Bitcoin's Mathematical Problem Programster's Blog

ACIS-mining and its 3 best algorithms

ACIS-mining and its 3 best algorithms
Hello. 👋🏻 Today we will tell you about ACIS-mining and its 3 best algorithms.
📌 With the advent of ASICs for mining, it became possible to mine Bitcoin in much larger quantities than using video cards. ASIC is an integrated circuit specialized to solve a specific problem, in our case, only for bitcoin mining. These schemes are many times more profitable than video cards, because with more power (hash calculation speed) they consume much less energy. This served as a good reason to create a cryptocurrency mining business.
📌 In bitcoin and other blockchain systems, the complexity of mining depends on how quickly the miners find the block. Compared with the GPU and CPU, specialized #ASIC miners solve #PoW puzzles better and are therefore able to quickly find new blocks.
📌 Since PoW is still the preferred mining consensus mechanism, we propose to take a multiple algorithm approach. Instead of trying to use algorithms which are ASIC resistant, we propose to use algorithms which have had ASIC miners for quite some time. These are: #SHA256, #Scrypt, and #X11.
🔹 The SHA-256 algorithm has a number of advantages over other information protection technologies. Over the years of use in the cryptocurrency industry, he has shown his resistance to various hacking attempts.
🔹 Scrypt is a cryptocurrency mining algorithm that was previously interesting to many single miners in view of its resistance to the so-called “hardware attack”. The speed of creating blocks in a Scrypt-based blockchain is about 30 seconds. The hashrate, like Ethash, is measured in Megahash per second. Scrypt, first of all, became popular due to its use in Litecoin #cryptocurrency.
🔹 X11 is an encryption algorithm in which eleven are used instead of one function. This means that this technology can provide a high degree of security, because in order to harm the system, an attacker will have to crack all 11 functions, which is very unlikely, because the changes made will be visible after breaking the first function, and developers will have a lot of time to protect the system before the hacker reaches the eleventh function.
Since these miners are already in wide use, the distribution of mining should be fair and even. Furthermore, the use of three different algorithms results in a far less chance of any single person gaining a majority hash rate share. Lastly, we use the Multishield difficulty adjustment algorithm to prevent difficulty spike issues resulting from burst mining.
Read more about PYRK mining solutions here: https://www.pyrk.org
Read our Whitepaper to know more about the project:
https://www.pyrk.org/Pyrk-Whitepaper.pdf
https://preview.redd.it/rxmlr7wt1k251.png?width=1200&format=png&auto=webp&s=162f9ddaacb3cf3e137638464a208bdf25e50a21
submitted by VS_community to pyrk [link] [comments]

Where is Bitcoin Going and When?

Where is Bitcoin Going and When?

The Federal Reserve and the United States government are pumping extreme amounts of money into the economy, already totaling over $484 billion. They are doing so because it already had a goal to inflate the United States Dollar (USD) so that the market can continue to all-time highs. It has always had this goal. They do not care how much inflation goes up by now as we are going into a depression with the potential to totally crash the US economy forever. They believe the only way to save the market from going to zero or negative values is to inflate it so much that it cannot possibly crash that low. Even if the market does not dip that low, inflation serves the interest of powerful people.
The impending crash of the stock market has ramifications for Bitcoin, as, though there is no direct ongoing-correlation between the two, major movements in traditional markets will necessarily affect Bitcoin. According to the Blockchain Center’s Cryptocurrency Correlation Tool, Bitcoin is not correlated with the stock market. However, when major market movements occur, they send ripples throughout the financial ecosystem which necessary affect even ordinarily uncorrelated assets.
Therefore, Bitcoin will reach X price on X date after crashing to a price of X by X date.

Stock Market Crash

The Federal Reserve has caused some serious consternation with their release of ridiculous amounts of money in an attempt to buoy the economy. At face value, it does not seem to have any rationale or logic behind it other than keeping the economy afloat long enough for individuals to profit financially and politically. However, there is an underlying basis to what is going on which is important to understand in order to profit financially.
All markets are functionally price probing systems. They constantly undergo a price-discovery process. In a fiat system, money is an illusory and a fundamentally synthetic instrument with no intrinsic value – similar to Bitcoin. The primary difference between Bitcoin is the underlying technology which provides a slew of benefits that fiat does not. Fiat, however, has an advantage in being able to have the support of powerful nation-states which can use their might to insure the currency’s prosperity.
Traditional stock markets are composed of indices (pl. of index). Indices are non-trading market instruments which are essentially summaries of business values which comprise them. They are continuously recalculated throughout a trading day, and sometimes reflected through tradable instruments such as Exchange Traded Funds or Futures. Indices are weighted by market capitalizations of various businesses.
Price theory essentially states that when a market fails to take out a new low in a given range, it will have an objective to take out the high. When a market fails to take out a new high, it has an objective to make a new low. This is why price-time charts go up and down, as it does this on a second-by-second, minute-by-minute, day-by-day, and even century-by-century basis. Therefore, market indices will always return to some type of bull market as, once a true low is formed, the market will have a price objective to take out a new high outside of its’ given range – which is an all-time high. Instruments can only functionally fall to zero, whereas they can grow infinitely.
So, why inflate the economy so much?
Deflation is disastrous for central banks and markets as it raises the possibility of producing an overall price objective of zero or negative values. Therefore, under a fractional reserve system with a fiat currency managed by a central bank – the goal of the central bank is to depreciate the currency. The dollar is manipulated constantly with the intention of depreciating its’ value.
Central banks have a goal of continued inflated fiat values. They tend to ordinarily contain it at less than ten percent (10%) per annum in order for the psyche of the general populace to slowly adjust price increases. As such, the markets are divorced from any other logic. Economic policy is the maintenance of human egos, not catering to fundamental analysis. Gross Domestic Product (GDP) growth is well-known not to be a measure of actual growth or output. It is a measure of increase in dollars processed. Banks seek to produce raising numbers which make society feel like it is growing economically, making people optimistic. To do so, the currency is inflated, though inflation itself does not actually increase growth. When society is optimistic, it spends and engages in business – resulting in actual growth. It also encourages people to take on credit and debts, creating more fictional fiat.
Inflation is necessary for markets to continue to reach new heights, generating positive emotional responses from the populace, encouraging spending, encouraging debt intake, further inflating the currency, and increasing the sale of government bonds. The fiat system only survives by generating more imaginary money on a regular basis.
Bitcoin investors may profit from this by realizing that stock investors as a whole always stand to profit from the market so long as it is managed by a central bank and does not collapse entirely. If those elements are filled, it has an unending price objective to raise to new heights. It also allows us to realize that this response indicates that the higher-ups believe that the economy could crash in entirety, and it may be wise for investors to have multiple well-thought-out exit strategies.

Economic Analysis of Bitcoin

The reason why the Fed is so aggressively inflating the economy is due to fears that it will collapse forever or never rebound. As such, coupled with a global depression, a huge demand will appear for a reserve currency which is fundamentally different than the previous system. Bitcoin, though a currency or asset, is also a market. It also undergoes a constant price-probing process. Unlike traditional markets, Bitcoin has the exact opposite goal. Bitcoin seeks to appreciate in value and not depreciate. This has a quite different affect in that Bitcoin could potentially become worthless and have a price objective of zero.
Bitcoin was created in 2008 by a now famous mysterious figure known as Satoshi Nakamoto and its’ open source code was released in 2009. It was the first decentralized cryptocurrency to utilize a novel protocol known as the blockchain. Up to one megabyte of data may be sent with each transaction. It is decentralized, anonymous, transparent, easy to set-up, and provides myriad other benefits. Bitcoin is not backed up by anything other than its’ own technology.
Bitcoin is can never be expected to collapse as a framework, even were it to become worthless. The stock market has the potential to collapse in entirety, whereas, as long as the internet exists, Bitcoin will be a functional system with a self-authenticating framework. That capacity to persist regardless of the actual price of Bitcoin and the deflationary nature of Bitcoin means that it has something which fiat does not – inherent value.
Bitcoin is based on a distributed database known as the “blockchain.” Blockchains are essentially decentralized virtual ledger books, replete with pages known as “blocks.” Each page in a ledger is composed of paragraph entries, which are the actual transactions in the block.
Blockchains store information in the form of numerical transactions, which are just numbers. We can consider these numbers digital assets, such as Bitcoin. The data in a blockchain is immutable and recorded only by consensus-based algorithms. Bitcoin is cryptographic and all transactions are direct, without intermediary, peer-to-peer.
Bitcoin does not require trust in a central bank. It requires trust on the technology behind it, which is open-source and may be evaluated by anyone at any time. Furthermore, it is impossible to manipulate as doing so would require all of the nodes in the network to be hacked at once – unlike the stock market which is manipulated by the government and “Market Makers”. Bitcoin is also private in that, though the ledge is openly distributed, it is encrypted. Bitcoin’s blockchain has one of the greatest redundancy and information disaster recovery systems ever developed.
Bitcoin has a distributed governance model in that it is controlled by its’ users. There is no need to trust a payment processor or bank, or even to pay fees to such entities. There are also no third-party fees for transaction processing. As the ledge is immutable and transparent it is never possible to change it – the data on the blockchain is permanent. The system is not easily susceptible to attacks as it is widely distributed. Furthermore, as users of Bitcoin have their private keys assigned to their transactions, they are virtually impossible to fake. No lengthy verification, reconciliation, nor clearing process exists with Bitcoin.
Bitcoin is based on a proof-of-work algorithm. Every transaction on the network has an associated mathetical “puzzle”. Computers known as miners compete to solve the complex cryptographic hash algorithm that comprises that puzzle. The solution is proof that the miner engaged in sufficient work. The puzzle is known as a nonce, a number used only once. There is only one major nonce at a time and it issues 12.5 Bitcoin. Once it is solved, the fact that the nonce has been solved is made public.
A block is mined on average of once every ten minutes. However, the blockchain checks every 2,016,000 minutes (approximately four years) if 201,600 blocks were mined. If it was faster, it increases difficulty by half, thereby deflating Bitcoin. If it was slower, it decreases, thereby inflating Bitcoin. It will continue to do this until zero Bitcoin are issued, projected at the year 2140. On the twelfth of May, 2020, the blockchain will halve the amount of Bitcoin issued when each nonce is guessed. When Bitcoin was first created, fifty were issued per block as a reward to miners. 6.25 BTC will be issued from that point on once each nonce is solved.
Unlike fiat, Bitcoin is a deflationary currency. As BTC becomes scarcer, demand for it will increase, also raising the price. In this, BTC is similar to gold. It is predictable in its’ output, unlike the USD, as it is based on a programmed supply. We can predict BTC’s deflation and inflation almost exactly, if not exactly. Only 21 million BTC will ever be produced, unless the entire network concedes to change the protocol – which is highly unlikely.
Some of the drawbacks to BTC include congestion. At peak congestion, it may take an entire day to process a Bitcoin transaction as only three to five transactions may be processed per second. Receiving priority on a payment may cost up to the equivalent of twenty dollars ($20). Bitcoin mining consumes enough energy in one day to power a single-family home for an entire week.

Trading or Investing?

