BITCOIN GENERATOR TOOL - Obtain BTC with Smart Mining

Subreddit Stats: programming top posts from 2019-10-22 to 2020-10-21 06:41 PDT

Period: 364.67 days
Submissions Comments
Total 1000 180545
Rate (per day) 2.74 491.84
Unique Redditors 629 34951
Combined Score 1178903 2688497

Top Submitters' Top Submissions

  1. 47468 points, 49 submissions: iamkeyur
    1. One Guy Ruined Hacktoberfest 2020 (3039 points, 584 comments)
    2. AWS forked my project and launched it as its own service (2956 points, 810 comments)
    3. Privacy analysis of Tiktok’s app and website (2858 points, 234 comments)
    4. 98.css – design system for building faithful recreations of Windows 98 UIs (2781 points, 318 comments)
    5. Microsoft demos language model that writes code based on signature and comment (2621 points, 614 comments)
    6. Why does HTML think “chucknorris” is a color? (2565 points, 531 comments)
    7. Windows 95 UI Design (2309 points, 665 comments)
    8. The Linux codebase has over 3k TODO comments, many from over a decade ago (2119 points, 369 comments)
    9. eBay is port scanning visitors to their website (1829 points, 236 comments)
    10. Using const/let instead of var can make JavaScript code run 10× slower in Webkit (1814 points, 525 comments)
  2. 44853 points, 28 submissions: speckz
    1. From August, Chrome will start blocking ads that consume 4MB of network data, 15 seconds of CPU usage in any 30 second period, or 60 seconds of total CPU usage (8434 points, 590 comments)
    2. How To Spot Toxic Software Jobs From Their Descriptions (6246 points, 1281 comments)
    3. A Facebook crawler was making 7M requests per day to my stupid website (2662 points, 426 comments)
    4. Apple, Your Developer Documentation is Garbage (2128 points, 432 comments)
    5. The code I’m still ashamed of (2016) (2105 points, 429 comments)
    6. Slack Is Fumbling Developers And The Rise Of Developer Discords (2095 points, 811 comments)
    7. The Chromium project finds that around 70% of our serious security bugs are memory safety problems. Our next major project is to prevent such bugs at source. (1959 points, 418 comments)
    8. Advice to Myself When Starting Out as a Software Developer (1934 points, 257 comments)
    9. Software patents are another kind of disease (1893 points, 419 comments)
    10. My favourite Git commit (1772 points, 206 comments)
  3. 35237 points, 28 submissions: whackri
    1. It is perfectly OK to only code at work, you can have a life too (6765 points, 756 comments)
    2. Kernighan's Law - Debugging is twice as hard as writing the code in the first place. Therefore, if you write the code as cleverly as possible, you are, by definition, not smart enough to debug it. (5171 points, 437 comments)
    3. The entire Apollo 11 computer code that helped get us to the Moon is available on github. (3841 points, 433 comments)
    4. Raytracing - in Excel! (2478 points, 168 comments)
    5. Writing userspace USB drivers for abandoned devices (1689 points, 84 comments)
    6. Drum Machine in Excel (1609 points, 60 comments)
    7. fork() can fail: this is important (1591 points, 264 comments)
    8. Learn how computers add numbers and build a 4 bit adder circuit (1548 points, 66 comments)
    9. Heroes Of Might And Magic III engine written from scratch (open source, playable) (1453 points, 84 comments)
    10. Apollo Guidance Computer: Restoring the computer that put man on the Moon (1277 points, 47 comments)
  4. 14588 points, 11 submissions: pimterry
    1. I'm a software engineer going blind, how should I prepare? (4237 points, 351 comments)
    2. The 2038 problem is already affecting some systems (1988 points, 518 comments)
    3. TLDR pages: Simplified, community-driven man pages (1897 points, 182 comments)
    4. JetBrains Mono: A Typeface for Developers (1728 points, 456 comments)
    5. BlurHash: extremely compact representations of image placeholders (930 points, 159 comments)
    6. Let's Destroy C (855 points, 290 comments)
    7. Shared Cache is Going Away (833 points, 192 comments)
    8. XML is almost always misused (766 points, 538 comments)
    9. Wireshark has a new packet diagram view (688 points, 24 comments)
    10. fork() can fail: this is important (460 points, 299 comments)
  5. 14578 points, 9 submissions: magenta_placenta
    1. Trello handed over user's personal account to user's previous company (2962 points, 489 comments)
    2. Feds: IBM did discriminate against older workers in making layoffs - “Analysis shows it was primarily older workers (85.85%) in the total potential pool of those considered for layoff,” the EEOC wrote (2809 points, 509 comments)
    3. Stripe Workers Who Relocate Get $20,000 Bonus and a Pay Cut - Stripe Inc. plans to make a one-time payment of $20,000 to employees who opt to move out of San Francisco, New York or Seattle, but also cut their base salary by as much as 10% (2765 points, 989 comments)
    4. US court fully legalized website scraping and technically prohibited it - On September 9, the U.S. 9th circuit court of Appeals ruled that web scraping public sites does not violate the CFAA (Computer Fraud and Abuse Act) (2014 points, 327 comments)
    5. I Suspect many Task Deadlines are Designed to Force Engineers to Work for Free (1999 points, 553 comments)
    6. Intent to Deprecate and Freeze: The User-Agent string (1012 points, 271 comments)
    7. Contractor admits planting logic bombs in his software to ensure he’d get new work (399 points, 182 comments)
    8. AlphaStar: Grandmaster level in StarCraft II using multi-agent reinforcement learning (396 points, 97 comments)
    9. Half of the websites using WebAssembly use it for malicious purposes - WebAssembly not that popular: Only 1,639 sites of the Top 1 Million use WebAssembly (222 points, 133 comments)
  6. 13750 points, 3 submissions: pedrovhb
    1. Bubble sort visualization (7218 points, 276 comments)
    2. Breadth-first search visualization (3874 points, 96 comments)
    3. Selection sort visualization (2658 points, 80 comments)
  7. 11833 points, 1 submission: flaming_bird
    1. 20GB leak of Intel data: whole Git repositories, dev tools, backdoor mentions in source code (11833 points, 956 comments)
  8. 11208 points, 10 submissions: PowerOfLove1985
    1. No cookie consent walls — and no, scrolling isn’t consent, says EU data protection body (5975 points, 890 comments)
    2. Redesigning uBlock Origin (1184 points, 162 comments)
    3. Playing Around With The Fuchsia Operating System (696 points, 164 comments)
    4. Microsoft's underwater data centre resurfaces after two years (623 points, 199 comments)
    5. Microsoft Paint/Paintbrush in Javascript (490 points, 58 comments)
    6. GitHub shuts off access to Aurelia repository, citing trade sanctions (478 points, 81 comments)
    7. How 3D Game Rendering Works: Texturing (475 points, 22 comments)
    8. Simdjson: Parsing Gigabytes of JSON per Second (441 points, 90 comments)
    9. How 1500 bytes became the MTU of the internet (435 points, 60 comments)
    10. It’s OK for your open source library to be a bit shitty (411 points, 130 comments)
  9. 10635 points, 8 submissions: michalg82
    1. Turning animations to 60fps using AI (3449 points, 234 comments)
    2. Bug #1463112 “Cat sitting on keyboard crashes lightdm” (3150 points, 143 comments)
    3. Heroes Of Might And Magic III engine written from scratch (open source, playable) (1431 points, 172 comments)
    4. Vulkan is coming to Raspberry Pi: first triangle - Raspberry Pi (1318 points, 66 comments)
    5. An EPYC trip to Rome: AMD is Cloudflare's 10th-generation Edge server CPU (431 points, 60 comments)
    6. Microsoft cancels GDC 2020 presence due to coronavirus concerns (Following Sony, Facebook, Kojima Productions, Epic Games, Unity, and more) (371 points, 52 comments)
    7. Moving from reCAPTCHA to hCaptcha - The Cloudflare Blog (278 points, 71 comments)
    8. How much of a genius-level move was using binary space partitioning in Doom? (207 points, 109 comments)
  10. 10106 points, 10 submissions: SerenityOS
    1. Someone suggested I should host my website on my own OS. For that we'll need a web server, so here's me building a basic web server in C++ for SerenityOS! (2269 points, 149 comments)
    2. I've been learning about OS security lately. Here's me making a local root exploit for SerenityOS, and then fixing the kernel bugs that made it possible! (1372 points, 87 comments)
    3. SerenityOS was hacked in a 36c3 CTF! (Exploit and write-up) (1236 points, 40 comments)
    4. One week ago, I started building a JavaScript engine for SerenityOS. Here’s me integrating it with the web browser and adding some simple API’s like alert()! (1169 points, 63 comments)
    5. Implementing macOS-style "purgeable memory" in my kernel. This technique is amazing and helps apps be better memory usage citizens! (1131 points, 113 comments)
    6. SerenityOS: The second year (900 points, 101 comments)
    7. Using my own C++ IDE to make a little program for decorating my webcam frame (571 points, 33 comments)
    8. This morning I ported git to SerenityOS. It took about an hour and some hacks, but it works! :D (547 points, 64 comments)
    9. Smarter C/C++ inlining with attribute((flatten)) (521 points, 118 comments)
    10. Introduction to SerenityOS GUI programming (390 points, 45 comments)

Top Commenters

  1. XANi_ (10753 points, 821 comments)
  2. dnew (7513 points, 641 comments)
  3. drysart (7479 points, 202 comments)
  4. MuonManLaserJab (6666 points, 233 comments)
  5. SanityInAnarchy (6331 points, 350 comments)
  6. AngularBeginner (6215 points, 59 comments)
  7. SerenityOS (5627 points, 128 comments)
  8. chucker23n (5465 points, 370 comments)
  9. IshKebab (4898 points, 393 comments)
  10. L3tum (4857 points, 199 comments)

Top Submissions

  1. 20GB leak of Intel data: whole Git repositories, dev tools, backdoor mentions in source code by flaming_bird (11833 points, 956 comments)
  2. hentAI: Detecting and removing censors with Deep Learning and Image Segmentation by 7cmStrangler (9621 points, 395 comments)
  3. US Politicians Want to Ban End-to-End Encryption by CarrotRobber (9427 points, 523 comments)
  4. From August, Chrome will start blocking ads that consume 4MB of network data, 15 seconds of CPU usage in any 30 second period, or 60 seconds of total CPU usage by speckz (8434 points, 590 comments)
  5. Mozilla: The Greatest Tech Company Left Behind by matthewpmacdonald (7566 points, 1087 comments)
  6. Bubble sort visualization by pedrovhb (7218 points, 276 comments)
  7. During lockdown my wife has been suffering mentally from pressure to stay at her desk 100% of the time otherwise after a few minutes her laptop locks and she is recorded as inactive. I wrote this small app to help her escape her desk by periodically moving the cursor. Hopefully it can help others. by silitbang6000 (7193 points, 855 comments)
  8. It is perfectly OK to only code at work, you can have a life too by whackri (6765 points, 756 comments)
  9. Blockchain, the amazing solution for almost nothing by imogenchampagne (6725 points, 1561 comments)
  10. Blockchain, the amazing solution for almost nothing by jessefrederik (6524 points, 1572 comments)

Top Comments

  1. 2975 points: deleted's comment in hentAI: Detecting and removing censors with Deep Learning and Image Segmentation
  2. 2772 points: I_DONT_LIE_MUCH's comment in 20GB leak of Intel data: whole Git repositories, dev tools, backdoor mentions in source code
  3. 2485 points: api's comment in Stripe Workers Who Relocate Get $20,000 Bonus and a Pay Cut - Stripe Inc. plans to make a one-time payment of $20,000 to employees who opt to move out of San Francisco, New York or Seattle, but also cut their base salary by as much as 10%
  4. 2484 points: a_false_vacuum's comment in Stack Overflow lays off 15%
  5. 2464 points: iloveparagon's comment in Google engineer breaks down the problems he uses when doing technical interviews. Lots of advice on algorithms and programming.
  6. 2384 points: why_not_both_bot's comment in During lockdown my wife has been suffering mentally from pressure to stay at her desk 100% of the time otherwise after a few minutes her laptop locks and she is recorded as inactive. I wrote this small app to help her escape her desk by periodically moving the cursor. Hopefully it can help others.
  7. 2293 points: ThatInternetGuy's comment in Iranian Maintainer refuses to merge code from Israeli Developer. Cites Iranian regulations.
  8. 2268 points: xequae's comment in I'm a software engineer going blind, how should I prepare?
  9. 2228 points: turniphat's comment in AWS forked my project and launched it as its own service
  10. 2149 points: Rami-Slicer's comment in 20GB leak of Intel data: whole Git repositories, dev tools, backdoor mentions in source code
Generated with BBoe's Subreddit Stats
submitted by flpezet to subreddit_stats [link] [comments]

