangular hole in the middle. Several coins could be strung together on a rope. Merchants in China, if they became rich enough, found that their strings of coins were too heavy to carry around easily. To solve this problem, coins were often left with a trustworthy person, and the merchant was given a slip of paper recording how much money they had with that person. Marco Polo's account of paper money during the Yuan Dynasty is the subject of a chapter of his book, The Travels of Marco Polo, titled "How the Great Kaan Causeth the Bark of Trees, Made Into Something Like Paper, to Pass for Money All Over his Country."
1252 Florin minted in Florence, becomes the hard currency of its day helping Florence thrive economically
1340 Double-entry bookkeeping - The clerk keeping the accounts for the Genoese firm of Massari painstakingly fills in the ledger for the year 1340.
1397 Medici Bank established
1450 Johannes Gutenberg builds the printing press – printed words no longer just for the rich
1455 Paper money disappears from China
1466 Polyalphabetic Cipher
1466 Rotating cipher disks – Vatican – greatest crypto invention in 1000 yrs – the first system to challenge frequency analysis
1466 First known mechanical cipher machine
1472 The oldest bank still in existence founded, Banca Monte dei Paschi di Siena, headquartered in Siena, Italy
1494 Double-entry bookkeeping system codified by Luca Pacioli
1535 Wampum, a form of currency used by Native Americans, a string of beads made from clamshells, is first document.
1553 Vigenere Cipher
1557 Phillip II of Spain managed to burden his kingdom with so much debt (as the result of several pointless wars) that he caused the world's first national bankruptcy — as well as the world's second, third and fourth, in rapid succession.
1577 Newspaper in Korea
1586 The Babington Plot
1590 Cabinet Noir was established in France. Its mission was to open, read and reseal letters, and great expertise was developed in the restoration of broken seals. In the knowledge that mail was being opened, correspondents began to develop systems to encrypt and decrypt their letters. The breaking of these codes gave birth to modern systematic scientific code breaking.
1600s Promissory banknotes began in London
1600s By the early 17th century banking begins also to exist in its modern sense - as a commercial service for customers rather than kings. – Late 17th century we see cheques slowly gains acceptance
The total of the money left on deposit by a bank's customers is a large sum, only a fraction of which is usually required for withdrawals. A proportion of the rest can be lent out at interest, bringing profit to the bank. When the customers later come to realize this hidden value of their unused funds, the bank's profit becomes the difference between the rates of interest paid to depositors and demanded from debtors.
The transformation from moneylenders into private banks is a gradual one during the 17th and 18th centuries. In England it is achieved by various families of goldsmiths who early in the period accept money on deposit purely for safe-keeping. Then they begin to lend some of it out. Finally, by the 18th century, they make banking their business in place of their original craft as goldsmiths.
1605 Newspaper in Straussburg
c1627 Great Cipher
1637 Wampum is declared as legal tender in the U.S. (where we got the slang word “clams” for money)
1656 Johan Palmstruch establishes the Stockholm Banco
1661 Paper Currency reappears in Europe, soon became common - The goldsmith-bankers of London began to give out the receipts as payable to the bearer of the document rather than the original depositor
1661 Palmstruch issues credit notes which can be exchanged, on presentation to his bank, for a stated number of silver coins
1666 Stockholms Banco, the predecessor to the Central Bank of Sweden issues the first paper money in Europe. Soon went bankrupt for printing too much money.
1667 He issues more notes than his bank can afford to redeem with silver and winds up in disgrace, facing a death penalty (commuted to imprisonment) for fraud.
1668 Bank of Sweden – today the 2nd oldest surviving bank
1694 First Central Bank established in the UK was the first bank to initiate the permanent issue of banknotes
Served as model for most modern central banks.
The modern banknote rests on the assumption that money is determined by a social and legal consensus. A gold coin's value is simply a reflection of the supply and demand mechanism of a society exchanging goods in a free market, as opposed to stemming from any intrinsic property of the metal. By the late 17th century, this new conceptual outlook helped to stimulate the issue of banknotes.