The fundamental divide in trading revolves around the question of market structure. Many feel that the market operates totally randomly and its’ behavior cannot be predicted. For the purposes of this article, we will assume that the market has a structure, but that that structure is not perfect. That market structure naturally generates chart patterns as the market records prices in time. In order to determine when the stock market will crash, causing a major decline in BTC price, we will analyze an instrument, an exchange traded fund, which represents an index, as opposed to a particular stock. The price patterns of the various stocks in an index are effectively smoothed out. In doing so, a more technical picture arises. Perhaps the most popular of these is the SPDR S&P Standard and Poor 500 Exchange Traded Fund ($SPY).
In trading, little to no concern is given about value of underlying asset. We are concerned primarily about liquidity and trading ranges, which are the amount of value fluctuating on a short-term basis, as measured by volatility-implied trading ranges. Fundamental analysis plays a role, however markets often do not react to real-world factors in a logical fashion. Therefore, fundamental analysis is more appropriate for long-term investing.
The fundamental derivatives of a chart are time (x-axis) and price (y-axis). The primary technical indicator is price, as everything else is lagging in the past. Price represents current asking price and incorrectly implementing positions based on price is one of the biggest trading errors.
Markets and currencies ordinarily have noise, their tendency to back-and-fill, which must be filtered out for true pattern recognition. That noise does have a utility, however, in allowing traders second chances to enter favorable positions at slightly less favorable entry points. When you have any market with enough liquidity for historical data to record a pattern, then a structure can be divined. The market probes prices as part of an ongoing price-discovery process. Market technicians must sometimes look outside of the technical realm and use visual inspection to ascertain the relevance of certain patterns, using a qualitative eye that recognizes the underlying quantitative nature
Markets and instruments rise slower than they correct, however they rise much more than they fall. In the same vein, instruments can only fall to having no worth, whereas they could theoretically grow infinitely and have continued to grow over time. Money in a fiat system is illusory. It is a fundamentally synthetic instrument which has no intrinsic value. Hence, the recent seemingly illogical fluctuations in the market.
According to trade theory, the unending purpose of a market or instrument is to create and break price ranges according to the laws of supply and demand. We must determine when to trade based on each market inflection point as defined in price and in time as opposed to abandoning the trend (as the contrarian trading in this sub often does). Time and Price symmetry must be used to be in accordance with the trend. When coupled with a favorable risk to reward ratio, the ability to stay in the market for most of the defined time period, and adherence to risk management rules; the trader has a solid methodology for achieving considerable gains.
We will engage in a longer term market-oriented analysis to avoid any time-focused pressure. The Bitcoin market is open twenty-four-hours a day, so trading may be done when the individual is ready, without any pressing need to be constantly alert. Let alone, we can safely project months in advance with relatively high accuracy. Bitcoin is an asset which an individual can both trade and invest, however this article will be focused on trading due to the wide volatility in BTC prices over the short-term.

Technical Indicator Analysis of Bitcoin

Technical indicators are often considered self-fulfilling prophecies due to mass-market psychology gravitating towards certain common numbers yielded from them. They are also often discounted when it comes to BTC. That means a trader must be especially aware of these numbers as they can prognosticate market movements. Often, they are meaningless in the larger picture of things.
  • Volume – derived from the market itself, it is mostly irrelevant. The major problem with volume for stocks is that the US market open causes tremendous volume surges eradicating any intrinsic volume analysis. This does not occur with BTC, as it is open twenty-four-seven. At major highs and lows, the market is typically anemic. Most traders are not active at terminal discretes (peaks and troughs) because of levels of fear. Volume allows us confidence in time and price symmetry market inflection points, if we observe low volume at a foretold range of values. We can rationalize that an absolute discrete is usually only discovered and anticipated by very few traders. As the general market realizes it, a herd mentality will push the market in the direction favorable to defending it. Volume is also useful for swing trading, as chances for swing’s validity increases if an increase in volume is seen on and after the swing’s activation. Volume is steadily decreasing. Lows and highs are reached when volume is lower.
Therefore, due to the relatively high volume on the 12th of March, we can safely determine that a low for BTC was not reached.
  • VIX – Volatility Index, this technical indicator indicates level of fear by the amount of options-based “insurance” in portfolios. A low VIX environment, less than 20 for the S&P index, indicates a stable market with a possible uptrend. A high VIX, over 20, indicates a possible downtrend. VIX is essentially useless for BTC as BTC-based options do not exist. It allows us to predict the market low for $SPY, which will have an indirect impact on BTC in the short term, likely leading to the yearly low. However, it is equally important to see how VIX is changing over time, if it is decreasing or increasing, as that indicates increasing or decreasing fear. Low volatility allows high leverage without risk or rest. Occasionally, markets do rise with high VIX.
As VIX is unusually high, in the forties, we can be confident that a downtrend for the S&P 500 is imminent.
  • RSI (Relative Strength Index): The most important technical indicator, useful for determining highs and lows when time symmetry is not availing itself. Sometimes analysis of RSI can conflict in different time frames, easiest way to use it is when it is at extremes – either under 30 or over 70. Extremes can be used for filtering highs or lows based on time-and-price window calculations. Highly instructive as to major corrective clues and indicative of continued directional movement. Must determine if longer-term RSI values find support at same values as before. It is currently at 73.56.
  • Secondly, RSI may be used as a high or low filter, to observe the level that short-term RSI reaches in counter-trend corrections. Repetitions based on market movements based on RSI determine how long a trade should be held onto. Once a short term RSI reaches an extreme and stay there, the other RSI’s should gradually reach the same extremes. Once all RSI’s are at extreme highs, a trend confirmation should occur and RSI’s should drop to their midpoint.

Trend Definition Analysis of Bitcoin

Trend definition is highly powerful, cannot be understated. Knowledge of trend logic is enough to be a profitable trader, yet defining a trend is an arduous process. Multiple trends coexist across multiple time frames and across multiple market sectors. Like time structure, it makes the underlying price of the instrument irrelevant. Trend definitions cannot determine the validity of newly formed discretes. Trend becomes apparent when trades based in counter-trend inflection points continue to fail.
Downtrends are defined as an instrument making lower lows and lower highs that are recurrent, additive, qualified swing setups. Downtrends for all instruments are similar, except forex. They are fast and complete much quicker than uptrends. An average downtrend is 18 months, something which we will return to. An uptrend inception occurs when an instrument reaches a point where it fails to make a new low, then that low will be tested. After that, the instrument will either have a deep range retracement or it may take out the low slightly, resulting in a double-bottom. A swing must eventually form.
A simple way to roughly determine trend is to attempt to draw a line from three tops going upwards (uptrend) or a line from three bottoms going downwards (downtrend). It is not possible to correctly draw a downtrend line on the BTC chart, but it is possible to correctly draw an uptrend – indicating that the overall trend is downwards. The only mitigating factor is the impending stock market crash.

Time Symmetry Analysis of Bitcoin

Time is the movement from the past through the present into the future. It is a measurement in quantified intervals. In many ways, our perception of it is a human construct. It is more powerful than price as time may be utilized for a trade regardless of the market inflection point’s price. Were it possible to perfectly understand time, price would be totally irrelevant due to the predictive certainty time affords. Time structure is easier to learn than price, but much more difficult to apply with any accuracy. It is the hardest aspect of trading to learn, but also the most rewarding.
Humans do not have the ability to recognize every time window, however the ability to define market inflection points in terms of time is the single most powerful trading edge. Regardless, price should not be abandoned for time alone. Time structure analysis It is inherently flawed, as such the markets have a fail-safe, which is Price Structure. Even though Time is much more powerful, Price Structure should never be completely ignored. Time is the qualifier for Price and vice versa. Time can fail by tricking traders into counter-trend trading.
Time is a predestined trade quantifier, a filter to slow trades down, as it allows a trader to specifically focus on specific time windows and rest at others. It allows for quantitative measurements to reach deterministic values and is the primary qualifier for trends. Time structure should be utilized before price structure, and it is the primary trade criterion which requires support from price. We can see price structure on a chart, as areas of mathematical support or resistance, but we cannot see time structure.
Time may be used to tell us an exact point in the future where the market will inflect, after Price Theory has been fulfilled. In the present, price objectives based on price theory added to possible future times for market inflection points give us the exact time of market inflection points and price.
Time Structure is repetitions of time or inherent cycles of time, occurring in a methodical way to provide time windows which may be utilized for inflection points. They are not easily recognized and not easily defined by a price chart as measuring and observing time is very exact. Time structure is not a science, yet it does require precise measurements. Nothing is certain or definite. The critical question must be if a particular approach to time structure is currently lucrative or not.
We will measure it in intervals of 180 bars. Our goal is to determine time windows, when the market will react and when we should pay the most attention. By using time repetitions, the fact that market inflection points occurred at some point in the past and should, therefore, reoccur at some point in the future, we should obtain confidence as to when SPY will reach a market inflection point. Time repetitions are essentially the market’s memory. However, simply measuring the time between two points then trying to extrapolate into the future does not work. Measuring time is not the same as defining time repetitions. We will evaluate past sessions for market inflection points, whether discretes, qualified swings, or intra-range. Then records the times that the market has made highs or lows in a comparable time period to the future one seeks to trade in.
What follows is a time Histogram – A grouping of times which appear close together, then segregated based on that closeness. Time is aligned into combined histogram of repetitions and cycles, however cycles are irrelevant on a daily basis. If trading on an hourly basis, do not use hours.
  • Yearly Lows (last seven years): 1/1/13, 4/10/14, 1/15/15, 1/17/16, 1/1/17, 12/15/18, 2/6/19
  • Monthly Mode: 1, 1, 1, 1, 2, 4, 12
  • Daily Mode: 1, 1, 6, 10, 15, 15, 17
  • Monthly Lows (for the last year): 3/12/20 (10:00pm), 2/28/20 (7:09am), 1/2/20 (8:09pm), 12/18/19 (8:00am), 11/25/19 (1:00am), 10/24/19 (2:59am), 9/30/19 (2:59am), 8/29,19 (4:00am), 7/17/19 (7:59am), 6/4/19 (5:59pm), 5/1/19 (12:00am), 4/1/19 (12:00am)
  • Daily Lows Mode for those Months: 1, 1, 2, 4, 12, 17, 18, 24, 25, 28, 29, 30
  • Hourly Lows Mode for those Months (Military time): 0100, 0200, 0200, 0400, 0700, 0700, 0800, 1200, 1200, 1700, 2000, 2200
  • Minute Lows Mode for those Months: 00, 00, 00, 00, 00, 00, 09, 09, 59, 59, 59, 59
  • Day of the Week Lows (last twenty-six weeks):
Weighted Times are repetitions which appears multiple times within the same list, observed and accentuated once divided into relevant sections of the histogram. They are important in the presently defined trading time period and are similar to a mathematical mode with respect to a series. Phased times are essentially periodical patterns in histograms, though they do not guarantee inflection points
Evaluating the yearly lows, we see that BTC tends to have its lows primarily at the beginning of every year, with a possibility of it being at the end of the year. Following the same methodology, we get the middle of the month as the likeliest day. However, evaluating the monthly lows for the past year, the beginning and end of the month are more likely for lows.
Therefore, we have two primary dates from our histogram.
1/1/21, 1/15/21, and 1/29/21
2:00am, 8:00am, 12:00pm, or 10:00pm
In fact, the high for this year was February the 14th, only thirty days off from our histogram calculations.
The 8.6-Year Armstrong-Princeton Global Economic Confidence model states that 2.15 year intervals occur between corrections, relevant highs and lows. 2.15 years from the all-time peak discrete is February 9, 2020 – a reasonably accurate depiction of the low for this year (which was on 3/12/20). (Taking only the Armstrong model into account, the next high should be Saturday, April 23, 2022). Therefore, the Armstrong model indicates that we have actually bottomed out for the year!
Bear markets cannot exist in perpetuity whereas bull markets can. Bear markets will eventually have price objectives of zero, whereas bull markets can increase to infinity. It can occur for individual market instruments, but not markets as a whole. Since bull markets are defined by low volatility, they also last longer. Once a bull market is indicated, the trader can remain in a long position until a new high is reached, then switch to shorts. The average bear market is eighteen months long, giving us a date of August 19th, 2021 for the end of this bear market – roughly speaking. They cannot be shorter than fifteen months for a central-bank controlled market, which does not apply to Bitcoin. (Otherwise, it would continue until Sunday, September 12, 2021.) However, we should expect Bitcoin to experience its’ exponential growth after the stock market re-enters a bull market.
Terry Laundy’s T-Theory implemented by measuring the time of an indicator from peak to trough, then using that to define a future time window. It is similar to an head-and-shoulders pattern in that it is the process of forming the right side from a synthetic technical indicator. If the indicator is making continued lows, then time is recalculated for defining the right side of the T. The date of the market inflection point may be a price or indicator inflection date, so it is not always exactly useful. It is better to make us aware of possible market inflection points, clustered with other data. It gives us an RSI low of May, 9th 2020.
The Bradley Cycle is coupled with volatility allows start dates for campaigns or put options as insurance in portfolios for stocks. However, it is also useful for predicting market moves instead of terminal dates for discretes. Using dates which correspond to discretes, we can see how those dates correspond with changes in VIX.
Therefore, our timeline looks like:
  • 2/14/20 – yearly high ($10372 USD)
  • 3/12/20 – yearly low thus far ($3858 USD)
  • 5/9/20 – T-Theory true yearly low (BTC between 4863 and 3569)
  • 5/26/20 – hashrate difficulty halvening
  • 11/14/20 – stock market low
  • 1/15/21 – yearly low for BTC, around $8528
  • 8/19/21 – end of stock bear market
  • 11/26/21 – eighteen months from halvening, average peak from halvenings (BTC begins rising from $3000 area to above $23,312)
  • 4/23/22 – all-time high
Taken from my blog: http://aliamin.info/2020/
submitted by aibnsamin1 to Bitcoin [link] [comments]