Cryptocurrencies and Money Laundering: To What Extent They Are Actually Connected ( part 2)

Cryptocurrencies and Money Laundering: To What Extent They Are Actually Connected ( part 2)

https://preview.redd.it/rwfzet5fu2u51.jpg?width=1024&format=pjpg&auto=webp&s=f27873c32c2c5435ae7ed7d51f8abf47152073bf
Cryptocurrencies are ill suited to money laundering
As a tool for money laundering, cryptocurrencies are a lot less universal and convenient than bank payments and cash.
Unlike cash transactions and bank transfers, transactions in decentralized blockchains are easily traceable. Cryptocurrencies are transparent in nature — all transactions are recorded and publicly accessible. If you can accumulate considerable volume of data, you can determine who's behind a bitcoin address used for money laundering. Besides, you cannot use the ВТС network and other cryptocurrency networks to transfer a large amount of money — such a transaction would be immediately brought to attention of law enforcement.
The experience of fighting against the Darknet (the illegal Internet) shows that states can fight against cyber crime while anonymity of cryptocurrencies is greatly exaggerated. Legal cryptocurrency platforms have demonstrated a long-standing trend of using KYC principles (provision of complete information about a user) — exchanging currencies anonymously is getting harder. Special services can connect transactions to specific users, sometimes using the blockchain technology itself to do it.
Super anonymous coins that encrypt transaction data (Monero, Dash, ZCash and others) cannot save criminals either — there are methods that can be used to break down these transactions. However, some experts state that cryptocurrency technologies evolve really fast and will soon become completely untraceable. In any case, to withdraw cryptocurrencies and turn them into fiat money, you would have to “burn” your actual bank accounts, thus reducing the entire anonymity level.
It is often mentioned that criminals use the so-called “mixers” — software and services where transactions can be run by mixing your coins and coins owned by other users to maintain confidentiality. It allows you to hide your withdrawal data and addresses, as well as your real identities. However, according to the above mentioned Chainalysis report, most users prefer to use mixers to ensure confidentiality and not to conduct illegal activity. This method is only used to launder 8 % of all money passing through.
Moreover, special services can track transactions passing through mixers which makes them suspicious by default. This is why criminals are not overenthusiastic to use them — cash and banks are more secure.
As you can see, cryptocurrencies are not all that convenient for criminals though it may seem so. They are an excessive intermediate since actual laundering requires cashing out and it's getting harder to do so anonymously by the day.
Banks are the key “laundromats” of the criminal underworld
Let's turn to the best part now. Criminals launder most money via regulated banks seen as ideal by the states. They can annually launder up to $ 2 trln. Think about it: trillions of dollars laundered through the banks.
Many of the world's biggest banks have been involved in money laundering schemes and fined for this. For instance, Wells Fargo, J. P. Morgan Chase & Co and the Bank of America, Standard Chartered and others. Last year, it turned out that Citigroup, Deutsche Bank and Raiffeisen had helped criminals launder $ 8.8 bln over a period of 7 years. It's only three bank conglomerates seen as strongholds of honesty and security. Imagine how much money has been laundered via other banks, including “shadow” banks.
In 2019, various companies around the world were fined for being involved in money laundering schemes worth of the record $ 8.14 bln. It's twice as much as in 2018. Two thirds of the fines were attributed to banks — $ 6.2 bln, and 17% — to gaming and gambling organizations. The best joke is that these fines are a drop in the ocean for the banks while money laundering cannot be undone.
According to the August report by the Mexican Finance Intelligence Unit, local criminals still prefer to launder money using conventional financial institutions, mostly banks, as well as brokerage firms and exchange companies. Seven biggest and most regulated Mexican banks that control 80 % of all assets in the national financial sector run the biggest number of transactions with black money (no specific amounts are given).
Moreover, Mexican banks have long been known to deal with activities of this kind. In 2012, one of them — HSBC — paid a record $ 1.92 bln in fines to the US authorities after the Mexican and Columbian drug cartels were caught using this bank for laundering drug-related money.
A short time ago, the international payment system SWIFT used by all of the world's banks published a report drafted in partnership with the financial research firm Bae Systems. The report noted that cryptocurrencies are rarely used for money laundering — with criminals preferring the more conventional ways. These include: using the so-called “money mules” — intermediaries who allow to use their accounts for transferring illegal money; hacking bank accounts, bribing bank officials, using shell companies and casinos.
The report also lists examples of laundering big amounts of money using cryptocurrencies while also noting that only few cases have been registered. These include use of intermediaries, prepaid crypto cards, purchase of physical assets, such as real estate or expensive cards, for cryptocurrency.
Cryptocurrencies do not launder money — they fight against money laundering
As you can see, while cryptocurrencies can be used for money laundering, they are ill suited to this purpose. Moreover, they actually work the other way around by increasing transparency, security and speed of payment transactions and giving users more independence. Coins like UMI are building an alternative financial system accessible to anyone, not a shadow market for laundering illegal money.
The fact is that today 99 % of laundered money passes through other channels, not cryptocurrencies. Criminals still prefer using fiat money for this purpose. Banking institution are their key accomplices, and the amounts of money they hide outmatches the overall capitalization of the cryptocurrency market. However, no one is threatening to prohibit banks.
At the same time, we hear all the time that cryptocurrencies should be banned or strictly regulated. Unfortunately, financial regulators and law enforcement agencies all over the world are sometimes obsessed with the idea of putting spokes in wheels for the usual people who use cryptocurrencies while also allowing bankers to launder trillions of dollars. Isn't it ironic?
UMI is fighting against this state of affairs. We're building a new, alternative and completely transparent financial system where any person on the globe can generate digital money and make instant, fast and free-of-charge payments.
To sum up, don't trust the negative publicity for cryptocurrencies Trust the facts. The negative publicity is mostly generated by people who are not happy that the existing financial system based on banks is gradually become a thing of the past while cryptocurrencies are growing rapidly. At any rate, the key point is that decentralized cryptocurrencies which belong to users from across the world cannot be banned, even from the technical point of view. Thus, there's nothing to fear and progress cannot be stopped.
Sincerely yours, UMI Team!
submitted by UMITop to u/UMITop [link] [comments]

CryptoSmarts 4: The Best Free Password Managers

CryptoSmarts 4: The Best Free Password Managers
MintDice is proud to bring you the fourth part of the CryptoSmarts series, a 100% unbiased/non-affiliate paid article set that will focus on relatively simple ways you can boost your privacy, take power away from overbearing governments and corporations while also doing relative good for society all at the same time with minimal effort. Rest assured that anything suggested here is solely for your own benefit.
In this article, we'll take a deep dive into password managers, which applications to go for, how to optimize your password managers and which ones to avoid. It's of increasing importance for all users to adopt a password manager because commonly used passwords and repeated use of log-in + password combinations are the two weakest points in any normal individual's security online. Meanwhile, memorizing dozens of unique and complex passwords is beyond the scope of what most people can do, especially long term. Thus password managers have been created as a way to store multiple passwords into a single file that can help ensure your security and privacy online.
For a little encouragement, we'll share the now extremely famous dialogue between Edward Snowden and John Oliver talking about passwords. As should be painfully obvious by now, password managers are one of the best solutions to this entire dilemma.

https://preview.redd.it/ribbtjwz1it51.png?width=1000&format=png&auto=webp&s=3c3a9a31bdb8c4f9ec83bea98638fec5dd78b38f

PASSWORD MANAGER BASICS

We should first note that not all password managers are created the same as we've noted with software across all of our other articles. By and large, we'll be looking for similar characteristics in our password managers as we would our other software which includes open sourced software protocols and best software security practices. And when it comes to Bitcoin, cryptocurrency and your entire life's work on the internet, there is a lot at stake here. I'd argue that it is more important for password managers than for any other application to make sure to get this one correct since it will have your entire livelihood on the line.
The very amazing thing with demanding open sourced software for your password manager is that it by definition will also be free at the most basic level. This is because if it weren't, all it would take would be someone to fork over a program to make it free. So you are in a sense getting the best of both worlds here; a free software that is also of the highest quality. Meanwhile, ironically, many of the more commonly known password managers like Dashlane or Lastpass use closed source software and often charge fees to use their service. Funnily enough, Lastpass, the password manager itself, was actually formerly hacked in the past. One could argue this at least in part had to do with it's closed source software since having open sourced software at least in part makes software more secure. In short, do not used these closed source services that are frequently advertised for on the web as they are detrimental to you in more ways than one.

RECOMMENDED BEST PASSWORD MANAGERS

Bitwarden is our first recommendation. Bitwarden is truly one of the all time greats by approaching password management on the individual, team and even enterprise level to create a one size fits all solution. Bitwarden is compatible on virtually all devices out there from all desktops to mobile devices and so forth. Additionally, while they offer a centralized cloud service for free, Bitwarden is also set up to allow you to run your own private server to keep your own key base entirely under your own control, fully encrypted.

https://preview.redd.it/zmlkf5d12it51.jpg?width=770&format=pjpg&auto=webp&s=02998b777d05ab00557a97c616a4b0d505b324aa
Next up we have KeePassXC which is a fork of one of the longest standing password managers in existence, formerly known as KeePass that halted a lot of it's ongoing development some time ago. KeePassXC was created as a locally held password manager application that could work across platforms. Unlike Bitwarden where your key file is held in cloud storage, KeePassXC is simply a program client and a local file that you must maintain and backup yourself. This has some pros and cons. The good news is that you have full control of everything related to KeePassXC as the program under most situations will not be talking to any online server which could expose private or sensitive information. The bad news is that if you ever were to lose control of your key file, you are completely out of luck. For this reason, it's imperative to back up your encrypted key file in multiple locations to protect against what would be catastrophic loss. You can do this with USB drives, e-mail accounts, cloud storage, safe deposit boxes or a whole host of other creative solutions that you might come up with.
The final recommended option is LessPass. LessPass is very interesting technology because it is a no-knowledge password manager. By inputting a few pieces of information which could be a master password in conjunction with an e-mail address or user name, a password is automatically attached to any URL address. It will simply cross all of these pieces of information via PBKDF2 and SHA-256 to produce random yet consistent outputs for any of your web browsing. The advantage of this program is that it is extremely light weight, and so long as you can remember your e-mail address, account name and master password, you can now gain full access to everything around the internet without the need of any files. The downside is some level of control over password flexibility since the passwords are automatically generated for you.
In summation of these three options, BitWarden is the best overall password manager for most people's use cases. Meanwhile, LessPass is probably best suited for the most casual user who contains fewer accounts across the internet and wants something extremely simple and easy to use. Lastly, KeePassXC, will be the ultimate in privacy password manager technology and is best suited for those that are prepared to take the extra steps to ensure their key file is kept up to date as the months and years tick by.

https://preview.redd.it/r4icjup22it51.jpg?width=1920&format=pjpg&auto=webp&s=622cf1b967ec5622e3feb2b49e5ac29917629cdf

BEST PRACTICES WITH YOUR NEW PASSWORD MANAGER

Once you have chosen a password manager from the above list, it will be important to change all of your account passwords one by one to incorporate it into your new system. This will help you get away from your commonly used log-in and password combinations and over to your new, more secure and robust set up. With your new set up, if you have a key file to back up, you must now start getting in the habit of doing so, especially after major or important changes to your password manager. Or if you wish to use BItWarden with a private cloud server, make sure that that is fully set up and running.
Generally speaking, when choosing password length from your password manager for standard and robust security, 25 random characters, letters (and symbols if you wish, but they aren't necessary), is mostly considered to be uncrackable. This is because while every password is in theory beatable, it takes dramatically more computational energy over time to figure out what your password is, and at some point, it becomes unreasonable. That said, NSA grade security often holds itself up to 50 random characters which is considered to be unbreakable even on a government wide scale.
On that same token, you'll have to use a master password for your password manager. Given that you only need to know one password, it will now be extremely important to make this a very good password. Because a password that you need to remember most likely won't (or perhaps shouldn't) be completely random so that it's easy to remember, it should, at the very least, be long. I would suggest making sure that you come up with a master password that is at least 40 characters long or 125 bits of information. To check out how many bits of entropy your master password is, you can type it into the password field of KeePassXC and it will tell you roughly how secure your master password is. While 40 characters may seem like a lot, do keep in mind that this is now the only gateway between yourself and all of your access keys to all of your accounts held on this account.