1700s Throughout the commercially energetic 18th century there are frequent further experiments with bank notes - deriving from a recognized need to expand the currency supply beyond the availability of precious metals.
1710 Physiocracy
1712 First commercial steam engine
1717 Master of the Royal Mint Sir Isaac Newton established a new mint ratio between silver and gold that had the effect of driving silver out of circulation (bimetalism) and putting Britain on a gold standard.
1735 Classical Economics – markets regulate themselves when free of intervention
1744 Mayer Amschel Rothschild, Founder of the Rothschild Banking Empire, is Born in Frankfurt, Germany
Mayer Amschel Rothschild extended his banking empire across Europe by carefully placing his five sons in key positions. They set up banks in Frankfurt, Vienna, London, Naples, and Paris. By the mid 1800’s they dominated the banking industry, lending to governments around the world and people such as the Vanderbilts, Carnegies, and Cecil Rhodes.
1745 There was a gradual move toward the issuance of fixed denomination notes in England standardized printed notes ranging from £20 to £1,000 were being printed.
1748 First recorded use of the word buck for a dollar, stemming from the Colonial period in America when buck skins were commonly traded
1757 Colonial Scrip Issued in US
1760s Mayer Amschel Rothschild establishes his banking business
1769 First steam powered car
1775-1938 US Diplomatic Codes & Ciphers by Ralph E Weber used – problems were security and distribution
1776 American Independence
1776 Adam Smith’s Invisible Hand theory helped bankers and money-lenders limit government interference in the banking sector
1781 The Bank of North America was a private bank first adopted created the US Nation's first de facto central bank. When shares in the bank were sold to the public, the Bank of North America became the country's first initial public offering. It lasted less than ten years.
1783 First steamboat
1791 Congress Creates the First US Bank – A Private Company, Partly Owned by Foreigners – to Handle the Financial Needs of the New Central Government. First Bank of the United States, a National bank, chartered for a term of twenty years, it was not renewed in 1811.
Previously, the 13 states had their own banks, currencies and financial institutions, which had an average lifespan of about 5 years.
1792 First optical telegraph invented where towers with telescopes were dispersed across France 12-25 km apart, relaying signals according to positions of arms extended from the top of the towers.
1795 Thomas Jefferson invents the Jefferson Disk Cipher or Wheel Cipher
1797 to 1821 Restriction Period by England of trading banknotes for silver during Napoleonic Wars
1797 Currency Crisis
Although the Bank was originally a private institution, by the end of the 18th century it was increasingly being regarded as a public authority with civic responsibility toward the upkeep of a healthy financial system.
1799 First paper machine
1800 Banque de France – France’s central bank opens to try to improve financing of the war
1800 Invention of the battery
1801 Rotchschild Dynasty begins in Frankfurt, Holy Roman Empire – established international banking family through his 5 sons who established themselves in London, Paris, Frankfurt, Vienna, and Naples
1804 Steam locomotive
1807 Internal combustion engine and automobile
1807 Robert Fulton expands water transportation and trade with the workable steamboat.
1809 Telegraphy
1811 First powered printing press, also first to use a cylinder
1816 The Privately Owned Second Bank of the US was Chartered – It Served as the Main Depository for Government Revenue, Making it a Highly Profitable Bank – charter not renewed in 1836
1816 The first working telegraph was built using static electricity
1816 Gold becomes the official standard of value in England
1820 Industrial Revolution
c1820 Neoclassical Economics
1821 British gov introduces the gold standard - With governments issuing the bank notes, the inherent danger is no longer bankruptcy but inflation.
1822 Charles Babbage, considered the "father of the computer", begins building the first programmable mechanical computer.
1832 Andrew Jackson Campaigns Against the 2nd Bank of the US and Vetoes Bank Charter Renewal
Andrew Jackson was skeptical of the central banking system and believed it gave too few men too much power and caused inflation. He was also a proponent of gold and silver and an outspoken opponent of the 2nd National Bank. The Charter expired in 1836.
1833 President Jackson Issues Executive Order to Stop Depositing Government Funds Into Bank of US
By September 1833, government funds were being deposited into state chartered banks.
