HD & 4K Blockchain Videos: Royalty-Free Blockchain Stock ...
/r/Scams Common Scam Master Post
Hello visitors and subscribers of scams! Here you will find a master list of common (and uncommon) scams that you may encounter online or in real life. Thank you to the many contributors who helped create this thread!
If you know of a scam that is not covered here, write a comment and it will be added to the next edition.
Caller ID spoofing It is very easy for anyone to make a phone call while having any number show up on the caller ID of the person receiving the phone call. Receiving a phone call from a certain number does not mean that the person/company who owns that number has actually called you. Email spoofing The "from" field of an email can be set by the sender, meaning that you can receive scam emails that look like they are from legitimate addresses. It's important to never click links in emails unless absolutely necessary, for example a password reset link you requested or an account activation link for an account you created. SMS spoofing SMS messages can be spoofed, so be wary of messages that seem to be from your friends or other trusted people.
The most common scams
The fake check scam (Credit to nimble2 for this part) The fake check scam arises from many different situations (for instance, you applied for a job, or you are selling something on a place like Craigslist, or someone wants to purchase goods or services from your business, or you were offered a job as a mystery shopper, you were asked to wrap your car with an advertisement, or you received a check in the mail for no reason), but the bottom line is always something like this:
The scammer sends you a very real looking, but fake, check. Sometimes they'll call it a "cashier's check", a "certified check", or a "verified check".
You deposit the check into your bank account, and within a couple of days your bank makes some or all of the funds available to you. This makes you think that the check is real and the funds have cleared. However, the money appearing in your account is not the same as the check actually clearing. The bank must make the funds available to you before they have cleared the check because that is the law.
For various and often complicated reasons, depending on the specific story line of the scam, the scammer will ask you to send someone some of the money, using services like MoneyGram, Western Union, and Walmart-2-Walmart. Sometimes the scammer will ask for you to purchase gift cards (iTunes, Amazon, Steam, etc) and give them the codes to redeem the gift cards. Some scammers may also give you instructions on how to buy and send them bitcoins.
Within a couple of weeks, though it can take as long as a month, your bank will realize that the check you deposited was fake, and your bank will remove the funds that you deposited into your account and charge you a bounced check fee. If you withdrew any of the money from the fake check, that money will be gone and you will owe that money to the bank. Some posters have even had their bank accounts closed and have been blocked from having another account for 5 years using ChexSystems.
General fraudulent funds scams If somebody is asking you to accept and send out money as a favour or as part of a job, it is a fraudulent funds scam. It does not matter how they pay you, any payment on any service can be fraudulent and will be reversed when it is discovered to be fraudulent. Phone verification code scams Someone will ask you to receive a verification text and then tell you to give them the code. Usually the code will come from Google Voice, or from Craigslist. In the Google version of the scam, your phone number will be used to verify a Google Voice account that the scammer will use to scam people with. In the Craigslist version of the scam, your phone number will be used to verify a Craigslist posting that the scammer will use to scam people. There is also an account takeover version of this scam that will involve the scammer sending a password reset token to your phone number and asking you for it. Bitcoin job scams Bitcoin job scams involve some sort of fraudulent funds transfer, usually a fake check although a fraudulent bank transfer can be used as well. The scammer will send you the fraudulent money and ask you to purchase bitcoins. This is a scam, and you will have zero recourse after you send the scammer bitcoins. Email flooding If you suddenly receive hundreds or thousands of spam emails, usually subscription confirmations, it's very likely that one of your online accounts has been taken over and is being used fraudulently. You should check any of your accounts that has a credit card linked to it, preferably from a computer other than the one you normally use. You should change all of your passwords to unique passwords and you should start using two factor authentication everywhere. Cartel scam You will be threatened by scammers who claim to be affiliated with a cartel. They may send you gory pictures and threaten your life and the lives of your family. Usually the victim will have attempted to contact an escort prior to the scam, but sometimes the scammers target people randomly. If you are targeted by a cartel scam all you need to do is ignore the scammers as their threats are clearly empty. Boss/CEO scam A scammer will impersonate your boss or someone who works at your company and will ask you to run an errand for them, which will usually be purchasing gift cards and sending them the code. Once the scammer has the code, you have no recourse. Employment certification scams You will receive a job offer that is dependent on you completing a course or receiving a certification from a company the scammer tells you about. The scammer operates both websites and the job does not exist. Craigslist fake payment scams Scammers will ask you about your item that you have listed for sale on a site like Craigslist, and will ask to pay you via Paypal. They are scamming you, and the payment in most cases does not actually exist, the email you received was sent by the scammers. In cases where you have received a payment, the scammer can dispute the payment or the payment may be entirely fraudulent. The scammer will then either try to get you to send money to them using the fake funds that they did not send to you, or will ask you to ship the item, usually to a re-shipping facility or a parcel mule. Craigslist Carfax/vehicle history scam You'll encounter a scammer on Craigslist who wants to buy the vehicle you have listed, but they will ask for a VIN report from a random site that they have created and they will expect you to pay for it. Double dip/recovery scammers This is a scam aimed at people who have already fallen for a scam previously. Scammers will reach out to the victim and claim to be able to help the victim recover funds they lost in the scam. General fraudulent funds scams The fake check scam is not the only scam that involves accepting fraudulent/fake funds and purchasing items for scammers. If your job or opportunity involves accepting money and then using that money, it is almost certainly a frauduent funds scam. Even if the payment is through a bank transfer, Paypal, Venmo, Zelle, Interac e-Transfer, etc, it does not matter. Credit card debt scam Fraudsters will offer to pay off your bills, and will do so with fraudulent funds. Sometimes it will be your credit card bill, but it can be any bill that can be paid online. Once they pay it off, they will ask you to send them money or purchase items for them. The fraudulent transaction will be reversed in the future and you will never be able to keep the money. This scam happens on sites like Craigslist, Twitter, Instagram, and also some dating sites, including SeekingArrangement. The parcel mule scam A scammer will contact you with a job opportunity that involves accepting and reshipping packages. The packages are either stolen or fraudulently obtained items, and you will not be paid by the scammer. Here is a news article about a scam victim who fell for this scam and reshipped over 20 packages containing fraudulently acquired goods. The Skype sex scam You're on Facebook and you get a friend request from a cute girl you've never met. She wants to start sexting and trading nudes. She'll ask you to send pictures or videos or get on webcam where she can see you naked with your face in the picture. The scam: There's no girl. You've sent nudes to a guy pretending to be a girl. As soon as he has the pictures he'll demand money and threaten to send the pictures to your friends and family. Sometimes the scammer will upload the video to a porn site or Youtube to show that they are serious. What to do if you are a victim of this scam: You cannot buy silence, you can only rent it. Paying the blackmailer will show them that the information they have is valuable and they will come after you for more money. Let your friends and family know that you were scammed and tell them to ignore friend requests or messages from people they don't know. Also, make sure your privacy settings are locked down and consider deactivating your account. The underage girl scam You're on a dating site or app and you get contacted by a cute girl. She wants to start sexting and trading nudes. Eventually she stops communicating and you get a call from a pissed off guy claiming to be the girl's father, or a police officer, or a private investigator, or something else along those lines. Turns out the girl you were sexting is underage, and her parents want some money for various reasons, such as to pay for a new phone, to pay for therapy, etc. There is, of course, no girl. You were communicating with a scammer. What to do if you are a victim of this scam: Stop picking up the phone when the scammers call. Do not pay them, or they will be after you for more money. Phishing Phishing is when a scammer tries to trick you into giving information to them, such as your password or private financial information. Phishing messages will usually look very similar to official messages, and sometimes they are identical. If you are ever required to login to a different account in order to use a service, you should be incredibly cautious. The blackmail email scam part 5: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5/ PSA: you did not win a giftcard: https://old.reddit.com/Scams/comments/fffmle/psa_you_did_not_win_a_gift_card/ Sugar scams Sugar scammers operate all over the internet and usually come in two varieties: advance-fee scams where the scammer will ask for a payment from you before sending you lots of money, and fake check style scams where the scammer will either pull a classic fake check scam, or will do a "bill pay" style scam that involves them paying your bills, or them giving you banking information to pay your bills. If you encounter these scammers, report their accounts and move on. Google Hangouts Google Hangouts is a messaging platform used extensively by all kinds of scammers. If you are talking with someone online and they want you to switch to Hangouts, they are likely a scammer and you should proceed with caution. Publishers Clearing House scams PCH scams are often advance-fee scams, where you will be promised lots of money after you make an initial payment. You will never need to pay if you win money from the real PCH. Pet scams You are looking for a specific breed of puppy, bird, or other pet. You come across a nice-looking website that claims to be breeding them and has some available right now - they may even be on sale! The breeders are not local to your area (and may not even list a physical location) but they assure you they can safely ship the pet to you after a deposit or full payment. If you go through with the payment, you will likely be contacted by the "shipper" who will inform you about an unexpected shipping/customs/processing fee required to deliver your new pet. But there was never any pet, both the "breeder" and the "shipper" are scammers, typically operating out of Africa. These sites are rampant and account for a large percentage of online pet seller websites - they typically have a similar layout/template (screenshot - example) If you are considering buying a pet online, some easy things to check are: (1) The registration date of the domain (if it was created recently it is likely a scam website) (2) Reverse image search the pictures of available pets - you will usually find other scam websites using the same photos. (3) Copy a sentence/section of the text from the "about us" page and put it into google (in quotes) - these scammers often copy large parts of their website's text from other places. (4) Search for the domain name and look for entries on petscams.com or other scam-tracking sites. (5) Strongly consider buying/adopting your pet from a local shelter or breeder where you can see the animal in person before putting any money down. Thanks to djscsi for this entry. Fake shipping company scams These scams usually start when you try to buy something illegal online. You will be scammed for the initial payment, and then you will receive an email from the fake shipping company telling you that you need to pay them some sort of fee or bribe. If you pay this, they will keep trying to scam you with increasingly absurd stories until you stop paying, at which point they will blackmail you. If you are involved in this scam, all you can do is ignore the scammers and move on, and try to dispute your payments if possible. Chinese Upwork scam Someone will ask you to create an Upwork or other freelancer site account for them and will offer money in return. You will not be paid, and they want to use the accounts to scam people. Quickbooks invoice scam This is a fake check style scam that takes advantage of Quickbooks. The blackmail email scam The exact wording of the emails varies, but there are generally four main parts. They claim to have placed software/malware on a porn/adult video site, they claim to have a video of you masturbating or watching porn, they threaten to release the video to your friends/family/loved ones/boss/dog, and they demand that you pay them in order for them to delete the video. Rest assured that this is a very common spam campaign and there is no truth behind the email or the threats. Here are some news articles about this scam. The blackmail mail scam This is very similar to the blackmail email scam, but you will receive a letter in the mail. Rental scams Usually on local sites like Craigslist, scammers will steal photos from legitimate real estate listings and will list them for rent at or below market rate. They will generally be hesitant to tell you the address of the property for "safety reasons" and you will not be able to see the unit. They will then ask you to pay them a deposit and they claim they will ship you the keys. In reality, your money is gone and you will have no recourse. Craigslist vehicle scams A scammer will list a vehicle on Craigslist and will offer to ship you the car. In many cases they will also falsely claim to sell you the car through eBay or Amazon. If you are looking for a car on Craigslist and the seller says anything about shipping the car, having an agent, gives you a long story about why they are selling the car, or the listing price is far too low, you are talking to a scammer and you should ignore and move on. Advance-fee scam, also known as the 419 scam, or the Nigerian prince scam. You will receive a communication from someone who claims that you are entitled to a large sum of money, or you can help them obtain a large sum of money. However, they will need money from you before you receive the large sum. Man in the middle scams Man in the middle scams are very common and very hard to detect. The scammer will impersonate a company or person you are legitimately doing business with, and they will ask you to send the money to one of their own bank accounts or one controlled by a money mule. They have gained access to the legitimate persons email address, so there will be nothing suspicious about the email. To prevent this, make contact in a different way that lets you verify that the person you are talking to is the person you think you are talking to. Digit wallet scam A variation of the fake check scam, the scammer sends you money through a digital wallet (i.e. Venmo, Apple Pay, Zelle, Cash App) along with a message claiming they've sent the money to the wrong person and a request to send the money back. Customer service for these digital wallets may even suggest that you send the money back. However, the money sent is from a stolen credit card and will be removed from your account after a few days. Your transfer is not reversed since it came from your own funds. Cam girl voting/viewer scam You will encounter a "cam girl" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to go to their site and sign up with your credit card. They may offer a free show, or ask you to vote for them, or any number of other fake stories. Amateur porn recruitment scam You will encounter a "pornstar" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to create an adult film with hehim, but first you need to do something. The story here is usually something to do with verifying your age, or you needing to take an STD test that involves sending money to a site operated by the scammer. Hot girl SMS spam You receive a text from a random number with a message along the lines of "Hey babe I'm here in town again if you wanted to meet up this time, are you around?" accompanied by a NSFW picture of a hot girl. It's spam, and they'll direct you to their scam website that requires a credit card. Identity verification scam You will encounter someone on a dating/messaging/social media/whatever site/app, and the scammer will ask that you verify your identity as they are worried about catfishing. The scammer operates the site, and you are not talking to whoever you think you are talking to. This type of scam teases you with something, then tries to make you sign up for something else that costs money. The company involved is often innocent, but they turn a blind eye to the practice as it helps their bottom line, even if they have to occasionally issue refunds. A common variation takes place on dating sites/dating apps, where you will match with someone who claims to be a camgirl who wants you to sign up for a site and vote for her. Another variation takes place on local sites like Craigslist, where the scammers setup fake rental scams and demand that you go through a specific service for a credit check. Once you go through with it, the scammer will stop talking to you. Another variation also takes place on local sites like Craigslist, where scammers will contact you while you are selling a car and will ask you to purchase a Carfax-like report from a specific website. Multi Level Marketing or Affiliate Marketing You apply for a vague job listing for 'sales' on craigslist. Or maybe an old friend from high school adds you on Facebook and says they have an amazing business opportunity for you. Or maybe the well dressed guy who's always interviewing people in the Starbucks that you work at asks if you really want to be slinging coffee the rest of your life. The scam: MLMs are little more than pyramid schemes. They involve buying some sort of product (usually snake oil health products like body wraps or supplements) and shilling them to your friends and family. They claim that the really money is recruiting people underneath you who give you a slice of whatever they sell. And if those people underneath you recruit more people, you get a piece of their sales. Ideally if you big enough pyramid underneath you the money will roll in without any work on your part. Failure to see any profit will be your fault for not "wanting it enough." The companies will claim that you need to buy their extra training modules or webinars to really start selling. But in reality, the vast majority of people who buy into a MLM won't see a cent. At the end of the day all you'll be doing is annoying your friends and family with your constant recruitment efforts. What to look out for: Recruiters love to be vague. They won't tell you the name of the company or what exactly the job will entail. They'll pump you up with promises of "self-generating income", "being your own boss", and "owning your own company." They might ask you to read books about success and entrepreneurs. They're hoping you buy into the dream first. If you get approached via social media, check their timelines. MLMs will often instruct their victims to pretend that they've already made it. They'll constantly post about how they're hustling and making the big bucks and linking to youtube videos about success. Again, all very vague about what their job actually entails. If you think you're being recruited: Ask them what exactly the job is. If they can't answer its probably a MLM. Just walk away.