CRYPTOPUZZLER INFO (Also found on the wiki)

This information explains the information regarding the puzzles that could be helpful to those trying to solve them. It also explains how you can support the puzzles. It will be updated regularly.
How do the puzzles work?
The idea is I write short stories/themes that contain all the seed words. These are hidden in the story in a variety of ways (codes, numbers, plain sight, riddles, clues, etc etc), this is likely to get more complicated as time goes on but for now is remaining relatively simple. I think I will also be adding brain teasers that will be significantly easier with much lower prizes. For these rather than making a wallet, I will operate by sending dogecoins to the first correct comment (with a bonus if the winner explains their method to find the answer)
How often will you post puzzles?
I'll be posting these as soon as they've been created and checked. Even if the previous one has not been solved I will be posting new ones. I will leave about a month between posting, so people don't find themselves flicking between puzzles but after a month if its ready, a new one will be uploaded. By having multiple puzzles here to be attempted, I am hoping people will be encouraged as theres more opportunities to win. I think I might post easier brain teasers with small prizes (around the 50 doge mark) just to encourage participation.
This all seems a bit chaotic, is there no organisation system? I have used flairs to organise, 'puzzle', 'clue' and eventually 'solution' once they're solved. I'm still learning how to organise things on reddit but I assure you, it will be done.
How will puzzles be funded?
The first one has been funded through /dogecoinbeg and my own private funds, I am hoping for donations once I've published a few puzzles to help me fund future ones. I also use faucets to fund them. If you want to support my puzzles without donating, I would highly appreciate you using my referral links which I will publish below.
How do we know this isn't a scam?
Part of the reason I'm planning on keeping puzzle prizes low for the time being is so people aren't afraid to donate ie the value is too low to be worth scamming for. Also, creative writing is the highest effort way of scamming I can possibly think of.
Can I support without donating?
Absolutely yes! Liking, commenting and sharing are the best ways to show support. I want to grow a puzzle community on here and the only way I can do that is with the support of you guys! Also, feedback. Whether in comments or private messages I will respond to any feedback and suggestions. Another way to support these puzzles is using the referral links below! Instead of donating, that enables you to earn and me to fund my puzzles with the referral earnings, win win! The more people using the referral links, the higher the potential prizes so if anything, I hugely encourage you to use them.
How do you decide how much the prize is?
It will be based on difficulty level, once I've worked out how to gauge that.
Will prizes always be in dogecoin?
No, probably not. I am planning on a puzzle with a bitcoin prize but that will be significantly more difficult. Dogecoin puzzles I am creating because I enjoy it and I think dogecoin is painfully underrated (Lets be real, its v fast and its got doge in the name, says it all really)
Referral links to fund doge puzzles (All of these are linked to my personal doge wallet which will fund puzzles):
Cointiply - this is a website and android app faucet. You earn coins through the hourly free coin spin, watching ads and completing surveys and can withdraw in either doge or bitcoin. I personally have been withdrawing in bitcoin to convert to dogecoin. This has a generous referral scheme in which I receive 25% of earnings from spins. Mobile referral link https://cointiply.mobi/21muWebsite referral link http://cointiply.com/kVPK6
Moondoge - the moon faucets are pretty popular, you just click whenever you want and the coins go to you coinpot wallet, I get a 1% referral bonus per person that signs up so thats again, pretty good to earn to fund my puzzles Referral link http://moondoge.co.in/?ref=D941AC8F3D5A
The rest of the moon faucets: All referral earnings from these will be converted to dogecoin and put into the prize wallet when the faucet reaches 100 dogecoins as this is the minimum withdrawal amount.
http://moonbit.co.in/?ref=F8FBB5261B9E
http://moonliteco.in/?ref=2027684E45F2
http://moondash.co.in/?ref=AF219A5BE3F0
http://bonusbitcoin.co/?ref=668A0EEDFA2D
The crypto faucet - one click a day earns between 0.3 to 600 dogecoins and can withdraw at 10 dogecoins. Using my referral earns the prize fund 50% of whatever you earn. https://www.thecryptofaucet.com/?r=67361 The balance from this faucet will be added to whatever prize wallet is in use every time it surpasses 200.
Referral links to support me (Obviously it's good fun creating puzzles which is a reward in itself but if you do enjoy these puzzles please use these links to support me): Freebitco.in - this is a faucet that also has a highelower game, betting and interest over 30,000 satoshis. I currently use it to grow interest on past faucet earnings so if you want to help me grow my holding please sign up and use https://freebitco.in/?r=38129961
Publish0x - Basically here I'm currently publishing articles on the faucets I use to try and gain more income from referrals to fund the puzzles. If you sign up to the site and tip authors, I receive a 5% referral bonus from the tip. This is greatly appreciated and eventually I will be using this site to explain different codes I've used in these puzzles https://www.publish0x.com?a=5xe73yQje7
Resources to help you crack puzzles:
This list will basically contain sites that I've either used to help code things and sites I've used when trying to break my codes from scratch (when trying to think like someone who hasn't seen it before).
Decoding - https://cryptii.com
submitted by coinsntings to cryptopuzzler [link] [comments]

TradeOptionGains bitcoin site?

Got this weird DM on reddit idk what this guy is up to have any of you ever heard of this https://tradeoptiongains.com Site?
u/mikerobin25