Bits of Entropy Example on KeePassXC
Finally, it is worth investing in a YubiKey or similar 2-FA device if you can get one. This can apply to BitWarden and KeePassXC. With the normal password managers, a hacker will need access to not only your password but also your key file in order to have free reign over all of your accounts. However, a sophisticated hacker that has full access to your device with a keylogger could ultimately, in theory, compromise your full set up, and this would be disastrous for you. Fortunately, this can be resolved by buying and activating a Yubikey or other such device. The Yubikey example requires that a Yubikey, with a private key that you set up for your password manager, is present to access your database. Therefore, even if a hacker were to obtain your key file and your master password, they still won't be able gain access to your account. As a precaution, however, if you lose access to your Yubikey and/or private key, you too, will be locked out. Therefore, it is important to keep your Yubikey backed up and to keep extra copies available.

IN CONCLUSION

Owning Bitcoin or other cryptocurrencies comes with a lot of responsibility if you want to minimize risk. As does maintaining a strong hack-resistant presence online. One of the best defenses you can make is by implementing a password manager. Similar to the previous CryptoSmarts articles that we have written prior, it will take some small amount of set up work to get fully acclimated to your new system, but you'll thank yourself down the road that you have done this. And the sooner you start, the better, as things will only continue to get more complex, with more risk factors at play as the internet plays an ever increasing role in all of our day to day lives.
Finally, while the article is current as of the writing of the article, it will undoubtedly lose merit over time. Be sure to check if everything in this article is up to date or that any password manager that you select from this article continues development or continues to abide by the proper best practice principles.
If you enjoyed this article, we would encourage you to check out our other previous CryptoSmarts articles discussing private e-mails, secure messenger applications and proper web browsers.
submitted by MintDiceOfficial to MintDice [link] [comments]

Is PrimeXBT Safe for Canadian Traders?

Is PrimeXBT Safe for Canadian Traders?
https://preview.redd.it/vrq329h41vs51.png?width=1000&format=png&auto=webp&s=a9cdd74e5bfd8c7ca678fcb6663d37d87bc9f7b2
With the dramatic increase in the number of traders and investors in Canada that are using PrimeXBT, one question has been asked recently more than others which is whether PrimeXBT is safe for Canadian traders.
The number of Canadian users at PrimeXBT has been growing rapidly throughout 2020 as a sign that the tools and features on the platform are opening up new opportunities for interacting in the market in more optimal ways.
This guide covers whether or not PrimeXBT is safe for Canadian traders, and looks at some of the features and tools of the platform.
The Canadian Market in 2020
Like much of the rest of the world, the Canadian market has seen some of the highest levels of all volatility in 2020 that have been seen in many years, or even at all throughout the history of cryptocurrency.
The Canadian market has seen renewed growth following the contractions throughout 2018 and much of 2019 when the global bear market in the cryptocurrency space drove many retail investors back out of the market after the exponential growth of 2017.
This has led many Canadian traders to wonder whether we are on the brink of another major bull run as was seen both in 2017 as well as 2013, and that would potentially see the price of Bitcoin driven up to the range of $50,000 or more.
The Exponential Growth of PrimeXBT
With the backdrop of the excitement within the global cryptocurrency market in general, and the Canadian cryptocurrency market more specifically, PrimeXBT has been perfectly positioned for exponential growth since its launch in early 2018.
The platform initially launched at the start of 2018 with a waiting list of more than 150,000 traders, and this showed the interest in the platform that was present even before it came onto the market.
As a result of the unique tools and features provided by PrimeXBT, it has grown exponentially over the past few years to become the world’s leading multi-asset margin trading platform and today managing up to $2 billion worth of global trade every day.
What is PrimeXBT?

https://preview.redd.it/iax449j91vs51.png?width=1000&format=png&auto=webp&s=24ea73d33d4f74afedf75a55b5a51967e95dea04
PrimeXBT is a margin trading-centric platform that provides high leverage trading on a wide range of cryptoassets as well as many of the world’s leading traditional assets.
Traders at PrimeXBT are able to access up to 100X leverage on a wide range of cryptoassets that include BTC, ETH, XRP, LTC, and EOS.
This is whilst also being able to access up to 500X leverage on a range of traditional assets like stock indices such as the S&P500 and FTSE100, forex pairs such as USD/EUR and AUD/CAD, and commodities such as gold and oil.
PrimeXBT: Security Features
From a security perspective, PrimeXBT is one of the leading trading platforms in the crypto market, and has built a strong reputation for being a safe and reliable platform to trade on.
Much of this is as a result of the bank-grade security features that are implemented throughout PrimeXBT that include mandatory Bitcoin address whitelisting and hardware security modules with rating of FIPS PUB 140-2 Level 3 or higher.
By working to add advanced security solutions throughout its platform, PrimeXBT has shown a strong commitment to protecting the funds and data of its users.
PrimeXBT: Security Track Record
While there are many other platforms in the cryptocurrency space that have suffered devastating hacks over the past 2 or 3 years, PrimeXBT is one of a small number of top tier platforms that have remained hack-free throughout this period.
A good example of this is the Binance hack in 2019 that saw the platform lose more than $40 million of its users’ funds, and more recently the KuCoin hack where more than $150 million was lost by that platform.
In contrast, PrimeXBT has never been hacked and has never been breached by hackers and as such remains as one of the most trusted platforms in the market, having a clean security track record.
PrimeXBT: Excellent Customer Support
In 2019, a study of the top 5 crypto margin trading platforms found that PrimeXBT has the best customer service of all 5, and also was the only platform out of the 5 to have full marks for all for metrics.
These metrics were politeness, responsiveness, helpfulness, and the range of different communication channels that were available to users.
By having an excellent customer support structure, PrimeXBT has ensured that its users are able to get fast and easy solutions to the problems and that there is always a direct line of communication open with the admin at the platform to be able to effectively deal with any issues that arise.
Other Advantages of Using PrimeXBT
PrimeXBT also provides a number of other advantages that are unique to the platform including providing the lowest fee schedule of any major cryptocurrency trading platform in the market with a low flat rate of 0.05% applied to all trades, irrespective of the size of a trade or the asset being traded.
As well as this, PrimeXBT’s users can enjoy a robust trading engine that is built into the core of the PrimeXBT platform and that can execute up to 12,000 trades per second with an average trade time of less than 7.02 ms.
PrimeXBT also has a unique 4-tier referral program where the traders can generate revenue streams from direct referrals, as well as indirect referrals up to 4 levels deep, with this dramatically increasing the profitability of affiliate activities, and netting the top 3 affiliates on the platform more than $1 million in 2019.
In Summary
PrimeXBT is a safe and well-reputed trading platform for Canadian traders and this is the reason for its exponential growth of users and volume within Canada over the past months.
As well as being a safe platform to trade at, PrimeXBT also provides a range of unique tools and features to use in order to maximize profitability in the cryptocurrency and traditional asset markets.
To understand more about the security features on PrimeXBT that have protected its users, check out PrimeXBT’s Security page.
submitted by benebit to CryptocurrencyICO [link] [comments]