You should generally avoid answering or engaging with random phone calls. Picking up and engaging with a scam call tells the scammers that your phone number is active, and will usually lead to more calls. Tax Call You get a call from somebody claiming to be from your countries tax agency. They say you have unpaid taxes that need to be paid immediately, and you may be arrested or have other legal action taken against you if it is not paid. This scam has caused the American IRS, Canadian CRA, British HMRC, and Australian Tax Office to issue warnings. This scam happens in a wide variety of countries all over the world. Warrant Call Very similar to the tax call. You'll get a phone call from an "agent", "officer", "sheriff", or other law enforcement officer claiming that there is a warrant out for your arrest and you will be arrested very soon. They will then offer to settle everything for a fee, usually paid in giftcards. [Legal Documents/Process Server Calls] Very similar to the warrant call. You'll get a phone call from a scammer claiming that they are going to serve you legal documents, and they will threaten you with legal consequences if you refuse to comply. They may call themselves "investigators", and will sometimes give you a fake case number. Student Loan Forgiveness Scam Scammers will call you and tell you about a student loan forgiveness program, but they are interested in obtaining private information about you or demanding money in order to join the fake program. Tech Support Call You receive a call from someone with a heavy accent claiming to be a technician Microsoft or your ISP. They inform you that your PC has a virus and your online banking and other accounts may be compromised if the virus is not removed. They'll have you type in commands and view diagnostics on your PC which shows proof of the virus. Then they'll have you install remote support software so the technician can work on your PC, remove the virus, and install security software. The cost of the labor and software can be hundreds of dollars. The scam: There's no virus. The technician isn't a technician and does not work for Microsoft or your ISP. Scammers (primarily out of India) use autodialers to cold-call everyone in the US. Any file they point out to you or command they have you run is completely benign. The software they sell you is either freeware or ineffective. What to do you if you're involved with this scam: If the scammers are remotely on your computer as you read this, turn off your PC or laptop via the power button immediately, and then if possible unplug your internet connection. Some of the more vindictive tech scammers have been known to create boot passwords on your computer if they think you've become wise to them and aren't going to pay up. Hang up on the scammers, block the number, and ignore any threats about payment. Performing a system restore on your PC is usually all that is required to remove the scammer's common remote access software. Reports of identity theft from fake tech calls are uncommon, but it would still be a good idea to change your passwords for online banking and monitor your accounts for any possible fraud. How to avoid: Ignore any calls claiming that your PC has a virus. Microsoft will never contact you. If you're unsure if a call claiming to be from your ISP is legit, hang up, and then dial the customer support number listed on a recent bill. If you have elderly relatives or family that isn't tech savvy, take the time to fill them in on this scam. Chinese government scam This scam is aimed at Chinese people living in Europe and North America, and involves a voicemail from someone claiming to be associated with the Chinese government, usually through the Chinese consulate/embassy, who is threatening legal action or making general threats. Chinese shipping scam This scam is similar to the Chinese government scam, but involves a seized/suspicious package, and the scammers will connect the victim to other scammers posing as Chinese government investigators. Social security suspension scam You will receive a call from someone claiming to work for the government regarding suspicious activity, fraud, or serious crimes connected to your social security number. You'll be asked to speak to an operator and the operator will explain the steps you need to follow in order to fix the problems. It's all a scam, and will lead to you losing money and could lead to identity theft if you give them private financial information. Utilities cutoff You get a call from someone who claims that they are from your utility company, and they claim that your utilities will be shut off unless you immediately pay. The scammer will usually ask for payment via gift cards, although they may ask for payment in other ways, such as Western Union or bitcoin. Relative in custody Scammer claims to be the police, and they have your son/daughtenephew/estranged twin in custody. You need to post bail (for some reason in iTunes gift cards or MoneyGram) immediately or the consequences will never be the same. Mexican family scam This scam comes in many different flavours, but always involves someone in your family and Mexico. Sometimes the scammer will claim that your family member has been detained, sometimes the scammer will claim that your family member has been kidnapped, and sometimes the scammer will claim that your family member is injured and needs help. General family scams Scammers will gather a large amount of information about you and target your family members using different stories with the goal of gettimg them to send money. One ring scam Scammers will call you from an international number with the goal of getting you to return their call, causing you to incur expensive calling fees.
Online shopping scams
THE GOLDEN RULE OF ONLINE SHOPPING: If it sounds too good to be true, it probably is. Dropshipping An ad on reddit or social media sites like Facebook and Instagram offers items at huge discounts or even free (sometimes requiring you to reblog or like their page). They just ask you to pay shipping. The scam: The item will turn out to be very low quality and will take weeks or even months to arrive. Sometimes the item never arrives, and the store disappears or stops responding. The seller drop-ships the item from China. The item may only cost a few dollars, and the Chinese government actually pays for the shipping. You end up paying $10-$15 dollars for a $4 item, with the scammer keeping the profit. If you find one of these scams but really have your heart set on the item, you can find it on AliExpress or another Chinese retailer. Influencer scams A user will reach out to you on a social media platform, usually Instagram, and offer you the chance to partner with them and receive a free/discounted product, as long as you pay shipping. This is a different version of the dropshipping scam, and is just a marketing technique to get you to buy their products. Triangulation fraud Triangulation fraud occurs when you make a purchase on a site like Amazon or eBay for an item at a lower than market price, and receive an item that was clearly purchased new at full price. The scammer uses a stolen credit card to order your item, while the money from the listing is almost all profit for the scammer. Instagram influencer scams Someone will message you on Instagram asking you to promote their products, and offering you a discount code. The items are Chinese junk, and the offer is made to many people at a time. Cheap Items Many websites pop up and offer expensive products, including electronics, clothes, watches, sunglasses, and shoes at very low prices. The scam: Some sites are selling cheap knock-offs. Some will just take your money and run. What to do if you think you're involved with this scam: Contact your bank or credit card and dispute the charge. How to avoid: The sites often have every brand-name shoe or fashion item (Air Jordan, Yeezy, Gucci, etc) in stock and often at a discounted price. The site will claim to be an outlet for a major brand or even a specific line or item. The site will have images at the bottom claiming to be Secured by Norton or various official payment processors but not actual links. The site will have poor grammar and a mish-mash of categories. Recently, established websites will get hacked or their domain name jacked and turned into scam stores, meaning the domain name of the store will be completely unrelated to the items they're selling. If the deal sounds too good to be true it probably is. Nobody is offering brand new iPhones or Beats or Nintendo Switches for 75% off. Cheap Amazon 3rd Party Items You're on Amazon or maybe just Googling for an item and you see it for an unbelievable price from a third-party seller. You know Amazon has your back so you order it. The scam: One of three things usually happen: 1) The seller marks the items as shipped and sends a fake tracking number. Amazon releases the funds to the seller, and the seller disappears. Amazon ultimately refunds your money. 2) The seller immediately cancels the order and instructs you to re-order the item directly from their website, usually with the guarantee that the order is still protected by Amazon. The seller takes your money and runs. Amazon informs you that they do not offer protection on items sold outside of Amazon and cannot help you. 2) The seller immediately cancels the order and instructs you to instead send payment via an unused Amazon gift card by sending the code on the back via email. Once the seller uses the code, the money on the card is gone and cannot be refunded. How to avoid: These scammers can be identified by looking at their Amazon storefronts. They'll be brand new sellers offering a wide range of items at unbelievable prices. Usually their Amazon names will be gibberish, or a variation on FIRSTNAME.LASTNAME. Occasionally however, established storefronts will be hacked. If the deal is too good to be true its most likely a scam. Scams on eBay There are scams on eBay targeting both buyers and sellers. As a seller, you should look out for people who privately message you regarding the order, especially if they ask you to ship to a different address or ask to negotiate via text/email/a messaging service. As a buyer you should look out for new accounts selling in-demand items, established accounts selling in-demand items that they have no previous connection to (you can check their feedback history for a general idea of what they bought/sold in the past), and lookout for people who ask you to go off eBay and use another service to complete the transaction. In many cases you will receive a fake tracking number and your money will be help up for up to a month. Scams on Amazon There are scams on Amazon targeting both buyers and sellers. As a seller, you should look out for people who message you about a listing. As a buyer you should look out for listings that have an email address for you to contact the person to complete the transaction, and you should look out for cheap listings of in-demand items. Scams on Reddit Reddit accounts are frequently purchased and sold by fraudsters who wish to use the high karma count + the age of the account to scam people on buy/sell subreddits. You need to take precautions and be safe whenever you are making a transaction online. Computer scams Virus scam A popup or other ad will say that you have a virus and you need to follow their advice in order to remove it. They are lying, and either want you to install malware or pay for their software.
Chinese Brushing / direct shipping If you have ever received an unsolicited small package from China, your address was used to brush. Vendors place fake orders for their own products and send out the orders so that they can increase their ratings. Money flipping Scammer claims to be a banking insider who can double/triple/bazoople any amount of money you send them, with no consequences of any kind. Obviously, the money disappears into their wallet the moment you send it.
For what I hope are obvious reasons, I don't want, and probably will never post my threat model publicly online. However, regardless of that, what I'm sure you will extrapolate from this post is that I live my life, digitally in particular, with a fairly high level threat model. This is not because I'm some super sophisticated criminal mastermind, but rather, I am at this level because I genuinely love playing around with this stuff. And I just happen to understand the importance of privacy and just how vital it is to a truly healthy society. I would like to extend a thanks to ProgressiveArchitect for the sharing of the knowledge they have done on this subreddit, /privacytoolsio, and the like. We may have never interacted, but nevertheless, your input into this community is truly interesting and extremely informative and educating. I'm sure those of you familiar with PA's setup will be able to draw some parallels with mine and their's. Thank you. I hope you all enjoy reading this write up.
I run Qubes OS on a Lenovo ThinkPad X230 laptop. Specs for it are as following: - i7-3520M - 16GB RAM - 1TB Samsung 860 Evo SSD - Qualcomm Atheros AR9285 wireless card Additionally, I used a Raspberry Pi Model 3B+ and a Pomono SPI clip to replace the stock BIOS firmware with coreboot+me_cleaner. This wasn't done out of any "real" concern for the Intel ME (though of course proprietary black-boxes like it should be avoided at all costs and not trusted), but rather for open source enthusiasm and for increased security and faster boot times than what the stock BIOS firmware allows for. On that note about the ME, I don't believe the conspiracy theories that claim that it is a state-sponsored attack method for surveillance. I believe that Intel had good intentions for improving the lives of IT professionals who need to manage hundreds, if not thousands of remote machines. However, it has proven time and time again to be insecure, and I don't need the remote management and the "features" that it provides on my machines. In Qubes, I use a combination of AppVMs and StandaloneVMs for a variety of different purposes. All VMs use PVH over HVM, except for the Mirage Unikernel Firewall, which uses PV, and the sys-net and sys-usb StandaloneVMs which have to use HVM because of PCI device passthrough. Right now most of my VMs are AppVMs, but for maintenance and compartmentalization reasons, I am considering moving more towards StandaloneVMs, despite the increase in disk space and bandwidth usage for updates. General route of from Qubes to the Internet for anonymous browsing, general private browsing, accessing Uni services, and Uni-related anonymous browsing respectively: 1. Qubes->sys-mirage-firewall->sys-vpn-wg->sys-corridor->sys-whonix->whonix-ws-15-dvm to the internet. 2. Qubes->sys-mirage-firewall->sys-vpn-wg to the Internet. 3. Qubes->sys-mirage-firewall->uni-vpn-wg to the Internet. 4. Qubes->sys-mirage-firewall->uni-vpn-wg->uni-corridor->uni-whonix->uni-anon-research to the Internet.