Mikerobin2501:52 AM
Hello there
IDEKMyUsername09:34 AM
Howdy
Mikerobin2509:47 AM
How's it going?
IDEKMyUsername12:13 PM
Not bad.
What's up
Mikerobin2512:36 PM
I'm doing quite alright, How about you?
IDEKMyUsername12:53 PM
Not bad
Mikerobin2501:39 PM
Well, I don't mean to intrude but are you familiar with the term "cryptocurrency", Bitcoin to be precise?
IDEKMyUsername03:10 PM
Yes
Aye
Mikerobin2503:25 PM
Well, I'm at the moment engaging in an outreach aimed at expanding the clientele of my platform and enlightening the populace on the monetary potential of bitcoin trading and mining. Would you be interested in this?
IDEKMyUsername03:26 PM
Uh yeah sure I can look into it.
What does it include?
Mikerobin2503:28 PM
Are you familiar with the term "Bitcoin trading"?
IDEKMyUsername03:29 PM
Yeah somewhat
Like selling and buying it?
Mikerobin2503:33 PM
Well, Bitcoin trading is the process of making profits by buying Bitcoin at a low cost and selling it when the price goes up, This method is referred to as Dollar Cost Averaging(DCA). The Bitcoin trade is volatile, and price move by a significant margin. This activity is done on trading platforms.
Are you following?
IDEKMyUsername04:07 PM
Yep gotcha so far
Sorry had to pickup a call
Mikerobin2506:51 PM
No problem mate. Every platform has an investment procedure and ROI method. Unlike other platforms that engage in day trading (profiting from the volatility of bitcoin which is inefficient), My platform is registered with S9 ant miners that mine the bitcoin you invest to increase exponentially and that’s how you earn profits.
Have you heard of the term "Bitcoin mining"?
IDEKMyUsername06:52 PM
Yes I have
Mikerobin2506:57 PM
Good. For clarification, Bitcoin mining primarily involves generating and earning off the confirmation of blocks of transaction on the network such as the Blockchain network.
This is made possible with the use of special and sophisticated devices called the Bit main devices, Such as the AntMiner S9 and ASIC hardware. These devices are extremely expensive to maintain and require a lot of electricity generation and technical expertise which makes it rarely an option for private individuals who are interested in going into Bitcoin mining. But my platform has been able to provide for this disability.
Are you following?
IDEKMyUsername06:57 PM
I feel ya
Yes
Mikerobin2507:01 PM
Moving on, My platform operates a full S9 Antminer farm. The Antminer s9 has a hash rate of 12.93TH/s which is -+ 7%, Which could generate a ROI of 0.5 BTC within an investment period depending on the investment capital. Note: ROI stands for return of investment while hash rates a measure of how many times the network can attempt to complete this puzzle every second. This means that hash rate is a good indicator of the Bitcoin network's health.
Do i still have your attention?
IDEKMyUsername07:02 PM
Yes
Mikerobin2507:05 PM
Finally, All investments are made and monitored by the client (you) on the platform's website as you earn profits daily and you can contact me a "Broker" on the platform whenever you need assistance or more information.
https://tradeoptiongains.com
IDEKMyUsername07:05 PM
Hm
U have a history of wise investments?
I mean don't really know you so not like your a "professional" of any means
Mikerobin2507:06 PM
Certainly
We've been running for a span of 4 years now with optimum services provided
IDEKMyUsername07:38 PM
oh wow
gimmie some more deets?
how much money would I expect if i put a quick g bar in?
IDEKMyUsername07:53 PM
hm?
Mikerobin2507:54 PM
An investment of $1000 amounts up to the standard ROI stated above which is 50% of 1 bitcoin.
Apologies for the late reply, Was attending to a client of mine.
IDEKMyUsername07:55 PM
so invest of about $1000 would give ruffly 5?
nah ur good fam
like how I go about that tho u know
cause isn't bitcoin like kind of high right now?
Mikerobin2507:57 PM
Yeah though it would have been more profitable if you had started earlier when it was cheaper but you should be expecting more returns due to the halving coming up.
https://www.bitcoinblockhalf.com/
IDEKMyUsername07:58 PM
how high you think its going to get?
Mikerobin2507:59 PM
Its a highly speculative asset but from my experience and following it's previous halving events, Probably 15-18k.
IDEKMyUsername08:01 PM
oh jeez thats like as big as the big boom right?
how you know its gonna do that?
and what if it doesn't lol?
do I just l;ose it all
Mikerobin2508:05 PM
Exactly. If it doesn't, It would remain at its breaking point of 9k or peak point of 10k but i highly doubt it doesn't pump(rise) based on past halving events. You can simply get started by creating your personal account on the platform by which you can start by purchasing bitcoin and you can do this by clicking on the "Register" icon to get started.
IDEKMyUsername08:05 PM
hmmm idk
Kinda need some more security u know what I mean?
Mikerobin2508:08 PM
I understand. Loses are only made when you sell off, You money remains intact whether it rises or falls as long as you don't sell but your ROI is fully attained on your account on the platform.
IDEKMyUsername08:09 PM
o
Mikerobin2508:10 PM
Indeed
Mikerobin2508:20 PM
Any more questions?
IDEKMyUsername08:20 PM
uhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh
no
Mikerobin2508:22 PM
Okay then, I'm available here if you're interested and need my assistance
Enjoy the rest of your day.
IDEKMyUsername08:25 PM
o
ok
Yesterday
Mikerobin2501:48 PM
https://www.fxstreet.com/cryptocurrencies/news/breaking-bitcoin-price-takes-down-9-000-as-10-000-beckons-202004300334
https://www.independent.co.uk/life-style/gadgets-and-tech/news/bitcoin-price-gold-oil-2020-best-performing-assets-a9492641.html
IDEKMyUsername01:51 PM
O
I bought it
Mikerobin2501:51 PM
Pardon?
IDEKMyUsername01:52 PM
I bought one
Mikerobin2501:52 PM
On what platform?
IDEKMyUsername01:54 PM
I'm idk the one u sent me
Um*
Mikerobin2501:55 PM
Really? When did you do this and why wasn't i informed?
Today
IDEKMyUsername10:19 AM
Oh like last last night
I thought it was expected
U sent me the link and everything
;(
Mikerobin2510:22 AM
You would have informed me so i can enlighten you more on the procedure. Are you aware that it's a mining platform and you earn profits as an investor?
IDEKMyUsername10:23 AM
Yah so what would profit be ya reckon?
For let's say $1000 over liek a year
Mikerobin2510:24 AM
What name did you use in registering the account?
IDEKMyUsername10:24 AM
Uh I'd have to look it up
But how much profit did u say it would be about?
Mikerobin2510:27 AM
0.5 BTC a month depending on your investment capital that is, I would need the name of your account to register it under my personal database so i can provide you with information and assistance when needed.
IDEKMyUsername10:28 AM
O damn that's some big bucks right there
.5 btc like what 4g?
4 times 11 that's $44,000 a month
Mikerobin2510:30 AM
How much did you invest and what is the name of your account?
Your profit is calculated in respect of your investment capital
IDEKMyUsername10:31 AM
Like 11grand
Mikerobin2510:31 AM
And the name?
IDEKMyUsername10:31 AM
Mmmm
How do I find it?
Is there a way on the site
Mikerobin2510:31 AM
What name did you use in creating the account?
Didn't you register?
IDEKMyUsername10:32 AM
Oh like my irl name
I thought u meant like a username
Mikerobin2510:32 AM
Username is what i mean
IDEKMyUsername10:33 AM
It's gonna be under Jeffery Henderson
Jeffery L. Henderson
Mikerobin2510:35 AM
Okay, Give me a second to record it and ascertain your expected profit.
IDEKMyUsername10:35 AM
Sick
Did u find my account?
Mikerobin2510:41 AM
I can't find your records on the platform, Maybe a technical difficulty. Could you please sign in and send me a screenshot of your funds deposited through discord please?
IDEKMyUsername10:41 AM
So tell me mike
Where's the cash?
Mikerobin2510:41 AM
Pardon?
IDEKMyUsername10:41 AM
You lost it, oh you misplaced it.
Now mike you know I don't like to be lied to right?
Mikerobin2510:43 AM
Since i can't find your account on the platform, I guess that's the ending of our conversation.
Good day.
IDEKMyUsername10:43 AM
So why
THE FUCK
ARE YOU LIEING TO ME
Mikerobin2510:44 AM
Prove that you have an account on the platform by sending a screenshot
IDEKMyUsername10:44 AM
I cannot
I did it on
Computer
Mikerobin2510:45 AM
The sign in through your phone, Do i seem like a fool to you?
I have a lot of clients to attend to and i don't have time for games
IDEKMyUsername10:45 AM
I ain't the I one that took another man's money and now can't find it
You don't have other clients
Let's not play games here
How do I get my money out of this depreciating asset?
You better help me get my money out of this or were going to have a major issue
Mike...
IDEKMyUsername11:16 AM
U serious rn bro?
Ur gonna scam me out of my 💰
?
A day will come when you think yourself safe and happy,.
But suddenly your joy will turn to ashes in your mouth.
and you'll know the debt is paid
IDEKMyUsername08:01 PM
Br
You still my 11 grand
Stole
What's your name
Tell me
Or I'll find you
submitted by IDEKMyUsername to Scams [link] [comments]

Proof Of Work Explained

Proof Of Work Explained
https://preview.redd.it/hl80wdx61j451.png?width=1200&format=png&auto=webp&s=c80b21c53ae45c6f7d618f097bc705a1d8aaa88f
A proof-of-work (PoW) system (or protocol, or function) is a consensus mechanism that was first invented by Cynthia Dwork and Moni Naor as presented in a 1993 journal article. In 1999, it was officially adopted in a paper by Markus Jakobsson and Ari Juels and they named it as "proof of work".
It was developed as a way to prevent denial of service attacks and other service abuse (such as spam on a network). This is the most widely used consensus algorithm being used by many cryptocurrencies such as Bitcoin and Ethereum.
How does it work?
In this method, a group of users competes against each other to find the solution to a complex mathematical puzzle. Any user who successfully finds the solution would then broadcast the block to the network for verifications. Once the users verified the solution, the block then moves to confirm the state.
The blockchain network consists of numerous sets of decentralized nodes. These nodes act as admin or miners which are responsible for adding new blocks into the blockchain. The miner instantly and randomly selects a number which is combined with the data present in the block. To find a correct solution, the miners need to select a valid random number so that the newly generated block can be added to the main chain. It pays a reward to the miner node for finding the solution.
The block then passed through a hash function to generate output which matches all input/output criteria. Once the result is found, other nodes in the network verify and validate the outcome. Every new block holds the hash of the preceding block. This forms a chain of blocks. Together, they store information within the network. Changing a block requires a new block containing the same predecessor. It is almost impossible to regenerate all successors and change their data. This protects the blockchain from tampering.
What is Hash Function?
A hash function is a function that is used to map data of any length to some fixed-size values. The result or outcome of a hash function is known as hash values, hash codes, digests, or simply hashes.
https://preview.redd.it/011tfl8c1j451.png?width=851&format=png&auto=webp&s=ca9c2adecbc0b14129a9b2eea3c2f0fd596edd29
The hash method is quite secure, any slight change in input will result in a different output, which further results in discarded by network participants. The hash function generates the same length of output data to that of input data. It is a one-way function i.e the function cannot be reversed to get the original data back. One can only perform checks to validate the output data with the original data.
Implementations
Nowadays, Proof-of-Work is been used in a lot of cryptocurrencies. But it was first implemented in Bitcoin after which it becomes so popular that it was adopted by several other cryptocurrencies. Bitcoin uses the puzzle Hashcash, the complexity of a puzzle is based upon the total power of the network. On average, it took approximately 10 min to block formation. Litecoin, a Bitcoin-based cryptocurrency is having a similar system. Ethereum also implemented this same protocol.
Types of PoW
Proof-of-work protocols can be categorized into two parts:-
· Challenge-response
This protocol creates a direct link between the requester (client) and the provider (server).
In this method, the requester needs to find the solution to a challenge that the server has given. The solution is then validated by the provider for authentication.
The provider chooses the challenge on the spot. Hence, its difficulty can be adapted to its current load. If the challenge-response protocol has a known solution or is known to exist within a bounded search space, then the work on the requester side may be bounded.
https://preview.redd.it/ij967dof1j451.png?width=737&format=png&auto=webp&s=12670c2124fc27b0f988bb4a1daa66baf99b4e27
Source-wiki
· Solution–verification
These protocols do not have any such prior link between the sender and the receiver. The client, self-imposed a problem and solve it. It then sends the solution to the server to check both the problem choice and the outcome. Like Hashcash these schemes are also based on unbounded probabilistic iterative procedures.
https://preview.redd.it/gfobj9xg1j451.png?width=740&format=png&auto=webp&s=2291fd6b87e84395f8a4364267f16f577b5f1832
Source-wiki
These two methods generally based on the following three techniques:-
CPU-bound
This technique depends upon the speed of the processor. The higher the processor power greater will be the computation.
Memory-bound
This technique utilizes the main memory accesses (either latency or bandwidth) in computation speed.
Network-bound
In this technique, the client must perform a few computations and wait to receive some tokens from remote servers.
List of proof-of-work functions
Here is a list of known proof-of-work functions:-
o Integer square root modulo a large prime
o Weaken Fiat–Shamir signatures`2
o Ong–Schnorr–Shamir signature is broken by Pollard
o Partial hash inversion
o Hash sequences
o Puzzles
o Diffie–Hellman–based puzzle
o Moderate
o Mbound
o Hokkaido
o Cuckoo Cycle
o Merkle tree-based
o Guided tour puzzle protocol
A successful attack on a blockchain network requires a lot of computational power and a lot of time to do the calculations. Proof of Work makes hacks inefficient since the cost incurred would be greater than the potential rewards for attacking the network. Miners are also incentivized not to cheat.
It is still considered as one of the most popular methods of reaching consensus in blockchains. Though it may not be the most efficient solution due to high energy extensive usage. But this is why it guarantees the security of the network.
Due to Proof of work, it is quite impossible to alter any aspect of the blockchain, since any such changes would require re-mining all those subsequent blocks. It is also difficult for a user to take control over the network computing power since the process requires high energy thus making these hash functions expensive.
submitted by RumaDas to u/RumaDas [link] [comments]

What are the benefits of Crypto Mining?