50 Free Courses & Best Selling Discounted

Here is another list of 50 Free & Best Selling Discounted courses
  1. [English] 2h 59m Complete SQL Bootcamp with MySQL, PHP & Python https://www.udemy.com/course/complete-sql-bootcamp-with-mysql-php-python/?couponCode=SQLSEPT2020 2 Days left at this price!
  2. [English] 1h 23m Agile Software Testing - Techniques and Tools https://www.udemy.com/course/agile-software-testing-techniques-and-tools/?couponCode=00533267C97F10EE5634 2 Days left at this price!
  3. [English] 2h 59m PMI-ACP Certification: Initiation and Requirements Gathering https://www.udemy.com/course/pmi-acp-certification-initiation-and-requirements-gathering/?couponCode=490FEB856DD5B5D48C4B 2 Days left at this price!
  4. [English] 3h 8m PMI-ACP Certification: The Scrum Development Process https://www.udemy.com/course/pmi-acp-certification-the-scrum-development-process/?couponCode=EA44639A0058D1848A9D 2 Days left at this price!
  5. [English] 2h 39m Operations Management: Supply Chains, Products and Services https://www.udemy.com/course/operations-management-supply-chains-products-and-services/?couponCode=83932A50D7BD7081EBBB 2 Days left at this price!
  6. [English] 3h 7m Sales and Business Case Development https://www.udemy.com/course/business-basic-learn-sales-and-business-case-development/?couponCode=06E7E8B54E012E8D2A2A 2 Days left at this price!
  7. [English] 2h 15m Learn HTML - For Beginners https://www.udemy.com/course/learn-html-for-beginners/?couponCode=YOUACCELSEPTEND 2 Days left at this price!
  8. [English] 3h 52m Internet and Web Development Fundamentals https://www.udemy.com/course/internet-and-web-development-fundamentals/?couponCode=YOUACCELSEPTEND 2 Days left at this price!
  9. [English] 5h 57m JavaScript, Bootstrap, & PHP - Certification for Beginners https://www.udemy.com/course/javascript-bootstrap-php-certification-for-beginners/?couponCode=YOUACCELSEPTEND 2 Days left at this price!
  10. [English] 2h 38m JavaScript & jQuery - Certification Course for Beginners https://www.udemy.com/course/javascript-jquery-certification-course-for-beginners/?couponCode=YOUACCELSEPTEND 2 Days left at this price!
  11. [English] 0h 37m Quick Guide: Setup a Local Testing Server using WAMP or MAMP https://www.udemy.com/course/quick-guide-setup-a-local-testing-server-using-wamp-or-mamp/?couponCode=YOUACCELSEPTEND 2 Days left at this price!
  12. [English] 2h 23m Learn XML-AJAX - For Beginners https://www.udemy.com/course/learn-xml-ajax-for-beginners/?couponCode=YOUACCELSEPTEND 2 Days left at this price!
  13. [English] 1h 49m Create a Members Only Blog using PHP, MySQL, & AJAX https://www.udemy.com/course/create-a-members-only-blog-using-php-mysql-ajax/?couponCode=YOUACCELSEPTEND 2 Days left at this price!
  14. [English] 3h 15m PHP & MySQL - Certification Course for Beginners https://www.udemy.com/course/php-mysql-certification-course-for-beginners/?couponCode=YOUACCELSEPTEND 2 Days left at this price!
  15. [Spanish] 0h 34m ¡Apréndetelo!- Técnicas de estudio, aprendizaje y memoria https://www.udemy.com/course/aprendetelo-tecnicas-de-aprendizaje-y-memoria/?couponCode=STICK10 1 Day left at this price!
  16. [English] 0h 59m How to Make Passive Income With Bitcoin Lending https://www.udemy.com/course/how-to-make-passive-income-with-bitcoin-lending/?couponCode=SEPTHRW2020 1 Day left at this price!
  17. [English] 0h 43m Color Correction & Grading with Adobe Premiere Pro 2020 https://www.udemy.com/course/color-correction-grading-with-adobe-premiere-pro/?couponCode=SEPTLIMT 1 Day left at this price!
  18. [Spanish] 8h 57m Microsoft Power BI - Curso de Power BI Desktop https://www.udemy.com/course/curso-microsoft-power-bi/?couponCode=SEP20-2 2 Days left at this price!
  19. [English] 0h 46m Mindfulness For Depression, Anxiety, PTSD, Stress Sampler https://www.udemy.com/course/mindfulness-for-depression-anxiety-ptsd-stress-sample?couponCode=7CF3459567C77678E42A 2 Days left at this price!
  20. [English] 9h 8m Adobe Premiere Pro CC 2020: Video Editing for Beginners https://www.udemy.com/course/premiere-pro-with-brad-newton/?couponCode=LOCKDOWN_SEPTEMBER 2 Days left at this price!
  21. [English] 0h 33m Download Royalty HD Images For Your Project - WEBSITE https://www.udemy.com/course/get-free-premium-quality-images-for-your-project-website/?couponCode=PLATINUM 2 Days left at this price!
  22. [English] 0h 56m Vegan Diet - Healthy Lifestyle https://www.udemy.com/course/vegan-vegetarian-diet-healthy-training/?couponCode=8B25BD8F7BCD94547AAB 2 Days left at this price!
  23. [English] 1h 7m Healthy Heart - Strengthen, Heal & Protect Your Heart https://www.udemy.com/course/healthy-heart-strengthen-heal-protect-tips-treatment/?couponCode=5979417420E3D3106DBE 2 Days left at this price!
  24. [English] 1h 2m Eczema Solution https://www.udemy.com/course/eczema-solution-treatment-tips-solution-training/?couponCode=3C1F1837B5EFBE19EF87 2 Days left at this price!
  25. [English] 0h 44m Remote Teaching Online // How To Record Lectures at Home https://www.udemy.com/course/remote-teaching-how-to-record-lectures-at-home/?couponCode=EECC3F3DFD229C336F14 2 Days left at this price!
  26. [English] 84h 46m Machine Learning MASTER, Zero To Mastery https://www.udemy.com/course/ml-maste?couponCode=DISCUDEMY.COM 2 Days left at this price!
  27. [Arabic] 1h 35m تعلم الهكر الأخلاقي https://www.udemy.com/course/arabic-ethical-hacking/?couponCode=FREEBESGLOBAL 1 Day left at this price!
  28. [English] 1h 46m Learn CSS - For Beginners https://www.udemy.com/course/learn-css-for-beginners/?couponCode=YOUACCELSEPTEND 2 Days left at this price!
  29. [English] 4h 0m Bootstrap & jQuery - Certification Course for Beginners https://www.udemy.com/course/bootstrap-jquery-certification-course-for-beginners/?couponCode=YOUACCELSEPTEND 2 Days left at this price!
  30. [Turkish] 15h 44m React JS :Uygulamalı React JS Eğitimi https://www.udemy.com/course/uygulamali-react-js-egitimi/?couponCode=REACTJSBEDAVA 1 Day left at this price!
  31. [English] 2h 4m Mastering Assertiveness: How to be more Assertive in Life https://www.udemy.com/course/mastering-assertiveness-how-to-be-more-assertive-in-life/?couponCode=C67A023CAAF22331F76B 1 Day left at this price!
  32. [English] 1h 44m How to Make Money Online for Beginners: Follow PROVEN STEPS! https://www.udemy.com/course/make-money-online-for-beginners/?couponCode=44F581314D68A600C9B6 2 Days left at this price!
  33. [English] 2h 10m Certified solid works associate preparation course (cswa) https://www.udemy.com/course/cswacertified-solid-works-associate-get-certified-for-your-skill/?couponCode=5E90BD9A0126C59DE876 1 Day left at this price!
  34. [English] 3h 31m Blissful Real Estate Investing https://www.udemy.com/course/blissful-real-estate-investing/?couponCode=BREIEXPSEPT242020 2 Days left at this price!
  35. [Turkish] 4h 13m c++ sıfırdan https://www.udemy.com/course/cppsifirdan/?couponCode=DISCUDEMYNEW 2 Days left at this price!
  36. [Turkish] 4h 18m Makine Mühendisleri için AutoCad https://www.udemy.com/course/sifirdan-autocad-makine-muhendisleri-icin/?couponCode=DISCUDEMMYNEW 2 Days left at this price!
  37. [English] 13h 26m Java for complete beginners(in depth, java and adv java) ) https://www.udemy.com/course/smt-java-advjava/?couponCode=JAVASMT210920 2 Days left at this price!
  38. [English] 2h 30m Basics Data Science with Numpy, Pandas and Matplotlib https://www.udemy.com/course/basics-data-science-with-numpy-pandas-and-matplotlib/?couponCode=D14200A3E47DC31605F9 1 Day left at this price!
  39. [English] 4h 28m Microsoft Excel -Basic Excel/ Advanced Excel Formulas https://www.udemy.com/course/microsoft-excel-basic-excel-advanced-excel-formulas/?couponCode=ECF7F33025B767C0C82A 2 Days left at this price!
  40. [English] 1h 40m Public Speaking: You Can Give Great Financial Presentations https://www.udemy.com/course/how-to-give-financial-presentations/?couponCode=1FF4E353E323C663A4D5 2 Days left at this price!
  41. [English] 0h 59m Sales Skills Training: Free Sales Generation Seminars https://www.udemy.com/course/how-to-deliver-a-free-sales-generation-semina?couponCode=E00F38AD0573F7B8A5B4 2 Days left at this price!
  42. [English] 1h 26m Public Speaking: You Can Speak to Large Audiences https://www.udemy.com/course/how-to-speak-to-large-audiences/?couponCode=171BD34D451ACD54C666 2 Days left at this price!
  43. [English] 0h 56m Communication Skills: Use a Teleprompter Effectively https://www.udemy.com/course/how-to-use-a-teleprompte?couponCode=CF92DA8309C0E71BCEB0 2 Days left at this price!
  44. [English] 0h 51m Public Speaking Contests: You Can Win https://www.udemy.com/course/how-to-win-a-public-speaking-contest/?couponCode=EF2742F9BE6FEDBB5BA9 2 Days left at this price!
  45. [English] 0h 58m Presentation Skills: Give a Great New Business Pitch https://www.udemy.com/course/how-to-give-a-new-business-pitch-presentation/?couponCode=C69C9D6DB752DB9B88FD 2 Days left at this price!
  46. [English] 0h 41m Public Speaking for Beginners https://www.udemy.com/course/public-speaking-for-beginners-al/?couponCode=1D190710EF55A1953106 2 Days left at this price!
  47. [English] 0h 53m Public Relations: Speak Effectively at Press Conferences https://www.udemy.com/course/how-to-speak-at-a-press-conference/?couponCode=5AE3D8F9245686FD00F3 2 Days left at this price!
  48. [English] 2h 57m Complete Hypnosis Weight Loss Course - Dieting Psychology https://www.udemy.com/course/complete-hypnosis-weight-loss-course-dieting-psychology/?couponCode=ACD790BBF53776D61DC9 2 Days left at this price!
  49. [English] 0h 40m Teacher Training - How to Teach Online - Remote Teaching 1Hr https://www.udemy.com/course/teacher-training-how-to-teach-online-remote-teaching-1h?couponCode=834FAD646BD46B70D115 2 Days left at this price!
  50. [English] 1h 34m QuantMaster - Ace the Interview Math https://www.udemy.com/course/quantmaster-ace-the-interview-math/?couponCode=312C5B504DD95E755B18 2 Days left at this price!
Best Selling Discounted Courses from $9.99
  1. [English] 13h 7m [NEW] AWS Certified Cloud Practitioner Exam Training 2020 $9.99 https://www.udemy.com/course/aws-certified-cloud-practitioner-training-course/?couponCode=AWSCLOUD-SEP
  2. [English] 23h 44m AWS Certified DevOps Engineer: Get 3 Certifications 2020 $9.99 https://www.udemy.com/course/aws-certified-devops-engineer-get-3-certifications/?couponCode=SEEKALL
  3. [English] 35h 53m Ultimate AWS Certified Developer Associate Masterclass 2020 $9.99 https://www.udemy.com/course/aws-certified-developer-associate-masterclass/?couponCode=SEEKDEV 3 Days left at this price!
  4. [English] 82h 20m Ultimate PHP, Laravel, CSS & Sass! Learn PHP, Laravel & Sass $11.39 https://www.udemy.com/course/ultimate-php-css-and-sass-enhance-your-javascript-skills/?couponCode=LEARN95
  5. [English] 31h 16m The Agile Methodology for Project Risk Managers $12.99 https://www.udemy.com/course/the-agile-methodology-for-project-risk-managers/?couponCode=STAYSAFESEPT
  6. [English] 26h 49m Leading Effective Meetings - You Can Lead Effective Meetings $12.99 https://www.udemy.com/course/leading-effective-meetings-you-can-lead-effective-meetings/?couponCode=THANKSSEP
  7. [English] 18h 3m AWS Rekognition: Machine Learning Using Python Masterclass $12.99 https://www.udemy.com/course/aws-rekognition-with-python/?couponCode=SEEKALL
  8. [English] [Code=SEEKALL] 34h 80 Discounted Udemy : AWS Certified Developer Associate (34 Hours), AWS Cloud Technology (24 Hours), AWS DevOps (23.5 Hours), AWS Certified Solutions Architect (13 Hours), PHP, Java, Ethical Hacking, Python & More $12.99 https://www.udemy.com/useclaydesk/ Code=SEEKALL
  9. [English] [Code=THANKSSEP] 34h 70 Best Selling Udemy Courses: Communication Skills, Presentation Skills, Public Speaking, Complete Freelancing, Body Language, Soft Skills & Many More $12.99 https://www.udemy.com/usetjwalker2/ Code=THANKSSEP
  10. [English] [Code=STAYSAFESEPT] 32h 100+ Courses – Agile (32 Hours), PMI-RMP/IIBA-ECBA (37 Hours) , Business Analysis (16.5 hours) , Operations Management (13.5 Hours) & More $12.99 https://www.udemy.com/usesorindumitrascu/ Code=STAYSAFESEPT
Eduonix Sitewide:
Buy 1 and Get 2nd at 50% OFF + 50% Extra Discount. Mix Match with Any of these Mighty Bundles or E- Degrees or Courses Sitewide
Use Code : APPLY50
  1. $63.75 ( $40 Cybersecurity E-Degree + $21.25 Mighty Cybersecurity Bundle ) APPLY50
  2. $60 ( $42.5 Mighty DevOps Bundle + $17.5 DevOps E-degree )
  3. $60 ( $42.5 Mighty JavaScript Bundle + $17.5 Fullstack JavaScript Developer E-Degree )
  4. $58.75 ( $40 Mighty Machine Learning Bundle + $18.75 Artificial Intelligence and Machine Learning E-Degree )
  5. $60 ( $40 Mighty Machine Learning Bundle + $20 Advance Artificial Intelligence & Machine Learning E-Degree )
  6. $63.75 ( $42.5 Mighty Web Development Bundle 2.0 + $21.25 Mighty Web Development Bundle )
submitted by ViralMedia007 to FREECoursesEveryday [link] [comments]

A note from moderator on "hacking" topic & script kiddies

This post goes beyond the general Termux discussions but since script kiddies are the real problem for our and similar communities. I have decided to clear up the subreddit rule under number 4 (no hacking/phishing), few details on current Automod setup and announce upcoming changes to its configuration.
First of all, here is our position regarding that topic:
As we respect privacy, we are not helping any people with hacking, phishing, spying and generally any activity involving unauthorized access to data or devices, disrupting someone's lives or business. Also we are not helping with installation, configuration and usage of utilities allowing to perform such actions. We do not care whether such activity is performed with or without permission, for education, pranking or whatever else.
Note that ethical hacking, i.e. discovering vulnerabilities and reporting them to affected parties is still ok.
So here is a list what SHOULD NEVER BE asked on our subreddit:
and any variations of these questions. And please, do not send me direct messages with same questions! - I will ignore them.
Ok, now about principles how Automod is configured currently:
Here are Automod changes that will be implemented soon:
And this is addressed to all script kiddies present in our subreddit:
/termux is not a place where your hacky/phishy interests will receive appreciation. Seek another community (in darknet/tor) where your activity will be ok. Otherwise work hard on your skills and at least try to not look like a baby with a new toy.
UPDATE (2020.06.26):
New automod configuration is active. It is more strict than was before. There can be false-positives, but most common should be already fixed.
submitted by xeffyr to termux [link] [comments]

How To End The Cryptocurrency Exchange "Wild West" Without Crippling Innovation


In case you haven't noticed the consultation paper, staff notice, and report on Quadriga, regulators are now clamping down on Canadian cryptocurrency exchanges. The OSC and other regulatory bodies are still interested in industry feedback. They have not put forward any official regulation yet. Below are some ideas/insights and a proposed framework.



Many of you have limited time to read the full proposal, so here are the highlights:

Offline Multi-Signature

Effective standards to prevent both internal and external theft. Exchange operators are trained and certified, and have a legal responsibility to users.

Regular Transparent Audits

Provides visibility to Canadians that their funds are fully backed on the exchange, while protecting privacy and sensitive platform information.

Insurance Requirements

Establishment of basic insurance standards/strategy, to expand over time. Removing risk to exchange users of any hot wallet theft.


Background and Justifications


Cold Storage Custody/Management
After reviewing close to 100 cases, all thefts tend to break down into more or less the same set of problems:
• Funds stored online or in a smart contract,
• Access controlled by one person or one system,
• 51% attacks (rare),
• Funds sent to the wrong address (also rare), or
• Some combination of the above.
For the first two cases, practical solutions exist and are widely implemented on exchanges already. Offline multi-signature solutions are already industry standard. No cases studied found an external theft or exit scam involving an offline multi-signature wallet implementation. Security can be further improved through minimum numbers of signatories, background checks, providing autonomy and legal protections to each signatory, establishing best practices, and a training/certification program.
The last two transaction risks occur more rarely, and have never resulted in a loss affecting the actual users of the exchange. In all cases to date where operators made the mistake, they've been fully covered by the exchange platforms.
• 51% attacks generally only occur on blockchains with less security. The most prominent cases have been Bitcoin Gold and Ethereum Classic. The simple solution is to enforce deposit limits and block delays such that a 51% attack is not cost-effective.
• The risk of transactions to incorrect addresses can be eliminated by a simple test transaction policy on large transactions. By sending a small amount of funds prior to any large withdrawals/transfers as a standard practice, the accuracy of the wallet address can be validated.
The proposal covers all loss cases and goes beyond, while avoiding significant additional costs, risks, and limitations which may be associated with other frameworks like SOC II.