(Note: the VPN name is substituted in the "vpn" above. I had to remove it to comply with this subreddit's rules. It is easy to identify what VPN it is as it randomly generates a long numaric string and has fantastic support for WireGuard.)
fedora-29-minimal: Base for the minimal VMs.
fedora-29-uni-persist: Template for uni-campus and uni-home AppVMs.
crypto: A work in progress VM for handling crypto transaction using cleansed Bitcoin and Monero.
printing: Exactly as it sounds like. It is firewalled to only be able to connect to the network printer on my home network.
sys-corridor: corridor is a Tor traffic whitelisting gateway that provides network to sys-whonix. It helps to provide an additional failsafe to defend against clearnet attacks.
sys-mirage-firewall: A version of the Mirage Unikernel to act as an extremely minimal and resource light firewall. It is configured to only allow connections to the individual IP addresses my VPN's WireGuard servers as well as a select few internal IP addresses on my home network (router, home server, and Pi-Hole).
uni-corridor: See sys-corridor for description. Provides network to uni-whonix.
sys-usb: USB stack isolation VM. Uses fedora minimal now.
uni-vpn-wg: A Uni ProxyVM for my VPN.
uni-net: A ProxyVM for all Uni-related domains. Based off fedora minimal.
uni-shared: Acts as an SMB network share for uni-campus and uni-home so that the documents and emails can be accessed easily between them.
fedora-29-dvm: Default disposable Fedora VM.
whonix-ws-15-dvm: Default disposable Whonix VM. This is where I do 95% of my online browsing.
calendar: Exactly as it's named. Has a firewall rule to only allow connections to posteo.de.
nas-access: Used to access my NAS and to watch content on it.
pihole-access: Used to access my Pi-Hole through Firefox. Has a firewall rule to only allow connections to its IP address.
router-access: Used to access my router through Firefox. Has a firewall so its only able to connect to 192.168.0.1.
personal: Personal domain. Used to check personal emails, read rss feeds, stream YouTube videos, and internet banking.
repos: Local copy of my repos. Has a firewall rule to only allow connections to the site hosting my git repo.
uni-anon-resarch: Research for Uni.
uni-campus: Domain for doing Uni work on campus.
uni-home: Domain for doing Uni work at home.
uni-whonix: Seperate Whonix gateway for Uni research.
offline-archive-manager: For managing the offline archives that I burn to DVDs.
personal-archive: Exactly as it's named.
sys-whonix: Default Whonix gateway ProxyVM.
vault: For storing GPG keys and other files.
vault-dvm: DVM with no internet access. The Vault VMs use this as their DisposableVM.
work-archive: Storing work archive documents (payslips, employment information, etc).
Phone: Motorola Moto G5s running Lineage OS 16.0 Pie no G-Apps or micro-G with the following Apps: - AdAway: Open Source hosts file-based ad blocker. (Requires root.) - AFWall+: Linux iptables front end. (Requires root.) - Amaze: File manager. - andOPT: 2FA app. I like it since it can export the entries to an AES encrypted file. - AntennaPod: Podcast manager. - AnySoftKeyboard - Simple Calendar - Simple Contacts Pro - DAVx5: CalDav syncronization with my calendar on my Posteo email account. - F-Droid - Fennec F-Droid: Web Browser. Has the same Firefox addons like on Qubes minus Vim Vixen. I used the app Privacy Settings to configure the about:config. - KeePassDX: Password manager. - KISS launcher - Magisk Manager - NewPipe: YouTube app replacement. - S.Notes: Standard Notes. - OsmAnd~: Maps and navigation. - Red Moon: Blue light filter. - SELinuxModeChanger: Exactly as it sounds. (Requires root.) - Shelter: Work profile manager. - Signal: Messaging. - Vinyl Music Player: Music player. - WireGuard: VPN protocol frontend. Is configured to use my VPN account. Is setup as an always-on and connected VPN. As mentioned, I use Shelter to manage my work profile. In it I isolate the following apps: - Clover: *chan browser. - Orbot: For routing apps through Tor. Is setup as an always-on and connected VPN. - RedReader: Reddit client. - Tor Browser Over the last several years, I have started using my phone less and less and taking advantage of less of what it has got to offer. I don't check email on my device. I have no real need to browse the Internet on it outside of watching videos using NewPipe, browsing Reddit, and various *chan boards. On the Smart Phone side of things, I am considering purchasing an older used iPhone SE or 6S for use with MySudo when outside of my home as well as an iPod Touch for use on WiFi only for use inside my home. The iPhone would be kept inside of a faraday bag when I am at home and not using it. It would also be kept in the faraday bag whenever at home to avoid associating that device with my home address. The iPod Touch would be used for MySudo calls instead. Future outlook and plan for my privacy and security: To avoid as much deanonymisation of my privacy as possible, I'm only going to specify enough so that anyone reading this can get the jist of my situation in life. I am quite young (age 16 to 25) and I started along this privacy journey when I was even younger. I was never a very heavy social media user, however I did have an online presence if you looked hard enough. My name fortunately is a very common and short name, so that does help to bury information that I was not able to remove further in the vast trenches that is the Internet. On the digital side of things, I mentioned that I have a dedicated Crypto AppVM for handling crypto currency transactions using Bisq. I have setup a dedicated bank account that I have periodically been transferring money into so that I can trade crypto. Unfortunately, I do not live in the US, so being able to effectively start trades with others is more difficult. I also do not have access to a credit card masking account like privacy.com (that I absolutely would use given the ability). I plan on getting an anonymous VPS to host my own Tor exit node for better speeds and to mitigate the possibility of malicious exit nodes. The country I live in has been a proponent of absolute dragnet surveillance on all activities occurring online and in real life, though the former is far more visible on this subreddit. I will be using crypto with cleaned Bitcoin (as seen with ProgressiveArchitect's setup) for purchasing my VPN service, etc. With future hardware, to replace my aging laptop, I am very hopeful for Xen, then eventually Qubes OS getting ported to Power9. When that happens I'll be getting a Raptor Computing Blackbird as a desktop. Maybe in the future I'll get a Purism Librem laptop, but for now my corebooted X230 works perfectly for my use cases. On that note, I have successfully build the Heads firmware for the X230 and I was able to get the minimal 4MB image flashed on my laptop. I did revert it back to my coreboot setup after playing around a little with it, and unfortunately I haven't had time since to do a full, complete flash of it. On the physical/real life side of things, I plan on making use of various Trusts in order to hold assets, say to keep my name from being immediately visible on the title of my car. As of right now I am fortunate enough to have the title of my car under the name of someone who I trust. Unless I am legally required, and where there are immediate and absolute consequences, I use fake names in real life. With Uni, I am enrolled under my real name and address. This is a requirement and it is verified, so there is nothing that I can realistically do about it. As for other services, I plan on setting up a personal mailbox (PMB), etc if possible to use as a real, physical address that is associated with my real name and that is used for things like Government issued ID. In the future when I move again, I plan on renting a place in cash to try and keep my name dissociated with my real address. For those looking for reasoning on why one would want to do that, please read How to be Invisible by J.J. Luna. It's truly the Bible of physical privacy. At this stage I am just going off on a ramble, so I should cut it short here. I have just started and I live for this shit.
DigiByte not focusing on cryptocurrency is like Apple not focusing on phones or Microsoft not focusing on software. Yes, DigiByte, Apple and Microsoft do more than their core product, but it’s their core product offering that make them leaders in the market and they work from their strengths. In order to take DGB to the next level, DigiByte needs a clear vision and roadmap of goals which the team can work on achieving (and adding new members to team only helps and some current team members need to adjust their bad mindset and behaviors as its hurts DGB advancement), like getting DGB listed on all remaining big exchanges, making a website and smart contract templates where people can download them and easily and vastly run smart contracts and dapps on the DigiByte blockchain. Have focused marketing that wants DGB to dominate as THE coin (just like Litecoin’s marketing want LTC to dominate as THE coin and their mindset is why LTC is temporary leading over DGB now and some at LTC are upset in seeing DGB rise up in market cap and DGB gaining on Litecoin recently); for the purpose of building and having any better technology product is for it to be vastly marketed and used worldwide and have global mass adoption as a dominating product in the market. A few people need to adjust their mindset from a poverty mentality to a prosperity mentality concerning DigiByte and believe the sky is the limit for the DGB price ahead (as some wrongfully rebuke others that want a higher price for DGB); for DGB "deserves" to rise up to #2 in market cap value long-term after Bitcoin (out of respect for BTC being the King of Cryptocurrency), given better technology products always win (and they "deserve" to win) in the end in the market. Understand, WallStreet made Apple (which has the best technology products) to have the highest market cap in the Stock Market. So, highly likely such will happen in cryptos, but DGB must implement a clear vision and complete the end goals noted above, to this end. Anyone in the DGB community that demonizes Binance or personally attacks, block and/or pushes away any DGB user from being a DGB customer. Such need to STOP it, as this only sabotages DGB growth. Such don't understand that "keeping" DGB customers is just as important as "gaining" them from DGB marketing. On YouTube and social media, a disturbing trend is seen, in that, far too many people are now "former" DGB users today and they left DigiByte being offended, because of how they were personally attacked by some in the DGB community, and now they bad-mouth DGB. Those that drove them away laugh about it, not understanding the big long-term picture and ramifications of their negative behavior towards others, in driving them away from DGB. Yes, some will still lash out in hate and personal attacks on this constructive criticism, not understanding the big picture that is required to take DigiByte to the next level. But the helpful truth is having a clear vision for DGB and working to achieve it with love and positively will help DGB growth; but having no clear vision with hate and negative personal attacks against others in the DGB community by some only sabotages DGB growth. Congrats to all the DGBAT and marketing efforts by all in DGB community that has helped DigiByte rise up in market cap ranking this year, which means, by default, DGB overtakes its competitors. For Marketing 101 is to gain market share. Each time DGB overtakes another coin or token in market rank ranking, its DigiByte that is dominating or overtaking another coin or token in market share - and DGB marketing wants to see DGB rise up to #2 long-term (or they should, if they truly believe the best technology of DigiByte "deserves" to rise up to the top long term). Note: some that own both DigiByte and Litecoin are upset as they have a financial interest in both coins. But understand, Coke's marketing does not tell the market to buy Pepsi and all competing drinks too, but Coke markets to gain market share for Coke alone, as with DGB marketing, and the better technology of DigiByte "deserves" to rise up to the top and overtake inferior technology coins, including DGB overtaking Litecoin long-term. This offends those that own both coins, but understand, just as Litecoin marketing is not trying to get people to buy DigiByte, DGB marketing is not trying to get people to buy Litecoin, but of course some will own both, which is great. A few that don't understand what marketing is have got upset, yet they continue to see DGB rise up in market cap rankings, so they should rejoice that DGB marketing this year is working and producing positive results for DGB growing in market cap and gaining share in the crypto market. Lastly, having the best team behind DGB to implement a clear vision and end goals for DGB advancement is just as important as having the best blockchain technology behind DigiByte, in order to take DGB to the next level. Yes, technology matters, but the team behind the technology matters too in order make that technology a big winner in the market long term.
What benefits does Nexus bring to the blockchain space?
How does Nexus secure the network and reach consensus?
What is quantum resistance and how does Nexus implement this?
What is Nexus’ Unified Time protocol?
Why does Nexus need its own satellite network?
The Nexus Currency:
How can I get Nexus?
How much does a transaction cost?
How fast does Nexus transfer?
Did Nexus hold an ICO? How is Nexus funded?
Is there a cap on the number of Nexus in existence?
What is the difference between the Oracle wallet and the LLD wallet?
How do I change from Oracle to the LLD wallet?
How do I install the Nexus Wallet?
Types of Mining or Minting:
Can I mine Nexus?
How do I mine Nexus?
How do I stake Nexus?
I am staking with my Nexus balance. What are trust weight, block weight and stake weight?
1. What is Nexus (NXS)? Nexus is a digital currency, distributed framework, and peer-to-peer network. Nexus further improves upon the blockchain protocol by focusing on the following core technological principles:
Nexus will combine our in-development quantum-resistant 3D blockchain software with cutting edge communication satellites to deliver a free, distributed, financial and data solution. Through our planned satellite and ground-based mesh networks, Nexus will provide uncensored internet access whilst bringing the benefits of distributed database systems to the world. For a short video introduction to Nexus Earth, please visit this link
2. What benefits does Nexus bring to the blockchain space? As Nexus has been developed, an incredible amount of time has been put into identifying and solving several key limitations:
Quantum computing vulnerability
Centralized network access
Slow difficulty adjustment
Slow block times
Block reward halving
Nexus is also developing a framework called the Lower Level Library. This LLL will incorporate the following improvements:
LLC (Lower Level Cryptography): This is a suite of cutting edge cryptographic methods including hashing, asymmetric encryption, digital signatures, and symmetric encryption algorithms
LLP (Lower Level Protocol): This is a template protocol to allow any protocol to be created with ease without the need for repeated network programming.
LLD (Lower Level Database): This is a set of templates for creating high efficiency database systems. This high efficiency can be used to power large websites, which are currently built with database software that is not designed to scale.
For information about more additions to the Lower Level Library, please visit here
3. How does Nexus secure the network and reach consensus? Nexus is unique amongst blockchain technology in that Nexus uses 3 channels to secure the network against attack. Whereas Bitcoin uses only Proof-of-Work to secure the network, Nexus combines a prime number channel, a hashing channel and a Proof-of-Stake channel. Where Bitcoin has a difficulty adjustment interval measured in weeks, Nexus can respond to increased hashrate in the space of 1 block and each channel scales independently of the other two channels. This stabilizes the block times at ~50 seconds and ensures no single channel can monopolize block production. This means that a 51% attack is much more difficult to launch because an attacker would need to control all 3 channels. Every 60 minutes, the Nexus protocol automatically creates a checkpoint. This prevents blocks from being created or modified dated prior to this checkpoint, thus protecting the chain from malicious attempts to introduce an alternate blockchain.