1833-1837 Manufactured “boom” created by central bankers – money supply Increases 84%, Spurred by the 2nd Bank of the US
The total money supply rose from $150 million to $267 million
1835 Jackson Escapes Assassination. Assassin misfired twice.
1837-1862 The “Free Banking Era” there was no formal central bank in the US, and banks issued their own notes again
1838 First Telegram sent using Morse Code across 3 km, in 1844 he sent a message across 71 km from Washington DC to Baltimore.
1843 Ada Lovelace published the first algorithm for computing
1844 Modern central bank of England established - meaning only the central bank of England could issue banknotes – prior to that commercial banks could issue their own and were the primary form of currency throughout England
the Bank of England was restricted to issue new banknotes only if they were 100% backed by gold or up to £14 million in government debt.
1848 Communist Manifesto
1850 The first undersea telegraphic communications cable connected France in England after latex produced from the sap of the Palaquium gutta tree in 1845 was proposed as insulation for the underwater cables.
1852 Many countries in Europe build telegram networks, however post remained the primary means of communication to distant countries.
1855 In England fully printed notes that did not require the name of the payee and the cashier's signature first appeared
1855 The printing telegraph made it possible for a machine with 26 alphabetic keys to print the messages automatically and was soon adopted worldwide.
1856 Belgian engineer Charles Bourseul proposed telephony
1856 The Atlantic Telegraph company was formed in London to stretch a commercial telegraph cable across the Atlantic Ocean, completed in 1866.
1860 The Pony Express was founded, able to deliver mail of wealthy individuals or government officials from coast to coast in 10 days.
1861 The East coast was connected to the West when Western Union completed the transcontinental telegraph line, putting an end to unprofitable The Pony Express.
1862-1863 First US banknotes - Lincoln Over Rules Debt-Based Money and Issues Greenbacks to Fund Civil War
Bankers would only lend the government money under certain conditions and at high interest rates, so Lincoln issued his own currency – “greenbacks” – through the US Treasury, and made them legal tender. His soldiers went on to win the war, followed by great economic expansion.
1863 to 1932 “National Banking Era” Commercial banks in the United States had legally issued banknotes before there was a national currency; however, these became subject to government authorization from 1863 to 1932
1864 Friedrich Wilhelm Raiffeisen founded the first rural credit union in Heddesdorf (now part of Neuwied) in Germany. By the time of Raiffeisen's death in 1888, credit unions had spread to Italy, France, the Netherlands, England, Austria, and other nations
1870 Long-distance telegraph lines connected Britain and India.
c1871 Marginalism - The doctrines of marginalism and the Marginal Revolution are often interpreted as a response to the rise of the worker's movement, Marxian economics and the earlier (Ricardian) socialist theories of the exploitation of labour.
1871 Carl Menger’s Principles of Economics – Austrian School
1872 Marx’s Das Capital
1872 Australia becomes the first nation to be connected to the rest of the world via submarine telegraph cables.
1876 Alexander Graham Bell patented the telephone, first called the electric speech machine – revolutionized communication
1877 Thomas Edison – Phonograph
1878 Western Union, the leading telegraph provider of the U.S., begins to lose out to the telephone technology of the National Bell Telephone Company.
1881 President James Garfield, Staunch Proponent of “Honest Money” Backed by Gold and Silver, was Assassinated
Garfield opposed fiat currency (money that was not backed by any physical object). He had the second shortest Presidency in history.
1882 First description of the one-time pad
1886 First gas powered car
1888 Ballpoint pen
1892 Cinematograph
1895 System of wireless communication using radio waves
1896 First successful intercontinental telegram
1898 Polyethylene
1899 Nickel-cadmium battery
1907 Banking Panic of 1907
The New York Stock Exchange dropped dramatically as everyone tried to get their money out of the banks at the same time across the nation. This banking panic spurred debate for banking reform. JP Morgan and others gathered to create an image of concern and stability in the face of the panic, which eventually led to the formation of the Federal Reserve. The founders of the Federal Reserve pretended like the bankers were opposed to the idea of its formation in order to mislead the public into believing that the Federal Reserve would help to regulate bankers when in fact it really gave even more power to private bankers, but in a less transparent way.
