submitted by UMITop to u/UMITop [link] [comments]
Greetings from the UMI Team! Our Whitepaper describes in detail the key pros and cons of the two mechanisms which the great majority of other cryptocurrencies are based on:
● Proof-of-Work (PoW) — mining technology. Used in Bitcoin, Ethereum, Litecoin, Monero, etc.
● Proof-of-Stake (PoS) and its derivatives — forging technology. Used in Nxt, PeerCoin, NEO, PRIZM, etc.
As a result of a careful analysis of PoW and PoS, which are designed to fight against centralization, there came a conclusion that they both fail to perform their main mission and, in the long run, they lead to the network centralization and poor performance. For this reason, we took a different approach. We use Proof-of-Authority (PoA) algorithm coupled with master nodes, which can ensure the UMI network with decentralization and maximum speed.
The Whitepaper allows you to understand the obvious things. This article will give you a clear and detailed explanation of the technology implemented in the UMI network. Let's glance at the heart of the network right now.
Proof-of-Authority: How and Why It Emerged
It's been over a decade since the first transaction in the Bitcoin network. Over this time, the blockchain technology has undergone some qualitative changes. It's down to the fact that the cryptocurrency world seeing the emerging Proof-of-Work defects in the Bitcoin network year after year has actively searched for ways to eliminate them.
PoW decentralization and reliability has an underside of low capacity and scalability problem that prevents the network from rectifying this shortcoming. Moreover, with the growing popularity of Bitcoin, greed of miners who benefit from high fees resulting from the low network throughput has become a serious problem. Miners have also started to create pools making the network more and more centralized. The “human factor” that purposefully slowed down the network and undermined its security could never be eliminated. All this essentially limits the potential for using PoW-based cryptocurrencies on a bigger scale.
Since PoW upgrade ideas came to nothing, crypto community activists have suggested cardinally new solutions and started to develop other protocols. This is how the Proof-of-Stake technology emerged. However, it proved to be excellent in theory rather than in practice. Overall, PoS-based cryptocurrencies do demonstrate a higher capacity, but the difference is not as striking. Moreover, PoS could not fully solve the scalability issue.
In the hope that it could cope with the disaster plaguing all cryptocurrencies, the community came up with brand new algorithms based on alternative operating principles. One of them is the Proof-of-Authority technology. It was meant to be an effective alternative with a high capacity and a solution to the scalability problem. The idea of using PoA in cryptocurrencies was offered by Gavin Wood — a high-profile blockchain programmer and Ethereum co-founder.
Proof-of-Authority Major Features
PoA's major difference from PoW and PoS lies in the elimination of miner or forger races. Network users do not fight for the right to be the first to create a block and receive an award, as it happens with cryptocurrencies based on other technologies. In this case blockchain's operating principle is substantially different — Proof-of-Authority uses the “reputation system” and only allows trusted nodes to create blocks.
It solves the scalability problem allowing to considerably increase capacity and handle transactions almost instantly without wasting time on unnecessary calculations made by miners and forgers. Moreover, trusted nodes must meet the strict capacity requirements. This is one the main reasons why we have selected PoA since this is the only technology allowing to fully use super-fast nodes.
Due to these features, the Proof-of-Authority algorithm is seen as one of the most effective and promising options for bringing blockchain to various business sectors. For instance, its model perfectly fits the logistics and supply chain management sectors. As an outstanding example, PoA is effectively used by the Microsoft Azure cloud platform to offer various tools for bringing blockchain solutions to businesses.
How the UMI Network Gets Rid of the Defects and Incorporates the Benefits of Proof-of-Authority Method
Any system has both drawbacks and advantages — so does PoA. According to the original PoA model, each trusted node can create a block, while it is technically impossible for ordinary users to interfere with the system operation. This makes PoA-based cryptocurrencies a lot more centralized than those based on PoW or PoS. This has always been the main reason for criticizing the PoA technology.
We understood that only a completely decentralized product could translate our vision of a "hard-to-hit", secure and transparent monetary instrument into reality. Therefore, we started with upgrading its basic operating principle in order to create a product that will incorporate all the best features while eliminating the defects. What we’ve got is a decentralized PoA method. We will try to explain at the elementary level:
- We've divided the nodes in the UMI network into two types: master nodes and validator nodes.
- Only master nodes have the right to create blocks and confirm transactions. Among master node holders there's the UMI team and their trusted partners from across the world. Moreover, we deliberately keep some of our partners — those who hold master nodes — in secret in order to secure ourselves against potential negative influence, manipulation, and threats from third parties. This way we ensure maximum coherent and reliable system operation.
- However, since the core idea behind a decentralized cryptocurrency rules out any kind of trust, the blockchain is secured to prevent master nodes from harming the network in the event of sabotage or collusion. It might happen to Bitcoin or other PoW- or PoS-based cryptocurrencies if, for example, several large mining pools unite and perform a 51% attack. But it can’t happen to UMI. First, the worst that bad faith master node holders can do is to negligibly slow down the network. But the UMI network will automatically respond to it by banning such nodes. Thus, master nodes will prevent any partner from doing intentional harm to the network. Moreover, it will not be able to do this, even if most other partners support it. Nothing — not even quantum computers — will help hackers. Read our post "UMI Blockchain Six-Level Security" for more details.
- A validator node can be launched by any participant. Validator nodes maintain the network by verifying the correctness of blocks and excluding the possibility of fakes. In doing so they increase the overall network security and help master nodes carry out their functions. More importantly, those who hold validator nodes control those who hold master nodes and confirm that the latter don't violate anything and comply with the rules. You can find more details about validator nodes in the article we mentioned above.
- Finally, the network allows all interested users to launch light nodes (SPV), which enables viewing and sending transactions without having to download the blockchain and maintain the network. With light nodes, any network user can make sure if the system is operating properly and doesn't have to download the blockchain to do this.
- In addition, we are developing the ability to protect the network in case 100% of the master nodes (10,000 master nodes in total) are "disabled" for some reason. Even this is virtually impossible, we've thought ahead and in the worst-case scenario, the system will automatically move to PoS. By doing so, it will be able to continue processing transactions. We're going to tell you about this in our next publications.
Thus, the UMI network uses an upgraded version of this technology which possesses all its advantages with drawbacks eliminated. This model is truly decentralized and maximum secured.
Another major drawback of PoA-based cryptos is no possibility to grant incentives to users. PoA doesn't imply forging or mining which allow users to earn cryptocurrency while generating new coins. No reward for maintaining the network is the main reason why the crypto community is not interested in PoA. This is, of course, unfair. With this in mind, the UMI team has found the best solution — the unique staking smart-contract. It allows you to increase the number of your coins up to 40% per month even with no mining or forging meaning the human factor cannot have a negative impact on the decentralization and network performance.
The UMI network uses an upgraded version of PoA technology which possesses all its advantages with drawbacks virtually eliminated. This makes UMI a decentralized, easily scalable, and yet the most secure, productive, profitable and fair cryptocurrency, working for the sake of all people.
The widespread use of UMI can change most aspects of society in different areas, including production, commerce, logistics, and all financial arrangements. We are just beginning this journey and thrilled to have you with us. Let's change the world together!
Best regards, UMI Team!
submitted by j0j0r0 to ethereum [link] [comments]
Dragonchain Public Proposal TL;DR:Dragonchain has demonstrated twice Reddit’s entire total daily volume (votes, comments, and posts per Reddit 2019 Year in Review) in a 24-hour demo on an operational network. Every single transaction on Dragonchain is decentralized immediately through 5 levels of Dragon Net, and then secured with combined proof on Bitcoin, Ethereum, Ethereum Classic, and Binance Chain, via Interchain. At the time, in January 2020, the entire cost of the demo was approximately $25K on a single system (transaction fees locked at $0.0001/txn). With current fees (lowest fee $0.0000025/txn), this would cost as little as $625.
Watch Joe walk through the entire proposal and answer questions on YouTube.
This proposal is also available on the Dragonchain blog.
Hello Reddit and Ethereum community!I’m Joe Roets, Founder & CEO of Dragonchain. When the team and I first heard about The Great Reddit Scaling Bake-Off we were intrigued. We believe we have the solutions Reddit seeks for its community points system and we have them at scale.
For your consideration, we have submitted our proposal below. The team at Dragonchain and I welcome and look forward to your technical questions, philosophical feedback, and fair criticism, to build a scaling solution for Reddit that will empower its users. Because our architecture is unlike other blockchain platforms out there today, we expect to receive many questions while people try to grasp our project. I will answer all questions here in this thread on Reddit, and I've answered some questions in the stream on YouTube.
We have seen good discussions so far in the competition. We hope that Reddit’s scaling solution will emerge from The Great Reddit Scaling Bake-Off and that Reddit will have great success with the implementation.
Executive summaryDragonchain is a robust open source hybrid blockchain platform that has proven to withstand the passing of time since our inception in 2014. We have continued to evolve to harness the scalability of private nodes, yet take full advantage of the security of public decentralized networks, like Ethereum. We have a live, operational, and fully functional Interchain network integrating Bitcoin, Ethereum, Ethereum Classic, and ~700 independent Dragonchain nodes. Every transaction is secured to Ethereum, Bitcoin, and Ethereum Classic. Transactions are immediately usable on chain, and the first decentralization is seen within 20 seconds on Dragon Net. Security increases further to public networks ETH, BTC, and ETC within 10 minutes to 2 hours. Smart contracts can be written in any executable language, offering full freedom to existing developers. We invite any developer to watch the demo, play with our SDK’s, review open source code, and to help us move forward. Dragonchain specializes in scalable loyalty & rewards solutions and has built a decentralized social network on chain, with very affordable transaction costs. This experience can be combined with the insights Reddit and the Ethereum community have gained in the past couple of months to roll out the solution at a rapid pace.
Response and PoCIn The Great Reddit Scaling Bake-Off post, Reddit has asked for a series of demonstrations, requirements, and other considerations. In this section, we will attempt to answer all of these requests.
A live proof of concept showing hundreds of thousands of transactionsOn Jan 7, 2020, Dragonchain hosted a 24-hour live demonstration during which a quarter of a billion (250 million+) transactions executed fully on an operational network. Every single transaction on Dragonchain is decentralized immediately through 5 levels of Dragon Net, and then secured with combined proof on Bitcoin, Ethereum, Ethereum Classic, and Binance Chain, via Interchain. This means that every single transaction is secured by, and traceable to these networks. An attack on this system would require a simultaneous attack on all of the Interchained networks.
24 hours in 4 minutes (YouTube):
24 hours in 4 minutes
The demonstration was of a single business system, and any user is able to scale this further, by running multiple systems simultaneously. Our goals for the event were to demonstrate a consistent capacity greater than that of Visa over an extended time period.
Tooling to reproduce our demo is available here:
Source code (for on & off-chain components as well tooling used for the PoC). The source code does not have to be shared publicly, but if Reddit decides to use a particular solution it will need to be shared with Reddit at some point.
How it works & scales
Architectural ScalingDragonchain’s architecture attacks the scalability issue from multiple angles. Dragonchain is a hybrid blockchain platform, wherein every transaction is protected on a business node to the requirements of that business or purpose. A business node may be held completely private or may be exposed or replicated to any level of exposure desired.
Every node has its own blockchain and is independently scalable. Dragonchain established Context Based Verification as its consensus model. Every transaction is immediately usable on a trust basis, and in time is provable to an increasing level of decentralized consensus. A transaction will have a level of decentralization to independently owned and deployed Dragonchain nodes (~700 nodes) within seconds, and full decentralization to BTC and ETH within minutes or hours. Level 5 nodes (Interchain nodes) function to secure all transactions to public or otherwise external chains such as Bitcoin and Ethereum. These nodes scale the system by aggregating multiple blocks into a single Interchain transaction on a cadence. This timing is configurable based upon average fees for each respective chain. For detailed information about Dragonchain’s architecture, and Context Based Verification, please refer to the Dragonchain Architecture Document.