On The Subject of Third Party Custodians
Many Canadian platforms are currently experimenting with third party custody. From the standpoint of the exchange operator, they can liberate themselves from some responsibility of custody, passing that off to someone else. For regulators, it puts crypto in similar categorization to oil, gold, and other commodities, with some common standards. Platform users would likely feel greater confidence if the custodian was a brand they recognized. If the custodian was knowledgeable and had a decent team that employed multi-sig, they could keep assets safe from internal theft. With the right protections in place, this could be a great solution for many exchanges, particularly those that lack the relevant experience or human resources for their own custody systems.
However, this system is vulnerable to anyone able to impersonate the exchange operators. You may have a situation where different employees who don't know each other that well are interacting between different companies (both the custodian and all their customers which presumably isn't just one exchange). A case study of what can go wrong in this type of environment might be Bitpay, where the CEO was tricked out of 5000 bitcoins over 3 separate payments by a series of emails sent legitimately from a breached computer of another company CEO. It's also still vulnerable to the platform being compromised, as in the really large $70M Bitfinex hack, where the third party Bitgo held one key in a multi-sig wallet. The hacker simply authorized the withdrawal using the same credentials as Bitfinex (requesting Bitgo to sign multiple withdrawal transactions). This succeeded even with the use of multi-sig and two heavily security-focused companies, due to the lack of human oversight (basically, hot wallet). Of course, you can learn from these cases and improve the security, but so can hackers improve their deception and at the end of the day, both of these would have been stopped by the much simpler solution of a qualified team who knew each other and employed multi-sig with properly protected keys. It's pretty hard to beat a human being who knows the business and the typical customer behaviour (or even knows their customers personally) at spotting fraud, and the proposed multi-sig means any hacker has to get through the scrutiny of 3 (or more) separate people, all of whom would have proper training including historical case studies.
There are strong arguments both for and against using use of third party custodians. The proposal sets mandatory minimum custody standards would apply regardless if the cold wallet signatories are exchange operators, independent custodians, or a mix of both.

On The Subject Of Insurance
ShakePay has taken the first steps into this new realm (congratulations). There is no question that crypto users could be better protected by the right insurance policies, and it certainly feels better to transact with insured platforms. The steps required to obtain insurance generally place attention in valuable security areas, and in this case included a review from CipherTrace. One of the key solutions in traditional finance comes from insurance from entities such as the CDIC.
However, historically, there wasn't found any actual insurance payout to any cryptocurrency exchange, and there are notable cases where insurance has not paid. With Bitpay, for example, the insurance agent refused because the issue happened to the third party CEO's computer instead of anything to do with Bitpay itself. With the Youbit exchange in South Korea, their insurance claim was denied, and the exchange ultimately ended up instead going bankrupt with all user's funds lost. To quote Matt Johnson in the original Lloyd's article: “You can create an insurance policy that protects no one – you know there are so many caveats to the policy that it’s not super protective.”
ShakePay's insurance was only reported to cover their cold storage, and “physical theft of the media where the private keys are held”. Physical theft has never, in the history of cryptocurrency exchange cases reviewed, been reported as the cause of loss. From the limited information of the article, ShakePay made it clear their funds are in the hands of a single US custodian, and at least part of their security strategy is to "decline[] to confirm the custodian’s name on the record". While this prevents scrutiny of the custodian, it's pretty silly to speculate that a reasonably competent hacking group couldn't determine who the custodian is. A far more common infiltration strategy historically would be social engineering, which has succeeded repeatedly. A hacker could trick their way into ShakePay's systems and request a fraudulent withdrawal, impersonate ShakePay and request the custodian to move funds, or socially engineer their way into the custodian to initiate the withdrawal of multiple accounts (a payout much larger than ShakePay) exploiting the standard procedures (for example, fraudulently initiating or override the wallet addresses of a real transfer). In each case, nothing was physically stolen and the loss is therefore not covered by insurance.
In order for any insurance to be effective, clear policies have to be established about what needs to be covered. Anything short of that gives Canadians false confidence that they are protected when they aren't in any meaningful way. At this time, the third party insurance market does not appear to provide adequate options or coverage, and effort is necessary to standardize custody standards, which is a likely first step in ultimately setting up an insurance framework.
A better solution compared to third party insurance providers might be for Canadian exchange operators to create their own collective insurance fund, or a specific federal organization similar to the CDIC. Such an organization would have a greater interest or obligation in paying out actual cases, and that would be it's purpose rather than maximizing it's own profit. This would be similar to the SAFU which Binance has launched, except it would cover multiple exchanges. There is little question whether the SAFU would pay out given a breach of Binance, and a similar argument could be made for a insurance fund managed by a collective of exchange operators or a government organization. While a third party insurance provider has the strong market incentive to provide the absolute minimum coverage and no market incentive to payout, an entity managed by exchange operators would have incentive to protect the reputation of exchange operators/the industry, and the government should have the interest of protecting Canadians.

On The Subject of Fractional Reserve
There is a long history of fractional reserve failures, from the first banks in ancient times, through the great depression (where hundreds of fractional reserve banks failed), right through to the 2008 banking collapse referenced in the first bitcoin block. The fractional reserve system allows banks to multiply the money supply far beyond the actual cash (or other assets) in existence, backed only by a system of debt obligations of others. Safely supporting a fractional reserve system is a topic of far greater complexity than can be addressed by a simple policy, and when it comes to cryptocurrency, there is presently no entity reasonably able to bail anyone out in the event of failure. Therefore, this framework is addressed around entities that aim to maintain 100% backing of funds.
There may be some firms that desire but have failed to maintain 100% backing. In this case, there are multiple solutions, including outside investment, merging with other exchanges, or enforcing a gradual restoration plan. All of these solutions are typically far better than shutting down the exchange, and there are multiple cases where they've been used successfully in the past.

Proof of Reserves/Transparency/Accountability
Canadians need to have visibility into the backing on an ongoing basis.
The best solution for crypto-assets is a Proof of Reserve. Such ideas go back all the way to 2013, before even Mt. Gox. However, no Canadian exchange has yet implemented such a system, and only a few international exchanges (CoinFloor in the UK being an example) have. Many firms like Kraken, BitBuy, and now ShakePay use the Proof of Reserve term to refer to lesser proofs which do not actually cryptographically prove the full backing of all user assets on the blockchain. In order for a Proof of Reserve to be effective, it must actually be a complete proof, and it needs to be understood by the public that is expected to use it. Many firms have expressed reservations about the level of transparency required in a complete Proof of Reserve (for example Kraken here). While a complete Proof of Reserves should be encouraged, and there are some solutions in the works (ie TxQuick), this is unlikely to be suitable universally for all exchange operators and users.
Given the limitations, and that firms also manage fiat assets, a more traditional audit process makes more sense. Some Canadian exchanges (CoinSquare, CoinBerry) have already subjected themselves to annual audits. However, these results are not presently shared publicly, and there is no guarantee over the process including all user assets or the integrity and independence of the auditor. The auditor has been typically not known, and in some cases, the identity of the auditor is protected by a NDA. Only in one case (BitBuy) was an actual report generated and publicly shared. There has been no attempt made to validate that user accounts provided during these audits have been complete or accurate. A fraudulent fractional exchange, or one which had suffered a breach they were unwilling to publicly accept (see CoinBene), could easily maintain a second set of books for auditors or simply exclude key accounts to pass an individual audit.
The proposed solution would see a reporting standard which includes at a minimum - percentage of backing for each asset relative to account balances and the nature of how those assets are stored, with ownership proven by the auditor. The auditor would also publicly provide a "hash list", which they independently generate from the accounts provided by the exchange. Every exchange user can then check their information against this public "hash list". A hash is a one-way form of encryption, which fully protects the private information, yet allows anyone who knows that information already to validate that it was included. Less experienced users can take advantage of public tools to calculate the hash from their information (provided by the exchange), and thus have certainty that the auditor received their full balance information. Easy instructions can be provided.
Auditors should be impartial, their identities and process public, and they should be rotated so that the same auditor is never used twice in a row. Balancing the cost of auditing against the needs for regular updates, a 6 month cycle likely makes the most sense.

Hot Wallet Management
The best solution for hot wallets is not to use them. CoinBerry reportedly uses multi-sig on all withdrawals, and Bitmex is an international example known for their structure devoid of hot wallets.
However, many platforms and customers desire fast withdrawal processes, and human validation has a cost of time and delay in this process.
A model of self-insurance or separate funds for hot wallets may be used in these cases. Under this model, a platform still has 100% of their client balance in cold storage and holds additional funds in hot wallets for quick withdrawal. Thus, the risk of those hot wallets is 100% on exchange operators and not affecting the exchange users. Since most platforms typically only have 1%-5% in hot wallets at any given time, it shouldn't be unreasonable to build/maintain these additional reserves over time using exchange fees or additional investment. Larger withdrawals would still be handled at regular intervals from the cold storage.
Hot wallet risks have historically posed a large risk and there is no established standard to guarantee secure hot wallets. When the government of South Korea dispatched security inspections to multiple exchanges, the results were still that 3 of them got hacked after the inspections. If standards develop such that an organization in the market is willing to insure the hot wallets, this could provide an acceptable alternative. Another option may be for multiple exchange operators to pool funds aside for a hot wallet insurance fund. Comprehensive coverage standards must be established and maintained for all hot wallet balances to make sure Canadians are adequately protected.

Current Draft Proposal

(1) Proper multi-signature cold wallet storage.
(a) Each private key is the personal and legal responsibility of one person - the “signatory”. Signatories have special rights and responsibilities to protect user assets. Signatories are trained and certified through a course covering (1) past hacking and fraud cases, (2) proper and secure key generation, and (3) proper safekeeping of private keys. All private keys must be generated and stored 100% offline by the signatory. If even one private keys is ever breached or suspected to be breached, the wallet must be regenerated and all funds relocated to a new wallet.
(b) All signatories must be separate background-checked individuals free of past criminal conviction. Canadians should have a right to know who holds their funds. All signing of transactions must take place with all signatories on Canadian soil or on the soil of a country with a solid legal system which agrees to uphold and support these rules (from an established white-list of countries which expands over time).
(c) 3-5 independent signatures are required for any withdrawal. There must be 1-3 spare signatories, and a maximum of 7 total signatories. The following are all valid combinations: 3of4, 3of5, 3of6, 4of5, 4of6, 4of7, 5of6, or 5of7.
(d) A security audit should be conducted to validate the cold wallet is set up correctly and provide any additional pertinent information. The primary purpose is to ensure that all signatories are acting independently and using best practices for private key storage. A report summarizing all steps taken and who did the audit will be made public. Canadians must be able to validate the right measures are in place to protect their funds.
(e) There is a simple approval process if signatories wish to visit any country outside Canada, with a potential whitelist of exempt countries. At most 2 signatories can be outside of aligned jurisdiction at any given time. All exchanges would be required to keep a compliant cold wallet for Canadian funds and have a Canadian office if they wish to serve Canadian customers.
(2) Regular and transparent solvency audits.
(a) An audit must be conducted at founding, after 3 months of operation, and at least once every 6 months to compare customer balances against all stored cryptocurrency and fiat balances. The auditor must be known, independent, and never the same twice in a row.
(b) An audit report will be published featuring the steps conducted in a readable format. This should be made available to all Canadians on the exchange website and on a government website. The report must include what percentage of each customer asset is backed on the exchange, and how those funds are stored.
(c) The auditor will independently produce a hash of each customer's identifying information and balance as they perform the audit. This will be made publicly available on the exchange and government website, along with simplified instructions that each customer can use to verify that their balance was included in the audit process.
(d) The audit needs to include a proof of ownership for any cryptocurrency wallets included. A satoshi test (spending a small amount) or partially signed transaction both qualify.
(e) Any platform without 100% reserves should be assessed on a regular basis by a government or industry watchdog. This entity should work to prevent any further drop, support any private investor to come in, or facilitate a merger so that 100% backing can be obtained as soon as possible.
(3) Protections for hot wallets and transactions.
(a) A standardized list of approved coins and procedures will be established to constitute valid cold storage wallets. Where a multi-sig process is not natively available, efforts will be undertaken to establish a suitable and stable smart contract standard. This list will be expanded and improved over time. Coins and procedures not on the list are considered hot wallets.
(b) Hot wallets can be backed by additional funds in cold storage or an acceptable third-party insurance provider with a comprehensive coverage policy.
(c) Exchanges are required to cover the full balance of all user funds as denominated in the same currency, or double the balance as denominated in bitcoin or CAD using an established trading rate. If the balance is ever insufficient due to market movements, the firm must rectify this within 24 hours by moving assets to cold storage or increasing insurance coverage.
(d) Any large transactions (above a set threshold) from cold storage to any new wallet addresses (not previously transacted with) must be tested with a smaller transaction first. Deposits of cryptocurrency must be limited to prevent economic 51% attacks. Any issues are to be covered by the exchange.
(e) Exchange platforms must provide suitable authentication for users, including making available approved forms of two-factor authentication. SMS-based authentication is not to be supported. Withdrawals must be blocked for 48 hours in the event of any account password change. Disputes on the negligence of exchanges should be governed by case law.