4. What is quantum resistance and how does Nexus implement it? To understand what quantum resistance is and why it is important, you need to understand how quantum computing works and why it’s a threat to blockchain technology. Classical computing uses an array of transistors. These transistors form the heart of your computer (the CPU). Each transistor is capable of being either on or off, and these states are used to represent the numerical values 1 and 0. Binary digits’ (bits) number of states depends on the number of transistors available, according to the formula 2n, where n is the number of transistors. Classical computers can only be in one of these states at any one time, so the speed of your computer is limited to how fast it can change states. Quantum computers utilize quantum bits, “qubits,” which are represented by the quantum state of electrons or photons. These particles are placed into a state called superposition, which allows the qubit to assume a value of 1 or 0 simultaneously. Superposition permits a quantum computer to process a higher number of data possibilities than a classical computer. Qubits can also become entangled. Entanglement makes a qubit dependant on the state of another, enabling quantum computing to calculate complex problems, extremely quickly. One such problem is the Discrete Logarithm Problem which elliptic curve cryptography relies on for security. Quantum computers can use Shor’s algorithm to reverse a key in polynomial time (which is really really really fast). This means that public keys become vulnerable to quantum attack, since quantum computers are capable of being billions of times faster at certain calculations. One way to increase quantum resistance is to require more qubits (and more time) by using larger private keys: Bitcoin Private Key (256 bit) 5Kb8kLf9zgWQnogidDA76MzPL6TsZZY36hWXMssSzNydYXYB9KF Nexus Private Key (571 bit) 6Wuiv513R18o5cRpwNSCfT7xs9tniHHN5Lb3AMs58vkVxsQdL4atHTF Vt5TNT9himnCMmnbjbCPxgxhSTDE5iAzCZ3LhJFm7L9rCFroYoqz Bitcoin addresses are created by hashing the public key, so it is not possible to decrypt the public key from the address; however, once you send funds from that address, the public key is published on the blockchain rendering that address vulnerable to attack. This means that your money has higher chances of being stolen. Nexus eliminates these vulnerabilities through an innovation called signature chains. Signature chains will enable access to an account using a username, password and PIN. When you create a transaction on the network, you claim ownership of your signature chain by revealing the public key of the NextHash (the hash of your public key) and producing a signature from the one time use private key. Your wallet then creates a new private/public keypair, generates a new NextHash, including the corresponding contract. This contract can be a receive address, a debit, a vote, or any other type of rule that is written in the contract code. This keeps the public key obscured until the next transaction, and by divorcing the address from the public key, it is unnecessary to change addresses in order to change public keys. Changing your password or PIN code becomes a case of proving ownership of your signature chain and broadcasting a new transaction with a new NextHash for your new password and/or PIN. This provides the ability to login to your account via the signature chain, which becomes your personal chain within the 3D chain, enabling the network to prove and disprove trust, and improving ease of use without sacrificing security. The next challenge with quantum computers is that Grover’s algorithm reduces the security of one-way hash function by a factor of two. Because of this, Nexus incorporates two new hash functions, Skein and Keccak, which were designed in 2008 as part of a contest to create a new SHA3 standard. Keccak narrowly defeated Skein to win the contest, so to maximize their potential Nexus combines these algorithms. Skein and Keccak utilize permutation to rotate and mix the information in the hash. To maintain a respective 256/512 bit quantum resistance, Nexus uses up to 1024 bits in its proof-of-work, and 512 bits for transactions.
5. What is the Unified Time protocol? All blockchains use time-stamping mechanisms, so it is important that all nodes operate using the same clock. Bitcoin allows for up to 2 hours’ discrepancy between nodes, which provides a window of opportunity for the blockchain to be manipulated by time-related attack vectors. Nexus eliminates this vulnerability by implementing a time synchronization protocol termed Unified Time. Unified Time also enhances transaction processing and will form an integral part of the 3D chain scaling solution. The Unified Time protocol facilitates a peer-to-peer timing system that keeps all clocks on the network synchronized to within a second. This is seeded by selected nodes with timestamps derived from the UNIX standard; that is, the number of seconds since January 1st, 1970 00:00 UTC. Every minute, the seed nodes report their current time, and a moving average is used to calculate the base time. Any node which sends back a timestamp outside a given tolerance is rejected. It is important to note that the Nexus network is fully synchronized even if an individual wallet displays something different from the local time.
6. Why does Nexus need its own satellite network? One of the key limitations of a purely electronic monetary system is that it requires a connection to the rest of the network to verify transactions. Existing network infrastructure only services a fraction of the world’s population. Nexus, in conjunction with Vector Space Systems, is designing communication satellites, or cubesats, to be launched into Low Earth Orbit in 2019. Primarily, the cubesat mesh network will exist to give Nexus worldwide coverage, but Nexus will also utilize its orbital and ground mesh networks to provide free and uncensored internet access to the world.
The Nexus Currency (NXS):
1. How can I get Nexus? There are two ways you can obtain Nexus. You can either buy Nexus from an exchange, or you can run a miner and be rewarded for finding a block. If you wish to mine Nexus, please follow our guide found below. Currently, Nexus is available on the following exchanges:
Bittrex (99% of trade volume)
Upbit (South Korea)
Nexus is actively reaching out to other exchanges to continue to be listed on cutting edge new financial technologies..
2. How much does a transaction cost? Under Nexus, the fee structure for making a transaction depends on the size of your transaction. A default fee of 0.01 NXS will cover most transactions, and users have the option to pay higher fees to ensure their transactions are processed quickly. When the 3D chain is complete and the initial 10-year distribution period finishes, Nexus will absorb these fees through inflation, enabling free transactions.
3. How fast does Nexus transfer? Nexus reaches consensus approximately every ~ 50 seconds. This is an average time, and will in some circumstances be faster or slower. NXS currency which you receive is available for use after just 6 confirmations. A confirmation is proof from a node that the transaction has been included in a block. The number of confirmations in this transaction is the number that states how many blocks it has been since the transaction is included. The more confirmations a transaction has, the more secure its placement in the blockchain is.
4. Did Nexus hold an ICO? How is Nexus funded? The Nexus Embassy, a 501(C)(3) not-for-profit corporation, develops and maintains the Nexus blockchain software. When Nexus began under the name Coinshield, the early blocks were mined using the Developer and Exchange (Ambassador) addresses, which provides funding for the Nexus Embassy. The Developer Fund fuels ongoing development and is sourced by a 1.5% commission per block mined, which will slowly increase to 2.5% after 10 years. This brings all the benefits of development funding without the associated risks. The Ambassador (renamed from Exchange) keys are funded by a 20% commission per block reward. These keys are mainly used to pay for marketing, and producing and launching the Nexus satellites. When Nexus introduces developer and ambassador contracts, they will be approved, denied, or removed by six voting groups namely: currency, developer, ambassador, prime, hash, and trust. Please Note: The Nexus Embassy reserves the sole right to trade, sell and or use these funds as required; however, Nexus will endeavor to minimize the impact that the use of these funds has upon the NXS market value.
5. Is there a cap on the number of NXS in existence? After an initial 10-year distribution period ending on September 23rd, 2024, there will be a total of 78 million NXS. Over this period, the reward gradient for mining Nexus follows a decaying logarithmic curve instead of the reward halving inherent in Bitcoin. This avoids creating a situation where older mining equipment is suddenly unprofitable, encouraging miners to continue upgrading their equipment over time and at the same time reducing major market shocks on block halving events. When the distribution period ends, the currency supply will inflate annually by a maximum of 3% via staking and by 1% via the prime and hashing channels. This inflation is completely unlike traditional inflation, which degrades the value of existing coins. Instead, the cost of providing security to the blockchain is paid by inflation, eliminating transaction fees. Colin Cantrell - Nexus Inflation Explained
6. What is the difference between the LLD wallet and the Oracle wallet? Due to the scales of efficiency needed by blockchain, Nexus has developed a custom-built database called the Lower Level Database. Since the development of the LLD wallet 0.2.3.1, which is a precursor to the Tritium updates, you should begin using the LLD wallet to take advantage of the faster load times and improved efficiency. The Oracle wallet is a legacy wallet which is no longer maintained or updated. It utilized the Berkeley DB, which is not designed to meet the needs of a blockchain. Eventually, users will need to migrate to the LLD wallet. Fortunately, the wallet.dat is interchangeable between wallets, so there is no risk of losing access to your NXS.
7. How do I change from Oracle to the LLD wallet? Step 1 - Backup your wallet.dat file. You can do this from within the Oracle wallet Menu, Backup Wallet. Step 2 - Uninstall the Oracle wallet. Close the wallet and navigate to the wallet data directory. On Windows, this is the Nexus folder located at %APPDATA%\Nexus. On macOS, this is the Nexus folder located at ~/Library/Application Support/Nexus. Move all of the contents to a temporary folder as a backup. Step 3 - Copy your backup of wallet.dat into the Nexus folder located as per Step 2. Step 4 - Install the Nexus LLD wallet. Please follow the steps as outlined in the next section. Once your wallet is fully synced, your new wallet will have access to all your addresses.
8. How do I install the Nexus Wallet? You can install your Nexus wallet by following these steps: Step 1 - Download your wallet from www.nexusearth.com. Click the Downloads menu at the top and select the appropriate wallet for your operating system. Step 2 - Unzip the wallet program to a folder. Before running the wallet program, please consider space limitations and load times. On the Windows OS, the wallet saves all data to the %APPDATA%\Nexus folder, including the blockchain, which is currently ~3GB. On macOS, data is saved to the ~/Library/Application Support/Nexus folder. You can create a symbolic link, which will allow you to install this information in another location. Using Windows, follow these steps:
Step 3 (optional) - Before running the wallet, we recommend downloading the blockchain database manually. Nexus Earth maintains a copy of the blockchain data which can save hours from the wallet synchronization process. Please go to www.nexusearth.com and click the Downloads menu. Step 4 (optional) - Extract the database file. This is commonly found in the .zip or .rar format, so you may need a program like 7zip to extract the contents. Please extract it to the relevant directory, as outlined in step 2. Step 5 - You can now start your wallet. After it loads, it should be able to complete synchronization in a short time. This may still take a couple of hours. Once it has completed synchronizing, a green check mark icon will appear in the lower right corner of the wallet. Step 6 - Encrypt your wallet. This can be done within the wallet, under the Settings menu. Encrypting your wallet will lock it, requiring a password in order to send transactions. Step 7 - Backup your wallet.dat file. This can be done from the File menu inside the wallet. This file contains the keys to the addresses in your wallet. You may wish to keep a secure copy of your password somewhere, too, in case you forget it or someone else (your spouse, for example) ever needs it. You should back up your wallet.dat file again any time you create – or a Genesis transaction creates (see “staking” below) – a new address.
Types of Mining or Minting:
1.Can I mine Nexus? Yes, there are 2 channels that you can use to mine Nexus, and 1 channel of minting: Prime Mining Channel This mining channel looks for a special prime cluster of a set length. This type of calculation is resistant to ASIC mining, allowing for greater decentralization. This is most often performed using the CPU. Hashing Channel This channel utilizes the more traditional method of hashing. This process adds a random nonce, hashes the data, and compares the resultant hash against a predetermined format set by the difficulty. This is most often performed using a GPU. Proof of Stake (nPoS) Staking is a form of mining NXS. With this process, you can receive NXS rewards from the network for continuously operating your node (wallet). It is recommended that you only stake with a minimum balance of 1000 NXS. It’s not impossible to stake with less, but it becomes harder to maintain trust. Losing trust resets the interest rate back to 0.5% per annum.
2. How do I mine Nexus? As outlined above, there are two types of mining and 1 proof of stake. Each type of mining uses a different component of your computer to find blocks, the CPU or the GPU. Nexus supports CPU and GPU mining on Windows only. There are also third-party macOS builds available. Please follow the instructions below for the relevant type of miner.
Prime Mining: Almost every CPU is capable of mining blocks on this channel. The most effective method of mining is to join a mining pool and receive a share of the rewards based on the contribution you make. To create your own mining facility, you need the CPU mining software, and a NXS address. This address cannot be on an exchange. You create an address when you install your Nexus wallet. You can find the related steps under How Do I Install the Nexus Wallet? Please download the relevant miner from http://nexusearth.com/mining.html. Please note that there are two different miner builds available: the prime solo miner and the prime pool miner. This guide will walk you through installing the pool miner only. Step 1 - Extract the archive file to a folder. Step 2 - Open the miner.conf file. You can use the default host and port, but these may be changed to a pool of your choice. You will need to change the value of nxs_address to the address found in your wallet. Sieve_threads is the number of CPU threads you want to use to find primes. Ptest_threads is the number of CPU threads you want to test the primes found by the sieve. As a general rule, the number of threads used for the sieve should be 75% of the threads used for testing. It is also recommended to add the following line to the options found in the .conf file: "experimental" : "true" This option enables the miner to use an improved sieve algorithm which will enable your miner to find primes at a faster rate. Step 3 - Run the nexus_cpuminer.exe file. For a description of the information shown in this application, please read this guide.
Hashing: The GPU is a dedicated processing unit housed on-board your graphics card. The GPU is able to perform certain tasks extremely well, unlike your CPU, which is designed for parallel processing. Nexus supports both AMD and Nvidia GPU mining, and works best on the newer models. Officially, Nexus does not support GPU pool mining, but there are 3rd party miners with this capability. The latest software for the Nvidia miner can be found here. The latest software for the AMD miner can be found here. The AMD miner is a third party miner. Information and advice about using the AMD miner can be found on our Slack channel. This guide will walk you through the Nvidia miner. Step 1 - Close your wallet. Navigate to %appdata%\Nexus (~/Library/Application Support/Nexus on macOS) and open the nexus.conf file. Depending on your wallet, you may or may not have this file. If not, please create a new txt file and save it as nexus.conf You will need to add the following lines before restarting your wallet:
Step 2 - Extract the files into a new folder. Step 3 - Run the nexus.bat file. This will run the miner and deposit any rewards for mining a block into the account on your wallet. For more information on either Prime Mining or Hashing, please join our Slack and visit the #mining channel. Additional information can be found here.
3. How do I stake Nexus? Once you have your wallet installed, fully synchronized and encrypted, you can begin staking by:
Choosing Unlock Wallet from the Settings menu
Check the box that says "Unlock for Mint Only", then enter your password.