1908 St Mary’s Bank – first credit union in US
1908 JP Morgan Associate and Rockefeller Relative Nelson Aldrich Heads New National Monetary Commission
Senate Republican leader, Nelson Aldrich, heads the new National Monetary Commission that was created to study the cause of the banking panic. Aldrich had close ties with J.P. Morgan and his daughter married John D. Rockefeller.
1910 Bankers Meet Secretly on Jekyll Island to Draft Federal Reserve Banking Legislation
Over the course of a week, some of the nation’s most powerful bankers met secretly off the coast of Georgia, drafting a proposal for a private Central Banking system.
1913 Federal Reserve Act Passed
Two days before Christmas, while many members of Congress were away on vacation, the Federal Reserve Act was passed, creating the Central banking system we have today, originally with gold backed Federal Reserve Notes. It was based on the Aldrich plan drafted on Jekyll Island and gave private bankers supreme authority over the economy. They are now able to create money out of nothing (and loan it out at interest), make decisions without government approval, and control the amount of money in circulation.
1913 Income tax established -16th Amendment Ratified
Taxes ensured that citizens would cover the payment of debt due to the Central Bank, the Federal Reserve, which was also created in 1913.The 16th Amendment stated: “The Congress shall have power to lay and collect taxes on incomes, from whatever source derived, without apportionment among the several States, and without regard to any census or enumeration.”
1914 November, Federal Reserve Banks Open
JP Morgan and Co. Profits from Financing both sides of War and Purchasing Weapons
J.P. Morgan and Co. made a deal with the Bank of England to give them a monopoly on underwriting war bonds for the UK and France. They also invested in the suppliers of war equipment to Britain and France.
1914 WWI
1917 Teletype cipher
1917 The one-time pad
1917 Zimmerman Telegram intercepted and decoded by Room 40, the cryptanalysis department of the British Military during WWI.
1918 GB returns to gold standard post-war but it didn’t work out
1919 First rotor machine, an electro-mechanical stream ciphering and decrypting machine.
1919 Founding of The Cipher Bureau, Poland’s intelligence and cryptography agency.
1919-1929 The Black Chamber, a forerunner of the NSA, was the first U.S. cryptanalytic organization. Worked with the telegraph company Western Union to illegally acquire foreign communications of foreign embassies and representatives. It was shut down in 1929 as funding was removed after it was deemed unethical to intercept private domestic radio signals.
1920s Department stores, hotel chains and service staions begin offering customers charge cards
1921-1929 The “Roaring 20’s” – The Federal Reserve Floods the Economy with Cash and Credit
From 1921 to 1929 the Federal Reserve increased the money supply by $28 billion, almost a 62% increase over an eight-year period.[3] This artificially created another “boom”.
1927 Quartz clock
1928 First experimental Television broadcast in the US.
1929 Federal Reserve Contracts the Money Supply
In 1929, the Federal Reserve began to pull money out of circulation as loans were paid back. They created a “bust” which was inevitable after issuing so much credit in the years before. The Federal Reserve’s actions triggered the banking crisis, which led to the Great Depression.
1929 October 24, “Black Thursday”, Stock Market Crash
The most devastating stock market crash in history. Billions of dollars in value were consolidated into the private banker’s hands at the expense of everyone else.
1930s The Great Depression marked the end of the gold standard
1931 German Enigma machines attained and reconstructed.
1932 Turbo jet engine patented
1933 SEC founded - passed the Glass–Steagall Act, which separated investment banking and commercial banking. This was to avoid more risky investment banking activities from ever again causing commercial bank failures.
1933 FM Radio
1933 Germany begins Telex, a network of teleprinters sending and receiving text based messages. Post WWII Telex networks began to spread around the world.