Economic ScalingAn interesting feature of Dragonchain’s network consensus is its economics and scarcity model. Since Dragon Net nodes (L2-L4) are independent staking nodes, deployment to cloud platforms would allow any of these nodes to scale to take on a large percentage of the verification work. This is great for scalability, but not good for the economy, because there is no scarcity, and pricing would develop a downward spiral and result in fewer verification nodes. For this reason, Dragonchain uses TIME as scarcity.
TIME is calculated as the number of Dragons held, multiplied by the number of days held. TIME influences the user’s access to features within the Dragonchain ecosystem. It takes into account both the Dragon balance and length of time each Dragon is held. TIME is staked by users against every verification node and dictates how much of the transaction fees are awarded to each participating node for every block.
TIME also dictates the transaction fee itself for the business node. TIME is staked against a business node to set a deterministic transaction fee level (see transaction fee table below in Cost section). This is very interesting in a discussion about scaling because it guarantees independence for business implementation. No matter how much traffic appears on the entire network, a business is guaranteed to not see an increased transaction fee rate.
Scaled DeploymentDragonchain uses Docker and Kubernetes to allow the use of best practices traditional system scaling. Dragonchain offers managed nodes with an easy to use web based console interface. The user may also deploy a Dragonchain node within their own datacenter or favorite cloud platform. Users have deployed Dragonchain nodes on-prem on Amazon AWS, Google Cloud, MS Azure, and other hosting platforms around the world. Any executable code, anything you can write, can be written into a smart contract. This flexibility is what allows us to say that developers with no blockchain experience can use any code language to access the benefits of blockchain. Customers have used NodeJS, Python, Java, and even BASH shell script to write smart contracts on Dragonchain.
With Docker containers, we achieve better separation of concerns, faster deployment, higher reliability, and lower response times.
We chose Kubernetes for its self-healing features, ability to run multiple services on one server, and its large and thriving development community. It is resilient, scalable, and automated. OpenFaaS allows us to package smart contracts as Docker images for easy deployment.
Contract deployment time is now bounded only by the size of the Docker image being deployed but remains fast even for reasonably large images. We also take advantage of Docker’s flexibility and its ability to support any language that can run on x86 architecture. Any image, public or private, can be run as a smart contract using Dragonchain.
Flexibility in ScalingDragonchain’s architecture considers interoperability and integration as key features. From inception, we had a goal to increase adoption via integration with real business use cases and traditional systems.
We envision the ability for Reddit, in the future, to be able to integrate alternate content storage platforms or other financial services along with the token.
Cost estimates (on-chain and off-chain) For the purpose of this proposal, we assume that all transactions are on chain (posts, replies, and votes).On the Dragonchain network, transaction costs are deterministic/predictable. By staking TIME on the business node (as described above) Reddit can reduce transaction costs to as low as $0.0000025 per transaction.
Dragonchain Fees Table
How to run itBuilding on Dragonchain is simple and requires no blockchain experience. Spin up a business node (L1) in our managed environment (AWS), run it in your own cloud environment, or on-prem in your own datacenter. Clear documentation will walk you through the steps of spinning up your first Dragonchain Level 1 Business node.
Getting started is easy...
ArchitectureDragonchain is an open source hybrid platform. Through Dragon Net, each chain combines the power of a public blockchain (like Ethereum) with the privacy of a private blockchain.
Dragonchain organizes its network into five separate levels. A Level 1, or business node, is a totally private blockchain only accessible through the use of public/private keypairs. All business logic, including smart contracts, can be executed on this node directly and added to the chain.
After creating a block, the Level 1 business node broadcasts a version stripped of sensitive private data to Dragon Net. Three Level 2 Validating nodes validate the transaction based on guidelines determined from the business. A Level 3 Diversity node checks that the level 2 nodes are from a diverse array of locations. A Level 4 Notary node, hosted by a KYC partner, then signs the validation record received from the Level 3 node. The transaction hash is ledgered to the Level 5 public chain to take advantage of the hash power of massive public networks.
Dragon Net can be thought of as a “blockchain of blockchains”, where every level is a complete private blockchain. Because an L1 can send to multiple nodes on a single level, proof of existence is distributed among many places in the network. Eventually, proof of existence reaches level 5 and is published on a public network.
APIs (on chain & off)
Known issues or tradeoffs
Costs and resources
Summary of cost & resource information for both on-chain & off-chain components used in the PoC, as well as cost & resource estimates for further scaling. If your PoC is not on mainnet, make note of any mainnet caveats (such as congestion issues).Every transaction on the PoC system had a transaction fee of $0.0001 (one-hundredth of a cent USD). At 256MM transactions, the demo cost $25,600. With current operational fees, the same demonstration would cost $640 USD.
For the demonstration, to achieve throughput to mimic a worldwide payments network, we modeled several clients in AWS and 4-5 business nodes to handle the traffic. The business nodes were tuned to handle higher throughput by adjusting memory and machine footprint on AWS. This flexibility is valuable to implementing a system such as envisioned by Reddit. Given that Reddit’s daily traffic (posts, replies, and votes) is less than half that of our demo, we would expect that the entire Reddit system could be handled on 2-5 business nodes using right-sized containers on AWS or similar environments.
Verification was accomplished on the operational Dragon Net network with over 700 independently owned verification nodes running around the world at no cost to the business other than paid transaction fees.
This PoC should scale to the numbers below with minimal costs (both on & off-chain). There should also be a clear path to supporting hundreds of millions of users.During Dragonchain’s 24 hour demo, the above required numbers were reached within the first few minutes.
Reddit’s total activity is 9000% more than Ethereum’s total transaction level. Even if you do not include votes, it is still 700% more than Ethereum’s current volume. Dragonchain has demonstrated that it can handle 250 million transactions a day, and it’s architecture allows for multiple systems to work at that level simultaneously. In our PoC, we demonstrate double the full capacity of Reddit, and every transaction was proven all the way to Bitcoin and Ethereum.
Reddit Scaling on Ethereum
Solutions should not depend on any single third-party provider. We prefer solutions that do not depend on specific entities such as Reddit or another provider, and solutions with no single point of control or failure in off-chain components but recognize there are numerous trade-offs to considerDragonchain’s architecture calls for a hybrid approach. Private business nodes hold the sensitive data while the validation and verification of transactions for the business are decentralized within seconds and secured to public blockchains within 10 minutes to 2 hours. Nodes could potentially be controlled by owners of individual subreddits for more organic decentralization.
Usability Scaling solutions should have a simple end user experience.
Users shouldn't have to maintain any extra state/proofs, regularly monitor activity, keep track of extra keys, or sign anything other than their normal transactionsDragonchain and its customers have demonstrated extraordinary usability as a feature in many applications, where users do not need to know that the system is backed by a live blockchain. Lyceum is one of these examples, where the progress of academy courses is being tracked, and successful completion of courses is rewarded with certificates on chain. Our @Save_The_Tweet bot is popular on Twitter. When used with one of the following hashtags - #please, #blockchain, #ThankYou, or #eternalize the tweet is saved through Eternal to multiple blockchains. A proof report is available for future reference. Other examples in use are DEN, our decentralized social media platform, and our console, where users can track their node rewards, view their TIME, and operate a business node.
Transactions complete in a reasonable amount of time (seconds or minutes, not hours or days)All transactions are immediately usable on chain by the system. A transaction begins the path to decentralization at the conclusion of a 5-second block when it gets distributed across 5 separate community run nodes. Full decentralization occurs within 10 minutes to 2 hours depending on which interchain (Bitcoin, Ethereum, or Ethereum Classic) the transaction hits first. Within approximately 2 hours, the combined hash power of all interchained blockchains secures the transaction.
Free to use for end users (no gas fees, or fixed/minimal fees that Reddit can pay on their behalf)With transaction pricing as low as $0.0000025 per transaction, it may be considered reasonable for Reddit to cover transaction fees for users.
All of Reddit's Transactions on Blockchain (month)
Community points can be earned by users and distributed directly to their Reddit account in batch (as per Reddit minting plan), and allow users to withdraw rewards to their Ethereum wallet whenever they wish. Withdrawal fees can be paid by either user or Reddit. This model has been operating inside the Dragonchain system since 2018, and many security and financial compliance features can be optionally added. We feel that this capability greatly enhances user experience because it is seamless to a regular user without cryptocurrency experience, yet flexible to a tech savvy user. With regard to currency or token transactions, these would occur on the Reddit network, verified to BTC and ETH. These transactions would incur the $0.0000025 transaction fee. To estimate this fee we use the monthly active Reddit users statista with a 60% adoption rate and an estimated 10 transactions per month average resulting in an approximate $720 cost across the system. Reddit could feasibly incur all associated internal network charges (mining/minting, transfer, burn) as these are very low and controllable fees.
Reddit Internal Token Transaction Fees
Reddit Ethereum Token Transaction Fees
When we consider further the Ethereum fees that might be incurred, we have a few choices for a solution.
Users should be able to view their balances & transactions via a blockchain explorer-style interfaceFrom interfaces for users who have no knowledge of blockchain technology to users who are well versed in blockchain terms such as those present in a typical block explorer, a system powered by Dragonchain has flexibility on how to provide balances and transaction data to users. Transactions can be made viewable in an Eternal Proof Report, which displays raw data along with TIME staking information and traceability all the way to Bitcoin, Ethereum, and every other Interchained network. The report shows fields such as transaction ID, timestamp, block ID, multiple verifications, and Interchain proof. See example here.
Node payouts within the Dragonchain console are listed in chronological order and can be further seen in either Dragons or USD. See example here.
In our social media platform, Dragon Den, users can see, in real-time, their NRG and MTR balances. See example here.
A new influencer app powered by Dragonchain, Raiinmaker, breaks down data into a user friendly interface that shows coin portfolio, redeemed rewards, and social scores per campaign. See example here.
Exiting is fast & simpleWithdrawing funds on Dragonchain’s console requires three clicks, however, withdrawal scenarios with more enhanced security features per Reddit’s discretion are obtainable.
Interoperability Compatibility with third party apps (wallets/contracts/etc) is necessary.Proven interoperability at scale that surpasses the required specifications. Our entire platform consists of interoperable blockchains connected to each other and traditional systems. APIs are well documented. Third party permissions are possible with a simple smart contract without the end user being aware. No need to learn any specialized proprietary language. Any code base (not subsets) is usable within a Docker container. Interoperable with any blockchain or traditional APIs. We’ve witnessed relatively complex systems built by engineers with no blockchain or cryptocurrency experience. We’ve also demonstrated the creation of smart contracts within minutes built with BASH shell and Node.js. Please see our source code and API documentation.
Scaling solutions should be extensible and allow third parties to build on top of it Open source and extensible
Documentation should be clear and completeFor full documentation, explore our docs, SDK’s, Github repo’s, architecture documents, original Disney documentation, and other links or resources provided in this proposal.
Third-party permissionless integrations should be possible & straightforward Smart contracts are Docker based, can be written in any language, use full language (not subsets), and can therefore be integrated with any system including traditional system APIs. Simple is better. Learning an uncommon or proprietary language should not be necessary.Advanced knowledge of mathematics, cryptography, or L2 scaling should not be required. Compatibility with common utilities & toolchains is expected.
Dragonchain business nodes and smart contracts leverage Docker to allow the use of literally any language or executable code. No proprietary language is necessary. We’ve witnessed relatively complex systems built by engineers with no blockchain or cryptocurrency experience. We’ve also demonstrated the creation of smart contracts within minutes built with BASH shell and Node.js.
Bonus Points: Show us how it works. Do you have an idea for a cool new use case for Community Points? Build it!
TIMECommunity points could be awarded to Reddit users based upon TIME too, whereas the longer someone is part of a subreddit, the more community points someone naturally gained, even if not actively commenting or sharing new posts. A daily login could be required for these community points to be credited. This grants awards to readers too and incentivizes readers to create an account on Reddit if they browse the website often. This concept could also be leveraged to provide some level of reputation based upon duration and consistency of contribution to a community subreddit.