What are the benefits of Crypto Mining?

https://preview.redd.it/q6xfuxvtmjv41.png?width=875&format=png&auto=webp&s=b092bca718f6cba3ae8c327a54952f4e65c7ed25
If you’ve ever heard the word cryptocurrency, then you’ve probably heard about the mining as well. If you still don’t know what cryptocurrency mining is and about profitable, keep reading!
In order to understand crypto mining, you need to fully understand what a cryptocurrency is first. Unlike traditional currencies (aka fiat currency), a cryptocurrency is a digital asset that works in a decentralized way; it does not require a bank or a third-party to operate. Someone can send someone else a cryptocurrency directly without any third-party involved.
The first ever cryptocurrency created was Bitcoin.
Every single cryptocurrency has a blockchain, which is an immutable digital ledger. A single transaction is recorded on the blockchain permanently, which no one can edit or delete it randomly.
A blockchain works by incentivizing miners to confirm the authenticity of each transaction. A person who confirmed the authenticity of the transaction, get the cryptocurrency as a reward.
Since the cryptocurrencies are based on cryptography, the miners need to solve extremely complicated mathematical problems to verify each transaction. They are incentivized to do it because they are rewarded for it.
Anyone can participate in mining from anywhere in the world as long as they have a computer. When the number of miners increases, it allows cryptocurrencies to be more secure. Even if an attacker would want to attack the blockchain network, somehow, an attacker needs to know 51% or more miners. Since the miners are spread around the world, this task is close to impossible and most likely not economically viable.

Types of Crypto Mining

Bitcoin was the first cryptocurrency to introduce the Proof-of-Work (PoW) consensus algorithm, where users have to solve complex mathematical problems in order to process transactions and secure the whole network.
Bitcoin was quite easy to mine at first, and you could do it with your CPU, there was no need for special equipment, and the rewards were huge. However, today, Bitcoin’s mining difficulty has increased considerably, and users need specialized and expensive equipment to mine it.
There are four main types of mining when it comes to the PoW algorithm. There is a CPU, GPU, ASIC, and Cloud mining.
The first three are essentially the same, but they use different parts of your computer. There are some cryptocurrencies specifically created to be mined only through CPU and to be ASIC resistant. Other cryptocurrencies can be mined through all three methods.
Cloud mining, on the other hand, is a process where a user basically pays to rent out a mining machine somewhere else. You don’t have to buy the equipment physically but it is wise to carry out due diligence and research into who and what you are paying for.

Proof of Stake ‘Mining’

With the introduction of the Proof-of-Stake (PoS) consensus algorithm, cryptocurrency mining changed forever. In this case, users don’t have to solve computationally intensive puzzles. In PoS-based cryptocurrencies, the creator of blocks is chosen via random selection or wealth.
Validators in the PoS consensus have to lock up some of their coins as a ‘stake’ and will get rewarded for it.
There are many benefits over the traditional PoW like lower cost and more energy efficiency. Additionally, because PoS encourages users to hold the coin in the wallet, it stabilizes the price a bit more than conventional cryptocurrencies.
Today, you can find plenty of exchanges that support staking, including the most popular exchange, Binance. The safest option, however, is always going to be staking using your own private wallet.

Proof of Formulation ‘Mining’

FLETA has developed the most innovative and newest consensus algorithms known as Proof-of-Formulation (PoF).
This PoF consensus algorithm uses something called the ‘Synchronization Group’, which allows all of the miners to mine in an orderly manner. The generating block time only takes 0.5 seconds, and the observer node checks the irregular blocks in real-time, which prevents the fork and double-spending. Furthermore, FLETA’s PoF algorithm is currently undergoing the patent process through the United States Patent Office (Application Number: 62717695).
The users can easily create a FLETA formulator through the official FLETA wallet. The minimum amount to create a single Formulator is 200,000 FLETA. The blockchain network is operated by FLETA and requires a 6-core CPU or higher.
As you created at least four Formulators, you will be able to upgrade it, which allows you to get 1.3 times more rewards.
Besides creating a Formulator, users can contribute to mining with a minimum amount of 100 FLETA.

Conclusion

Today, various mining methods exist, each with their pros and cons. However, cryptocurrency miners are still craving more convenient (and less costly) ways to earn rewards.
FLETA’s Proof-of-Formulation consensus is not only fast, but it is also highly secure the added layer of protection between observer nodes, formulator, and the synchronization group.
With plenty more to come, in terms of DApp development, games and partnerships, FLETA’s PoF is increasingly becoming the preferred consensus of many developers due to the speed, security and convenience of the platform.
**
submitted by fleta-official to fletachain [link] [comments]

I'm an Undercover FBI Agent on the Deep Web

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to DrCreepensVault [link] [comments]

I'm an Undercover FBI Agent on the Deep Web.

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to mrcreeps [link] [comments]

AMA Wrap-up & Summary

A very big thank you to everyone who participated in FinNexus’s first ever AMA session in the Wanchain Telegram! We were very pleased with the level of enthusiasm from AMA participants! We’re sorry to say that we weren’t able to answer every single question as we received close to 80 questions, and many of them were similar. However, we did our best to identify all the unique questions and answer them all as fully as possible. We have also selected the top ten 🏆🏆🏆winning questions🏆🏆🏆 of the AMA who’s askers will be receiving $20.00 worth of FNC each at the Wanchain address they submitted after the token generation event scheduled in January.
(Feel free to ask any other questions in response to this post!)

TOP TEN QUESTIONS:

1.🏆 What’s special about Finnexus vs. others in the space? @oluap5773
Our closest competitors are traditional financial institutions which offer low risk, non blockchain based stable return and fixed return products. Our other competitors would be platforms such as Binance and Compound which offer centralized or decentralized stable return products based on crypto lending businesses.
FinNexus has a unique focus on assets with real value built on blockchain infrastructure, which is rare in our other DeFi projects. Unlike Binance and Compound whose stable return products are based on crypto lending businesses, the assets we issue include those based on both real world and crypto businesses, which gives users access to reliable assets which are not correlated with the performance of crypto markets. And unlike traditional institutions, all our products are built on blockchain, which enables them to make use of all the blockchain’s advantages.
2. 🏆 What do you think of the future of DeFi in this space? @salmanmbstu96
Our expectation of the future DeFi is mainly on the application level rather than a technical one.
  1. Borrowing and Lending cannot be everything about DeFi. The growth of the DeFi should be largely diversified to other assets and business models.
  2. The risks in the DeFi world is similar, in other words, most of the DeFi models are facing the same systematic risks, which are with high risk and high expected return characteristics. In cases when the bitcoin collapses, every businesses and scenarios will be affected. This is not healthy.
  3. The DeFi applications are not so user-friendly. One has to take some time to learn how to deal with one decentralized product.
A leading project in the future should have the ability to solve the problems above. Blockchain is a great technology, while the combination with finance cannot avoid the basic logic and be isolated from the successful scenarios and models we built. Different models here mean different application scenarios in the financial world, like the equity rights, debenture rights, derivatives or other beneficiary rights.
The centralized or decentralized cannot be questions like yes or no. During the process of development, there may be something in between. On one hand it is built in a decentralized way and smart contracts are triggered automatically; while on the other hand, it is adapting the realistic that some parts of transactions or measurements must be under centralized regulations. We would like to call it Open Finance, as it is open to both the crypto assets on the blockchain, and the assets off the chain while restructuring their parts in a decentralized way.
In the future, we believe that there will be leading projects, that can bridge the blockchain technology and real world assets, diversify the systematic risks while attracting more users, and be user friendly that the nonprofessional may easily operate.
3. 🏆 Give me reason’s why should I invest in #FinNexus? @cryptococuk01
I hope you read the write paper of FinNexus and got understandings on what FinNexus is about to do. FNC will be the sole token in the FinNexus ecosystem. It is a kind of hybrid token, like a utility token but also benefiting from FinNexus development.
FinNexus will work as the financial product supermarket, Broker, Investment Banker or something alike. It will gain revenue directly from its operations.
Holders of FNC is eligible to the following rights or benefits (will be explained in details on the FinNexus official websites):
1)Rights of higher rate of returns on tokenized products; 2)Rights to invest in tokenized products with lower cost; 3)Benefits on the discount on the transaction commissions; 4)Derivative rights, like early settlement, resale or interest swaps; 5)Rights to interact with WAN; 6)Benefits on the FinNexus’ development; the revenue of FinNexus is from: Underwriting; Investment banking; Market making; Transaction commissions; Investment in tokenized products.
4. 🏆 How can FinNexus goal be explained in layman’s terms? @iamthethirdkind
You can actually get a clue from the project’s name ‘FinNexus’. The name is quite straightforward. FinNexus is the combination of the words ‘Finance’ and ‘Nexus’. It means financial connections. I will explain that in 3 aspects:
  1. To asset owners
Finance here includes the ‘traditional’ and the ‘decentralized’ and traditional finance is only traditional compared to DeFi. Here FinNexus is aiming at providing a solution, which we call it a protocol, where one can link the traditional financial world with the blockchain technology in an efficient, transparent and feasible way. For example, one with assets that have good expected cash flows will find a way to easily tokenize the assets on FinNexus.
  1. To users FinNexus will act as a financial product supermarket. Right now, the DeFi world has a problem that almost all of the crypto assets or financial products bear the same systematic risks, which means when the Bitcoin price collapses, every kind will join the plummet and even the financial models will cease to be valid. One of the reasons is that all assets are purely crypto-born. Moreover, the crypto interface is not so easy for a nonprofessional to operate. FinNexus’ goal is to provide diversification and convenience with assets of real value. Users will be able to invest in assets with various risks and returns here, and can easily choose to their preferences like in a supermarket.
  2. FinNexus Itself
FinNexus is concentrating in the application level, with the help of the two initiators. It will not operate or manage assets directly and will act as a channel or a hub, where supplies and needs are paired, while in later stages, it will strive to build the protocols or standards for all of these tokenizations and transactions.
5. 🏆 What are tokenized digital assets in FinNexus? How is it different from current digital assets? @hg144
The FinNexus team have done researches on the tokenization of real world assets. Right now, only a few groups like the credit assets, supply chain finance or other sub-dividable beneficial rights seem most feasible. These tokenized products may bear characteristics like equities, debentures, derivatives or other beneficiary rights.
The noticeable differences lie in the nature of the products. The returns are from the cashflow of the real world assets, rather than mining, staking, speculating, etc. FinNexus combines the decentralized and centralized means. The tokens have advantages on chain, while the product design and disclosure draw lessons from traditional finance.
Apart from that, there will also be products totally on chain, triggered by smart contracts, like crypto futures, options, and ETFs, with user-friendly interfaces.
6. 🏆 What are the advantages and disadvantages of FinNexus when developing in a large market like China? Do you have plans to develop other regions? @hiampluto
Advantages:
(1) The blockchain industrial environment and public opinion guidance has changed since China’s President Xi Jinping recent announcement. The word blockchain has been mentioned in social media time and time again, and almost everyone is trying to find out what it is. President made it clear that the country would encourage enterprises applying the technology into real world scenarios.
(2) China has the largest population and made great technological progress over the last decade. Blockchain projects, communities, exchanges, token funds, medias, and other participants have established a complete and dynamic ecosystem. FinNexus is easy to access to these resources.
(3) Financial market in China has been making great progress, which provides FinNexus with adequate talents, financial products and potential users.
(4) The two initiators Wanchain and SuperAtom (incubated by Cheetah Mobile) are all based in China. They both give FinNexus big financial, human-power and community support, with minimum communication cost in the same city.
Disadvantages:
(1) Activities like ICOs or other forms of public fund-raising are still restricted;
(2) The government’s attitude towards the security-like tokens and tokenization is still not clear;
(3) Language and time zone discrepancy may cause difficulties.
FinNexus is aiming to build a global open finance protocol. Blockchain should be boundless, and so will be our users and assets. Our first product’s basic asset is in SE Asia. We are now building teams, grouping communities, and recruiting regional ambassadors. Also, we are making continuous and effective interactions with the global communities of Wanchain and Bitrue.
7. 🏆 FinNexus’s team consists of experienced and brilliant individuals. What made them to unite together and work in unison for the fulfilment of it and how does it act as an advantage compared to other projects in terms of brainstorming and guidance? @cryptollll
Though key members of FinNexus team seem to have different educational backgrounds or working experiences, we come together with the same beliefs and goals. The same purpose has united us together and after grinding-in over one and a half years, we are working together energetically and harmoniously, which provides a foundation for the success of FinNexus. It is not the first time we work together and we knew each other with for long time. The details of resumes are on the website.
8. 🏆 Many blockchain projects and companies focus on making very complex systems, say they will revolutionize the society, and help the unbanked. Since you work directly in the area, how realistic do you think such statements are? @lucbazanse
The team has been working together for more than a year already. FinNexus is a project at the layer 3 level in the blockchain system, targeting at the application usage. The team believes that no matter how innovative or revolutionary a new technology is, if it fails to be conveniently applied in everyday use or have efficient or cost-saving solutions to users, we cannot call it a successful technology.
Therefore, we will build our application on top of the successful public chains and concentrate in providing financially practical and risk diversified products and user friendly applications. We doubt that the unbanked can be helped by a complex system. Unbanked group of people usually exist in the less developed regions that lack basic infrastructure. They may not well educated or lack the basic understanding of the technology or even ideas of modern financial or banking system.
Therefore, the application is most important. A successful project should provide them with friendly interfaces and convenient accesses, aiming directly to their basic needs, no matter how complex or innovative the technology is. That’s what FinNexus is trying to do, to provide what is needed the most in a simple and understandable way.
9. 🏆 Which way you will offer token sale?
We create a new way of the token sales together with launching our products. FinNexus’ will issue its CFNC (convertible FNC), which gives holders the right to convert into ABT in the conversion period. The holders of ABT are eligible to the benefit with an annualized rate of return at over 10%. ABT is called the Asset Backed Token in general, in specific, the return of the token is backed by the consumer loan assets in Indonesia, with the originator SuperAtom, which is initiated by the NYSE listed company Cheetah Mobile, as the basic asset. It has a traditional hierarchical design and the ABT is the token in the senior tranche. The details will be disclosed in the Offering Circular on the FinNexus website later.
We strongly recommend the interested blockchainers to check the details on www.finnexus.io
10. 🏆 Can you tell more about road-map for future developments? @toanphamhd
In phase one, before the end of 2019 or early in 2020, FinNexus is introducing ICTO, combining the fund raising process with its products. Instruments with the essentials of ABT are likely to be one of the major products offered to users, with different systematic risks from the crypto assets. Before the first quarter of 2020, other products like the borrowing and lending, hedging, ETF and staking are likely to be issued, as well as the other schemes of the ABT products. FinNexus will also cooperate with at least three of the token exchanges, crypto wallets or other channels as the sale portals.
In phase two, before the end of 2020, FinNexus will search for the qualified assets globally and combine the blockchain technology with the real world application scenarios in vaster occasions. And FinNexus work with other mainnet projects to launch its new products and interactions with the chain tokens. Moreover, FinNexus will facilitate the trade of the ABT and other similar products on the OTC market. The experience of the traditional financial market shows that the OTC transactions of these products have even higher volume than the bidding mode in the exchanges.
In the third phase, in three years, FinNexus’ goal is to build an open finance protocol. This protocol is established on Layer 3, targeted on the application level. It will provide the basic standard for the tokenization and transaction for all types of assets, both in traditional finance and in the crypto world. All assets that provide future returns will be programmable with blockchain in the future and FinNexus is defining a protocol that provides the standards and convenience in realization. Different assets may apply to various requirements in details, but the common language lying in is what FinNexus is chasing for.
While in the coming days, we would expect 1) the release of the detailed conversion and subscription rules on the website; 2) the release of the ABT offering circular to give a detailed explanation on the risks and returns; 3) setting the timetable for offering and listing of FNC.