1936 Austrian engineer Paul Eisler invented Printed circuit board
1936 Beginning of the Keynesian Revolution
1937 Typex, British encryption machines which were upgraded versions of Enigma machines.
1906 Teletypewriters
1927 Founding of highly secret and unofficial Signal Intelligence Service, SIS, the U.S. Army’s codebreaking division.
1937 Made illegal for Americans to own gold
1938 Z1 built by Konrad Zuse is the first freely programmable computer in the world.
1939 WWII – decline of the gold standard which greatly restricted policy making
1939-45 Codetalkers - The Navajo code is the only spoken military code never to have been deciphered - "Were it not for the Navajos, the Marines would never have taken Iwo Jima."—Howard Connor
1940 Modems
1942 Deciphering Japanese coded messages leads to a turning point victory for the U.S. in WWII.
1943 At Bletchley Park, Alan Turing and team build a specialized cipher-breaking machine called Heath Robinson.
1943 Colossus computer built in London to crack the German Lorenz cipher.
1944 Bretton Woods – convenient after the US had most of the gold
1945 Manhattan Project – Atom Bomb
1945 Transatlantic telephone cable
1945 Claude E. Shannon published "A mathematical theory of cryptography", commonly accepted as the starting point for development of modern cryptography.
C1946 Crypto Wars begin and last to this day
1946 Charg-it card created by John C Biggins
1948 Atomic clock
1948 Claude Shannon writes a paper that establishes the mathematical basis of information theory
1949 Info theorist Claude Shannon asks “What does an ideal cipher look like?” – one time pad – what if the keys are not truly random
1950 First credit card released by the Diners Club, able to be used in 20 restaurants in NYC
1951 NSA, National Security Agency founded and creates the KL-7, an off-line rotor encryption machine
1952 First thermonuclear weapon
1953 First videotape recorder
1953 Term “Hash” first used meaning to “chop” or “make a mess” out of something
1954 Atomic Energy Act (no mention of crypto)
1957 The NSA begins producing ROMOLUS encryption machines, soon to be used by NATO
1957 First PC – IBM
1957 First Satellite – Sputnik 1
1958 Western Union begins building a nationwide Telex network in the U.S.
1960s Machine readable codes were added to the bottom of cheques in MICR format, which speeded up the clearing and sorting process
1960s Financial organizations were beginning to require strong commercial encryption on the rapidly growing field of wired money transfer.
1961 Electronic clock
1963 June 4, Kennedy Issued an Executive Order (11110) that Authorized the US Treasury to Issue Silver Certificates, Threatening the Federal Reserve’s Monopoly on Money
This government issued currency would bypass the governments need to borrow from bankers at interest.
1963 Electronic calculator
1963 Nov. 22, Kennedy Assassinated
1963 Johnson Reverses Kennedy’s Banking Rule and Restores Power to the Federal Reserve
1964 8-Track
1964 LAN, Local Area Networks adapters
1965 Moore’s Law by CEO of Intel Gordon Moore observes that the number of components per integrated circuit doubles every year, and projected this rate of growth would continue for at least another decade. In 1975 he revised it to every two years.
1967 First ATM installed at Barclay’s Bank in London
1968 Cassette Player introduced
1969 First connections of ARPANET, predecessor of the internet, are made. started – SF, SB, UCLA, Utah (now Darpa) – made to stay ahead of the Soviets – there were other networks being built around the world but it was very hard to connect them – CERN in Europe
1970s Stagflation – unemployment + inflation, which Keynesian theory could not explain
1970s Business/commercial applications for Crypto emerge – prior to this time it was militarily used – ATMs 1st got people thinking about commercial applications of cryptography – data being sent over telephone lines
1970s The public developments of the 1970s broke the near monopoly on high quality cryptography held by government organizations.
Use of checks increased in 70s – bringing about ACH
One way functions...