When the question mark at the lower right of the wallet window changes to a clock icon, you are now staking.
After you begin staking, you will receive a Genesis transaction as your first staking reward. This establishes a Trust key in your wallet and stakes your wallet balance on that key. From that point, you will periodically receive additional Trust transactions as further staking rewards for as long as your Trust key remains active. IMPORTANT - After you receive a Genesis transaction, backup your wallet.dat file immediately. You can select the Backup Wallet option from the File menu, or manually copy the file directly. If you do not do this, then your Nexus balance will be staked on the Trust key that you do not have backed up, and you risk loss if you were to suffer a hard drive failure or other similar problem. In the future, signature chains will make this precaution unnecessary.
4. I am staking with my Nexus balance. What are interest rate, trust weight, block weight, and stake weight? These items affect the size and frequency of staking rewards after you receive your initial Genesis transaction. When staking is active, the wallet displays a clock icon in the bottom right corner. If you hover your mouse pointer over the icon, a tooltip-style display will open up, showing their current values. Please remember to backup your wallet.dat file (see question 3 above) after you receive a Genesis transaction. Interest Rate - The minting rate at which you will receive staking rewards, displayed as an annual percentage of your NXS balance. It starts at 0.5%, increasing to 3% after 12 months. The rate increase is not linear but slows over time. It takes several weeks to reach 1% and around 3 months to reach 2%. With this rate, you can calculate the average amount of NXS you can expect to receive each day for staking. Trust Weight - An indication of how much the network trusts your node. It starts at 5% and increases much more quickly than the minting (interest) rate, reaching 100% after one month. Your level of trust increases your stake weight (below), thus increasing your chances of receiving staking transactions. It becomes easier to maintain trust as this value increases. Block Weight - Upon receipt of a Genesis transaction, this value will begin increasing slowly, reaching 100% after 24 hours. Every time you receive a staking transaction, the block weight resets. If your block weight reaches 100%, then your Trust key expires and everything resets (0.5% interest rate, 5% trust weight, waiting for a new Genesis transaction). This 24-hour requirement will be replaced by a gradual decay in the Tritium release. As long as you receive a transaction before it decays completely, you will hold onto your key. This change addresses the potential of losing your trust key after months of staking simply because of one unlucky day receiving trust transactions. Stake Weight - The higher your stake weight, the greater your chance of receiving a transaction. The exact value is a derived by a formula using your trust weight and block weight, which roughly equals the average of the two. Thus, each time you receive a transaction, your stake weight will reset to approximately half of your current level of trust.
I would like to warmly welcome everyone to waltonchain This is an updated, extended community-written post and I will try to update it regularly over time.
Please respect our rules (see sidebar) and feel free to comment, contribute and ask questions. Don’t forget to subscribe to the subreddit for any news on Waltonchain!
What is Waltonchain?
The Waltonchain Foundation is building a cross-industry, cross-data sharing platform by integrating Blockchain with the Internet of Things through self-developed RFID Chips with intellectual property rights. The in-house developed Waltonchain RFID chips integrate a proprietary, genuine random number generator and an asymmetric encryption logic and hardware signature circuit, all of which are patent-protected. The combination of self-developed RFID chips and the Waltonchain blockchain will ultimately achieve the interconnection of all things and create a genuine, believable, traceable businessmodel with totally shared data and transparent information. Waltonchain will unfold a new era of the Value Internet of Things (VIoT).
The Waltonchain team has formulated a 4-phase development plan, starting from infrastructure platform establishment to gradually incorporating retail, logistics and product manufacturing, and to finally achieving the full coverage of the business ecosystem.
As for the phase 1.0 of the project, the team has developed the clothing system integration scheme based on RFID. The application scenarios at phase 1.0 will establish Golden demonstration template At phase 2.0, our RFID beacon chip will be massproduced and can be used in clothing, B2C retail and logistics. At phase 3.0, manufacturers will achieve traceable customization of intelligent packaging. At the project phase 4.0, with the upgrading and iteration of assets information collection hardware and improvement of blockchain data structure, all assets can be registered in Waltonchain in the future.
Do Sanghyuk (都相爀) – Initiator in Korea Korean, Vice Chairman of the China - Korea Cultural Exchange Development Committee, Director of the Korea Standard Products Association, Chairman of Seongnam Branch of the Korea Small and Medium Enterprises Committee, Chairman of Korea NC Technology Co., Ltd., Senior Reporter of IT TODAY News, Senior Reporter of NEWS PAPER Economic Department, Director of ET NEWS.
Xu Fangcheng (许芳呈) – Initiator in China Chinese, majored in Business Management, former Director for Supply Chain Management of Septwolves Group Ltd., has rich practical experience in supply chain management and purchasing process management. Currently, he is the Director of Shenzhen Silicon, the Director of Xiamen Silicon and the Board Chairman of Quanzhou Silicon. He is also one of our Angel investors.
Kim Suk ki (金锡基) Korean, South Koreas electronics industry leader, Doctor of Engineering (graduated from the University of Minnesota), Professor of Korea University, previously worked at Bell Labs and Honeywell USA, served as vice president of Samsung Electronics, senior expert in integrated circuit design field, IEEE Senior Member, Vice President of the Korea Institute of Electrical Engineers, Chairman of the Korea Semiconductor Industry Association. Has published more than 250 academic papers with more than 60 patents.
Zhu Yanping (朱延平) Taiwanese, China, Doctor of Engineering (graduated from National Cheng Kung University), Chairman of the Taiwan Cloud Services Association, Director of Information Management Department of National Chung Hsing University. Has won the Youth Invention Award by Taiwan Ministry of Education and Taiwan Top Ten Information Talent Award. Has deeply studied blockchain applications over the years and led a block chain technology team to develop systems for health big data and agricultural traceability projects.
Mo Bing (莫冰) Chinese, Doctor of Engineering (graduated from Harbin Institute of Technology), Research Professor of Korea University, Distinguished Fellow of Sun Yat - sen University, Internet of Things expert, integrated circuit expert, Senior Member of Chinese Society of Micro-Nano Technology, IEEE Member. Has published more than 20 papers and applied for 18 invention patents. Began his research of BitCoin in 2013, one of the earliest users of btc 38.com and Korea korbit. Served as Technical Director of Korea University to cooperate with Samsung Group to complete the project Multi sensor data interaction and fusion based on peer to peer network. Committed to the integration of block chain technology and Internet of Things to create a real commercialized public chain.
Wei Songjie (魏松杰) Chinese, Doctor of Engineering (graduated from the University of Delaware), Associate Professor of Nanjing University of Science and Technology, Core Member and Master Supervisor of Network Space Security Engineering Research Institute, Block Chain Technology expert in the field of computer network protocol and application, network and information security. Has published more than 20 papers and applied for 7 invention patents. Previously worked at Google, Qualcomm, Bloomberg and many other high-tech companies in the United States, served as R D engineer and technical expert; has a wealth of experience in computer system design, product development and project management.
Shan Liang (单良) Graduated from KOREATECH (Korea University of Technology and Education) Mechanical Engineering Department, Venture Capital PhD, GM of Waltonchain Technology Co., Ltd. (Korea), Director of Korea Sungkyun Technology Co., Ltd., Chinese Market Manager of the heating component manufacturer NHTECH, a subsidiary of Samsung SDI, economic group leader of the Friendship Association of Chinese Doctoral Students in Korea, one of the earliest users of Korbit, senior digital money player.
Chen Zhangrong (陈樟荣) Chinese, graduated in Business Management, received a BBA degree in Armstrong University in the United States, President of TIANYU INTERNATIONAL GROUP LIMITED, leader of Chinese clothing accessories industry, Chinas well-known business mentor, guest of the CCTV2 Win in China show in 2008. Researcher in the field of thinking training for Practical Business Intelligence e-commerce and MONEYYOU course, expert on success for Profit Model course. Began to contact Bitcoin in 2013 with a strong interest and in-depth study of digital money and decentralized management thinking. Has a wealth of practical experience in the business management, market research, channel construction, business cooperation and business model.
Lin Herui (林和瑞) Chinese, Dean of Xiamen Zhongchuan Internet of Things Industry Research Institute, Chairman of Xiamen Citylink Technology Co., Ltd., Chairman of Xiamen IOT. He successively served as Nokia RD Manager and Product Manager, Microsoft Hardware Department Supply Chain Director. In 2014, started to set up a number of IoT enterprises and laid out the industrial chain of the Internet of Things. The products and services developed under his guidance are very popular. Assisted the government in carrying out industrial and policy research and participated in planning of multiple government projects of smart cities, IoT towns and project reviews.
Ma Xingyi (马兴毅) Chinese, China Scholarship Council (CSC) special student, Doctor of Engineering of Korea University, Research Professor of Fusion Chemical Systems Institute of Korea University, Korea Sungkyun Technology Co., Ltd. CEO, Member of Korea Industry Association, Associate Member of the Royal Society of Chemistry, has published his research results in the worlds top journal Nature Communications and participated in the preparation of a series of teaching materials for Internet of Things engineering titled Introduction to the Internet of Things. His current research direction covers cross-disciplines that combine blockchain technology with intelligent medical technology.
Zhao Haiming (赵海明) Chinese, Doctor of Chemical Conductive Polymer of Sungkyunkwan University, core member of Korea BK21th conductive polymer project, researcher of Korea Gyeonggi Institute of Sensor, researcher of Korea ECO NCTech Co., Ltd., Vice President of the Chinese Chamber of Commerce, Director of Korea Sungkyun Technology Co., Ltd. He has been engaged in transfer of semiconductor, sensor and other technologies in South Korea. He is an early participant of the digital currency market.
Liu Cai (刘才) Chinese, Master of Engineering, has 12 years of experience in design and verification of VLSI and a wealth of practical project experience in RFID chip design process, SOC chip architecture, digital-analog hybrid circuit design, including algorithm design, RTL design, simulation verification, FPGA prototype verification, DC synthesis, backend PR, package testing, etc. Has led a team to complete the development of a variety of navigation and positioning baseband chips and communication baseband chips, finished a series of AES, DES and other encryption module designs, won the first prize of GNSS and LBS Association of China for scientific and technological progress. Finally, he is an expert in the consensus mechanism principle of blockchain and the related asymmetric encryption algorithm.
Yang Feng (杨锋) Chinese, Master of Engineering, worked at ZTE. Artificial intelligence expert, integrated circuit expert. Has 12 years of experience in VLSI research and development, architecture design and verification and 5 years of research experience in artificial intelligence and the genetic algorithm. Has won the Shenzhen Science and Technology Innovation Award. Has done an in-depth research on the principle and realization of the RFID technology, the underlying infrastructure of blockchain, smart contracts and the consensus mechanism algorithm.
Guo Jianping (郭建平) Chinese, Doctor of Engineering (graduated from the Chinese University of Hong Kong), Associate Professor of the Hundred Talents Program of Sun Yat-sen University, academic advisor of masters degree students, IEEE senior member, integrated circuit expert. Has published more than 40 international journal conference papers in the field of IC design and applied for 16 patents in China.
Huang Ruimin (黄锐敏) Chinese, Doctor of Engineering (graduated from the University of Freiburg, Germany), academic advisor of masters degree students, lecturer of the Department of Electronics of Huaqiao University, integrated circuit expert. Mainly explores digital signal processing circuit and system implementation and works on digital signal processing technology long-term research and development.
Guo Rongxin (郭荣新) Chinese, Master of Engineering, Deputy Director of the Communication Technology Research Center of Huaqiao University. Has more than 10 years of experience in design and development of hardware and software for embedded systems, works on the long-term research and development of RFID and blockchain technology in the field of Internet of Things.
Dai Minhua (戴闽华) Chinese, graduated in Business Management, received a BBA degree from Armstrong University, senior financial expert, served as Vice President and CFO of Tanyu International Group Co., Ltd. Has 13 years of financial work experience, has a wealth of experience in developing and implementing enterprise strategy and business plans, as well as achieving business management objectives and development goals.
Liu Dongxin (刘东欣) Chinese, received an MBA from China Europe International Business School, Visiting Scholar of Kellogg School of Management at Northwestern University, strategic management consulting expert, investment and financing expert. His current research interest lies in the impact of the blockchain technology on the financial sector.