Dragon DenDragonchain has already built a social media platform that harnesses community involvement. Dragon Den is a decentralized community built on the Dragonchain blockchain platform. Dragon Den is Dragonchain’s answer to fake news, trolling, and censorship. It incentivizes the creation and evaluation of quality content within communities. It could be described as being a shareholder of a subreddit or Reddit in its entirety. The more your subreddit is thriving, the more rewarding it will be. Den is currently in a public beta and in active development, though the real token economy is not live yet. There are different tokens for various purposes. Two tokens are Lair Ownership Rights (LOR) and Lair Ownership Tokens (LOT). LOT is a non-fungible token for ownership of a specific Lair. LOT will only be created and converted from LOR.
Energy (NRG) and Matter (MTR) work jointly. Your MTR determines how much NRG you receive in a 24-hour period. Providing quality content, or evaluating content will earn MTR.
Security. Users have full ownership & control of their points.All community points awarded based upon any type of activity or gift, are secured and provable to all Interchain networks (currently BTC, ETH, ETC). Users are free to spend and withdraw their points as they please, depending on the features Reddit wants to bring into production.
Balances and transactions cannot be forged, manipulated, or blocked by Reddit or anyone elseUsers can withdraw their balance to their ERC20 wallet, directly through Reddit. Reddit can cover the fees on their behalf, or the user covers this with a portion of their balance.
Users should own their points and be able to get on-chain ERC20 tokens without permission from anyone elseThrough our console users can withdraw their ERC20 rewards. This can be achieved on Reddit too. Here is a walkthrough of our console, though this does not show the quick withdrawal functionality, a user can withdraw at any time. https://www.youtube.com/watch?v=aNlTMxnfVHw
Points should be recoverable to on-chain ERC20 tokens even if all third-parties involved go offlineIf necessary, signed transactions from the Reddit system (e.g. Reddit + Subreddit) can be sent to the Ethereum smart contract for minting.
A public, third-party review attesting to the soundness of the design should be availableTo our knowledge, at least two large corporations, including a top 3 accounting firm, have conducted positive reviews. These reviews have never been made public, as Dragonchain did not pay or contract for these studies to be released.
Bonus pointsSee above
Compatibility with HSMs & hardware walletsFor the purpose of this proposal, all tokenization would be on the Ethereum network using standard token contracts and as such, would be able to leverage all hardware wallet and Ethereum ecosystem services.
Minting/distributing tokens is not performed by Reddit directlyThis operation can be automated by smart contract on Ethereum. Subreddits can if desired have a role to play.
One off point burning, as well as recurring, non-interactive point burning (for subreddit memberships) should be possible and scalableThis is possible and scalable with interaction between Dragonchain Reddit system and Ethereum token contract(s).
Fully open-source solutions are strongly preferredDragonchain is fully open source (see section on Disney release after conclusion).
ConclusionWhether it is today, or in the future, we would like to work together to bring secure flexibility to the highest standards. It is our hope to be considered by Ethereum, Reddit, and other integrative solutions so we may further discuss the possibilities of implementation. In our public demonstration, 256 million transactions were handled in our operational network on chain in 24 hours, for the low cost of $25K, which if run today would cost $625. Dragonchain’s interoperable foundation provides the atmosphere necessary to implement a frictionless community points system. Thank you for your consideration of our proposal. We look forward to working with the community to make something great!
Disney Releases Blockchain Platform as Open SourceThe team at Disney created the Disney Private Blockchain Platform. The system was a hybrid interoperable blockchain platform for ledgering and smart contract development geared toward solving problems with blockchain adoption and usability. All objective evaluation would consider the team’s output a success. We released a list of use cases that we explored in some capacity at Disney, and our input on blockchain standardization as part of our participation in the W3C Blockchain Community Group.
Open SourceIn 2016, Roets proposed to release the platform as open source to spread the technology outside of Disney, as others within the W3C group were interested in the solutions that had been created inside of Disney.
Following a long process, step by step, the team met requirements for release. Among the requirements, the team had to:
The Disney Open Source Committee approved the application known as OSSRELEASE-10, and the code was released on October 2, 2016. Disney decided to not issue a press release.
Original OSSRELASE-10 document
Dragonchain FoundationThe Dragonchain Foundation was created on January 17, 2017. https://den.social/l/Dragonchain/24130078352e485d96d2125082151cf0/dragonchain-and-disney/
|Around here nobody talks about the argument that increased regulation of the internet would help stop child predators. Is that true, and if so where do you fall on the Net Neutrality vs law enforcement spectrum?||No I don't think that's true at all. Child predators have been around much longer than the internet, and I would argue child abuse was more prevalent 50+ years ago when children were seen and not heard and it wasn't talked about. The dark web hasn't created more predators, it has just given them a new place to gather and hang out.|
|The one thing I found really interesting when I was lurking the forums of the child predators was their frustration about how children are now taught from a very young age that certain touching and acts are wrong and that they shouldn't keep certain secrets. It came up over and over again that they could not abuse certain children because they knew those children had someone they would tell. It was pretty clear that education was a child's best defence against getting abused.|
|the below is a reply to the above|
|That's so interesting, thanks for the AMA! Can you remember any other thing that a child could do in order to protect himself from being abused? What other characteristics do the abusers hate in potential victims?||That seems to be the main one. Kids who speak up and who have close relationships with one or more people they are likely to confide in|
|What do folks talk about in the child predator forums? Do they like give each other advice on how to improve their craft?||Yes, quite literally. The give each other tips on how not to get caught, how to edit out incriminating details in videos, how to drug children, techniques for convincing kids not to tell etc|
|the below is a reply to the above|
|Given your insight into how predators operate, do you have any advice for parents on protecting their kids?||I'll cut'n'paste a response i gave to someone else about this, because it was something that really stuck out to me:|
|The one thing I found really interesting when I was lurking the forums of the child predators was their frustration about how children are now taught from a very young age that certain touching and acts are wrong and that they shouldn't keep certain secrets. It came up over and over again that they could not abuse certain children because they knew those children had someone they would tell. It was pretty clear that education was a child's best defence against getting abused. Kids who speak up and who have close relationships with one or more people they are likely to confide in|
|Has the exponential increase in Bitcoin value affected darknet dealers in any profound way? I can imagine that some drug dealers were sitting on quite a large sum of Bitcoin when the value shot up.||Crypto purists hate to admit it, but bitcoin would not be where it is today without Silk Road. It was sitting at less than a dollar when Silk Road began and the markets showed a robust use case for cryptocurrency and as the markets grew, so did the demand for bitcoin. It also provided real-life use data for those who were not interested in drugs but who weren't sure if it had practical application. When SR went down, Bitcoin was at about $650 and it continued to grow as adoption became more mainstream. There are many many stories of drug dealers (and at least one faux-hitman!) who gained most of their wealth not by selling the drugs, but by the growth in value of their bitcoin holdings|
|Since you have a lot of experience with them online. Do you think pedophiles(not child abusers) should be treated as criminals, or as people suffering from a mental illness?||Contact offenders should be treated as criminals, because they are criminals. They have abused or hurt someone. Same with those who support the creation and dissemination of child abuse materials.|
|Pedophiles who do not act on their urges should be given as much help as humanly possible.|
|Are there any mysterious or suspicious pages or communities that you haven’t been able to access? Anything that seems especially weird?||there are a lot of Russian communities that I can't access, mostly because I don't speak Russian. Some of the more technical hacking communities have entry barriers that I'm not technical enough to score an invite to|
|How much these bad people really exist out there? Hundreds? Thousands? More?||It depends what you mean by bad. If you mean people who use the dark web to buy drugs (who I do not consider bad) then there are many many thousands. There are also thousands of people who deal in stolen information to make money.|
|Unfortunately there are also thousands of child predators and the dark web has provided a "safe space" for them to come together to share materials and "tips". I hope this is where most of the resources of law enforcement are concentrated|
|Ehy mine is a rare question: what do you know about art on dark web? I'm talking about the black market made of stolen important pieces from museums, art used as value to money laundry and other criminal affairs I'm an artist and what I know is people don't think too much about the dark side of art and probably they need to open their eyes about||I really haven't come across much in the way of that. Some of the markets have an "art" section, but that is mostly blotter art|
|How accurate are the legends?||Any legends in particular? For a lowdown copied from a post I made in another forum:|
|1Red Rooms ￼ The one that is most persistent is the myth of the "Red Room" - live streaming of torture/rape that ends in the murder of the victim and which people can pay to watch, or even bid to type in commands for the torturer to carry out (highest bid wins!). The most famous was the “ISIS Red Room” pictured above, where people could provide instructions to torture captured terrorists - you can read what happened here.|
|People have this idea of Hostel with webcams exist all over the dark web, but you just need an invite to get into them. It's ridiculous. They don't exist. They certainly wouldn't exist on Tor. But people are desperate to believe and they always come back with "You can't prove they don't exist, people are crazy, therefore they must exist." Picture my eyes rolling here.|
|I don't think many people are taken in by the hitmen sites anymore, though the press loves playing up the fact that there are sites offering up hitman services. But every single one of them has turned out to be a scam, especially Besa Mafia, the one that did the most marketing. Again, you can read about it at the same link as above.|
|3.Exotic animals ￼ People are always asking where they can find markets for exotic animals. Obviously the illegal trade in exotic animals exists, and some communications and transactions may well take place over Tor, but there are no markets like the drug markets where you can go and look at a picture and then put a tiger or ocelot or something into your basket and buy it with bitcoin.|
|SO WHAT DOES HAPPEN ON THE DARK WEB?|
|1.People buy and sell drugs.|
|The drug markets are more busy than ever. You have probably heard of Silk Road, the most famous online drug market that got busted a few years ago and the owner sent to prison for two consecutive life terms? A lot of people thought that was the end of drugs being sold on the dark web. In fact, dark web sales of drugs have tripled since the shutdown of Silk Road.|
|The reason people buy drugs this way is that for many they offer a safer alternative for people who are going to do drugs anyway. There is no possibility of any violence. The vast majority of the time a buyer knows exactly what they are getting, because of the feedback and rating system. That's not the case in a nightclub, or even friends-of-friends, where you just blindly accept that the pill, powder or tab is what the seller says it is.|
|2.People buy and sell other illegal things|
|Mostly they buy and sell stolen credit cards and financial information, fake IDs (though lots of these are scams), personal information, “dumps” of hacked data and fraud-related items. For a long time, a seller was making a fortune selling fake discount coupons that really worked.|
|3.People access and create childporn ￼ Unlike the other markets, the CP market is generally not for money, but rather they are groups who swap vile images and videos for free. The worst of the worst is called “hurtcore’. Thankfully, most of the people behind the worst sites have been arrested and put in jail.|
|4.People talk about stuff|
|There are plenty of sites, forums and chatrooms where people talk about all sorts of things - conspiracies, aliens, weird stuff. They take advantage of the anonymity.|
|5.People anonymously release information|
|Whistleblowers use the dark web to release information and make sure their identities won't be compromised. You will find Wikileaks, for example, on the dark web.|
|6.People surf the web anonymously|
|The number 1 thing people use the dark web for is just to surf the web completely anonymously. Not everybody wants to be tracked by advertisers.|
|I have a question: what are the odds of the casual Darkweb drug buyer - not buying mega loads all the time - the occasional purchase - what are the risks of being busted? Kinda figuring pretty low. But you’re the expert. What do you think?||Obviously there is always a risk, but the risk is very low. It is rare for personal amounts to be seized. Even if a package is seized, there's usually no resources to follow it up. Many people report simply receiving a letter from Customs saying they have seized what they believe is contraband and the person has a choice of going to claim it or it will be destroyed. Even if LE does knock on the door there is plausible deniability: "I don't know who sent that stuff to me".|