A few companies began selling access to private networks – but weren’t allowed to connect to the internet – business and universities using Arpanet had no commercial traffic – internet was used for research, not for commerce or advertising
1970 Railroads threatened by the growing popularity of air travel. Penn Central Railroad declares bankruptcy resulting in a $3.2 billion bailout
1970 Conjugate coding used in an attempt to design “money physically impossible to counterfeit”
1971 The US officially removes the gold standard
1971 Email invented
1971 Email
1971 First microcomputer on a chip
1971 Lockheed Bailout - $1.4 billion – Lockheed was a major government defense contractor
1972 First programmable word processor
1972 First video game console
1973 SWIFT established
1973 Ethernet invented, standardized in ‘83
1973 Mobile phone
1973 First commercial GUI – Xerox Alto
1973 First touchscreen
1973 Emails made up more than ¾ of ARPANET’s packets – people had to keep a map of the network by their desk – so DNS was created
1974 A protocol for packet network intercommunication – TCP/IP – Cerf and Kahn
1974 Franklin National Bank Bailout - $1.5 billion (valued at that time) - At the time, it was the largest bank failure in US history
1975 New York City Bailout - $9.4 billion – NYC was overextended
1975 W DES - meant that commercial uses of high quality encryption would become common, and serious problems of export control began to arise.
1975 DES, Data Encryption Standard developed at IBM, seeking to develop secure electronic communications for banks and large financial organizations. DES was the first publicly accessible cipher to be 'blessed' by a national agency such as the NSA. Its release stimulated an explosion of public and academic interest in cryptography.
1975 Digital camera
1975 Altair 8800 sparks the microprocessor revolution
1976 Bretton Woods ratified (lasted 30 years) – by 80’s all nations were using floating currencies
1976 New Directions in Cryptography published by Diffie & Hellman – this terrified Fort Meade – previously this technique was classified, now it’s public
1976 Apple I Computer – Steve Wozniak
1976 Asymmetric key cryptosystem published by Whitfield Diffie and Martin Hellman.
1976 Hellman and Diffie publish New Directions in Cryptography, introducing a radically new method of distributing cryptographic keys, contributing much to solving key distribution one of the fundamental problems of cryptography. It brought about the almost immediate public development of asymmetric key algorithms. - where people can have 2 sets of keys, public and private
1977 Diffie & Hellman receive letter from NSA employee JA Meyer that they’re violating Federal Laws comparable to arms export – this raises the question, “Can the gov prevent academics from publishing on crypto?
1977 DES considered insecure
1977 First handheld electronic game
1977 RSA public key encryption invented
1978 McEliece Cryptosystem invented, first asymmetric encryption algorithm to use randomization in the encryption process
1980s Large data centers began being built to store files and give users a better faster experience – companies rented space from them - Data centers would not only store data but scour it to show people what they might want to see and in some cases, sell data
1980s Reaganomics and Thatcherism
1980 A decade of intense bank failures begins; the FDIC reports that 1,600 were either closed or received financial assistance from 1980 to 1994
1980 Chrysler Bailout – lost over $1 billion due to major hubris on the part of its executives - $1.5 billion one of the largest payouts ever made to a single corporation.
1980 Protocols for public key cryptosystems – Ralph Merkle
1980 Flash memory invented – public in ‘84
1981 “Untraceable Electronic Mail, Return Addresses and Digital Pseudonumns” – Chaum
1981 EFTPOS, Electronic funds transfer at point of sale is created
1981 IBM Personal Computer
1982 “The Ethics of Liberty” Murray Rothbard
1982 Commodore 64
1982 CD
1983 Satellite TV
1983 First built in hard drive
1983 C++
1983 Stereolithography
1983 Blind signatures for untraceable payments
Mid 1980s Use of ATMs becomes more widespread
1984 Continental Illinois National Bank and Trust bailed out due to overly aggressive lending styles and - the bank’s downfall could be directly traced to risk taking and a lack of due diligence on the part of bank officers - $9.5 billion in 2008 money
1984 Macintosh Computer - the first mass-market personal computer that featured a graphical user interface, built-in screen and mouse
1984 CD Rom
1985 Zero-Knowledge Proofs first proposed
1985 300,000 simultaneous telephone conversations over single optical fiber
1985 Elliptic Curve Cryptography
1987 ARPANET had connected over 20k guarded computers by this time
1988 First private networks email servers connected to NSFNET
1988 The Crypto Anarchists Manifesto – Timothy C May
1988 ISDN, Integrated Services Digital Network
1989 Savings & Loan Bailout - After the widespread failure of savings and loan institutions, President George H. W. Bush signed and Congress enacted the Financial Institutions Reform Recovery and Enforcement Act - This was a taxpayer bailout of about $200 billion
1989 First commercial emails sent
1989 Digicash - Chaum
1989 Tim Berners-Lee and Robert Cailliau built the prototype system which became the World Wide Web, WWW
1989 First ISPs – companies with no network of their own which connected people to a local network and to the internet - To connect to a network your computer placed a phone call through a modem which translated analog signals to digital signals – dial-up was used to connect computers as phone lines already had an extensive network across the U.S. – but phone lines weren’t designed for high pitched sounds that could change fast to transmit large amounts of data
1990s Cryptowars really heat up...