Song Guoping (宋国平) Qiu Jun (邱俊) Yan Xiaoqian (严小铅) Lin Jingwei (林敬伟) He Honglian (何红连)
Ko Sang Tae (高尚台) Liu Xiaowei (刘晓为) Su Yan (苏岩) Zhang Yan (张岩) Ma Pingping (马萍萍) Peng Xiande (彭先德) Fu Ke (傅克) Xiao Guangjian (肖光坚) Li Xiong (李雄)
Question: the 3 days of devcon are over. Are people interested in reports on the next 3 days of international Blockchain week (demo day + 2 days of global Blockchain summit) http://www.blockchainweek2016.org `
The buzz during the day was around the "stick puzzle" that Bok Khoo was giving out to people. It is just a stick, with a loop of string. He gets you to turn away, he uses "the trick" to put it onto your bag and then you try to get it off. The WeChat channel was just filled with everyone asking where they can get it, and the screaming that they can't figure it out. Only about 5 people reported they were able to solve it (I haven't yet) http://imgur.com/mYfJQP4http://imgur.com/4Euka1a `
I'm biased, but I thought the announcement from Microsoft with the update of cryptlets was a big deal. The morning sessions covered a few different oracle systems, the afternoon had lots of IPFS sessions. Microsoft - A Lap around Cryptlets https://azure.microsoft.com/en-us/blog/cryptletsdd/https://azure.microsoft.com/en-us/documentation/templates/ethereum-consortium-blockchain-network/https://azure.microsoft.com/en-us/blog/authomarleyg Microsoft was a sponsor of Devcon1 & 2 Ethereum is a 1st class citizen Support for community & partners - Bizspark, Meetups, Workshops Announcing: Bletchley v1 Distributed Ledger stack V1 is a private Ethrerum consortium, that you can spin up for your own enterprise / group http://imgur.com/olwwd36 Cryptlets are being developed to help with security, identity, etc. How do you get trusted external data feeds injected into the Blockchain? Doing things on a specific interval (every 15 mins) When price of something hits a threshold (oil goes above $40/barrel) Secure IP protected algorithms, but still share with blockchain network. Use libraries for common platforms (.Net, Java, etc) Cryptlets vs Oracle Cryptlets will have a marketplace on Azure that will allow you to purchase and utilise Use case: Trigger on an event Wake up on 4pm, if market was open that day, then give me the price of gold for that day.Get signature of attested server, attested sender. Use case: Control Using smart contract like a traditional DB. Declare data you are keeping track of, and the functions/"stored proc" to update that data. Cryptlet runs off chain, and can be scaled up. http://imgur.com/ysgL8S2 Utility cryptlet. Use an attribute in solidity contract with cryptlet details Developer references at design time the cryptlet they want the contract to call Contract cryptlet, deploy the cryptlet at same time as contract. Why would you want Azure to do this? SGX allows you to create "secure enclaves", can have complete isolation on the hardware chip where it is not modifable. Provides a secure enclave at the CPU level. Can give full attestation right down to the silicon. Will be provided as a enclave container on Azure. Will be released for .NET core CLR first, then other languages. Can create cryptlet libraries that you can scale and put into the Azure marketplace. An ecosystem for developers & ISVs to consume and publish. Bletchley v1 released today will let you spin up a private consortium. Before today, it took a long time to try and deploy a private consortium (can take weeks to read doco, Now takes 5 minutes to deploy! Creates a private consortium, puts each member in its own separate subnet http://imgur.com/w4yUsqE Mist Vision and Demo I was too busy sharing the release posts of Microsoft project bletchey v1, missed this talk. It did look interesting, I will watch this one later. Idea: Reward for bandwidth. Providing connection could replace mining as entrance point for desktop computers. Allow you to have a trickle so you can trigger smart contracts. Standardised backends, so that you can swap out the underlying node between geth, blockapps, etc. Web3.js https://github.com/ethereum/web3.js Etehereum JS API Smart conracts are EVM opcodes, Helps translates calls to JSON RPC calls. Helps do the ABI encoding when sending data from JS to EVM It kept on growing, many different utility functions being thrown in. Is time to clean it up and be refactored. They are now building a NEW web3.js The communication will be socket based, will enable subscriptions. Everything will be based on promises to subscribe to events, like log events. Bunch of other newer cleaner methods and ways to do things like deploying contracts. Smart contract security Was a very good postmorteum of The DAO and things that could be done to mitigate it in the future. An issue with The DAO was trying to do a massive jump from centralisation all the way to full decentralisation. Meant no one could step up and make a decision on how to save it. We need to make smaller steps towards full decentralisation as we learn as a community how to do this. Same security patterns as yesterday's talks: check invarients, beware 1024 call stack depth, reentry exploit (update state BEFORE executing calls), timestamps are manipulatable. Updateable contracts. Who can update it? Community multisig? We need better rools: formal verification, compiler warnings, improved IDEs, trusted libraries, excape hatches Conclusion: It is still very early days in this space, be careful. A Provably Honest Oracle Model: Auditable Offchain Data Gathering & Computations Oracalize is the most widely used oracle (until everyone starts using Microsoft Azure cryptlets ;-) ) Contract calls Oracalize contract with the data they want, off chain they see this get the data, Oracalise then trigger their contract externally, which does a callback to your contract with the data. Can use external notary servers. Can get proof from multiple external services to get a higher level of confidence about data (e.g. stock price from a few feeds). Off-chain (auditable_ computation) AWS sandbox 2.0. Put the execution package onto IPFS, AWS gets it and executes it, signs it. iEx.ec: Fully Distributed Cloud Thanks to the Ethereum Blockchain http://iex.ec/ Provides blockchain based execution environments Global market for computing resources. Idea is to do what we did before with "grid computing" use the idle capacity of computers. But this time do a trickle of micropayments. Allows people to harness this global power to execute their tasks in a global "distributed cloud". The Final frontier: The company smart conract http://otonomos.com/ Helping companies to incorporate on the blockchain. Smart oracles https://github.com/smartoracles Connecting to external resources is difficult. Hard to try and use external currencies (like a bank account / fiat money) to make transactions. Could hook in paypal, HSBC, wells fargo, etc. Can provide your own payment services as an API to a smart oracle for smart contracts to consume. Do off chain data storage by calling smart oracle API Roadmap: more data sources & more payment methods IPFS & Ethereum: Updates https://Ipfs.io IPFS is AMAZING, seriously go watch the full 1 hour talks Juan has given in previous years. Current web has current issues. Centralisation, etc. IPFS is a new hypermedia transfer protocol Content can be retrieved not from specific servers, but instead via it's hash so that it can come from anywhere in the network (maybe from the person next to you who has cached it). It is highly modular, all of the transfer protocals, routing, naming, etc. are all swapable Is available as GO-IPFS & now JS-IPFS Means now you can run IPFS in the browser IPFS was great for static content, but not so great for dynamic content. Low latency pub/sub protocol will help with dynamic data. Created a distributed peer to peer chat app using this new dynamic content protocol. IPLD a common link-tree hash format Will be able to use IPFS to retrieve ethereum blockchain blocks DIRECTLY Can use IPFS as a package manager to retrieve them in a distributed manner. Many projects are using Ethereum & IPFS Uport, Digix, Infura, Ujo, Eris, Blockfreight. Filecoin was created as a way to try and incentivize nodes to keep files longer time. People rent out hdd space to earn filecoin. Exchange bitcoin/filecoin. Use filecoin to store files in network. Filecoin is going to be built on top of the public Ethereum blockchain, as a virtual blockchain / token. IPFS Libp2p & Ethereum networking Network connectivity between any 2 nodes can be difficult. Censorship, bandwidth, network issues, etc. Having to deal with different networking topologies and access. Libp2p & Devp2p is different. Devp2p is for Ethereum. LIbp2p is modular, can swap out components to change network access, encryption methods, etc. Can build up a MEGA mesh network, by utilising traditional wired internet, radio, bluetooth between some nodes. Web browser using web socket, to a node, which routes across network, to zigbee to a IoT device. Libp2p & Devp2p could merge and augment each other. Could create the libp2p components to replace the devp2p bits Any 2 nodes that speak the same protocol can communicate and be a part of the network chain. Experiment. They took the browser based version of EVM. Then used Libp2p to talk to the Ethereum network. Had a complete ethereum node running in a browser. Uport https://uport.me/ Universal identity platform Current challenges: key management. Ux for average person. Dapps via mobile. Identity and data ownership. How do you keep a consistent identity, even if you lose a key. Have some multisig contracts that you can use to keep track. Social recovery, use your friends to attest it is really you. Keep private key on mobile, do transactions on the desktop, scan a QR code to sign the transaction on your phone and send it off. A Deep Dive into the Colony Foundation Protocol It is an open source governance protocol built on Ethereum Problem with voting is how to prevent Sybil attacks. Votes are weighted by a reputation score. Reputation is non-transferable that can only be earned. Total weighted voting helps mitigate this. Chain orchestration tooling & smart contract package management Eris is tooling for developers. Package manager to build your own blockchain. Can compose a chain, e.g. geth + tendermint consensus. Init, install, do. Can easily install on Mac/bew, linux/apt-get, Windows/choco The Golem Project: Ethereum-based market for computing power http://www.golemproject.net/ Anyone can make an offer to sell computing power. e.g. Distributed rendering Want to create a standard framework that anyone can use to submit and process jobs. Status: Integrating Ethereum Into Our Daily Lives https://status.im Want to get ethereum everywhere. "Mist for Mobile" Everyone is using their mobile phones for everything, but mostly using instant messaging. What would Ethereum in a IM window look? Created a IM mobile app that has a local geth node. tart up, it asks you to create a password, it generates a pub/private pair. Then can send messages via whisper, and the messages are signed with your public key. Can load Dapps up in the local webview and interact with them. Allows you to create "chat Dapps", that you interact with via text. Like chatbots Maker Ecosystem Overview www.Makerdao.com Dai: seeking stability on blockchain. Stablecoin engine: smart contract that holds collateral reserves and controls the Dai lifecycle. MKR: open source community managing risk of the system In the last year, investing in a solid technical core. More slow and audit things. Moving into the next phase of stablecoin development. Their latest project is the "Simplecoin project" Meeting Thereum community's need for stability. An independent platform for creating centrally administered simple stablecoins. Issues create their own rule sets: Collateral types, participant whitelists, security parameters. Example: Shrutebucks. The only people who own it are Dwight, Jim & Pam. They backed it with 1/3 ETH 1/3 DGX 1/3 DUSD. Orbit. A distributed peer to peer app on IPFS https://github.com/haadcode Created a full distributed chat room, itself distributed through IPFS. It is integrated with uPort for identification Using uPort allows you to verify that you are talking to the correct person in the chat channel. All their messages are signed with their public keys He also created a full distribited twitter clone, using uport for the identity as well. Orbit-db key value store DB that stores its data on IPFS. Eventually consistent Appends data to the DB, an event is sent to those subscribed on pub/sub so they can see the latest root hash. Based on CRDT Ethereum + Pubsub + CRDTs + IPFS = super power primatives to build dynamic distributed apps Development considerations with distributed apps. Need to ensure that apps work offline. No centralised servers. No data silos. Provide integration path. Future work: could you use uPort for ACL like permissions? Mobile use cases, how to make it work nicely on mobiles Building scalable React Dapp architecture https://github.com/SilentCicero/react-dapp-boilerplate React + Ethereum He has a configured boilerplate template. Has contract scaffolding. Enforced contract Linting/testing. Wallet generation/identity. Preconfigured web3 instance. UI: Mature react arhitecture "react boilerplate". Prices listed in USD with ETH/btc via kraken api. A basic multi-contract example Dapp. Offline first, dapp runs without internet. Uses Redux. State models in UI & blockchains work well. PostCSS, CSS Modules, sanitize.cs. Redux, immutableJS, reslect, redux-saga, i18n, redux-router. Web3, ethdeploy, dapple, solium, eth-lightwallet, chaithereum, ethereumjs0-testrpc Enforced contract testing in 2 languages. Ethereum for Enterprise (BlockApps Strato) Trying to make sure that Ethereum stays relevent to enterprise development. Why do you need a blockchain WITHIN an org, shouldn't they trust each other? Well different departments may not, they may reconcile differently, and can help automate/orchestrate between them. Blockchain is the "killer app" for cloud financial services. Legacy infrastructure, batch prossing, etc are all restricting fintech from progressing. Blockchain can happen in real time, can replace legacy. Ethereum is very flexible and programmable, works well. There are others based on Bitcoin (like Hyperledger). Ethereum + Blockapps = Extreme productivity + Proven Technology. Blockapps is extending Ethereum for Enterprise. Runs very well on Azure Enterprises don't want all their data exposed on public chain. Blockapps helps solve data privacy and scaling with multichain fabrics.