|So yeah, rare, but it does happen. You might be the unlucky one|
|How do you find things on the dark web without search engines?||There are a lot of entry sites, set up with links to the most popular places. You can generally get a link to one of them by browsing places like reddit. From there it is a matter of checking out different places, people will put links in forums etc.|
|I also use a Pastebin where people paste sites they have made/found, and a Fresh Onion site, which crawls all the newly-populated .onion addresses|
|Hi. there!! Thank you for answering questions. Mine is very simple. How do sellers get the drugs to people? Regular mail? That's always puzzled me bc I'd assume USPS, UPS, fedEx or any other mail carrier would catch at least some goods.||If people are ordering drugs, particularly in powder form, for personal use, they can be flattened, sealed in MBB (moisture barrier baggies) and sent in a regular business envelope, indistinguishable from billions of other envelopes going through the postal system every day. The chances of a particular package being intercepted is very low.|
|Some people take the extra precaution of having the person taking delivery of the drugs different to the person/household that is ordering them.|
|How did you move from being a corporate lawyer to researching and writing about dark web?||I was in London, working for one of the most conservative law firms in the world when the Global Financial Crisis hit. I liked the job but it struck me when people were losing their livelihoods that I was working for the bad guys. I'd always wanted to be a writer so when I came back to Australia I quit law and enrolled in a writing course planning to be a novelist, but I discovered I was better at journalism. I first wrote for newspapers here about Silk Road and it grew from there|
|I've always wanted to check out the dark web, what is a normal day for you look like on there? Can you give me any tips on how to safely surf the dark web?||A normal day looks like me sitting at my desk writing things on my computer. When I'm researching a book or a case I venture away from my computer to trials and to interview people (at least I did pre-COVID)|
|There is nothing inherently unsafe in surfing the dark web. All the usual precautions you take surfing the clearweb apply. Don't visit any child exploitation sites - it will be pretty obvious that's what they are by the names/descriptions before you log in.|
|It is only when you want to do more than surfing - e.g. buying drugs etc - that you need to do a LOT of homework or you will absolutely get scammed|
|Is there anything good about the dark web?||It depends what you are into. A lot of academic research has concluded that the darknet markets provide a safer way for people to buy and use drugs, due to the ratings of vendors, services that independently test and report back on batches of drugs, doctor on staff ready to answer questions, no violence in transactions etc.|
|News sites provide a dark web option so that whistleblowers can safety provide information and upload documents that get stripped of any identifying metadata before being available.|
|It bypasses firewalls and allows for secure communications under hostile regimes|
|the below is a reply to the above|
|How does this make you feel about the idea of the decriminalization of drugs?||I've always been for full legalization of drugs, and studying the darknet markets just proved I was right.|
|I was invited to an experts roundtable in Portugal about drugs and cybercrime a few years ago and the Portugal model of decriminalisation has been a great success|
|the below is a reply to the above|
|Hey, you are still answering. Been reading this thread for 1-2 hours now. Thank you so much for all the good work and info! Always been intrigued by this topic, downloaded tor once to explore a bit but couldn’t and deleted it right away, to be on the safer side. Great insights. Thanks!||I've been writing it for about 14 hours. Going a bit loopy|
|How was working on Casefile? What's the production process like? Which episodes did u do?? I have listened to... all of them....||I absolutely LOVE working for Casefile. I am a freelancer, so I source and write my own cases and then sell the scripts to Casefile. I've done at least a dozen, but some of my most popular are Amy Allwine, Mark & John, Ella Tundra, Leigh Leigh, Rebecca Schaeffer...|
|As for the production process, once I have sold the script to them, a staff member edits them and then they are passed on to Casey to narrate. After that, they go to Mike for sound editing, music etc. They are the best team ever|
|the below is a reply to the above|
|Oh, Leigh Leigh was so well written!! How do you choose which stories to write? Do you just pick true crime you're interested in?||Thank you! I have a huge list of potential episodes. Any time I come across an interesting crime on reddit, or in the news or wherever I make a note of it. Then I just pick one when it comes time to write a new script.|
|Sometimes I've been personally involved (e.g. Amy Allwine), gone to trials etc. Those are always the best ones|
|Hi Eiley, your twitter just reminded me of this AMA :) What are your thoughts on bitcoin? And would you prefer to be paid in crypto or fiat?||OOOOH, I know that name! Love & Light to you!|
|I like Bitcoin and I wish I had a whole lot of it and like many many people, I wish I had kept the first crypto I bought at something like $4 a coin :D I do not have a whole lot of it but I do have a little bit. I like the philosophy behind it and in theory it should change the world. However the reality is that the vast majority of it is concentrated in a very few hands which allows for market manipulation and stops it being useful as a post-fiat currency.|
|As long as I'm getting paid, I'm pretty happy!|
|the below is a reply to the question|
|I too remember your name Pluto! Such a decent human ❤||he is!! True OG right there <3|
|Is the dark web subject to more racism than its counterpart, the world wide web?||There are some white power sites and that sort of thing and the chans are even more uncensored than the clearweb ones (4chan, 8chan) but to be honest they are the same cesspools in different spots. Drug forums don't seem to be very racist. I've seen worse on Twitter|
|Have you seen any consequential political or social organizing being carried out on the dark web?||Not directly, but the dark web helped facilitate the Arab Spring uprising in 2010 by allowing activists to remain anonymous and to access blocked websites and social media. Wikileaks, obviously. Some white supremacy organizations seem to use it to coordinate attacks, but they are not places I'm keen to hang out in.|
|What’s the most expensive thing for sale you’ve seen on the dark web? What was surprisingly inexpensive?||I can't remember specific listings, but there were sometimes sales of things like coke by the kilo, so that sort of thing I guess.|
|LSD could easily be found for $1/tab and one huge dealer gave it away for free if it was for personal use|
|the below has been split into separate questions|
|1. I’m going to ask a couple in hopes that one will catch your interest! I know you’re anonymous on the dark web, but even so, have you ever felt worried about your safety?||I actually made the decision to be upfront and honest about who I am on the dark web, so I use the name OzFreelancer (which is easily traceable to my real name) on all the dark web sites where i went looking for interviews. The people there had the option of talking to me or not, so they had no reason to want to harm me.|
|2. I’ve found your comments about your relationship with Yura fascinating. Did y’all develop a friendship? Did you build any other relationships that stand out in your mind? Since you were straightforward about being on the dark web for stories, did people seem reluctant to communicate, or were they excited for the opportunity to divulge a secret?||We do have a friendship of sorts, it is really quite weird. I do hope to met him one day. I met all of the senior staff of Silk Road other than the Dread Pirate Roberts himself and keep in touch with some. Some people wanted nothing to do with me of course, but many more were happy to talk to me. i think sometimes it was a relief to them to be able to talk to one person who they knew was who they said they were.|
|3. On violent forums, did users ever express remorse, guilt, shame, or anything indicative of some recognition that what they were viewing/seeking was awful? Do you see doxxing teams on the dark web working together to uncover info, or is the info already there through previous hacks/breaches, and someone just accesses and releases it? Sorry if any of those don’t make sense! I’m not familiar with the dark web lingo but am so intrigued by your work.||Not really. I think if they were contributing to the forums, they were comfortable with who they were and what they were doing. Many of the "regular" pedophiles expressed revulsion about Lux and hurtcore sites though|
|these have probably been asked before but has there ever been a time where you where genuinely been scared for your life and whats the most messed up thing you've witnessed did you have any help?||Yeah both things have been answered in this thread, so I'll cut'n'paste|
|The only time I've felt even slightly in danger despite all this nosing around in there was when I helped uncover a hitman scam. The owner of Besa Mafia, the most profitable murder-for-hire site in history, came after me when I started writing about him. He made loads of threats ("you don't know who I am, but I know who you are and where you live") but that wasnt scary, as I had access to the backdoor of his site thanks to a friendly hacker and knew he didn't really want to hurt anybody.|
|It took a bit of a darker turn when he told the people who had signed up to work as hitmen on his site - and who he made video themselves burning cars with signs on them to advertise how legit his site was, then never sent them the promised money for doing so - that I was the owner of the site who had ripped them off. That could have become ugly, but luckily even the thugs weren't dumb enough to believe him.|
|The only other time I've been a bit nervous was when Homeland Security wanted to have a "friendly" meeting with me on one of my trips to the US to attend a trial. They were friendly, but scary too.|
|The most frightening experience I've ever had is coming face to face with Lux, the owner of Pedoempire and Hurt2theCore, the most evil and reviled person on the entire dark web. He was responsible for procuring and hosting Daisy's Destruction, the most repulsive video ever made, created by Peter Scully, whose crimes were so bad, the Philippines are considering reinstating the death penalty especially for him.|
|It wasn't frightening because Lux was frightening - he was anything but. It was frightening because he looked so inoffensive and normal.|
|It was frightening because he was living proof that monsters walk among us and we never know.|
|[deleted]||It is absolute crap for browsing the clearweb, and a lot of sites detect that it is odd traffic and you have to solve their CAPTCHAs before doing the most basic things|
|I’m sure you’ve seen some really bad stuff, do you regularly talk to a therapist to help?||I've never seen a therapist (they don't really seem to be a thing in Australia they way they are in the US), but I have been known to unload on my partner and my dog|
|the below is a reply to the question|
|Yo, speaking as an Aussie, they absolutely are a thing, you can get them covered thru medicare, and I recommend it if you possibly can! Bro, therapy is awesome.||I'm not against therapy as a thing, but I've honestly never been so traumatised that I feel I need it. Also I had a bad experience with a psychologist after I watched my partner die in an accident - they suggested I find God, and I noped out of there|
|the below is another reply to the answer|
|Therapist is an American term- we call them psychs. And the one who told you to find God was terrible and out of line.||Yeah she didn't last long before I was over it. Also a doctor decided I needed Xanax, which was also a bad move, because what I really needed was to grieve and Xanax doesn't let you do that properly|
|Do you find any good things on the dark web? Happy stuff that gives people hope? Or just the trash?||I like the psychonaut communities. They just want peace, love and mungbeans for everybody|
|Have you heard of "The Primarch System" rumor of the dark web? Sounds downright silly to me. But I'm curious if anyone who spends time on the deep web actually takes it seriously, or if as an idea it is connected to anything serious at all.||Nah, up there with the Shadow Web and Mariana's Web. There's always people who want to find out where the "deeper" "more secret" "really dark" stuff is. To them I say what, hurtcore isn't dark enough for you?|
|Doesn't delving the murky depths of child predator forums categorize you with the child predators in the eyes of an investigating law enforcement agency? Do you have some sort of amnesty due to your journalism, or is that something you worry about having to explain away? Has your presence there ever caused some sort of a scare?||No, I never went into any of the sites that had actual photos or videos (you can't un-see that shit), but did spend a lot of time in pedophile discussion forums. I also went to a hurtcore hearing and saw screenshots in the police files, as well as listening for two days to videos being described frame-by-frame and private communications between the site owner and the sadists.|
|Besides drugs and sex crimes, what else is going on in the dark web? Are there other interesting nooks and crannies?||I often post screenshots of bizarre sites I find on my Twitter. However, the main uses for the dark web are drugs, digital/fraud goods and child exploitation|
|I have one, it might be rather boring though, but here goes. On these "child predator forums" are they actually forums devoted to stalking children and do they share social media profiles of children among themselves? That would be kik ids, snapchat and facebook ids, instagram, stuff like that, info that would allow online access and that may have been chosen for suitability? Creepy question I know, but anyway I would be interested to hear your answer. I came here from TrueCrime, you referred to these things in your post on that sub. I suspect I already know the answer yet would like to hear your take on it.||Yes, they provide information and tips on how to approach children, how to ensure they won't tell, how to sedate them in some instances, where to find child exploitation material, how to remove metadata and any identifying characteristics in photos and videos before sharing and so on.|