1990s Some countries started to change their laws to allow "truncation"
1990s Encryption export controls became a matter of public concern with the introduction of the personal computer. Phil Zimmermann's PGP cryptosystem and its distribution on the Internet in 1991 was the first major 'individual level' challenge to controls on export of cryptography. The growth of electronic commerce in the 1990s created additional pressure for reduced restrictions.[3] Shortly afterward, Netscape's SSL technology was widely adopted as a method for protecting credit card transactions using public key cryptography.
1990 NSFNET replaced Arpanet as backbone of the internet with more than 500k users
Early 90s Dial up provided through AOL and Compuserve
People were leery to use credit cards on the internet
1991 How to time-stamp a digital doc - Stornetta
1991 Phil Zimmermann releases the public key encryption program Pretty Good Privacy (PGP) along with its source code, which quickly appears on the Internet. He distributed a freeware version of PGP when he felt threatened by legislation then under consideration by the US Government that would require backdoors to be included in all cryptographic products developed within the US. Expanded the market to include anyone wanting to use cryptography on a personal computer (before only military, governments, large corporations)
1991 WWW (Tim Berners Lee) – made public in ‘93 – flatten the “tree” structure of the internet using hypertext – reason for HTTP//:WWW – LATER HTTPS for more security
1992 Erwise – first Internet Browser w a graphical Interface
1992 Congress passed a law allowing for commercial traffic on NSFNET
1992 Cpherpunks, Eric Hughes, Tim C May and John Gilmore – online privacy and safety from gov – cypherpunks write code so it can be spread and not shut down (in my earlier chapter)
1993 Mosaic – popularized surfing the web ‘til Netscape Navigator in ’94 – whose code was later used in Firefox
1993 A Cypherpunks Manifesto – Eric Hughes
1994 World’s first online cyberbank, First Virtual, opened for business
1994 Bluetooth
1994 First DVD player
1994 Stanford Federal Credit Union becomes the first financial institution to offer online internet banking services to all of its members in October 1994
1994 Internet only used by a few
1994 Cybercash
1994 Secure Sockets Layer (SSL) encryption protocol released by Netscape. Making financial transactions possible.
1994 One of the first online purchases was made, a Pizza Hut pepperoni pizza with mushrooms and extra cheese
1994 Cyphernomicon published – social implication where gov can’t do anything about it
1994-1999 Social Networking – GeoCities (combining creators and users) – had 19M users by ’99 – 3rd most popular after AOL and Yahoo – GeoCities purchased by Yahoo for $3.6B but took a hit after dotcom bubble popped and never recovered – GC shut down in ‘99
1995-2000 Dotcom bubble – Google, Amazon, Facebook: get over 600M visitors/year
1995 DVD
1995 MP3 term coined for MP3 files, the earlier development of which stretches back into the ‘70s, where MP files themselves where developed throughout the ‘90s