Steps Forward

Continued review of existing OSC feedback is still underway. More feedback and opinions on the framework and ideas as presented here are extremely valuable. The above is a draft and not finalized.
The process of further developing and bringing a suitable framework to protect Canadians will require the support of exchange operators, legal experts, and many others in the community. The costs of not doing such are tremendous. A large and convoluted framework, one based on flawed ideas or implementation, or one which fails to properly safeguard Canadians is not just extremely expensive and risky for all Canadians, severely limiting to the credibility and reputation of the industry, but an existential risk to many exchanges.
The responsibility falls to all of us to provide our insight and make our opinions heard on this critical matter. Please take the time to give your thoughts.
submitted by azoundria2 to QuadrigaInitiative [link] [comments]

RESEARCH REPORT ABOUT KYBER NETWORK

RESEARCH REPORT ABOUT KYBER NETWORK
Author: Gamals Ahmed, CoinEx Business Ambassador

https://preview.redd.it/9k31yy1bdcg51.jpg?width=936&format=pjpg&auto=webp&s=99bcb7c3f50b272b7d97247b369848b5d8cc6053

ABSTRACT

In this research report, we present a study on Kyber Network. Kyber Network is a decentralized, on-chain liquidity protocol designed to make trading tokens simple, efficient, robust and secure.
Kyber design allows any party to contribute to an aggregated pool of liquidity within each blockchain while providing a single endpoint for takers to execute trades using the best rates available. We envision a connected liquidity network that facilitates seamless, decentralized cross-chain token swaps across Kyber based networks on different chains.
Kyber is a fully on-chain liquidity protocol that enables decentralized exchange of cryptocurrencies in any application. Liquidity providers (Reserves) are integrated into one single endpoint for takers and users. When a user requests a trade, the protocol will scan the entire network to find the reserve with the best price and take liquidity from that particular reserve.

1.INTRODUCTION

DeFi applications all need access to good liquidity sources, which is a critical component to provide good services. Currently, decentralized liquidity is comprised of various sources including DEXes (Uniswap, OasisDEX, Bancor), decentralized funds and other financial apps. The more scattered the sources, the harder it becomes for anyone to either find the best rate for their trade or to even find enough liquidity for their need.
Kyber is a blockchain-based liquidity protocol that aggregates liquidity from a wide range of reserves, powering instant and secure token exchange in any decentralized application.
The protocol allows for a wide range of implementation possibilities for liquidity providers, allowing a wide range of entities to contribute liquidity, including end users, decentralized exchanges and other decentralized protocols. On the taker side, end users, cryptocurrency wallets, and smart contracts are able to perform instant and trustless token trades at the best rates available amongst the sources.
The Kyber Network is project based on the Ethereum protocol that seeks to completely decentralize the exchange of crypto currencies and make exchange trustless by keeping everything on the blockchain.
Through the Kyber Network, users should be able to instantly convert or exchange any crypto currency.

1.1 OVERVIEW ABOUT KYBER NETWORK PROTOCOL

The Kyber Network is a decentralized way to exchange ETH and different ERC20 tokens instantly — no waiting and no registration needed.
Using this protocol, developers can build innovative payment flows and applications, including instant token swap services, ERC20 payments, and financial DApps — helping to build a world where any token is usable anywhere.
Kyber’s fully on-chain design allows for full transparency and verifiability in the matching engine, as well as seamless composability with DApps, not all of which are possible with off-chain or hybrid approaches. The integration of a large variety of liquidity providers also makes Kyber uniquely capable of supporting sophisticated schemes and catering to the needs of DeFi DApps and financial institutions. Hence, many developers leverage Kyber’s liquidity pool to build innovative financial applications, and not surprisingly, Kyber is the most used DeFi protocol in the world.
The Kyber Network is quite an established project that is trying to change the way we think of decentralised crypto currency exchange.
The Kyber Network has seen very rapid development. After being announced in May 2017 the testnet for the Kyber Network went live in August 2017. An ICO followed in September 2017, with the company raising 200,000 ETH valued at $60 million in just one day.
The live main net was released in February 2018 to whitelisted participants, and on March 19, 2018, the Kyber Network opened the main net as a public beta. Since then the network has seen increasing growth, with network volumes growing more than 500% in the first half of 2019.
Although there was a modest decrease in August 2019 that can be attributed to the price of ETH dropping by 50%, impacting the overall total volumes being traded and processed globally.
They are developing a decentralised exchange protocol that will allow developers to build payment flows and financial apps. This is indeed quite a competitive market as a number of other such protocols have been launched.
In Brief - Kyber Network is a tool that allows anyone to swap tokens instantly without having to use exchanges. - It allows vendors to accept different types of cryptocurrency while still being paid in their preferred crypto of choice. - It’s built primarily for Ethereum, but any smart-contract based blockchain can incorporate it.
At its core, Kyber is a decentralized way to exchange ETH and different ERC20 tokens instantly–no waiting and no registration needed. To do this Kyber uses a diverse set of liquidity pools, or pools of different crypto assets called “reserves” that any project can tap into or integrate with.
A typical use case would be if a vendor allowed customers to pay in whatever currency they wish, but receive the payment in their preferred token. Another example would be for Dapp users. At present, if you are not a token holder of a certain Dapp you can’t use it. With Kyber, you could use your existing tokens, instantly swap them for the Dapp specific token and away you go.
All this swapping happens directly on the Ethereum blockchain, meaning every transaction is completely transparent.

1.1.1 WHY BUILD THE KYBER NETWORK?

While crypto currencies were built to be decentralized, many of the exchanges for trading crypto currencies have become centralized affairs. This has led to security vulnerabilities, with many exchanges becoming the victims of hacking and theft.
It has also led to increased fees and costs, and the centralized exchanges often come with slow transfer times as well. In some cases, wallets have been locked and users are unable to withdraw their coins.
Decentralized exchanges have popped up recently to address the flaws in the centralized exchanges, but they have their own flaws, most notably a lack of liquidity, and often times high costs to modify trades in their on-chain order books.

Some of the Integrations with Kyber Protocol
The Kyber Network was formed to provide users with a decentralized exchange that keeps everything right on the blockchain, and uses a reserve system rather than an order book to provide high liquidity at all times. This will allow for the exchange and transfer of any cryptocurrency, even cross exchanges, and costs will be kept at a minimum as well.
The Kyber Network has three guiding design philosophies since the start:
  1. To be most useful the network needs to be platform-agnostic, which allows any protocol or application the ability to take advantage of the liquidity provided by the Kyber Network without any impact on innovation.
  2. The network was designed to make real-world commerce and decentralized financial products not only possible but also feasible. It does this by allowing for instant token exchange across a wide range of tokens, and without any settlement risk.
  3. The Kyber Network was created with ease of integration as a priority, which is why everything runs fully on-chain and fully transparent. Kyber is not only developer-friendly, but is also compatible with a wide variety of systems.

1.1.2 WHO INVENTED KYBER?

Kyber’s founders are Loi Luu, Victor Tran, Yaron Velner — CEO, CTO, and advisor to the Kyber Network.

1.1.3 WHAT DISTINGUISHES KYBER?

Kyber’s mission has always been to integrate with other protocols so they’ve focused on being developer-friendly by providing architecture to allow anyone to incorporate the technology onto any smart-contract powered blockchain. As a result, a variety of different dapps, vendors, and wallets use Kyber’s infrastructure including Set Protocol, bZx, InstaDApp, and Coinbase wallet.
Besides, dapps, vendors, and wallets, Kyber also integrates with other exchanges such as Uniswap — sharing liquidity pools between the two protocols.
A typical use case would be if a vendor allowed customers to pay in whatever currency they wish, but receive the payment in their preferred token. Another example would be for Dapp users. At present, if you are not a token holder of a certain Dapp you can’t use it. With Kyber, you could use your existing tokens, instantly swap them for the Dapp specific token and away you go.
Limit orders on Kyber allow users to set a specific price in which they would like to exchange a token instead of accepting whatever price currently exists at the time of trading. However, unlike with other exchanges, users never lose custody of their crypto assets during limit orders on Kyber.
The Kyber protocol works by using pools of crypto funds called “reserves”, which currently support over 70 different ERC20 tokens. Reserves are essentially smart contracts with a pool of funds. Different parties with different prices and levels of funding control all reserves. Instead of using order books to match buyers and sellers to return the best price, the Kyber protocol looks at all the reserves and returns the best price among the different reserves. Reserves make money on the “spread” or differences between the buying and selling prices. The Kyber wants any token holder to easily convert one token to another with a minimum of fuss.

1.2 KYBER PROTOCOL

The protocol smart contracts offer a single interface for the best available token exchange rates to be taken from an aggregated liquidity pool across diverse sources. ● Aggregated liquidity pool. The protocol aggregates various liquidity sources into one liquidity pool, making it easy for takers to find the best rates offered with one function call. ● Diverse sources of liquidity. The protocol allows different types of liquidity sources to be plugged into. Liquidity providers may employ different strategies and different implementations to contribute liquidity to the protocol. ● Permissionless. The protocol is designed to be permissionless where any developer can set up various types of reserves, and any end user can contribute liquidity. Implementations need to take into consideration various security vectors, such as reserve spamming, but can be mitigated through a staking mechanism. We can expect implementations to be permissioned initially until the maintainers are confident about these considerations.
The core feature that the Kyber protocol facilitates is the token swap between taker and liquidity sources. The protocol aims to provide the following properties for token trades: ● Instant Settlement. Takers do not have to wait for their orders to be fulfilled, since trade matching and settlement occurs in a single blockchain transaction. This enables trades to be part of a series of actions happening in a single smart contract function. ● Atomicity. When takers make a trade request, their trade either gets fully executed, or is reverted. This “all or nothing” aspect means that takers are not exposed to the risk of partial trade execution. ● Public rate verification. Anyone can verify the rates that are being offered by reserves and have their trades instantly settled just by querying from the smart contracts. ● Ease of integration. Trustless and atomic token trades can be directly and easily integrated into other smart contracts, thereby enabling multiple trades to be performed in a smart contract function.
How each actor works is specified in Section Network Actors. 1. Takers refer to anyone who can directly call the smart contract functions to trade tokens, such as end-users, DApps, and wallets. 2. Reserves refer to anyone who wishes to provide liquidity. They have to implement the smart contract functions defined in the reserve interface in order to be registered and have their token pairs listed. 3. Registered reserves refer to those that will be cycled through for matching taker requests. 4. Maintainers refer to anyone who has permission to access the functions for the adding/removing of reserves and token pairs, such as a DAO or the team behind the protocol implementation. 5. In all, they comprise of the network, which refers to all the actors involved in any given implementation of the protocol.
The protocol implementation needs to have the following: 1. Functions for takers to check rates and execute the trades 2. Functions for the maintainers to registeremove reserves and token pairs 3. Reserve interface that defines the functions reserves needs to implement
https://preview.redd.it/d2tcxc7wdcg51.png?width=700&format=png&auto=webp&s=b2afde388a77054e6731772b9115ee53f09b6a4a

1.3 KYBER CORE SMART CONTRACTS

Kyber Core smart contracts is an implementation of the protocol that has major protocol functions to allow actors to join and interact with the network. For example, the Kyber Core smart contracts provide functions for the listing and delisting of reserves and trading pairs by having clear interfaces for the reserves to comply to be able to register to the network and adding support for new trading pairs. In addition, the Kyber Core smart contracts also provide a function for takers to query the best rate among all the registered reserves, and perform the trades with the corresponding rate and reserve. A trading pair consists of a quote token and any other token that the reserve wishes to support. The quote token is the token that is either traded from or to for all trades. For example, the Ethereum implementation of the Kyber protocol uses Ether as the quote token.
In order to search for the best rate, all reserves supporting the requested token pair will be iterated through. Hence, the Kyber Core smart contracts need to have this search algorithm implemented.
The key functions implemented in the Kyber Core Smart Contracts are listed in Figure 2 below. We will visit and explain the implementation details and security considerations of each function in the Specification Section.