So I've been digging into past posts of Jani and reading his words gave me extra confidence in Iconomi. I found possible use cases for ICN, company philosophy, and examples of the team's attention to detail that were new to me. I've included the quotes that stuck out. Hope you enjoy! Bold is the name of the quote's thread Italics is my one additional comment. Don't panic guys, this has happened before. "For all FUDers I'll start with a quote from an article: "First, the bubbly nature of the ICO market seems to favour the ability to tell a story over the ability to create a great product. The risk here is we’ll end up with more “stock promoters” than “product makers.”" We happen to be product makers and not hype promoters. Because long term product makers surpass hype promoters by a lot. With all this FUD there is never conversation about fundamentals. Because you can not have ICONOMI fundamentals and FUD in the same sentence. ICONOMI fundamentals are healthy. Yesterday for example we got more than 200k USD into BLX with 308 buy events. It was no spike. Just an average day. With those numbers ICONOMI as a project is 90% cash positive! That means we make 90% of money we burn every day! And we're able to do that because we have a functional product out and a lot more coming in the near future. Now compare that to any other blockchain project or to even any other startup that is less than a year old! " "Warren Buffett || "The stock market is a device for transferring money from the impatient to the patient." What if... the amount of ICN tokens Iconomi should buy back is not for sell on any exchange because every holder keeps HODLing? When will it be clear how much ICN is needed to use DAA? "When DAAs are ready. What is clear now is that any amount of ICN needed to use DAA will be burned as well." What value does ICN has for Iconomi? "ICONOMI has incentive to be trusted long term. Trust for us means DAA managers joining and investors joining us and more. That means business growing. If we break the promise with buy backs there is no more trust. If we stop buybacks everything else stops, because we'd lose the business and that is the best possible natural incentive and guarantee for you we'll keep doing buybacks." Suggestion for ICONOMI!A proposal put forward by ma007 that in my opinion would be awesome and make all ICN holders happy It would be great though if the Iconomi management team would break the silence about this subject and come with an official statement of ICN use case. Because this is becoming a drawn-out debate. "Official statement comes when ICN gets that function. That is when DAAs are out. Right now we're still playing with various scenarios." Tier 2 verification only via video-call? "Scans of documents are too easy to fake. Even if you ask for selfie while holding the ID. There are bunch of fake IDs and templates on the darknet markets to buy. Video call is way harder to fake (close to impossible). You need to have document in hard, we can see your actual face and all the security features on the document (you need to tilt ID on the video call). By having real identities, you decrease money laundering and all kind of frauds. When money laundering and frauds happen, investigations kick in (sooner or later). Each investigation takes a bunch of time and resources of the company. In future this will save us a bunch of time and we'll be able to use time to grow business instead of dealing with some bad guys. Also, plugging our services into existing financial infrastructure where lots of big money is residing requires you to be "clean". And that's where we're going. We're setting a new standards here, it might be a bit less convinient to make a video call than just uploading some docs, but it's well worth it. Disclaimer: before ICONOMI we ran Cashila. European fiat<>btc service and we've seen and learned a lot of valuable lessons that makes us build ICONOMI faster and in a way better way." Will we be able to buy ICN through the platform? "Yes. But can't say when exactly." Become one of the first ICONOMI Digital Asset Array managers Jani Valjavec is this open to small teams or only individual managers? "You don't need 100k urself. U can also privately get 100k invested from anyone on the platform. But once DAAs are out, they will all need to have at least 100k invested." ""$100k minimum at this stage; personal or raised" That means you either seed with your own money or raise privately from others. But privately. Before it's open to public on ICONOMI. " Would you be interested in ICN Weekly Discussion Thread "We're always open to suggestions. What rules should we create in that weekly disucssion thread?" Talk about Bancor ICO hi jani, how can we participate in future ICOs with ICN's help? "Now you can't. You will be able to once this is public and it will probably be correlated with the amount of ICN you will have (demand for this service proved to be enormous)." ICONOMI AMA - June 2017 "The ICONOMI platform will be home to many DAA’s. As of now there are 2: ICNP our actively managed closed-ended DAA with a high performance target. This is backed by Deloitte and CoFound.it. Secondly, ICNX our flagship index based DAA. This makes it possible to acquire a selection of digital assets with just a few clicks. Eventually anybody will be able to sign up and create their own DAA too. The ICONOMI token ICN is an Ethereum-based ERC20 token. ICN token holders benefit from several revenue streams including 20% of ICNP realised gains, a 3% yearly ICNX management fee and 0.1% entry/exit fee, 30% (of a 1-10% management fee) will also be collected from all future Digital Asset Arrays (DAA) created on the ICONOMI platform. User created DAA’s will also include a 0.1% entry/exit fee. As a holder of ICN you will benefit from all of the above. Currently ICNP’s assets represents approximately 45% of ICONOMI’s total assets. This value is embedded in the ICN tokens. Please see the image attached! http://imgur.com/2A2dhVS" Will Iconomi be implementing Cashila's assets/tech into the Iconomi platform? "Thanks for the question Harillen! All Cashila team members are now working full time at ICONOMI therefore all the experience that has been gained while running Cashila is being transferred over to ICONOMI. For those that aren’t aware Cashila was the first licenced money remittance service that was executing transactions from Bitcoin to fiat bank accounts in Europe!" Is there a plan to open ICNP eventually to outside money via platform? the wording on the site suggests so. "Hello again jandetlefsen! The platform will offer multiple actively managed Digital Asset Arrays which will provide opportunities for investors. We are considering a few scenarios for how to open ICNP for additional investors and to make tokens tradable." ICONOMI invested 1.5m into Aragon! "15k ETH went from ICNP. The rest was from individuals who wanted to participate in Aragon and were asking to join. We collected their ETH and put it in with a single ICO transaction of 17.670 ETH. Effectively we were trying to see if that could be a product ICONOMI could also offer. Looks like it worked well for all." "You are missing the big picture here. First of all, you can see patterns in blockchain and the fact that we moved exact amount to ICNP address tells you we act professionally. But the biggest reason lies elsewhere. In order to explore new product opportunities you need to start somewhere small out of need. It is exactly why we started ICONOMI. It was bunch of people around us asking us to manage assets for them as well. They said "just manage them with the rest of your portfolio". This of course is impossible task doing it on exchanges. This is simplified version of how ICONOMI was born. With investing into ICO story is the same. There obviously is a demand on the market and this is just a first step towards new product on ICONOMI. A product that will make investing into ICO easier or even possible for average Joe and a product that will enable DAA managers include certain assets since inception." "Individuals were our silent advisors/alpha group of people we work with. The group of people we listen to, learn from and progress ideas into products mostly. They can't be named individually. Few of them expressed wish to help them get into Aragon and we collected some ETH. No one knew who owns the amounts sent therefore no one knew if ICNP intends or does not intend to invest. Please do not make false accusations. However, sulution turned out to work great, as we made it into the very first block (only 3 other Aragon transactions made it). It will further evolve into offering getting into ICOs even with fiat money for an average Joe - without them knowing if ICNP will participate as well or not." "Investment secrecy and helping others invest was just tested and it works great! In future there will be option to invest into majority of ICOs via ICONOMI. Regardless if ICNP will invest or not." "Only Chuck Norris can invest with bitcoins into Ethereum smart contracts." We The Undersigned Vote Via +1 For An ICONOMI Dashboard App "We 100% agree on that and working on that. Prioritisation is clear. Nevertheless - compare ICONOMI's transaparency with other projects and you will see we are setting new standards here. And once again, thank you for your clearly stated expectations - we will meet them. Edit: I upvoted this post as well. We're on the same boat." Will Iconomi eventually move on to become a true decentralized dapp instead of using centralized servers once Raiden is up and running? "Swarm is still in alpha. Not even beta. Let's first see what it really offers and how it performs. Will you be able to use your own ICONOMI wallet? Eventually yes, you will have that option and we've had discussions of that already. Talking with some traditional asset management companies that request was partially exposed as something they might want/need - like to operate with ICONOMI and have outside custodian (which can be yourself as well) for your underlying assets. That way, you wouldn't even need decentralised exchanges." ICONOMI AMA - May 2017 "We acknowledge what the community is saying regarding the way we communicate and how it affects the price. This is a learning process for us - not only are there language barriers and cultural differences, but most of us are also more used to being locked away programming than interacting with the public. We’ve tried to improve the situation with a) quarterly financial reporting b) monthly updates and c) subsequent AMA’s. The interest in this project is somewhat overwhelming and we hope you’ll bear with us while we find our feet. There are investors in lots of different places not just ICONOMI slack and Reddit etc. - we are learning that there isn’t a one size fits all communication method and that we must try to listen to what our community is saying. ICONOMI is a project that will influence the way business is done in countries all around the globe - finding a common ground that spans these many cultures and languages is a daunting challenge that we take seriously and will work to improve. We also welcome any suggestions that you think will help us to keep you informed."
WaykiChain is a block public chain focusing on blockchain technology development and related operations. WaykiChain has positioned itself as an infrastructure that is based on both Ethereum and Blockchain, intending to trigger a collective growth of different industries by presenting an enterprise solution.
Determined to build a world-class decentralized platform and ecosystem, WaykiChain launched the first smart-contract-based game prediction DApp in May 2018 with over 130,000 install volume, token WICC listed in 100+ exchanges, peaking at ＄3, community members over 300K, is believed to be innovating a new business model in the new era. WaykiChain, a team focused on blockchain industry’s foundation and application development, now consisting of nearly 70 people, with core members from world-renowned companies such as Alibaba, Tencent, Morgan Stanley and Intel, is hoping to ultimately achieve an ecosystem that everyone can participate in the building and share the results.
Where is WaykiChain Heading?
The future of WaykiChain is a big community-driven public chain ecosystem. WaykiChain aims to build a decentralized application platform that can provide users with complete on-chain smart contract system. Anyone can realize their business ideas on WaykiChain and develop their own DApp, and build their own brands. WaykiChain takes decentralized prediction, assets trading and forex trading as entry industries to expand markets in the early stage. After accumulating plenty of application users and developers, WaykiChain will gradually perfect its upper blockchain applications. Currently, WaykiChain tech team is focusing on underlying public chain development. WaykiChain will provide friendly development environment to developers with sufficient development templates an interfaces. Besides, WaykiChain team plans to take a part of WICC as reward those developers who have made important contributions to the community. WaykiChain is committed to building an underlying technology platform that truly integrates blockchain application and real business. Along with its development, WaykiChain will gradually grow into a big ecosystem with totally decentralized operations, and brings the convenience of blockchain to every user.
Consensus Mechanism Delegated Proof of Stake (DPoS) is a consensus algorithm maintaining irrefutable agreement on the truth across the network, validating transactions and acting as a form of digital democracy. Delegated through token holders’ vote, ledgers nodes will package all the transactions in the block and get corresponding reward. DPOS can maximize token holders’ interests and network performance, meanwhile minimize the maintenance and operation costs. WaykiChain adopts DPoS, which is the most adaptive consensus mechanism for developing and operating applications on chain. The block is successively generated by 11 ledger nodes. Every 10 seconds, a new block will be generated on WaykiChain. Verified by WaykiChain mainnet operation, the transaction confirmation speed can reach 1000+tps. Vote Mechanism WaykiChain adopts DPOS consensus mechanism with 11 ledger nodes. When a block is generated, a node is elected with the most votes according to random perturbation algorithm from the 11 nodes. Then ledger node gains all of the transaction fee in its ledger block. Users can get proportionate votes by locking their WICC. Every node can be cast for 11 candidates at most. Every voted user will be awarded proportionate interest. When users’ corresponding accounts’ votes changes, the interest from voting will be received automatically. The first year’s rate of interest is 5% and it will decrease 1% annually during the following years. Finally, the annual rate of interest will be fixed at 1% permanently. Smart Contracts WaykiChain is a smart contract platform that supports Turing devices. These smart contracts can help in a variety of real-world applications including copyright issues, decentralized exchanges and asset problems. It adopts DPOS consensus mechanism, sets up 11 voting nodes, and generates a new block every 10 seconds. According to detailed calculation by WaykiChain team, currently, the confirmed transaction speed can reach 1000+tps. WaykiChain’s smart contract can be built using the programming language Lua. Lua was developed in the early 1990s and has an extensive developer community. It has been used in desktop development, web development and the Internet of Things. It also is one of the easiest programming languages and hence it provides an incentive for developers to code on WaykiChain’s platform. Sidechain The most popular smart contract cryptocurrency Ethereum, failed when Cryptokitties were released. Ethereum’s network was unable to handle the massive influx of users. Thus, scalability remains a huge problem. Fortunately, WaykiChain has a feature known as sidechains which can deal with huge amount of users. Applications built on WaykiChains will have their own sidechains and they are not linked in any way to each other. WaykiChain Ecosystem Development System WaykiChain ecosystem development system is driven and co-developed by three parties: WaykiChain core developers, open source community developers and business developers. In the decentralized system, WaykiChain team will provide technical standards and community contribution incentives to ensure that the entire ecosystem moves forward as a whole. On the basis of the underlying public chain, plug-ins, and smart contracts, business developers are able to develop applications efficiently and build their own brands with blockchain’s credit endorsement. WaykiChain plans to establish Technology Research Academy to gather a group of outstanding developers with decentralized blockchain beliefs. WaykiChain will provide underlying technology support and standards. Developers in the academy can free communicate, learn from each other and co-develop a fully decentralized community. Ecosystem Layered Architecture WaykiChain technology stack consists of four layers: the core node layer, the wallet node layer, the application platform layer, and the DApp application layer. Any developer can choose which layer to start development based on their own development capability, business needs, and application flexibility needs. WaykiChain core technology team is committed to providing the develop-friendly interfaces of each layer and improving the technical documentation to help the community better build the ecosystem.
WaykiChain Github:https://github.com/WaykiChain/WaykiChain How Does WaykiChain Work? WaykiChain uses a DPoS consensus mechanism with eleven accounting nodes. The annual rate of return is 5% for the first year, with a 1% increase with every year that goes by. Each time a block is created, an accounting node is randomly associated. The accounting node gains all of the transaction fees in its accounting block. Users can earn interest by locking WaykiChain coins. The interest is automatically determined each time the votes for the corresponding user account change. The terms of betting are triggered by the initiator through smart contract transactions. Users can initiate various betting contract transactions, all of which can be searched and identified in the block browsers. When the betting is over, the bet initiation will publish the final results and the gaining will be then shared accordingly. In short, the betting revenue is automatically issued to the user’s wallet after the betting results are displayed. The smart contract provided by the platform makes it possible for asset initiations to create dividend sharing rules. These rules are only triggered by various conditions. Hence, the final price of the assets in circulation will be determined by the market’s behavior towards the object in the transaction.