|They don't tend to share socia media, as that is the sort of thing that can be traced easily. They do talk about how to approach kids on social media and on the worst forums how to blackmail children into stripping/meeting etc|
|the below is a reply to the above|
|So you're saying they have a more general approach rather than identifying individual children on the internet? Again a creepy question because what I suggest is that a child's social media could be used and circulated on the dark web as potential information to gain access by anonymity, even if it was just online access only. I actually wonder as I have recently read of the anonymity of apps like ''kik messenger'' and how the police are often unable to get any information from the communications as they remain encrypted and off the server and require little if any valid ID to make an account.||No doubt photos from social media are uploaded as part of the materials they have. I haven't seen anything where they get together and try to track down a specific child, but I'm sure some predators do this. Most are more likely to abuse children in their orbit - family, kids of friends, or they work where they have access to children|
|I heard there are forums to download books but it was really dangerous, Is it true? I'm just a poor guy who wants to finish the young Jack sparrow series||Whenever you download anything from a pirate site you run the risk of infection|
|What do you think of QAnon?||Wackjob conspiracy|
|the below is a reply to the above|
|Who should the conspiracy theorists actually be worried about if they actually care about thwarting pedophilia?||The vast, vast majority of child abuse takes place within the child's personal orbit - relatives, family friends, parents of their own friends, people involved in their activities (coaches, leaders, etc)|
|So, those people|
|the below is another reply to the answer|
|Also how to we get people to stop believing in QAnon?||Outside my area of expertise, sorry|
|do you personally believe there was/is any truth to the "defense" (story) that DPR was a title handed down to different admins for the original silk road, or was it just a convenient defense? do you have any theories as to who satoshi nakamoto is? besides the original SR, are there any other darkweb markets that you think have a good enough story to turn into a book? eg sheep market? i've seen you talk a little about the child predator forums, and (as with h2tc) noted are mainly populated by males. i'm curious if you've ever encountered females on such forums/websites (eg. btfk)||No. There was a time that I believed the person posting on the forums as DPR changed, but the ownership and administration of the market I believe never changed hands. Variety Jones is claiming a part ownership (which may or may not be true) but I believe that is so he can run a Fourth Amendment argument|
|So many theories have some credibility to them, but no one theory ticks all the boxes. Highly recommend the 3-part youtube deep dive by Barely Sociable|
|I'm not sure any one market has the story that Silk Road had, but I would like to write a definitive history that encompasses the most compelling features of all the markets. Backopy of BMR apparently got away clean. The admins of Atlantis got wind of a security issue and closed shop, trying to warn DPR. AlphaBay ended in Alexander Cazes death in a Bangkok prison cell. Then everyone flocked to Hansa, which by that time was being run by law enforcement. Evolution ended in the most brazen exit scam, followed by a bizarre cloak'n'dagger situation played out right here on reddit. The WSM/DDW follow-the-money case. And these are just some that come right off the top of my head. I just need a publisher to provide me an advance I can live off while I write it!|
|There were a very few people on the forums who identified as female (obvs anyone can be anyone on a dark web forum) and there have been one or two arrests of women in relation to dark web child pornography. Peter Scully's female assistant who carried out some of the torture was originally one of his victims, turned into a sadist.|
|What’s the one lingering unanswered question you have about SR?||I am hanging out for Joel Ellingson to go to trial so that I can find out once and for all whether redandwhite, lucydrop and Tony76 are one and the same person.|
|There are several people who I got to "know" by their handles who I wonder about from time to time, but mostly I hope they are safe and well and i don't want to track them down or expose them|
|the below is a reply to the above|
|Eileen, I am fangirling PRE-TTY hard right now. Talking SR and Tony76 with you is how I imagine it feels to talk to a royal correspondent about Prince Andrew 😅 Ellingson being all three would be a very neat end to an otherwise insane story. Part of me wants to pin Oracle in with that trio too but that’s mostly a desperate attempt from me to add another layer to the madness. I miss the twists and turns that came with the rise and fall of SR. From your own experience - would you agree with the idea that more than one person staffed the DPR account? Thanks for the reply!||Ha! You have no idea what it is like when I find someone who really knows about this stuff and can have informed conversations about it. I latch onto them and don't let go. The very BEST was meeting up with DPR's three deputies (SSBD in Australia, Inigo in US and Libertas in Ireland) so I could actually have conversations with people who knew more than I did! Variety Jones was cool too, but the conversation couldn't flow too freely thanks to him being incarcerated in Bangkok prison at the time.|
|I think others sometimes posted from the forum account, but Ulbricht kept a vice-like grip on his market account|
|the below is a reply to the above|
|I can imagine it’s so satisfying and exciting to get those tidbits of info that piece the jigsaw together. The bedlam that played out over the forum in the aftermath was a cloud of paranoia and adrenaline that kept me refreshing pages for days. Would love to hear accounts from SSBD, Inigo and Libertas from this time. One last question: what were your thoughts when the Chloe Ayling story first broke?||I assumed it was a publicity stunt. I don't think that any more. I guess I can't blame her for milking her kidnapping for publicity in the aftermath, though I don't think she does herself any favors the way she goes about it sometimes|
|Sorry if this has been covered before but in your research, mainly related to child abuse, where are these children coming from? Children in their care/ family? Kidnapped?||The vast majority of child abuse is carried out by someone within their social circle - family and acquaintances. However, the hurtcore stuff was often carried out in third world countries on orphans or where desperate families gave up their children to "benefactors" who they believed were going to provide food an education|
|What Casefile episodes have you written? I became obsessed with it and ripped through all the episodes and now nothing will fill that void. Thanks for your efforts!||Casefile – the murder of Amy Allwine|
|Casefile – Blue Skies, Black Death|
|Casefile – Ella Tundra|
|Casefile – Dnepropetrovsk Maniacs|
|Casefile – Motown Murders|
|Casefile – Rebecca Schaeffer|
|Casefile – Sian Kingi|
|Casefile – John & Mark|
|Casefile – Shauna Howe|
|Casefile – Chloe Ayling|
|Casefile – Johnny Altinger|
|Casefile – Killer Petey|
|Casefile – The Santa Claus Bank Robbery|
|Casefile – Martha Puebla|
|Casefile – Leigh Leigh|
|Is there any way parents can keep their kids safe from this without being helicopter parents?||I'll cut'n'paste a response i gave to someone else about this, because it was something that really stuck out to me:|
|The one thing I found really interesting when I was lurking the forums of the child predators was their frustration about how children are now taught from a very young age that certain touching and acts are wrong and that they shouldn't keep certain secrets. It came up over and over again that they could not abuse certain children because they knew those children had someone they would tell. It was pretty clear that education was a child's best defence against getting abused. Kids who speak up and who have close relationships with one or more people they are likely to confide in|
|What does it take in terms of degrees and experience to get into this business?||Nothing official. I was a lawyer, but that had no bearing on what I do now (I did corporate law). I didn't have any official credentials when I began as a freelance journalist, though later I got a diploma of professional writing and editing. Anyone can be an author, provided they can write|
|If you could take a guess from your findings, what would be some speculative statistics on these abuse/torture sites? How many people (tens of thousands?) are involved? Do they generally come from the same places in the world or are they seemingly geographically random (based on victim ethnicity, or language spoken, perhaps)... what are some quantifying stats to wrap our heads around how prevalent this shit is?||Most dark web users come from western countries, just because infrastructure supports it. The sites often have tens of thousands of registered users, but a lot of them would be people for whom curiosity got the better of them and who signed up then left. Active users more like in the thousands, hyper-active users the hundreds.|
|One of the things that makes life difficult for law enforcement is that most of these sites don't operate on a commercial basis - people aren't making money from them, so there is no cryptocurrency chain to follow. They operate on a sharing basis and to get access to the more private parts of the sites, a user has to upload "fresh" material and/or prove they are actively abusing a child. Hurt2theCore used to get users to have the children hold up signs or have the site name or a username written on their bodies with a marker. This stopped law enforcement from getting access to those parts (like the "producers lounge") of the sites unless they were able to take over an account of a user who already had access. Even then, the rules of the hurtcore sites would require constant new proof in order to maintain access.|
|Some sites allowed people to buy access, such as one called "Welcome to Video" and then were taken down by law enforcement carrying out blockchain analysis of the Bitcoin transaction that led to the owner when they cashed out to fiat without moneylaundering precautions|
|the below is a reply to the above|
|Do you think LE uses deep fakes to simulate a picture to gain access? Is that possible?||It is definitely possible, but I don't know whether they are doing it as they are understandably secretive about their methods. I know it is deeply problematic, as even fake child porn is still illegal (even cartoon stuff, including some Hentai in some countries). But they have used questionable methods before, most notably running the dark web's largest site, Playpen, for over a year in order to identify contact offenders|
|the below is another reply to the original answer|
|Am I hearing you that many people are NOT doing this for financial gain? Just to do it and share it??||Child exploitation, yes, it is mostly a sharing community. Some people make some money out of it, but it is not like drugs where a lot of people are making a LOT of money|
|On the subject of abused kids... did you ever help the kids in any way?||I never met any of the kids. I never saw any of the photos and videos. I don't know who any of the kids are.|
|Daisy has been taken into care and her identity changed. I hope she is doing okay|
|What exactly does the dark web look like? You hear about it often, but don’t know if it looks like Google Chrome, Safari, or just a page full of code.||It looks like a normal browser and operates just like a normal browser. It's just that it can access sites that your normal browser can't.|
|e.g. http://thehub5himseelprs44xzgfrb4obgujkqwy5tzbsh5yttebqhaau23yd.onion/index.php is the URL of a dark web forum. If you plug it into your normal browser you will get an error. If you plug it into the Tor browser you will get the registration page for The Hub|
|How do you keep yourself from hating all humanity?||I am happy to report that, even on the dark web, the good people outnumber the bad|
|Hi! First off I'd like to say that I find what you do quite fascinating and would love to do something like that in the future. My question is in regards to art and other forms of artistic expression on the dark web. Is it true that the dark web is a place where you can also find awesome things such as art and literature?||Not really, because all that stuff is readily available on the clearweb. There are sites like the Imperial Library of Trantor, which is a pirate site for books, where you can read thousands of books for free, but that's really no different to The Pirate Bay. Some people share their LSD art, but again, nothing you won't find on the clearweb|
submitted by EpiK-Protocol to u/EpiK-Protocol [link] [comments]
On October 20, Eric Yao, Head of EpiK China, and Leo, Co-Founder & CTO of EpiK, visited Deep Chain Online Salon, and discussed “How EpiK saved the miners eliminated by Filecoin by launching E2P storage model”. ‘?” The following is a transcript of the sharing.
Eric: Hello, everyone, I’m Eric, graduated from School of Information Science, Tsinghua University. My Master’s research was on data storage and big data computing, and I published a number of industry top conference papers.
Since 2013, I have invested in Bitcoin, Ethereum, Ripple, Dogcoin, EOS and other well-known blockchain projects, and have been settling in the chain circle as an early technology-based investor and industry observer with 2 years of blockchain experience. I am also a blockchain community initiator and technology evangelist
Leo: Hi, I’m Leo, I’m the CTO of EpiK. Before I got involved in founding EpiK, I spent 3 to 4 years working on blockchain, public chain, wallets, browsers, decentralized exchanges, task distribution platforms, smart contracts, etc., and I’ve made some great products. EpiK is an answer to the question we’ve been asking for years about how blockchain should be landed, and we hope that EpiK is fortunate enough to be an answer for you as well.
Q & A
Deep Chain Finance:
First of all, let me ask Eric, on October 15, Filecoin’s main website launched, which aroused everyone’s attention, but at the same time, the calls for fork within Filecoin never stopped. The EpiK protocol is one of them. What I want to know is, what kind of project is EpiK Protocol? For what reason did you choose to fork in the first place? What are the differences between the forked project and Filecoin itself?