1.4 HOW KYBER’S ON-CHAIN PROTOCOL WORKS?

Kyber is the liquidity infrastructure for decentralized finance. Kyber aggregates liquidity from diverse sources into a pool, which provides the best rates for takers such as DApps, Wallets, DEXs, and End users.

1.4.1 PROVIDING LIQUIDITY AS A RESERVE

Anyone can operate a Kyber Reserve to market make for profit and make their tokens available for DApps in the ecosystem. Through an open reserve architecture, individuals, token teams and professional market makers can contribute token assets to Kyber’s liquidity pool and earn from the spread in every trade. These tokens become available at the best rates across DApps that tap into the network, making them instantly more liquid and useful.
MAIN RESERVE TYPES Kyber currently has over 45 reserves in its network providing liquidity. There are 3 main types of reserves that allow different liquidity contribution options to suit the unique needs of different providers. 1. Automated Price Reserves (APR) — Allows token teams and users with large token holdings to have an automated yet customized pricing system with low maintenance costs. Synthetix and Melon are examples of teams that run APRs. 2. Fed Price Reserves (FPR) — Operated by professional market makers that require custom and advanced pricing strategies tailored to their specific needs. Kyber alongside reserves such as OneBit, runs FPRs. 3. Bridge Reserves (BR) — These are specialized reserves meant to bring liquidity from other on-chain liquidity providers like Uniswap, Oasis, DutchX, and Bancor into the network.

1.5 KYBER NETWORK ROLES

There Kyber Network functions through coordination between several different roles and functions as explained below: - Users — This entity uses the Kyber Network to send and receive tokens. A user can be an individual, a merchant, and even a smart contract account. - Reserve Entities — This role is used to add liquidity to the platform through the dynamic reserve pool. Some reserve entities are internal to the Kyber Network, but others may be registered third parties. Reserve entities may be public if the public contributes to the reserves they hold, otherwise they are considered private. By allowing third parties as reserve entities the network adds diversity, which prevents monopolization and keeps exchange rates competitive. Allowing third party reserve entities also allows for the listing of less popular coins with lower volumes. - Reserve Contributors — Where reserve entities are classified as public, the reserve contributor is the entity providing reserve funds. Their incentive for doing so is a profit share from the reserve. - The Reserve Manager — Maintains the reserve, calculates exchange rates and enters them into the network. The reserve manager profits from exchange spreads set by them on their reserves. They can also benefit from increasing volume by accessing the entire Kyber Network. - The Kyber Network Operator — Currently the Kyber Network team is filling the role of the network operator, which has a function to adds/remove Reserve Entities as well as controlling the listing of tokens. Eventually, this role will revert to a proper decentralized governance.

1.6 BASIC TOKEN TRADE

A basic token trade is one that has the quote token as either the source or destination token of the trade request. The execution flow of a basic token trade is depicted in the diagram below, where a taker would like to exchange BAT tokens for ETH as an example. The trade happens in a single blockchain transaction. 1. Taker sends 1 ETH to the protocol contract, and would like to receive BAT in return. 2. Protocol contract queries the first reserve for its ETH to BAT exchange rate. 3. Reserve 1 offers an exchange rate of 1 ETH for 800 BAT. 4. Protocol contract queries the second reserve for its ETH to BAT exchange rate. 5. Reserve 2 offers an exchange rate of 1 ETH for 820 BAT. 6. This process goes on for the other reserves. After the iteration, reserve 2 is discovered to have offered the best ETH to BAT exchange rate. 7. Protocol contract sends 1 ETH to reserve 2. 8. The reserve sends 820 BAT to the taker.

1.7 TOKEN-TO-TOKEN TRADE

A token-to-token trade is one where the quote token is neither the source nor the destination token of the trade request. The exchange flow of a token to token trade is depicted in the diagram below, where a taker would like to exchange BAT tokens for DAI as an example. The trade happens in a single blockchain transaction. 1. Taker sends 50 BAT to the protocol contract, and would like to receive DAI in return. 2. Protocol contract sends 50 BAT to the reserve offering the best BAT to ETH rate. 3. Protocol contract receives 1 ETH in return. 4. Protocol contract sends 1 ETH to the reserve offering the best ETH to DAI rate. 5. Protocol contract receives 30 DAI in return. 6. Protocol contract sends 30 DAI to the user.

2.KYBER NETWORK CRYSTAL (KNC) TOKEN

Kyber Network Crystal (KNC) is an ERC-20 utility token and an integral part of Kyber Network.
KNC is the first deflationary staking token where staking rewards and token burns are generated from actual network usage and growth in DeFi.
The Kyber Network Crystal (KNC) is the backbone of the Kyber Network. It works to connect liquidity providers and those who need liquidity and serves three distinct purposes. The first of these is to collect transaction fees, and a portion of every fee collected is burned, which keeps KNC deflationary. Kyber Network Crystals (KNC), are named after the crystals in Star Wars used to power light sabers.
The KNC also ensures the smooth operation of the reserve system in the Kyber liquidity since entities must use third-party tokens to buy the KNC that pays for their operations in the network.
KNC allows token holders to play a critical role in determining the incentive system, building a wide base of stakeholders, and facilitating economic flow in the network. A small fee is charged each time a token exchange happens on the network, and KNC holders get to vote on this fee model and distribution, as well as other important decisions. Over time, as more trades are executed, additional fees will be generated for staking rewards and reserve rebates, while more KNC will be burned. - Participation rewards — KNC holders can stake KNC in the KyberDAO and vote on key parameters. Voters will earn staking rewards (in ETH) - Burning — Some of the network fees will be burned to reduce KNC supply permanently, providing long-term value accrual from decreasing supply. - Reserve incentives — KNC holders determine the portion of network fees that are used as rebates for selected liquidity providers (reserves) based on their volume performance.

Finally, the KNC token is the connection between the Kyber Network and the exchanges, wallets, and dApps that leverage the liquidity network. This is a virtuous system since entities are rewarded with referral fees for directing more users to the Kyber Network, which helps increase adoption for Kyber and for the entities using the Network.
And of course there will soon be a fourth and fifth uses for the KNC, which will be as a staking token used to generate passive income, as well as a governance token used to vote on key parameters of the network.
The Kyber Network Crystal (KNC) was released in a September 2017 ICO at a price around $1. There were 226,000,000 KNC minted for the ICO, with 61% sold to the public. The remaining 39% are controlled 50/50 by the company and the founders/advisors, with a 1 year lockup period and 2 year vesting period.
Currently, just over 180 million coins are in circulation, and the total supply has been reduced to 210.94 million after the company burned 1 millionth KNC token in May 2019 and then its second millionth KNC token just three months later.
That means that while it took 15 months to burn the first million KNC, it took just 10 weeks to burn the second million KNC. That shows how rapidly adoption has been growing recently for Kyber, with July 2019 USD trading volumes on the Kyber Network nearly reaching $60 million. This volume has continued growing, and on march 13, 2020 the network experienced its highest daily trading activity of $33.7 million in a 24-hour period.
Currently KNC is required by Reserve Managers to operate on the network, which ensures a minimum amount of demand for the token. Combined with future plans for burning coins, price is expected to maintain an upward bias, although it has suffered along with the broader market in 2018 and more recently during the summer of 2019.
It was unfortunate in 2020 that a beginning rally was cut short by the coronavirus pandemic, although the token has stabilized as of April 2020, and there are hopes the rally could resume in the summer of 2020.

2.1 HOW ARE KNC TOKENS PRODUCED?

The native token of Kyber is called Kyber Network Crystals (KNC). All reserves are required to pay fees in KNC for the right to manage reserves. The KNC collected as fees are either burned and taken out of the total supply or awarded to integrated dapps as an incentive to help them grow.

2.2 HOW DO YOU GET HOLD OF KNC TOKENS?

Kyber Swap can be used to buy ETH directly using a credit card, which can then be used to swap for KNC. Besides Kyber itself, exchanges such as Binance, Huobi, and OKex trade KNC.

2.3 WHAT CAN YOU DO WITH KYBER?

The most direct and basic function of Kyber is for instantly swapping tokens without registering an account, which anyone can do using an Etheruem wallet such as MetaMask. Users can also create their own reserves and contribute funds to a reserve, but that process is still fairly technical one–something Kyber is working on making easier for users in the future.

2.4 THE GOAL OF KYBER THE FUTURE

The goal of Kyber in the coming years is to solidify its position as a one-stop solution for powering liquidity and token swapping on Ethereum. Kyber plans on a major protocol upgrade called Katalyst, which will create new incentives and growth opportunities for all stakeholders in their ecosystem, especially KNC holders. The upgrade will mean more use cases for KNC including to use KNC to vote on governance decisions through a decentralized organization (DAO) called the KyberDAO.
With our upcoming Katalyst protocol upgrade and new KNC model, Kyber will provide even more benefits for stakeholders. For instance, reserves will no longer need to hold a KNC balance for fees, removing a major friction point, and there will be rebates for top performing reserves. KNC holders can also stake their KNC to participate in governance and receive rewards.

2.5 BUYING & STORING KNC

Those interested in buying KNC tokens can do so at a number of exchanges. Perhaps your best bet between the complete list is the likes of Coinbase Pro and Binance. The former is based in the USA whereas the latter is an offshore exchange.
The trading volume is well spread out at these exchanges, which means that the liquidity is not concentrated and dependent on any one exchange. You also have decent liquidity on each of the exchange books. For example, the Binance BTC / KNC books are wide and there is decent turnover. This means easier order execution.
KNC is an ERC20 token and can be stored in any wallet with ERC20 support, such as MyEtherWallet or MetaMask. One interesting alternative is the KyberSwap Android mobile app that was released in August 2019.
It allows for instant swapping of tokens and has support for over 70 different altcoins. It also allows users to set price alerts and limit orders and works as a full-featured Ethereum wallet.

2.6 KYBER KATALYST UPGRADE

Kyber has announced their intention to become the de facto liquidity layer for the Decentralized Finance space, aiming to have Kyber as the single on-chain endpoint used by the majority of liquidity providers and dApp developers. In order to achieve this goal the Kyber Network team is looking to create an open ecosystem that garners trust from the decentralized finance space. They believe this is the path that will lead the majority of projects, developers, and users to choose Kyber for liquidity needs. With that in mind they have recently announced the launch of a protocol upgrade to Kyber which is being called Katalyst.
The Katalyst upgrade will create a stronger ecosystem by creating strong alignments towards a common goal, while also strengthening the incentives for stakeholders to participate in the ecosystem.
The primary beneficiaries of the Katalyst upgrade will be the three major Kyber stakeholders: 1. Reserve managers who provide network liquidity; 2. dApps that connect takers to Kyber; 3. KNC holders.
These stakeholders can expect to see benefits as highlighted below: Reserve Managers will see two new benefits to providing liquidity for the network. The first of these benefits will be incentives for providing reserves. Once Katalyst is implemented part of the fees collected will go to the reserve managers as an incentive for providing liquidity.
This mechanism is similar to rebates in traditional finance, and is expected to drive the creation of additional reserves and market making, which in turn will lead to greater liquidity and platform reach.
Katalyst will also do away with the need for reserve managers to maintain a KNC balance for use as network fees. Instead fees will be automatically collected and used as incentives or burned as appropriate. This should remove a great deal of friction for reserves to connect with Kyber without affecting the competitive exchange rates that takers in the system enjoy. dApp Integrators will now be able to set their own spread, which will give them full control over their own business model. This means the current fee sharing program that shares 30% of the 0.25% fee with dApp developers will go away and developers will determine their own spread. It’s believed this will increase dApp development within Kyber as developers will now be in control of fees.
KNC Holders, often thought of as the core of the Kyber Network, will be able to take advantage of a new staking mechanism that will allow them to receive a portion of network fees by staking their KNC and participating in the KyberDAO.