Token System Waykichain Token, WICC is a token only used and circulated in WaykiChain Wallet DApp. WICC itself does not have any FIAT characteristics. By consuming WICC as a kind of fuel, users can use applications on WaykiChain; by locking their WICC for a certain period of time, users can share the revenue from WICC Lock Revenue Sharing Plan; and by voting for effective and stable accounting nodes, users can earn related interest. WICC can be obtained by participating in the lock plan, by accounting, voting, and subscription, or by trading with other holders. This means WICC will be listed on lots of exchanges and traded with other cryptocurrencies, thus WICC also has trade value. WaykiChain Block Explorer WaykiChain official block explorer is a data display system for WaykiChian applications, which displays the WICC transfer and transaction records, account balances, prediction games transactions, and payout results according to application data on the blockchain. All data is open and transparent and inherently irreversible. WICC Lock & Revenue Sharing Plan In order to reward all community supporters and provide a channel for application operators to make retribution to community, WaykiChain launched WICC Lock & Revenue Sharing Plan. Application operators can provide a portion of the proceeds to the community members to encourage their contribution to the entire public chain, and to motivate the community to continuously improve the public chain as a more robust underlying system. Investors can lock their own WICC, as a way of showing long-term optimism about the project, to get a certain amount of revenue. Investors can lock a certain number of mainnet WICC through the entrance in WaykiChain DApp. During the lock period, this part of WICC cannot be traded, transferred, or consumed as transaction fee. When the lock period expired, WICC will be automatically unlocked and become tradable. During the lock period, investors will receive WICC revenue at the end of each month. The amount of each investor’s WICC revenue is related to his/her WICC lock volume and duration, total WICC revenue generated during the period, and the total WICC lock volume and duration of all investors participating in the lock plan during this period. Specific calculating formula is as follows: WICC Lock revenue Calculation Formula: Each investor’s daily WICC revenue = Each investor’s lock index / The sum of each investor’s lock index * Total WICC revenue that day Each investor’s lock index = Each investor’s WICC lock volume * Time index * Volume index https://preview.redd.it/7c273o53chw11.png?width=689&format=png&auto=webp&s=219d1e810f4d9217c55c336273b6d2f021257dfa Time Index Table Decentralized App The first smart contract based application delivered by WaykiChain’s team is the WaykiChain decentralized betting application. In this application, the smart contract will assign a time duration in which the user can engage in the betting process. All the conditions related to betting will be given. When a bet is finished, the contract will release the results. The smart contract will then reward the winners. This DApp was launched in May 2018, attracting over 130,000 users to download and bet and has been upgraded to V2.1 ever since. The latest product WaykiBet DApp V2.5 is planned to launch in November along with a new WaykiChain wallet. WaykiBet V2.5 enables a new feature that everyone can be a bookmaker. With the authoritative event data and services provided by WaykiChain DApp, user even without any technical or product background can build a bet in simply one-click. And at the end of the game, WaykiBet will automatically call the smart contract to calculate the bet results and deliver payouts, without any manual participation. Besides, WaykiBet V2.5 has exempted the betting fee through the structure optimization and allows the player to participate in the betting directly after creating a new wallet without activation to ensure users outside of the cryptocurrency industry can be involved in the easiest manner. WaykiTimes Wallet The new WaykiChain wallet, named as WaykiTimes will retain the original wallet functions, such as Lock Revenue Sharing and node voting. The newly added “Forum” gathers the community of WaykiChain and blockchain together, will become an ecology of open communication. Meanwhile it will has a “News” section to meet different users’ needs. In the future, WaykiTimes will implement WaykiChain token economy to encourage the community members. Getting Setup Download WaykiBet DApp V.2.5 at official website: https://www.waykichain.com/
Meet the Team
WaykiChain team is comprised out of over 60 individuals with relevant experience in marketing, business, betting, lottery, betting and crypto industries. Wayki Sun, Founder & CSO One of the earliest digital currency investors and entrepreneurs in China. The founder of Xinhuo Network, the founder of Ou Lu Zhong Chou and the Managing Director of Jufeng Digital Asset Management Co., Ltd. Sun led an investment team of hundreds of people with great achievements made in stock, foreign exchange, futures and digital currency markets. Gordon Gao, CEO Gordon Gao, an alumni of Columbia University, ex-Lead Data Scientist of Fishbowl in Wall Street, ex-Senior Data Analyst of Alibaba Group, senior member of Mensa International Club. He is responsible for offering support to WaykiChain’s commercial model designing and strategy planning, building up a digitalized monitor system for products and operation and promoting WaykiChain overseas with his international background. Tony Chau, Co-founder & CBO Bachelor’s Degree in Finance from the University of Toronto in Canada and served in Hongshang Asset Management Co., Ltd. Focused on industrial surveys and commercial analysis, with in-depth research and distinctive perception on business operation models, and professional financial knowledge and complete project experience. Tame Huang, Chief Consultant The founder of BTC38, served as Product Manager and Project Manager of Tencent, Vice President of Fantasy Basketball, and Chief Strategy Officer of Licai Box; Huang was involved in the investment on more than ten high-tech enterprises, such as Jidian Technology, Yixiang Network, Maoming Rural and Commercial Bank, Jujin Technology, Cointime, etc., and established the Bitcoin Time Digital Currency Exchange in May 2013. Xi Zhang, CPO Tsinghua MBA, former Senior Product Manager of Tencent. Xi Zhang has been engaged in Internet industry for 14 years with several entrepreneurial experiences. In 2008, he joined aibo123.com as Product Director, responsible for the product design and operation of Olympics lottery. In 2014, he stared his own business and founded QiuShang APP, the first prediction APP in China applying big data prediction with 8% return rate and 67% win rate. In 2016, as a partner, he joined the Haiqiu Technology founded by famous football player Sun Jihai, responsible for the Miaohai business unit. He was fully responsible for the products, technology, operations, and marketing of Miaohai sports short video APP. The total downloads of Miaohai APP were 6 million and daily active users were 1 million. Richard Chen, CTO Master of Computer Science from the National University of Singapore and Bachelor of Communication Engineering from Shanghai Jiao Tong University. Richard worked for Alibaba and was responsible for the internal and external information security system construction of the entire groups Customer Service Department. Prior to this, Richard also served as Senior Vice President for the worlds top investment bank Morgan Stanley for 3 years and Intel Chief Architect for 8 years. Richard has received four US patents and won Intel Achievement Award (IAA). Richard has published several global patents in encryption technology, distributed network communication and collaboration, and big data. Xiang Li, CMO MBA degree from Tsinghua University, former COO of Brightoil Online under Brightoil Petroleum (Holdings) Limited, senior manager of Dacheng Food (Asia) Limited, has over a decade of experience in marketing and brand building. Ms. Li is an expert in building brand strategy, brand positioning, advertising channels, event marketing, crisis management, etc. Now Ms. Li is the marketing director of WaykiChain, responsible for the brand operation of WaykiChain in the global market and marketing cooperation. Getting Connected:
What is WICC? How to Buy WICC? WICC is the token launched by WaykiChain. In order to buy WaykiChain (WICC), we recommend you to buy some BTC or ETH (the highest volume trading pairs) from an exchange that accepts them. Then, you will have to find a marketplace that sells WICC in exchange for the aforementioned cryptocurrencies. We recommend you to buy WICC at AEX or Huobi Exchange (AEX has already supported WICC mainnet migration, Huobi will support the migration in November, 2018). For more information on this matter, you can visit CoinMarketCap. When it comes to storing your WICC coins, it’s recommended that you use the official WaykiChain wallet. By consuming the tokens, you can also use various applications on WaykiChain. What is the use of WICC? WICC is a token used and circulated in WaykiChain Wallet DApp. WICC itself does not have any FIAT characteristics. By consuming WICC as a kind of fuel, users can use applications on WaykiChain; by locking their WICC for a certain period of time, users can share the revenue from WICC lock plan; and by voting for effective and stable accounting nodes, users can earn related interest. WICC can be obtained by participating in the lock plan, by accounting, voting, and subscription, or by trading with other holders. WICC has been listed on over 100 exchanges and trading with other cryptocurrencies for almost 1 year, thus WICC also has trade value. What are WaykiChain’s advantages as a public chain 3.0? There are three different types of blockchain: public chain, consortium chain, and private chain. Public chain refers to the consensual blockchain that any individual or team can read and send transactions to, and obtain valid confirmation. Public chain, also known as the non-license chain, is totally open to the whole network that any node can access or leave at any time without any permission. As a public chain of blockchain 3.0, WaykiChain has the advantages of high speed, high stability and flexibility, and low handling fee, providing rich development tools and perfect development environment for worldwide developers. Adopting DPoS consensus mechanism, sidechain technology and other technologies, WaykiChain can process 1000+ transaction requests per second. Relying on its strong strength of underlying technology and innovation, WaykiChain can effectively support high-traffic application scenarios and realize the landing of WaykiChain ecological applications. What is WaykiChain decentralized betting application? WaykiChain decentralized betting application is the first smart contract application launched by WaykiChain team. Each betting is triggered by the application developer via a smart contract. During the period specified in the contract, the users can initiate betting transaction, and all betting records can be traced on the blockchain browser and can never be tampered with. The smart contract will automatically reward the winners based on the final result. WaykiChain will use smart contract to automatically execute the game rule on its public chain. Instead of relying on trust between people, WaykiChain betting application adopts trust among machines to save credit costs, and guarantees full compliance with the rules setting. Besides WaykiChain Official, the developers of the decentralized applications can be any other third-parties. WaykiChain welcomes all developers to join. What is WaykiChain Address? WaykiChain address is a 34-bit string consisting of English letters and numbers that may look like digital gibberish. My WaykiChain address WXv6xP8yVW4PkZ3DPvxqfBtfz7Bof1RJHm, as an example, looks like this. All transfer records for each WaykiChain address can be found through the blockchain explorer. The address is a personal WaykiChain account like your bank account number. Anyone can transfer WICC to you via your WaykiChain address. How do I get my own WaykiChain address then? You can download a WaykiChain Wallet on WaykiChain official website, or register one on trading platforms. Each user’s WaykiChain address is unique. It should be noted that each WaykiChain wallet can only create one address, therefore the wallet mnemonics must be kept carefully. What consensus mechanism does WaykiChain adopt? WaykiChain adopts DPOS consensus mechanism, a new algorithm to guarantee the security of cryptocurrency network. DPOS consensus mechanism can offset the negative effects of centralization through implementing technology-based democracy, and maximize the effectiveness of the public chain through nodes accounting. DPOS can be understood as giving the token holders a key to open the voting rights corresponding to their tokens, instead of giving them a shovel to mine. DPOS can maximize the profitability of the token holders, minimize the cost of network security, maximize the efficiency of network, and minimize the cost of network operation. WaykiChain has 11 accounting nodes in total. The nodes are generated by the token holders’voting. If nodes are making trouble or cannot account normally, the token holders can change their votes, so that there will be other nodes to replace to ensure that the public chain can be operating normally. What is WaykiChain mainnet migration? WaykiChain (WICC) mainnet migration is the process of replacing the previous Ethereum-based token ERC20 TOKEN with WaykiChain mainnet token. WaykiChain public chain, through several months of testing and rigorous evaluation from the exchange platforms after its release, has been fully proven to operate efficiently and stably. Mainnet migration marks that WaykiChain public chain is actually putting into use. After the mainnet migration, various applications and developments based on WaykiChain can be launched, and the service period of WaykiChain public chain truly starts. The dividend mechanism, voting mechanism, gas consumption, and accounting fees on WaykiChain ecosystem are all completed by the mainnet token. The previous ERC20 tokens do not have these functions. By the end of June 26th, AEX Exchange, CEO Exchange, and Bying Wallet have supported WICC mainnet migration. There will be more exchanges and wallets supporting the migration in the future. Please follow WaykiChain’s Wechat official account for more details. Are there any requirements or restrictions for developing projects on WaykiChain? WaykiChain’s code is completely open. WaykiChain welcomes third parties worldwide to develop, carry and operate various application products on WaykiChain, and finally form a diversiform public chain community ecology. WaykiChain is happy to provide public chain technology support for any individuals or third parties. Applications developed and operated by third parties, based on WaykiChain public chain, need to comply with local laws and policies. Only after obtaining related licenses, permits or qualifications required by local laws and policies, developers and operators can launch and operate their applications on WaykiChain. Because of blockchain public chain’s globality, anonymity, open code, and the limitation of our ability, WaykiChain Official cannot judge the identity of third parties, nor have the ability and right to verify, supervise, control or interfere the third parties. Therefore, third parties should bear responsibility of their own actions. What is WaykiChain Block Explorer? WaykiChain Block Explorer is a system that displays all transaction information on WaykiChain and provides visualized track services. Technically, a block explorer works by scanning the block into the database server and then setting up a Web access service. Users only need to import the transaction hash to check whether the transaction has been packaged and confirmed. From the point of product, block explorer is more suitable to be called as asset explorer, which provides asset certification for users so that they don’t have to visually identify or manually analyze the transactions themselves. The block explorer also provides statistics of blocks and transactions, helping users to directly understand the activity of the blockchain. The statistics can also be translated into various indexes for investors to understand the project. To track the transactions, users can search relevant information on WaykiChain official website through WaykiChain wallet address, transaction hash or block height.
Just thinking it would be great to create a post for everyone to post what they want to have for future releases of the Waykichain DApp or anything related to using Waykichain. Welcome feedback from the community, so please do get in touch. Want to dive in further? Follow WaykiChain onTwitter,MediumandLinkedIn.
Crypto currency banner template. Bitcoin. 3D isometric Physical bit coins. Golden bitcoin and silver Ripple coins with wi. Illustration about digital, bitcoin, coin - 111145842 A Bitcoin With Dollar Bills; Bitcoin; Bitcoin Mining; Crypto - Bitcoin Ethereum Litecoin And Graph; Golden Bitcoin; Bitcoin; Bitcoin On Black Background With Reflection. Ultraviolet Image; Block Chain. Crypto Currency. Blockchain Concept. 3D Wireframe Chain With Digital Code. Editable Cryptocurrency Template. 3D Illus Download royalty-free Bitcoin by gold chain. Vector illustration of blockchain technology for virtual money, secure digital business, cryptography. stock vector 109346264 from Depositphotos collection of millions of premium high-resolution stock photos, vector images and illustrations. The most popular and trusted block explorer and crypto transaction search engine. The Only 10 Bitcoin Stock Photos You’ll Ever See Bitcoin: you can’t see it, you can’t touch it, but you’ve still got to find some way to illustrate an article about it day after day, week ...
Bitcoin Basics (Part 1) - "Explained For Beginners" - YouTube
You can Download from here- https://programmerpro.club ----- cryptech responsive bitcoin cryptocurrency and investments html template crypto,b... Get our free Bitcoin course here - https://chrisdunn.com/free-bitcoin-course This Bitcoin basics video series will explain Bitcoin for beginners. You'll lear... If you’re wondering what the block reward in Bitcoin is then look no further. We go into what the block reward is, its purpose and why it’s so big. Hint: the Bitcoin block reward actually changes. Welcome to my channel Online Earning In Pakistan In This Video i am Showing U How to Create BlockChain Wallet Address In Pakistan..... Like Videos and Subscribe Our Channel For More Update https ... And for those of us who are purchasing bitcoin as an investment for the long run, I wanted to make a video that shows that this is actually a good thing and how to take advantage of it. Dollar ...