1995 NSFNET shut down and handed everything over to the ISPs
1995 NSA publishes the SHA1 hash algorithm as part of its Digital Signature Standard.
1996, 2000 President Bill Clinton signing the Executive order 13026 transferring the commercial encryption from the Munition List to the Commerce Control List. This order permitted the United States Department of Commerce to implement rules that greatly simplified the export of proprietary and open source software containing cryptography, which they did in 2000 - The successful cracking of DES likely helped gather both political and technical support for more advanced encryption in the hands of ordinary citizens - NSA considers AES strong enough to protect information classified at the Top Secret level
1996 e-gold
1997 WAP, Wireless Access Point
1997 NSA researchers published how to mint e cash
1997 Adam Back – HashCash – used PoW – coins could only be used once
1997 Nick Szabo – smart contracts “Formalizing and Securing Relationships on Public Networks”
1998 OSS, Open-source software Initiative Founded
1998 Wei Dai – B-money – decentralized database to record txs
1998 Bitgold
1998 First backdoor created by hackers from Cult of the Dead Cow
1998 Musk and Thiel founded PayPal
1998 Nick Szabo says crypto can protect land titles even if thugs take it by force – said it could be done with a timestamped database
1999 Much of the Glass-Steagal Act repealed - this saw US retail banks embark on big rounds of mergers and acquisitions and also engage in investment banking activities.
1999 Milton Friedman says, “I think that the Internet is going to be one of the major forces for reducing the role of government. The one thing that's missing, but that will soon be developed, is a reliable e-cash - a method whereby on the Internet you can transfer funds from A to B without A knowing B or B knowing A.”
1999 European banks began offering mobile banking with the first smartphones
1999 The Financial Services Modernization Act Allows Banks to Grow Even Larger
Many economists and politicians have recognized that this legislation played a key part in the subprime mortgage crisis of 2007.
1999-2001 Napster, P2P file sharing – was one of the fastest growing businesses in history – bankrupt for paying musicians for copyright infringement

submitted by crypto_jedi_ninja to Bitcoin [link] [comments]

Hash-hole Test 1 Mining Bitcoin In My Garage Blockchain/Bitcoin for beginners 2: Hashing, blockchain networks, blockchain browser Best Free Bitcoin mining  earn up to 0.025 BTC every day ... Mine FREE 0.001 Bitcoin daily! HASHFISH BTC Crypto Miner Legit Free Bitcoin Mining CPU+gpu  Free Bitcoin Miner ...

Online Hash Calculator. Online Hash Calculator lets you calculate the cryptographic hash value of a string or file. Multiple hashing algorithms are supported including MD5, SHA1, SHA2, CRC32 and many other algorithms. Here is an interactive Hash Calculator. You can enter any (standard) text in the text area and the exact same hashes will be generated if you enter the hashes at a later date. NOTES: Must be standard Characters only (not extended international characters). Exact copies including spaces and carriage returns are required to get identical results. Find out what your expected return is depending on your hash rate and electricity cost. Find out if it's profitable to mine Bitcoin, Ethereum, Litecoin, DASH or Monero. Do you think you've got what it takes to join the tough world of cryptocurrency mining? This is html5 file hash online calculator, which supports an unlimited number of files and unlimited file size. Your files are not transferred to the server. Accurate Bitcoin mining calculator trusted by millions of cryptocurrency miners since May 2013 - developed by an OG Bitcoin miner looking to maximize on mining profits and calculate ROI for new ASIC miners. Updated in 2020, the newest version of the Bitcoin mining calculator makes it simple and easy to quickly calculate mining profitability for your Bitcoin mining hardware.

[index] [511] [21188] [14853] [25734] [51277] [28104] [48249] [35284] [43274] [2603]

Hash-hole Test 1 Mining Bitcoin In My Garage

HashFlare Cloud Mining : Free Profitability Calculator Crypto Gnome. Loading... Unsubscribe from Crypto Gnome? ... What I use to buy Bitcoin: Coinbase (Get $10 on first trade): https://www ... This video is unavailable. Watch Queue Queue. Watch Queue What is hashing? In this video we explain how hash functions work in an easy to digest way. Hashing is the process of converting an input of any length into ... HashFish. Make money online and I will teach you how to earn free bitcoins from mining. Mine 0.001 btc daily, fast mining and instant withdrawals! Make money... In this video, you'll learn how to test for data integrity of a downloaded file by comparing its hash value against that quoted on the originating website. Y...

#