RUNNER UP QUESTIONS

11. What is the current development progress of the project, and when is the main online release? @btc4life76
The first product will be released together with ICTO process, details of which you may check on the FinNexus website. Right now, the product is under the final stage of development and the team are working on the necessary information disclosure materials and the design of tokens on Wanchain. The planned release time will be before the end of this year or early next year.
12. “What are the recent change in high-level strategy in product design and development? How will it help the #FinNexus to move further with the safest & fastest Blockchain technology?” @ahmetumit08
FinNexus is a project built on layer 3 and concentrates on technological application. ‘We are the portal to the users and we need to make it simple, convenient, understandable and transparent’.
The advantage does not lie in the sophistication of the underlying technology, but in the application level. To establish an Open Finance Protocol, FinNexus has to move earlier and faster than the others, and at present, it is the first in the industry to put forward this concept.
In product development, we will make each code be used in real use case and keep improving in practice. In the beginning, we will built a layer 3 for assets tokenization and distribution, fee and interests distribution, buying and withdrawing. Users (business users) do not need to connect public chains, but use our SDK or API to interact with different chains. Recently we are focusing on protocols with smart contracts that asset tokenization could be easily deployed by FNX layer 3. And then we will focus on the protocol of decentralized token distribution. That means anyone who wants to sell assets tokens in FinNexus only need to download our SDK or connect our API.
13. How many different types of assets can be expected in the first quarter of 2020 . What will be the jurisdiction of assets and how will FinNexus avoid people from holding assets from restricted jurisdictions? @anon
As a project incubated by SuperAtom, the UangMe assets will work as an initiator, and it has the potential of the amount of 100M USD. In the meantime, similar assets in Malaysia are under discussion. In addition, there will be other types of products the users may expect in the first quarter of 2020, like crypto borrowing and lending products, easy-operating crypto-currency derivatives, ETF products, staking related products, etc., and they are all under development right now.
We have a legal team that help us deal with the jurisdiction issues. We will monitor the changing legal environment around the main countries and regions. KYC procedures are necessary for avoiding investors from holding assets from restricted jurisdictions.
14. How FinNexus and Wanchain both can get benefitted using each others protocol? @salmanmbstu96
FinNexus is the layer 3 which can make users, especially business users, to use Wanchain easily in financial aspects. And FinNexus focuses on different assets, that could grant Wanchain with more applications to run. In most of financial scenarios, multi-coin will be used, so we can use the cross-chain protocol of Wanchain. If Wanchain protocol is like a highway road, FinNexus protocol is working as an assembly line.
15. What do you think about Defi Landscape right now? @paraphan1992
Now, many DeFi projects are limited to the products and applications with the pure crypto assets. They can be highly decentralized and automated, but is it enough?
1) Borrowing and Lending is the first natural DeFi application scenario and contributes to over 90% of the application scenarios. It cannot be everything about DeFi. The growth of the DeFi should be largely diversified to other assets and business models.
2) The risks in the DeFi world is similar, in other words, most of the DeFi models are facing the same systematic risks, which are with high risk and high expected return characteristics. In cases when the bitcoin collapses, every businesses and scenarios will be affected. This is not healthy. Tokens transactions with high risks and the relating credit activities cannot be the whole world of DeFi. FinNexus is trying to introduce financial products with different types and levels of risks and expected returns, to enrich the products desperately needed in the industry.
3) The DeFi applications are not so user-friendly. One has to take some time to learn how to deal with one decentralized product. FinNexus aims at providing something that is transparent with the information needed for the investors to make judgment while easy to handle.
Right now, Maker is trying to move to Multi-Collateral Dai (MCD), a big step to make the DeFi model richer and healthier. Also they introduce Dai Savings Rate (DSR), which may have the potential to be regarded as one of the standard rates. In the future, we may witness wider real world assets and application scenarios in DeFi and that is the path that DeFi is bound to follow.
16. Can FinNexus support smart contracts? @btc4life76
The answer is yes, smart contracts will play important roles in the FinNexus products. The first phase of products will be built on Wanchain and according to the ICTO rules, the ABT conversion and the future payment of principal and interest of ABT will all be supported by smart contracts. Again, for details of ICTO please check our website. In later phases ,we will develop other products based on ETH or other chains according to the users’ requirements and asset characteristics; and smart contracts will be richer and more diversified.
17. Why do we need DEFI? What is the new thing that DeFi bring to us? Was your project born for that? @oluap5773
A: The decentralized blockchain technology needs application scenarios, and the finance needs the innovative technology to solve its own problems, thus here comes the merge of the two.
Bitcoin brings the blockchain technology into our sight and until now, it has 70% of the total value of crypto assets. Bitcoin is born to facilitate the financial transactions and most of the project henceforth cannot be isolated from the financial fields. There is an inevitable bond since the birth of the technology, and finance is always the natural experimental field of blockchain.
The problem of information asymmetry is always puzzling investors and regulators. Most of the solution came from a centralized way from the authorities before, while the result was much diversified among regions. With the emergence of blockchain, it provides an alternative solution to this long-lasting issue. It is trustworthy, non-modifiable and self-proved. Moreover, it is bondless and anti-authorized, which can largely reduce the cost of international transactions while enhancing the efficiency. The technology is self-organized, decentralized and automated. DeFi has the potential to change the governance structure and investment behavior in the financial world.
Tens of years ago, the internet has brought finance efficiency and popularization. Today blockchain is about to change the financial system again. It introduces the participants into a new territory that is bondless, decentralized, trustworthy, and equal. It will largely decrease the cost of centralized supervision, the risk of information asymmetry and the barrier among economic entities. Many business formats will change concerning the technology, including the economic entities, governance authorities, market intermediaries, exchanges and the transaction behavior of investors. For example, in the future, it is expected that the basic bookkeeping of a business entity will be on blockchain, and all of the operational activities like procurement, production, sales, inventories, invoices, taxations, employments, etc., will be dealt with and recorded in a decentralized way. Therefore, the auditors’ jobs are shifting from the bookkeeping test of accuracy to the verification of the validity of the chain.
Of course, FinNexus is born to be part of the big change, and we strive to be one of the driving forces of the financial decentralization progress. The goal of FinNexus is to build an Open Finance Protocol. The protocol is like a channel or a standard, to allow all kinds of assets, whether decentralized or centralized, whether with characteristics of equity, debenture, derivative or other hybrid, to find its path towards tokenization with the blockchain technology. By maintaining the basic business logic and learning from the traditional financial model, FinNexus will combine with the advantages of the blockchain technology, to make investors truly benefit from decentralization.
18. Which target users does FinNexus aim to serve? Will its technology be easy for participants to use but still ensure open, transparent and equal way? @paraphan1992
FinNexus aims to serve those who know blockchain and have invested in crypto assets or DeFi products, those who know real world investment but little about blockchain, and those who know little about crypto assets or financial investment but interested in the blockchain technology and curious on the virtual assets.
The meaning of ‘Nexus’ has many parts, and one is to make connections with different market participants. FinNexus will work through protocols and try to act as a channel. In future stages, it will make connections with the OTC markets providing fiat and crypto currency exchanges. Through these protocols, non-crypto users will be able to invest in the FinNexus products.
As FinNexus is built on Layer 3, the protocol will be built combining the decentralized and centralized solution. User-friendliness is a must. By means of easy interfaces, full information disclosure and integrated protocols, users with various degree of knowledge and different risk tolerance are able to get their suitable investment, easily and transparently.
whether decentralization or centralization, are means not targets.
Openness, transparency and equality are necessary to lower credit risks in financial activities. The subscription, transaction, interaction and distribution of financial products will be on chain in a decentralized way, implemented by smart contracts; while the information disclosure, real assets collateral and basic assets operation will be off chain in a centralized way. FinNexus protocols will work to achieve such goals.
submitted by noahniuwa to finnexus [link] [comments]