First of all, let me answer the first question, what kind of project is EpiK Protocol.
With the Fourth Industrial Revolution already upon us, comprehensive intelligence is one of the core goals of this stage, and the key to comprehensive intelligence is how to make machines understand what humans know and learn new knowledge based on what they already know. And the knowledge graph scale is a key step towards full intelligence.
In order to solve the many challenges of building large-scale knowledge graphs, the EpiK Protocol was born. EpiK Protocol is a decentralized, hyper-scale knowledge graph that organizes and incentivizes knowledge through decentralized storage technology, decentralized autonomous organizations, and generalized economic models. Members of the global community will expand the horizons of artificial intelligence into a smarter future by organizing all areas of human knowledge into a knowledge map that will be shared and continuously updated for the eternal knowledge vault of humanity
And then, for what reason was the fork chosen in the first place?
EpiK’s project founders are all senior blockchain industry practitioners and have been closely following the industry development and application scenarios, among which decentralized storage is a very fresh application scenario.
However, in the development process of Filecoin, the team found that due to some design mechanisms and historical reasons, the team found that Filecoin had some deviations from the original intention of the project at that time, such as the overly harsh penalty mechanism triggered by the threat to weaken security, and the emergence of the computing power competition leading to the emergence of computing power monopoly by large miners, thus monopolizing the packaging rights, which can be brushed with computing power by uploading useless data themselves.
The emergence of these problems will cause the data environment on Filecoin to get worse and worse, which will lead to the lack of real value of the data in the chain, high data redundancy, and the difficulty of commercializing the project to land.
After paying attention to the above problems, the project owner proposes to introduce multi-party roles and a decentralized collaboration platform DAO to ensure the high value of the data on the chain through a reasonable economic model and incentive mechanism, and store the high-value data: knowledge graph on the blockchain through decentralized storage, so that the lack of value of the data on the chain and the monopoly of large miners’ computing power can be solved to a large extent.
Finally, what differences exist between the forked project and Filecoin itself?
On the basis of the above-mentioned issues, EpiK’s design is very different from Filecoin, first of all, EpiK is more focused in terms of business model, and it faces a different market and track from the cloud storage market where Filecoin is located because decentralized storage has no advantage over professional centralized cloud storage in terms of storage cost and user experience.
EpiK focuses on building a decentralized knowledge graph, which reduces data redundancy and safeguards the value of data in the distributed storage chain while preventing the knowledge graph from being tampered with by a few people, thus making the commercialization of the entire project reasonable and feasible.
From the perspective of ecological construction, EpiK treats miners more friendly and solves the pain point of Filecoin to a large extent, firstly, it changes the storage collateral and commitment collateral of Filecoin to one-time collateral.
Miners participating in EpiK Protocol are only required to pledge 1000 EPK per miner, and only once before mining, not in each sector.
What is the concept of 1000 EPKs, you only need to participate in pre-mining for about 50 days to get this portion of the tokens used for pledging. The EPK pre-mining campaign is currently underway, and it runs from early September to December, with a daily release of 50,000 ERC-20 standard EPKs, and the pre-mining nodes whose applications are approved will divide these tokens according to the mining ratio of the day, and these tokens can be exchanged 1:1 directly after they are launched on the main network. This move will continue to expand the number of miners eligible to participate in EPK mining.
Secondly, EpiK has a more lenient penalty mechanism, which is different from Filecoin’s official consensus, storage and contract penalties, because the protocol can only be uploaded by field experts, which is the “Expert to Person” mode. Every miner needs to be backed up, which means that if one or more miners are offline in the network, it will not have much impact on the network, and the miner who fails to upload the proof of time and space in time due to being offline will only be forfeited by the authorities for the effective computing power of this sector, not forfeiting the pledged coins.
If the miner can re-submit the proof of time and space within 28 days, he will regain the power.
Unlike Filecoin’s 32GB sectors, EpiK’s encapsulated sectors are smaller, only 8M each, which will solve Filecoin’s sector space wastage problem to a great extent, and all miners have the opportunity to complete the fast encapsulation, which is very friendly to miners with small computing power.
The data and quality constraints will also ensure that the effective computing power gap between large and small miners will not be closed.
Finally, unlike Filecoin’s P2P data uploading model, EpiK changes the data uploading and maintenance to E2P uploading, that is, field experts upload and ensure the quality and value of the data on the chain, and at the same time introduce the game relationship between data storage roles and data generation roles through a rational economic model to ensure the stability of the whole system and the continuous high-quality output of the data on the chain.
Deep Chain Finance:
Eric, on the eve of Filecoin’s mainline launch, issues such as Filecoin’s pre-collateral have aroused a lot of controversy among the miners. In your opinion, what kind of impact will Filecoin bring to itself and the whole distributed storage ecosystem after it launches? Do you think that the current confusing FIL prices are reasonable and what should be the normal price of FIL?
Filecoin mainnet has launched and many potential problems have been exposed, such as the aforementioned high pre-security problem, the storage resource waste and computing power monopoly caused by unreasonable sector encapsulation, and the harsh penalty mechanism, etc. These problems are quite serious, and will greatly affect the development of Filecoin ecology.
These problems are relatively serious, and will greatly affect the development of Filecoin ecology, here are two examples to illustrate. For example, the problem of big miners computing power monopoly, now after the big miners have monopolized computing power, there will be a very delicate state — — the miners save a file data with ordinary users. There is no way to verify this matter in the chain, whether what he saved is uploaded by himself or someone else. And after the big miners have monopolized computing power, there will be a very delicate state — — the miners will save a file data with ordinary users, there is no way to verify this matter in the chain, whether what he saved is uploaded by himself or someone else. Because I can fake another identity to upload data for myself, but that leads to the fact that for any miner I go to choose which data to save. I have only one goal, and that is to brush my computing power and how fast I can brush my computing power.
There is no difference between saving other people’s data and saving my own data in the matter of computing power. When I save someone else’s data, I don’t know that data. Somewhere in the world, the bandwidth quality between me and him may not be good enough.
The best option is to store my own local data, which makes sense, and that results in no one being able to store data on the chain at all. They only store their own data, because it’s the most economical for them, and the network has essentially no storage utility, no one is providing storage for the masses of retail users.
The harsh penalty mechanism will also severely deplete the miner’s profits, because DDOS attacks are actually a very common attack technique for the attacker, and for a big miner, he can get a very high profit in a short period of time if he attacks other customers, and this thing is a profitable thing for all big miners.
Now as far as the status quo is concerned, the vast majority of miners are actually not very well maintained, so they are not very well protected against these low-DDOS attacks. So the penalty regime is grim for them.
The contradiction between the unreasonable system and the demand will inevitably lead to the evolution of the system in a more reasonable direction, so there will be many forked projects that are more reasonable in terms of mechanism, thus attracting Filecoin miners and a diversion of storage power.
Since each project is in the field of decentralized storage track, the demand for miners is similar or even compatible with each other, so miners will tend to fork the projects with better economic benefits and business scenarios, so as to filter out the projects with real value on the ground.
For the chaotic FIL price, because FIL is also a project that has gone through several years, carrying too many expectations, so it can only be said that the current situation has its own reasons for existence. As for the reasonable price of FIL there is no way to make a prediction because in the long run, it is necessary to consider the commercialization of the project to land and the value of the actual chain of data. In other words, we need to keep observing whether Filecoin will become a game of computing power or a real value carrier.
Deep Chain Finance:
Leo, we just mentioned that the pre-collateral issue of Filecoin caused the dissatisfaction of miners, and after Filecoin launches on the main website, the second round of space race test coins were directly turned into real coins, and the official selling of FIL hit the market phenomenon, so many miners said they were betrayed. What I want to know is, EpiK’s main motto is “save the miners eliminated by Filecoin”, how to deal with the various problems of Filecoin, and how will EpiK achieve “save”?
Originally Filecoin’s tacit approval of the computing power makeup behavior was to declare that the official directly chose to abandon the small miners. And this test coin turned real coin also hurt the interests of the loyal big miners in one cut, we do not know why these low-level problems, we can only regret.
EpiK didn’t do it to fork Filecoin, but because EpiK to build a shared knowledge graph ecology, had to integrate decentralized storage in, so the most hardcore Filecoin’s PoRep and PoSt decentralized verification technology was chosen. In order to ensure the quality of knowledge graph data, EpiK only allows community-voted field experts to upload data, so EpiK naturally prevents miners from making up computing power, and there is no reason for the data that has no value to take up such an expensive decentralized storage resource.
With the inability to make up computing power, the difference between big miners and small miners is minimal when the amount of knowledge graph data is small.
We can’t say that we can save the big miners, but we are definitely the optimal choice for the small miners who are currently in the market to be eliminated by Filecoin.
Deep Chain Finance:
Let me ask Eric: According to EpiK protocol, EpiK adopts the E2P model, which allows only experts in the field who are voted to upload their data. This is very different from Filecoin’s P2P model, which allows individuals to upload data as they wish. In your opinion, what are the advantages of the E2P model? If only voted experts can upload data, does that mean that the EpiK protocol is not available to everyone?
First, let me explain the advantages of the E2P model over the P2P model.
There are five roles in the DAO ecosystem: miner, coin holder, field expert, bounty hunter and gateway. These five roles allocate the EPKs generated every day when the main network is launched.
The miner owns 75% of the EPKs, the field expert owns 9% of the EPKs, and the voting user shares 1% of the EPKs.
The other 15% of the EPK will fluctuate based on the daily traffic to the network, and the 15% is partly a game between the miner and the field expert.
The first describes the relationship between the two roles.
The first group of field experts are selected by the Foundation, who cover different areas of knowledge (a wide range of knowledge here, including not only serious subjects, but also home, food, travel, etc.) This group of field experts can recommend the next group of field experts, and the recommended experts only need to get 100,000 EPK votes to become field experts.
The field expert’s role is to submit high-quality data to the miner, who is responsible for encapsulating this data into blocks.
Network activity is judged by the amount of EPKs pledged by the entire network for daily traffic (1 EPK = 10 MB/day), with a higher percentage indicating higher data demand, which requires the miner to increase bandwidth quality.
If the data demand decreases, this requires field experts to provide higher quality data. This is similar to a library with more visitors needing more seats, i.e., paying the miner to upgrade the bandwidth.
When there are fewer visitors, more money is needed to buy better quality books to attract visitors, i.e., money for bounty hunters and field experts to generate more quality knowledge graph data. The game between miners and field experts is the most important game in the ecosystem, unlike the game between the authorities and big miners in the Filecoin ecosystem.
The game relationship between data producers and data storers and a more rational economic model will inevitably lead to an E2P model that generates stored on-chain data of much higher quality than the P2P model, and the quality of bandwidth for data access will be better than the P2P model, resulting in greater business value and better landing scenarios.
I will then answer the question of whether this means that the EpiK protocol will not be universally accessible to all.
The E2P model only qualifies the quality of the data generated and stored, not the roles in the ecosystem; on the contrary, with the introduction of the DAO model, the variety of roles introduced in the EpiK ecosystem (which includes the roles of ordinary people) is not limited. (Bounty hunters who can be competent in their tasks) gives roles and possibilities for how everyone can participate in the system in a more logical way.
For example, a miner with computing power can provide storage, a person with a certain domain knowledge can apply to become an expert (this includes history, technology, travel, comics, food, etc.), and a person willing to mark and correct data can become a bounty hunter.
The presence of various efficient support tools from the project owner will lower the barriers to entry for various roles, thus allowing different people to do their part in the system and together contribute to the ongoing generation of a high-quality decentralized knowledge graph.
Deep Chain Finance:
Leo, some time ago, EpiK released a white paper and an economy whitepaper, explaining the EpiK concept from the perspective of technology and economy model respectively. What I would like to ask is, what are the shortcomings of the current distributed storage projects, and how will EpiK protocol be improved?