CRYPTOCURRENCY BITCOIN

CRYPTOCURRENCY BITCOIN
Bitcoin Table of contents expand: 1. What is Bitcoin? 2. Understanding Bitcoin 3. How Bitcoin Works 4. What's a Bitcoin Worth? 5. How Bitcoin Began 6. Who Invented Bitcoin? 7. Before Satoshi 8. Why Is Satoshi Anonymous? 9. The Suspects 10. Can Satoshi's Identity Be Proven? 11. Receiving Bitcoins As Payment 12. Working For Bitcoins 13. Bitcoin From Interest Payments 14. Bitcoins From Gambling 15. Investing in Bitcoins 16. Risks of Bitcoin Investing 17. Bitcoin Regulatory Risk 18. Security Risk of Bitcoins 19. Insurance Risk 20. Risk of Bitcoin Fraud 21. Market Risk 22. Bitcoin's Tax Risk What is Bitcoin?
Bitcoin is a digital currency created in January 2009. It follows the ideas set out in a white paper by the mysterious Satoshi Nakamoto, whose true identity is yet to be verified. Bitcoin offers the promise of lower transaction fees than traditional online payment mechanisms and is operated by a decentralized authority, unlike government-issued currencies.
There are no physical bitcoins, only balances kept on a public ledger in the cloud, that – along with all Bitcoin transactions – is verified by a massive amount of computing power. Bitcoins are not issued or backed by any banks or governments, nor are individual bitcoins valuable as a commodity. Despite it not being legal tender, Bitcoin charts high on popularity, and has triggered the launch of other virtual currencies collectively referred to as Altcoins.
Understanding Bitcoin Bitcoin is a type of cryptocurrency: Balances are kept using public and private "keys," which are long strings of numbers and letters linked through the mathematical encryption algorithm that was used to create them. The public key (comparable to a bank account number) serves as the address which is published to the world and to which others may send bitcoins. The private key (comparable to an ATM PIN) is meant to be a guarded secret and only used to authorize Bitcoin transmissions. Style notes: According to the official Bitcoin Foundation, the word "Bitcoin" is capitalized in the context of referring to the entity or concept, whereas "bitcoin" is written in the lower case when referring to a quantity of the currency (e.g. "I traded 20 bitcoin") or the units themselves. The plural form can be either "bitcoin" or "bitcoins."
How Bitcoin Works Bitcoin is one of the first digital currencies to use peer-to-peer technology to facilitate instant payments. The independent individuals and companies who own the governing computing power and participate in the Bitcoin network, also known as "miners," are motivated by rewards (the release of new bitcoin) and transaction fees paid in bitcoin. These miners can be thought of as the decentralized authority enforcing the credibility of the Bitcoin network. New bitcoin is being released to the miners at a fixed, but periodically declining rate, such that the total supply of bitcoins approaches 21 million. One bitcoin is divisible to eight decimal places (100 millionths of one bitcoin), and this smallest unit is referred to as a Satoshi. If necessary, and if the participating miners accept the change, Bitcoin could eventually be made divisible to even more decimal places. Bitcoin mining is the process through which bitcoins are released to come into circulation. Basically, it involves solving a computationally difficult puzzle to discover a new block, which is added to the blockchain and receiving a reward in the form of a few bitcoins. The block reward was 50 new bitcoins in 2009; it decreases every four years. As more and more bitcoins are created, the difficulty of the mining process – that is, the amount of computing power involved – increases. The mining difficulty began at 1.0 with Bitcoin's debut back in 2009; at the end of the year, it was only 1.18. As of February 2019, the mining difficulty is over 6.06 billion. Once, an ordinary desktop computer sufficed for the mining process; now, to combat the difficulty level, miners must use faster hardware like Application-Specific Integrated Circuits (ASIC), more advanced processing units like Graphic Processing Units (GPUs), etc.
What's a Bitcoin Worth? In 2017 alone, the price of Bitcoin rose from a little under $1,000 at the beginning of the year to close to $19,000, ending the year more than 1,400% higher. Bitcoin's price is also quite dependent on the size of its mining network since the larger the network is, the more difficult – and thus more costly – it is to produce new bitcoins. As a result, the price of bitcoin has to increase as its cost of production also rises. The Bitcoin mining network's aggregate power has more than tripled over the past twelve months.
How Bitcoin Began
Aug. 18, 2008: The domain name bitcoin.org is registered. Today, at least, this domain is "WhoisGuard Protected," meaning the identity of the person who registered it is not public information.
Oct. 31, 2008: Someone using the name Satoshi Nakamoto makes an announcement on The Cryptography Mailing list at metzdowd.com: "I've been working on a new electronic cash system that's fully peer-to-peer, with no trusted third party. The paper is available at http://www.bitcoin.org/bitcoin.pdf." This link leads to the now-famous white paper published on bitcoin.org entitled "Bitcoin: A Peer-to-Peer Electronic Cash System." This paper would become the Magna Carta for how Bitcoin operates today.
Jan. 3, 2009: The first Bitcoin block is mined, Block 0. This is also known as the "genesis block" and contains the text: "The Times 03/Jan/2009 Chancellor on brink of second bailout for banks," perhaps as proof that the block was mined on or after that date, and perhaps also as relevant political commentary.
Jan. 8, 2009: The first version of the Bitcoin software is announced on The Cryptography Mailing list.
Jan. 9, 2009: Block 1 is mined, and Bitcoin mining commences in earnest.
Who Invented Bitcoin?
No one knows. Not conclusively, at any rate. Satoshi Nakamoto is the name associated with the person or group of people who released the original Bitcoin white paper in 2008 and worked on the original Bitcoin software that was released in 2009. The Bitcoin protocol requires users to enter a birthday upon signup, and we know that an individual named Satoshi Nakamoto registered and put down April 5 as a birth date. And that's about it.
Before Satoshi
Though it is tempting to believe the media's spin that Satoshi Nakamoto is a solitary, quixotic genius who created Bitcoin out of thin air, such innovations do not happen in a vacuum. All major scientific discoveries, no matter how original-seeming, were built on previously existing research. There are precursors to Bitcoin: Adam Back’s Hashcash, invented in 1997, and subsequently Wei Dai’s b-money, Nick Szabo’s bit gold and Hal Finney’s Reusable Proof of Work. The Bitcoin white paper itself cites Hashcash and b-money, as well as various other works spanning several research fields.
Why Is Satoshi Anonymous?
There are two primary motivations for keeping Bitcoin's inventor keeping his or her or their identity secret. One is privacy. As Bitcoin has gained in popularity – becoming something of a worldwide phenomenon – Satoshi Nakamoto would likely garner a lot of attention from the media and from governments.
The other reason is safety. Looking at 2009 alone, 32,489 blocks were mined; at the then-reward rate of 50 BTC per block, the total payout in 2009 was 1,624,500 BTC, which at today’s prices is over $900 million. One may conclude that only Satoshi and perhaps a few other people were mining through 2009 and that they possess a majority of that $900 million worth of BTC. Someone in possession of that much BTC could become a target of criminals, especially since bitcoins are less like stocks and more like cash, where the private keys needed to authorize spending could be printed out and literally kept under a mattress. While it's likely the inventor of Bitcoin would take precautions to make any extortion-induced transfers traceable, remaining anonymous is a good way for Satoshi to limit exposure.
The Suspects
Numerous people have been suggested as possible Satoshi Nakamoto by major media outlets. Oct. 10, 2011, The New Yorker published an article speculating that Nakamoto might be Irish cryptography student Michael Clear or economic sociologist Vili Lehdonvirta. A day later, Fast Company suggested that Nakamoto could be a group of three people – Neal King, Vladimir Oksman and Charles Bry – who together appear on a patent related to secure communications that were filed two months before bitcoin.org was registered. A Vice article published in May 2013 added more suspects to the list, including Gavin Andresen, the Bitcoin project’s lead developer; Jed McCaleb, co-founder of now-defunct Bitcoin exchange Mt. Gox; and famed Japanese mathematician Shinichi Mochizuki.
In December 2013, Techcrunch published an interview with researcher Skye Grey who claimed textual analysis of published writings shows a link between Satoshi and bit-gold creator Nick Szabo. And perhaps most famously, in March 2014, Newsweek ran a cover article claiming that Satoshi is actually an individual named Satoshi Nakamoto – a 64-year-old Japanese-American engineer living in California. The list of suspects is long, and all the individuals deny being Satoshi.
Can Satoshi's Identity Be Proven?
It would seem even early collaborators on the project don’t have verifiable proof of Satoshi’s identity. To reveal conclusively who Satoshi Nakamoto is, a definitive link would need to be made between his/her activity with Bitcoin and his/her identity. That could come in the form of linking the party behind the domain registration of bitcoin.org, email and forum accounts used by Satoshi Nakamoto, or ownership of some portion of the earliest mined bitcoins. Even though the bitcoins Satoshi likely possesses are traceable on the blockchain, it seems he/she has yet to cash them out in a way that reveals his/her identity. If Satoshi were to move his/her bitcoins to an exchange today, this might attract attention, but it seems unlikely that a well-funded and successful exchange would betray a customer's privacy.
Receiving Bitcoins As Payment
Bitcoins can be accepted as a means of payment for products sold or services provided. If you have a brick and mortar store, just display a sign saying “Bitcoin Accepted Here” and many of your customers may well take you up on it; the transactions can be handled with the requisite hardware terminal or wallet address through QR codes and touch screen apps. An online business can easily accept bitcoins by just adding this payment option to the others it offers, like credit cards, PayPal, etc. Online payments will require a Bitcoin merchant tool (an external processor like Coinbase or BitPay).
Working For Bitcoins
Those who are self-employed can get paid for a job in bitcoins. There are several websites/job boards which are dedicated to the digital currency:
Work For Bitcoin brings together work seekers and prospective employers through its websiteCoinality features jobs – freelance, part-time and full-time – that offer payment in bitcoins, as well as Dogecoin and LitecoinJobs4Bitcoins, part of reddit.comBitGigs
Bitcoin From Interest Payments
Another interesting way (literally) to earn bitcoins is by lending them out and being repaid in the currency. Lending can take three forms – direct lending to someone you know; through a website which facilitates peer-to-peer transactions, pairing borrowers and lenders; or depositing bitcoins in a virtual bank that offers a certain interest rate for Bitcoin accounts. Some such sites are Bitbond, BitLendingClub, and BTCjam. Obviously, you should do due diligence on any third-party site.
Bitcoins From Gambling
It’s possible to play at casinos that cater to Bitcoin aficionados, with options like online lotteries, jackpots, spread betting, and other games. Of course, the pros and cons and risks that apply to any sort of gambling and betting endeavors are in force here too.
Investing in Bitcoins
There are many Bitcoin supporters who believe that digital currency is the future. Those who endorse it are of the view that it facilitates a much faster, no-fee payment system for transactions across the globe. Although it is not itself any backed by any government or central bank, bitcoin can be exchanged for traditional currencies; in fact, its exchange rate against the dollar attracts potential investors and traders interested in currency plays. Indeed, one of the primary reasons for the growth of digital currencies like Bitcoin is that they can act as an alternative to national fiat money and traditional commodities like gold.
In March 2014, the IRS stated that all virtual currencies, including bitcoins, would be taxed as property rather than currency. Gains or losses from bitcoins held as capital will be realized as capital gains or losses, while bitcoins held as inventory will incur ordinary gains or losses.
Like any other asset, the principle of buying low and selling high applies to bitcoins. The most popular way of amassing the currency is through buying on a Bitcoin exchange, but there are many other ways to earn and own bitcoins. Here are a few options which Bitcoin enthusiasts can explore.
Risks of Bitcoin Investing
Though Bitcoin was not designed as a normal equity investment (no shares have been issued), some speculative investors were drawn to the digital money after it appreciated rapidly in May 2011 and again in November 2013. Thus, many people purchase bitcoin for its investment value rather than as a medium of exchange.
However, their lack of guaranteed value and digital nature means the purchase and use of bitcoins carries several inherent risks. Many investor alerts have been issued by the Securities and Exchange Commission (SEC), the Financial Industry Regulatory Authority (FINRA), the Consumer Financial Protection Bureau (CFPB), and other agencies.
The concept of a virtual currency is still novel and, compared to traditional investments, Bitcoin doesn't have much of a long-term track record or history of credibility to back it. With their increasing use, bitcoins are becoming less experimental every day, of course; still, after eight years, they (like all digital currencies) remain in a development phase, still evolving. "It is pretty much the highest-risk, highest-return investment that you can possibly make,” says Barry Silbert, CEO of Digital Currency Group, which builds and invests in Bitcoin and blockchain companies.
Bitcoin Regulatory Risk
Investing money into Bitcoin in any of its many guises is not for the risk-averse. Bitcoins are a rival to government currency and may be used for black market transactions, money laundering, illegal activities or tax evasion. As a result, governments may seek to regulate, restrict or ban the use and sale of bitcoins, and some already have. Others are coming up with various rules. For example, in 2015, the New York State Department of Financial Services finalized regulations that would require companies dealing with the buy, sell, transfer or storage of bitcoins to record the identity of customers, have a compliance officer and maintain capital reserves. The transactions worth $10,000 or more will have to be recorded and reported.
Although more agencies will follow suit, issuing rules and guidelines, the lack of uniform regulations about bitcoins (and other virtual currency) raises questions over their longevity, liquidity, and universality.
Security Risk of Bitcoins
Bitcoin exchanges are entirely digital and, as with any virtual system, are at risk from hackers, malware and operational glitches. If a thief gains access to a Bitcoin owner's computer hard drive and steals his private encryption key, he could transfer the stolen Bitcoins to another account. (Users can prevent this only if bitcoins are stored on a computer which is not connected to the internet, or else by choosing to use a paper wallet – printing out the Bitcoin private keys and addresses, and not keeping them on a computer at all.) Hackers can also target Bitcoin exchanges, gaining access to thousands of accounts and digital wallets where bitcoins are stored. One especially notorious hacking incident took place in 2014, when Mt. Gox, a Bitcoin exchange in Japan, was forced to close down after millions of dollars worth of bitcoins were stolen.
This is particularly problematic once you remember that all Bitcoin transactions are permanent and irreversible. It's like dealing with cash: Any transaction carried out with bitcoins can only be reversed if the person who has received them refunds them. There is no third party or a payment processor, as in the case of a debit or credit card – hence, no source of protection or appeal if there is a problem.
Insurance Risk
Some investments are insured through the Securities Investor Protection Corporation. Normal bank accounts are insured through the Federal Deposit Insurance Corporation (FDIC) up to a certain amount depending on the jurisdiction. Bitcoin exchanges and Bitcoin accounts are not insured by any type of federal or government program.
Risk of Bitcoin Fraud
While Bitcoin uses private key encryption to verify owners and register transactions, fraudsters and scammers may attempt to sell false bitcoins. For instance, in July 2013, the SEC brought legal action against an operator of a Bitcoin-related Ponzi scheme.
Market Risk
Like with any investment, Bitcoin values can fluctuate. Indeed, the value of the currency has seen wild swings in price over its short existence. Subject to high volume buying and selling on exchanges, it has a high sensitivity to “news." According to the CFPB, the price of bitcoins fell by 61% in a single day in 2013, while the one-day price drop in 2014 has been as big as 80%.
If fewer people begin to accept Bitcoin as a currency, these digital units may lose value and could become worthless. There is already plenty of competition, and though Bitcoin has a huge lead over the other 100-odd digital currencies that have sprung up, thanks to its brand recognition and venture capital money, a technological break-through in the form of a better virtual coin is always a threat.
Bitcoin's Tax Risk
As bitcoin is ineligible to be included in any tax-advantaged retirement accounts, there are no good, legal options to shield investments from taxation.
SPONSORED
Start with ¥3000 trading bonus
Trade forex and CFDs on stock indices, commodities, metals and energies with alicensed and regulated broker. For all clients who open their first real account, XM offers a¥3000 trading bonus to test the XM products and services without any initial deposit needed. Learn more about how you can trade from your PC and Mac, or from a variety of mobile devices.
Compare Investment Accounts
Advertiser Disclosure
Related Terms
Satoshi
The satoshi is the smallest unit of the bitcoin cryptocurrency. It is named after Satoshi Nakamoto, the creator of the protocol used in block chains and the bitcoin cryptocurrency.
Chartalism Chartalism is a non-mainstream theory of money that emphasizes the impact of government policies and activities on the value of money.
Satoshi Nakamoto The name used by the unknown creator of the protocol used in the bitcoin cryptocurrency. Satoshi Nakamoto is closely-associated with blockchain technology.
Bitcoin Mining, Explained Breaking down everything you need to know about Bitcoin Mining, from Blockchain and Block Rewards to Proof-of-Work and Mining Pools.
Understanding Bitcoin Unlimited Bitcoin Unlimited is a proposed upgrade to Bitcoin Core that allows larger block sizes. The upgrade is designed to improve transaction speed through scale.
Blockchain Explained
A guide to help you understand what blockchain is and how it can be used by industries. You've probably encountered a definition like this: “blockchain is a distributed, decentralized, public ledger." But blockchain is easier to understand than it sounds.
Top 6 Books to Learn About Bitcoin About UsAdvertiseContactPrivacy PolicyTerms of UseCareers Investopedia is part of the Dotdash publishing family.The Balance Lifewire TripSavvy The Spruceand more
By Satoshi Nakamoto
Read it once, go read other crypto stuff, read it again… keep doing this until the whole document makes sense. It’ll take a while, but you’ll get there. This is the original whitepaper introducing and explaining Bitcoin, and there’s really nothing better out there to understand on the subject.
“What is needed is an electronic payment system based on cryptographic proof instead of trust, allowing any two willing parties to transact directly with each other without the need for a trusted third party

submitted by adrian_morrison to BlockchainNews [link] [comments]

What is bitcoin difficulty? Bitcoin Mining Difficulty Zooms to All Time High But BTC ... BITCOIN MINING DIFFICULTY EXPLAINED IN 10 MINUTES! BITCOIN DIFFICULTY ALL-TIME HIGH ERREICHT - YouTube Crypto mining difficulty Reaches record high, Fidelity doubles mining investment, Polkadot supply?

Mining is one of the key elements that allows Bitcoin to regulate the distributed network of computers that helps make its software possible.. By racing to complete cryptographic puzzles, miners propose the blocks that make up the Bitcoin blockchain and that house the history of network transactions. Difficulty adjustment algorithms, adjust the difficulty of the mathematical puzzles to compensate for adjustments in mining power. The difficulty algorithm works by changing the difficulty of the calculation based on previous block times. How does this work? The Bitcoin blockchain is coded to create a new block every 10 minutes on average. This keeps the rate of bitcoin production steady, at 1 block approximately every 10 minutes, while allowing the hashrate (the computing power needed to solve the puzzles) to fluctuate with the ... The skyrocketing growth of the computing power directed at Bitcoin’s SHA-256 puzzles, counted in TerraHash/s “Miners have more conviction in Bitcoin than Investment Funds and Hodlers (holders ... Before we even begin to understand what bitcoin mining difficulty means, we need to know how mining works. We have covered this topic in detail before, so we will just give you a little overview before getting into the different nuances of difficulty. Following that, we will look at how mining difficulty is calculated and how it changes to suit the network’s needs.

[index] [10121] [9344] [24006] [17070] [25912] [14666] [14159] [9489] [27512] [26248]

What is bitcoin difficulty?

Why does Bitcoin have a "difficulty" and what does this difficulty represent? How is this number calculated and why is it important? In this video, shot in the Wynwood art district of Miami, I ... After the Bitcoin (BTC) mining difficulty jumped sharply today, mining has become 20% more difficult than right before the third BTC halving in May. However,... Bitcoin so sicher wie nie verwahren - https://amzn.to/2JVWhkD Das Must-have für alle Bitcoin Fans - https://amzn.to/2ZfQRbp -----Mehr interessa... Crypto mining difficulty Reaches record high, Fidelity doubles mining investment, Polkadot supply? ... How And Why You Should Should Invest In Bitcoin & Cryptocurrency - Duration: 28:00 ... BITCOIN MINING DIFFICULTY EXPLAINED IN 10 MINUTES! GenicsTheCrypto. ... 💰Buy & Sell Bitcoin💰 ... What is the "cryptographic puzzle"?

#