Distributed storage can easily be misunderstood as those of Ali’s OceanDB, but in the field of blockchain, we should focus on decentralized storage first.
There is a big problem with the decentralized storage on the market now, which is “why not eat meat porridge”.
How to understand it? Decentralized storage is cheaper than centralized storage because of its technical principle, and if it is, the centralized storage is too rubbish for comparison.
What incentive does the average user have to spend more money on decentralized storage to store data?
Is it safer?
Existence miners can shut down at any time on decentralized storage by no means save a share of security in Ariadne and Amazon each.
There’s no difference between encrypted presence on decentralized storage and encrypted presence on Amazon.
The 10,000 gigabytes of bandwidth in decentralized storage simply doesn’t compare to the fiber in a centralized server room. This is the root problem of the business model, no one is using it, no one is buying it, so what’s the big vision.
The goal of EpiK is to guide all community participants in the co-construction and sharing of field knowledge graph data, which is the best way for robots to understand human knowledge, and the more knowledge graph data there is, the more knowledge a robot has, the more intelligent it is exponentially, i.e., EpiK uses decentralized storage technology. The value of exponentially growing data is captured with linearly growing hardware costs, and that’s where the buy-in for EPK comes in.
Organized data is worth a lot more than organized hard drives, and there is a demand for EPK when robots have the need for intelligence.
Deep Chain Finance:
Let me ask Leo, how many forked projects does Filecoin have so far, roughly? Do you think there will be more or less waves of fork after the mainnet launches? Have the requirements of the miners at large changed when it comes to participation?
We don’t have specific statistics, now that the main network launches, we feel that forking projects will increase, there are so many restricted miners in the market that they need to be organized efficiently.
However, we currently see that most forked projects are simply modifying the parameters of Filecoin’s economy model, which is undesirable, and this level of modification can’t change the status quo of miners making up computing power, and the change to the market is just to make some of the big miners feel more comfortable digging up, which won’t help to promote the decentralized storage ecology to land.
We need more reasonable landing scenarios so that idle mining resources can be turned into effective productivity, pitching a 100x coin instead of committing to one Fomo sentiment after another.
Deep Chain Finance:
How far along is the EpiK Protocol project, Eric? What other big moves are coming in the near future?
The development of the EpiK Protocol is divided into 5 major phases.
(a) Phase I testing of the network “Obelisk”.
Phase II Main Network 1.0 “Rosetta”.
Phase III Main Network 2.0 “Hammurabi”.
(a) The Phase IV Enrichment Knowledge Mapping Toolkit.
The fifth stage is to enrich the knowledge graph application ecology.
Currently in the first phase of testing network “Obelisk”, anyone can sign up to participate in the test network pre-mining test to obtain ERC20 EPK tokens, after the mainnet exchange on a one-to-one basis.
We have recently launched ERC20 EPK on Uniswap, you can buy and sell it freely on Uniswap or download our EpiK mobile wallet.
In addition, we will soon launch the EpiK Bounty platform, and welcome all community members to do tasks together to build the EpiK community. At the same time, we are also pushing forward the centralized exchange for token listing.
Some KOLs said, Filecoin consumed its value in the next few years, so it will plunge, what do you think?
First of all, the judgment of the market is to correspond to the cycle, not optimistic about the FIL first judgment to do is not optimistic about the economic model of the project, or not optimistic about the distributed storage track.
First of all, we are very confident in the distributed storage track and will certainly face a process of growth and decline, so as to make a choice for a better project.
Since the existing group of miners and the computing power already produced is fixed, and since EpiK miners and FIL miners are compatible, anytime miners will also make a choice for more promising and economically viable projects.
Filecoin consumes the value of the next few years this time, so it will plunge.
Regarding the market issues, the plunge is not a prediction, in the industry or to keep learning iteration and value judgment. Because up and down market sentiment is one aspect, there will be more very important factors. For example, the big washout in March this year, so it can only be said that it will slow down the development of the FIL community. But prices are indeed unpredictable.
Actually, in the end, if there are no applications and no one really uploads data, the market value will drop, so what are the landing applications of EpiK?
Leo: The best and most direct application of EpiK’s knowledge graph is the question and answer system, which can be an intelligent legal advisor, an intelligent medical advisor, an intelligent chef, an intelligent tour guide, an intelligent game strategy, and so on.
Author: Gamals Ahmed, CoinEx Business Ambassadorsubmitted by CoinEx_Institution to Coinex [link] [comments]
ABSTRACTAryacoin is a new cryptocurrency, which allows for decentralized, peer to peer transactions of electronic cash. It is like Bitcoin and Litecoin, but the trading of the coin occurs on sales platforms that have no restriction to use. Further, it was created with the goal of addressing the double spend issues of Bitcoin and does so using a timestamp server to verify transactions. It works by taking the hash of a block of items to be timestamped and widely publishing the hash. The timestamp proves that the data must have existed at the time in order to get the hash. Each timestamp then includes the previous timestamp in its hash, forming a chain.
The Aryacoin team is continuously developing new use cases for the coin, including exchanges where users can exchange the coins without any fees or restrictions, and offline options where the coins can be bought and sold for cash. The coins can also be used on the company’s other platform, mrdigicoin.io. Along with the coin, there is a digital wallet that can be created and controlled by the user entirely, with no control being retained by the Aryacoin team.
1.INTRODUCTIONThe concept of Blockchain first came to fame in October 2008, as part of a proposal for Bitcoin, with the aim to create P2P money without banks. Bitcoin introduced a novel solution to the age-old human problem of trust. The underlying blockchain technology allows us to trust the outputs of the system without trusting any actor within it. People and institutions who do not know or trust each other, reside in different countries, are subject to different jurisdictions, and who have no legally binding agreements with each other, can now interact over the Internet without the need for trusted third parties like banks, Internet platforms, or other types of clearing institutions.
When bitcoin was launched it was revolutionary allowing people to transfer money to anytime and anywhere with very low transaction fees . It was decentralized and their is no third party involved in the transaction , only the sender and receiver were involved.
This paper provide a solution to the double-spending problem using a peer-to-peer distributed timestamp server to generate computational proof of the chronological order of transactions.The system is secure as long as honest nodes collectively control more CPU power than any cooperating group of attacker nodes. Bitcoin was made so that it would not be controlled or regulated but now exchanges and governments are regulating bitcoin and other cryptocurrencies at every step. Aryacoin was developed to overcome these restrictions on a free currency.
Aryacoin is a new age cryptocurrency, which withholds the original principle on which the concept of cryptocurrency was established. Combining the best in blockchain technology since the time of its creation, Aryacoin strives to deliver the highest trading and mining standards for its community.
1.1 OVERVIEW ABOUT ARYACOINAryacoin is a new age cryptocurrency, which withholds the original principle on which the concept of cryptocurrency was established. Combining the best in blockchain technology since the time of its creation, Aryacoin strives to deliver the highest trading and mining standards for its community.
Aryacoin is a blockchain based project that allows users to access their wallet on the web and mobile browsers, using their login details.
Aryacoin can be mined; it also can be exchanged by other digital currencies in several world-famous exchanges such as Hitbtc, CoinEx, P2pb2b, WhiteBit, Changelly and is also listed in reputable wallets such as Coinomi and Guarda.
Aryacoin is a coin, which can be used by anyone looking to use cryptocurrency which allows them to keep their privacy even when buying/selling the coin along with while using the coin during transactions. Proof of work and cryptographic hashes allows transactions to verified.
Stable Fee Per AYA is a unique feature of Aryacoin, so by increasing the amount or volume of the transaction, there is no change in the fee within the network, which means that the fee for sending an amount less than 1 AYA is equal to several hundred million AYA. Another unique feature of Aryacoin is the undetectability of transactions in Explorer, such as the DASH and Monero, of course, this operation is unique to Aryacoin.
Using Aryacoin digital currency, like other currencies, international transactions can be done very quickly and there are no limitations in this area as the creators claim.
Aryacoin aims to allow users to access the Aryacoin wallet via the web and mobile browsers using their login details.
Aryacoin is a peer-to-peer electronic cash system that enables users to send and receive payments directly from one party to another, and allow them to transfer funds across borders with no restriction or third party involvement. The blockchain-based system embraces the digital signature, which prevents double spending and low transfer fees, which enables users to transfer huge amounts with very low fees. The proof-of-work consensus mechanism allows each transaction to be verified and confirmed, while anonymity enables users to use the coin anywhere at any time.
According to the website of the operation, each wallet is divided into 2 or more AYA wallet addresses for each transaction, and depending on the volume of the transaction block, the origin, and destination of transactions in the network can not be traced and displayed to the public.
In fact, each wallet in Aryacoin consists of a total of several wallets. The number of these wallets increases per transaction to increase both security and privacy. Aryacoin also uses the dPoW protocol. In the dPoW protocol, a second layer is added to the network to verify transactions, which makes “51% attack” impossible even with more than half of the network hash, and blocks whose Blockchain uses this second layer of security never run the risk of 51% attacks.
AYA has been listed on a number of crypto exchanges, unlike other main cryptocurrencies, it cannot be directly purchased with fiats money. However, You can still easily buy this coin by
first buying Bitcoin from any large exchanges and then transfer to the exchange that offers to trade this coin.
1.1.1 ARYACOIN HISTORYAryacoin (AYA) is a new cryptocurrency, which has been created by a group of Iranian developers, is an altcoin which allows for decentralised, peer to peer transactions of electronic cash without any fees whatsoever. Along with the coin, there is a digital wallet that can be created and managed by the user entirely, with no control being retained by the Aryacoin team.
Aryacoin’s founder, Kiumars Parsa, has been a fan of alternative currencies and particularly Bitcoin.
“We see people from all around the world using Blockchain technology and the great benefits that came with it and it then that I decided to solve this puzzle for find a way of bringing the last missing piece to the jigsaw. The idea for Aryacoin was born.” Parsa said.
Parsa and his team of Iranian ex-pats not only persevered but expedited the project and just a year later, in the summer of 2019, the first version of Aryacoin was released. In 2020, Aryacoin is the first and only Iranian coin listed on CMC.
Parsa goes on to state that it is now the strength of the community that has invested in the coin that will ultimately drive its success, alongside its robust technology and appealing 0% network fees.
“We have thousands of voices behind Aryacoin. People for the people make this coin. It is a massive shout out for democracy. This had made us base the whole team strategy on the benefits for both our users and our traders.”
“One key example is that the network fee on AYA Blockchain is 0%. Yes, absolutely nothing, which which differentiates us from other networks. What also differentiates us from other coins is that we have AYAPAY which is the first cryptocurrency Gateway in the world which does not save funds on third party storage with all funds being forwarded directly to any wallet address that the Gateway owner requests”.
“So for the first time ever, and unlike other gateways, incoming funds will be saved on the users account with submitted withdrawal requests then made on the Gateway host website. In AYAPAY which has also been developed by the Aryacoin team, all funds without extra fees or extra costs will directly forwarded to users wallets. We have named this technology as CloudWithdrawal.”
“We are continuously challenging ourselves as it is a crowded marketplace. We are striving to have a safer Blockchain against 51% attacks, faster confirmations speeds of transactions, cheaper network fee, growing the market by cooperation with Top tier Exchangers.”
1.1.2 ARYACOIN’S MAIN GOALAryacoin’s main goal is to educate people and give them the freedom to use cryptocurrency in any way they want. Aryacoin empowers the users to transfer, pay, trade cryptocurrency from any country around the globe.
Platforms that have been created by Aryacoin Team, as well as those that will go live in future, operate on the same principle and exclude absolutely no one.
1.1.3 PROBLEM ARYACOIN SEEKS TO SOLVEAryacoin aims to provide a long-term solution to the problem of double spending, which is still common in the crypto market. The developers of the system have created a peer-to-peer distributed timestamp server that generates computational proof of the transactions as they occur.
Besides, the system remains secure provided honest nodes control more CPU power than any cooperating group of attacker nodes. While Bitcoin was designed not to be regulated or controlled, many exchanges and governments have put regulatory measures on the pioneer cryptocurrency at every step. Aryacoin aims to overcome these restrictions as a free digital currency.
1.1.4 BENEFITS OF USING ARYACOINAryacoin solution offers the following benefits:
1.1.5 ARYACOIN FEATURES1. Anonymity
The coin provides decent level of anonymity for all its users. The users can send their transactions to any of the public nodes to be broadcasted , the transaction sent to the nodes should be signed by the private key of the sender address . This allows the users to use the coin anywhere any time , sending transactions directly to the node allows users from any place and country .
2. Real Life Usage
aryacoin’s team is continuously developing new and innovative ways to use the coins , they are currently developing exchanges where the users can exchange the coins without any fees and any restrictions . They also are currently developing other innovative technologies, which would allow users to spend our coins everywhere and anywhere.
3. Offline Exchanges
They are also working with different offline vendors which would enable them to buy and sell the coins directly to our users on a fixed/variable price this would allow easy buy/sell directly using cash . This would allow the coins to be accessible to users without any restrictions which most of the online exchanges have, also increase the value and number of users along with new ways to spend the coin. This would increase anonymity level of the
coin. In addition, introduce new users into the cryptomarket and technology. Creating a revolution, which educates people about crypto and introduce them to the crypto world, which introduces a completely new group of people into crypto and a move towards a Decentralized future!
When it comes to transactions, Aryacoin embraces a chain of digital signatures, where each owner simply transfers the coin to the next person by digitally signing a hash of the previous transaction and the public key of the next owner. The recipient can then verify the signatures to confirm the chain of ownership. Importantly, Aryacoin comes with a trusted central authority that checks every transaction for double spending.
5. Business Partner with Simplex
Aryacoin is the first and only Iranian digital currency that managed to obtain a trading license in other countries.
In collaboration with the foundation and financial giant Simplex, a major cryptocurrency company that has large companies such as Binance, P2P, Changelly, etc. Aryacoin has been licensed to enter the world’s major exchanges, as well as the possibility of purchasing AYA through Credit Cards, which will begin in the second half of 2020.
Also, the possibility of purchasing Aryacoin through Visa and MasterCard credit cards will be activated simultaneously inside the Aryacoin site. plus, in less than a year, AYA will be placed next to big names such as CoinCapMarket, Coinomi, P2P, Coinpayments and many other world-class brands today.
1.1.6 WHY CHOOSE ARYACOIN?If you want to use a cryptocurrency that allows you to keep your privacy online even when buying and selling the coins, the Aryacoin team claims that AYA is the way to go. Aryacoin is putting in the work: with more ways to buy and sell, and fixing the issues that were present in the original Bitcoin, plus pushing the boundaries with innovative solutions in cryptocurrencies. You can get started using Aryacoin (AYA) payments simply by having a CoinPayments account!
1.1.7 ARYANA CENTRALIZED EXCHANGEAryana, the first Iranian exchange is a unique platform with the following features:
The feature of Smart Trading Robots is one of the most powerful features for digital currency traders. Digital cryptocurrency traders are well aware of how much they will benefit from smart trading robots. In the Aryana exchange, it is possible to connect exchange user accounts to intelligent trading bots and trade even when they are offline.
The injection of $ 1 million a day in liquidity by the WhiteBite exchange to maintain and support the price of Tether and eliminate the Tether fluctuations with Bitcoin instabilities used by profiteers to become a matter of course.
1.1.8 HOW DOES ARYACOIN WORK?Aryacoin (AYA) tries to ensure a high level of security and privacy. The team has made sure to eliminate any trading restrictions for the network users: no verification is required to carry out transactions on AYA, making the project truly anonymous, decentralized, and giving it a real use in day-to-day life. The Delayed-Proof-of-Work (dPoW) algorithm makes the Aryacoin blockchain immune to any attempts of a 51% attack. AYA defines a coin as a chain of digital signatures — each owner transfers the coin to the next owner by digitally signing the hash of the previous transaction and the public key of the next owner, and the receiver verifies the signatures and the chain of ownership.
2. ARYACOIN TECHNOLOGY
2.1 PROOF-OF-WORKThey use a proof-of-work system similar to Adam Back’s Hashcash to implement a distributed timestamp server on a peer-to-peer basis, rather than newspaper or Usenet publications. The proof-of-work involves scanning for a value that when hashed, such as with SHA-256, the hash begins with a number of zero bits. The average work required is exponential in the number of zero bits required and can be verified by executing a single hash.
For their timestamp network, they implement the proof-of-work by incrementing a nonce in the block until a value is found that gives the block’s hash the required zero bits. Once the CPU effort has been expended to make it satisfy the proof-of-work, the block cannot be changed without redoing the work. As later blocks are chained after it, the work to change the block would include redoing all the blocks after it.
The proof-of-work also solves the problem of determining representation in majority decision making. If the majority were based on one-IP-address-one-vote, it could be subverted by anyone able to allocate many IPs. Proof-of-work is essentially one-CPU-one-vote. The majority decision is represented by the longest chain, which has the greatest proof-of-work effort invested in it. If honest nodes control a majority of CPU power, the honest chain will grow the fastest and outpace any competing chains. To modify a past
block, an attacker would have to redo the proof-of-work of the block and all blocks after it, then catch up with, and surpass the work of the honest nodes.
2.2 NETWORKThe steps to run the network are as follows:
2.3 AYAPAY PAYMENT SERVICES GATEWAY:According to creators Aryacoin, the development team has succeeded in inventing a new blockchain technology for the first time in the world, which is undoubtedly a big step and great news for all digital currency enthusiasts around the world.
This new technology has been implemented on the Aryacoin AYAPAY platform and was unveiled on October 2. AYAPAY payment platform is the only payment gateway in the world that does not save money in users’ accounts and transfers incoming coins directly to any wallet address requested by the gateway owner without any additional transaction or fee.
In other similar systems or even systems such as PayPal, money is stored in the user account.
2.4 CONSENSUS ALGORITHM IN ARYACOINThe devs introduced the Delayed-Proof-of-Work (dPoW) algorithm, which represents a hybrid consensus method that allows one blockchain to take advantage of the security provided by the hashing power of another blockchain. The AYA blockchain works on dPoW and can use such consensus methods as Proof-of-Work (PoW) or Proof-of-Stake (PoS) and join to any desired PoW blockchain. The main purpose of this is to allow the blockchain to continue operating without notary nodes on the basis of its original consensus method. In this situation, additional security will no longer be provided through the attached blockchain, but this is not a particularly significant problem. dPoW can improve the security level and reduce energy consumption for any blockchain.
2.5 DOUBLE-SPEND PROBLEM AND SOLUTIONOne of the main problems in the blockchain world is that a receiver is unable to verify whether or not one of the senders did not double-spend. Aryacoin provides the solution, and has established a trusted central authority, or mint, that checks every transaction for double-spending. Only the mint can issue a new coin and all the coins issued directly from the mint are trusted and cannot be double-spent. However, such a system cannot therefore
be fully decentralized because it depends on the company running the mint, similar to a bank. Aryacoin implements a scheme where the receiver knows that the previous owners did not sign any earlier transactions. The mint is aware of all transactions including which of them arrived first. The developers used an interesting solution called the Timestamp Server, which works by taking a hash of a block of items to be ‘timestamped’ and publishing the hash. Each timestamp includes the previous timestamp in its hash, forming a chain. To modify a block, an attacker would have to redo the proof-of-work of all previous blocks, then catch up with, and surpass the work of the honest nodes. This is almost impossible, and makes the network processes more secure. The proof-of-work difficulty varies according to circumstances. Such an approach ensures reliability and high throughput.
3. ARYACOIN ROADMAPApril 2019: The launch of Aryacoin; AYA ICO, resulting in over 30BTC collected
December 2019: The launch of AYA Pay
April 2020: The successful Hamedan Hardfork, supported by all AYA exchanges, aimed at integrating the dPoW algorithm, improving the security of the AYA blockchain.
June 2020: Aryana Exchange goes live, opening more trading opportunities globally
July 2020: The enabling of our Coin Exchanger
November 2020: The implementation of Smart Contracts into the Aryacoin Ecosystem
Q1 2021: Alef B goes live (more details coming soon)
4. THE NUCYBER NETWORK COMMUNITY & SOCIALWebsite: https://aryacoin.io/
Twitter: 1.1k followers https://twitter.com/AryacoinAYA
Reddit: 442 members https://github.com/nucypher
Instagram: 3.8k followers https://www.instagram.com/mrdigicoin/ Telegram: 5.9k subscribers https://t.me/AYA_Global
5. SUMMARYAryacoin (AYA) is a new age cryptocurrency that combines the best of the blockchain technology and strives to deliver high trading and mining standards, enabling users to make peer-to-peer decentralized transactions of electronic cash. Aryacoin is part of an ecosystem that includes payment gateway Ayapay and the Ayabank. AYA has a partnership with the Microsoft Azure cloud platform, which provides the ability to develop applications and store data on servers located in distributed data centers. The network fee for the AYA Blockchain is 0%. In Ayapay service, which has been developed by the Aryacoin team, all funds without extra fees or costs are directly forwarded to users’ wallets with technology called CloudWithdrawal. The devs team is introducing new use cases including exchanges where users will exchange AYA without any restrictions. You can buy AYA on an exchange of your choice, create an Aryacoin wallet, and store it in Guarda.
6. REFERENCES1) https://coincodex.com/crypto/aryacoin/
Genesis mining is my favourite, it's not the cheapest but it is by far the best and most trustworthy. Use this code to get 3% off iRI47z Hashflare are cheaper and have a great reinvest feature and seen to be trust worthy but I personally wouldn't trust them as much as I do genesis, in saying that I do mine with them and have never had a problem. Cloud Mining. Cloud mining is another major solution that is reducing startup costs — and allowing some miners to profit even further. The term refers to Bitcoin miners renting other miners’ rigs for dedicated periods of time. By cloud mining, you don’t need to worry about your power consumption. You’re also able to mine Bitcoin on a rig of your choice without spending $10,000 in ... Is Cloud Mining Profitable? It depends what your goals are with cloud mining. If your goal is to obtain bitcoins, then there is really no reason to cloud mine or even mine at all. You will get more bitcoins for your buck if you just buy bitcoins! Coinbase is an easy place to buy Bitcoin instead of mining it. QUICK TIP. If you find a legitimate cloud mining operation and you are making profit ... Bitcoin cloud mining is the process of mining bitcoins using a remote datacenter with shared processing power. Cloud mining is beneficial to individuals as it allows them to carry out their mining activities without having to manage the complex mining hardware. Cloud mining enables you to earn bitcoins without mining software, mining hardware, bandwidth, electricity or other offline issues ... Cloud mining companies are a special type of cryptocurrency-based businesses that center around allowing users to mine cryptocurrencies, while at the same time removing the high cost of entry and technological expertise that is traditionally required to get involved.. Mining deals with keeping specialized hardware online all day and night, which requires setup, maintenance (and replacement as ...
[index]          
So is it time to revisit GENESIS MINING? Could CLOUD MINING be an option again? Let's find out. Subscribe for more awesome videos and a chance at Free Bitcoi... Is mining Bitcoin BTC still profitable in 2020? Let's review mining profitability, Bitcoin, Bitcoin Cash, and Bitcoin SV. Block reward halving, network diffi... Are USB Bitcoin Miners profitable right now? This video will show you all of the facts you need to know about usb bitcoin miners and how much money they actu... Whether you love Bitcoin cloud mining and it has made you rich, or you hate it and bought Genesis cloud mining contracts at the top of the 2017-2018 crypto bull-run and are now in massive debt ... Is it actually profitable to mine bitcoin using Hashflare's cloud mining service? Sign up for Hashflare - https://hashflare.io/r/B6F58087 We analyse mining b...