2.7 COMING KYBERDAO

With the implementation of the Katalyst protocol the KNC holders will be put right at the heart of Kyber. Holders of KNC tokens will now have a critical role to play in determining the future economic flow of the network, including its incentive systems.
The primary way this will be achieved is through KyberDAO, a way in which on-chain and off-chain governance will align to streamline cooperation between the Kyber team, KNC holders, and market participants.
The Kyber Network team has identified 3 key areas of consideration for the KyberDAO: 1. Broad representation, transparent governance and network stability 2. Strong incentives for KNC holders to maintain their stake and be highly involved in governance 3. Maximizing participation with a wide range of options for voting delegation
Interaction between KNC Holders & Kyber
This means KNC holders have been empowered to determine the network fee and how to allocate the fees to ensure maximum network growth. KNC holders will now have three fee allocation options to vote on: - Voting Rewards: Immediate value creation. Holders who stake and participate in the KyberDAO get their share of the fees designated for rewards. - Burning: Long term value accrual. The decreasing supply of KNC will improve the token appreciation over time and benefit those who did not participate. - Reserve Incentives:Value creation via network growth. By rewarding Kyber reserve managers based on their performance, it helps to drive greater volume, value, and network fees.

2.8 TRANSPARENCY AND STABILITY

The design of the KyberDAO is meant to allow for the greatest network stability, as well as maximum transparency and the ability to quickly recover in emergency situations. Initally the Kyber team will remain as maintainers of the KyberDAO. The system is being developed to be as verifiable as possible, while still maintaining maximum transparency regarding the role of the maintainer in the DAO.
Part of this transparency means that all data and processes are stored on-chain if feasible. Voting regarding network fees and allocations will be done on-chain and will be immutable. In situations where on-chain storage or execution is not feasible there will be a set of off-chain governance processes developed to ensure all decisions are followed through on.

2.9 KNC STAKING AND DELEGATION

Staking will be a new addition and both staking and voting will be done in fixed periods of times called “epochs”. These epochs will be measured in Ethereum block times, and each KyberDAO epoch will last roughly 2 weeks.
This is a relatively rapid epoch and it is beneficial in that it gives more rapid DAO conclusion and decision-making, while also conferring faster reward distribution. On the downside it means there needs to be a new voting campaign every two weeks, which requires more frequent participation from KNC stakeholders, as well as more work from the Kyber team.
Delegation will be part of the protocol, allowing stakers to delegate their voting rights to third-party pools or other entities. The pools receiving the delegation rights will be free to determine their own fee structure and voting decisions. Because the pools will share in rewards, and because their voting decisions will be clearly visible on-chain, it is expected that they will continue to work to the benefit of the network.

3. TRADING

After the September 2017 ICO, KNC settled into a trading price that hovered around $1.00 (decreasing in BTC value) until December. The token has followed the trend of most other altcoins — rising in price through December and sharply declining toward the beginning of January 2018.
The KNC price fell throughout all of 2018 with one exception during April. From April 6th to April 28th, the price rose over 200 percent. This run-up coincided with a blog post outlining plans to bring Bitcoin to the Ethereum blockchain. Since then, however, the price has steadily fallen, currently resting on what looks like a $0.15 (~0.000045 BTC) floor.
With the number of partners using the Kyber Network, the price may rise as they begin to fully use the network. The development team has consistently hit the milestones they’ve set out to achieve, so make note of any release announcements on the horizon.

4. COMPETITION

The 0x project is the biggest competitor to Kyber Network. Both teams are attempting to enter the decentralized exchange market. The primary difference between the two is that Kyber performs the entire exchange process on-chain while 0x keeps the order book and matching off-chain.
As a crypto swap exchange, the platform also competes with ShapeShift and Changelly.

5.KYBER MILESTONES

• June 2020: Digifox, an all-in-one finance application by popular crypto trader and Youtuber Nicholas Merten a.k.a DataDash (340K subs), integrated Kyber to enable users to easily swap between cryptocurrencies without having to leave the application. • June 2020: Stake Capital partnered with Kyber to provide convenient KNC staking and delegation services, and also took a KNC position to participate in governance. • June 2020: Outlined the benefits of the Fed Price Reserve (FPR) for professional market makers and advanced developers. • May 2020: Kyber crossed US$1 Billion in total trading volume and 1 Million transactions, performed entirely on-chain on Ethereum. • May 2020: StakeWith.Us partnered Kyber Network as a KyberDAO Pool Master. • May 2020: 2Key, a popular blockchain referral solution using smart links, integrated Kyber’s on-chain liquidity protocol for seamless token swaps • May 2020: Blockchain game League of Kingdoms integrated Kyber to accept Token Payments for Land NFTs. • May 2020: Joined the Zcash Developer Alliance , an invite-only working group to advance Zcash development and interoperability. • May 2020: Joined the Chicago DeFi Alliance to help accelerate on-chain market making for professionals and developers. • March 2020: Set a new record of USD $33.7M in 24H fully on-chain trading volume, and $190M in 30 day on-chain trading volume. • March 2020: Integrated by Rarible, Bullionix, and Unstoppable Domains, with the KyberWidget deployed on IPFS, which allows anyone to swap tokens through Kyber without being blocked. • February 2020: Popular Ethereum blockchain game Axie Infinity integrated Kyber to accept ERC20 payments for NFT game items. • February 2020: Kyber’s protocol was integrated by Gelato Finance, Idle Finance, rTrees, Sablier, and 0x API for their liquidity needs. • January 2020: Kyber Network was found to be the most used protocol in the whole decentralized finance (DeFi) space in 2019, according to a DeFi research report by Binance. • December 2019: Switcheo integrated Kyber’s protocol for enhanced liquidity on their own DEX. • December 2019: DeFi Wallet Eidoo integrated Kyber for seamless in-wallet token swaps. • December 2019: Announced the development of the Katalyst Protocol Upgrade and new KNC token model. • July 2019: Developed the Waterloo Bridge , a Decentralized Practical Cross-chain Bridge between EOS and Ethereum, successfully demonstrating a token swap between Ethereum to EOS. • July 2019: Trust Wallet, the official Binance wallet, integrated Kyber as part of its decentralized token exchange service, allowing even more seamless in-wallet token swaps for thousands of users around the world. • May 2019: HTC, the large consumer electronics company with more than 20 years of innovation, integrated Kyber into its Zion Vault Wallet on EXODUS 1 , the first native web 3.0 blockchain phone, allowing users to easily swap between cryptocurrencies in a decentralized manner without leaving the wallet. • January 2019: Introduced the Automated Price Reserve (APR) , a capital efficient way for token teams and individuals to market make with low slippage. • January 2019: The popular Enjin Wallet, a default blockchain DApp on the Samsung S10 and S20 mobile phones, integrated Kyber to enable in-wallet token swaps. • October 2018: Kyber was a founding member of the WBTC (Wrapped Bitcoin) Initiative and DAO. • October 2018: Developed the KyberWidget for ERC20 token swaps on any website, with CoinGecko being the first major project to use it on their popular site.

Full Article

submitted by CoinEx_Institution to kybernetwork [link] [comments]

Namecoin and the future of self-sovereign digital identity.

Namecoin's motto is "Bitcoin frees money – Namecoin frees DNS, identities, and other technologies."
biolizard89 has done fantastic work on the DNS part, but let's focus on the identity use case here. Recent events have convinced me that digital identity on the internet is broken. Consider:
What was true in 1993 when cartoonist Peter Steiner wrote "On the internet, nobody knows you are a dog" is still true today. The only difference is that identity is increasingly being weaponized using AI/ML so "On the internet, nobody knows you are a bot" would perhaps be more apt.
I read the following comment from a user on slashdot yesterday:
For the time being, you can assume that this comment was written by a human being. You can click on my username, look back at my history of posts, and go, "OK, here's a bunch of posts, by a person, going back more than a decade, to the TIME BEFORE BOTS." That is, before the first year of 2020.
Since humans are likely to adopt the majority opinion, bad actors find real value in being able to control the narrative online by surrounding the reader with manufactured opinions by bots that due to advances in ML/AI are quickly becoming indistinguishable from real users. This amounts to a Sybil attack on the minds of digital content consumers and poses major threat to the integrity of our social fabric.
Apart from the recent twitter incident used for scamming, nation states have been known to create massive bot armies of fake and hijacked user accounts to try and shift the narratives regarding the Hong Kong independence protests as well as national elections. This will only increase.
Currently, our digital identity is fragmented into silo's largely controlled by government institutions and mega corporations (FAANG) based on a "Trust us" model. As recent events have proven, this is a bad model and in dire need of improvement/replacement. IMHO we need to move from "Trust us" to a "Trust but verify" model where the user is in full control of their digital identity.
Namecoin can and should play an important role in building this 'web of trust composed of self-sovereign identities" as it is neutral (no owner), permissionless and secure (merge-mined). Daniel already developed a proof of concept with NameID but what can we do to take this further?
Personally I'd like to see users create Namecoin identities and link them to their social identities (e.g. Google, Facebook, Twitter, Reddit, etc). Then whenever they create content, they sign it with their private keys. This would allow a reader to verify the content was created by the user. Content verification would have stopped the recent twitter hack, because even if the hackers would have access to internal admin tools they would not have the private keys that the users produce valid content with. "Not your keys, not your content"
Content verification is only one part. Ideally a user would like to verify the integrity of the content creator as well. E.g. has this user passed human verification in any of the linked platforms? Does a trusted linked entity vouch for the reputation or integrity of this user (e.g. a government entity, financial entity or non-governmental organization?). This would require those platforms to allow linking of Namecoin ID with their Platform ID and allow lookup and signing of metadata provided by these platforms. (e.g. UserID Y is linked to PlatformID X and completed human verification on date Z, signed Twitter).
I image users could install an extension similar to uBlock or Privacy Badger that contains human curated blacklists and heuristics that operate on Namecoin entities to perform these checks and flag or filter content and users that fail integrity checks. This would allow a users to automatically weed out potential bots and trolls but keep full control of this process themselves, avoiding potential censorship if this task would fall on the platform owners themselves (something governments are pushing for).
We could take this even further and integrate Namecoin ID's in software and hardware devices as well. This could create chains of trust to verify the entire chain of content creation and manipulation to the final content posted on a social platform. Where every entity signs the resulting content. (E.g. camera -> photoshop -> twitter post)
Apart from signing content/messages (PGP style). Namecoin could perhaps also be used for managing identity tokens in a users 'Identity wallet'. Looking into my physical wallet this could include things like credit cards, insurance cards, government issued IDs, membership cards, transportation cards, key cards, etc. This could be done similar to 'colored coins' on Bitcoin. But would have to support some type of smart contract functionality to be useful (e.g. expiring tokens, etc).
I'm not a developer nor a technical writer, but I do think we need to think long and hard about how we can solve digital identity in a way that empowers users to trust and verify the content and identities of the peers we interact with online while also respecting privacy and preventing censorship by external parties. Namecoin could be the better path to building this web of trust, but given the current pace of AI/ML and the willingness by bad actors to weaponize it at scale against users interests we might not have much time. (Apologies for the rant!)
submitted by rmvaandr to Namecoin [link] [comments]

How to Cold Store Your Cryptocurrency for Safekeeping

According to CipherTrace (which specializes in litigation tools and services for cryptographic markets), between 2018 and 2019, the amount of theft from cryptographic wallets exceeds $2 billion. Thefts and break-ins are caused by a variety of reasons: simple incompetence in cryptographic storage, as well as by companies that provide storage services. It is not unusual for holders of crypto currency to lose access to their wallets by themselves, one of the last known cases occurred in Ireland: ,57 million dollars couldn’t be confiscated from a detained drug dealer, which were stored in bitcoins. The problem was that the wallets keys were lost.
The most secure way is a cold storage — all account data and private keys are kept offline and all transactions are manual. This storage method is great because it is fully protected from hacking and interception of data, but it is not suitable for those who make daily transfers of cryptocurrency, it is simply inconvenient.
If you compare “cold and hot” wallets, you can give a simple example: A hot wallet can be compared to a wallet that can be lost and stolen. But you can always access your funds. A cold wallet is safe, and access to it is not permanent. You can also take or put money, but it will require a special code.
In this article we will tell you about the most popular types of cold wallets and we will analyze their pros and cons.

Types of cold wallets

All cold wallets have one common thing — the data is stored offline. However, there are several types of cold wallets, which differ in the degree of protection, physical embodiment and cost of the wallet.

Desktop wallet

Desktop wallets are also known for a high level of protection, in addition to the ability to store crypto currency offline. There are so-called “light” wallets weighing less than 1 gb, and “heavy” wallets weighing more than 1 gb. Two of the desktop wallets can be distinguished:

Exodus Wallet

Multicurrency wallet. It was created in 2016 and supports more than 100 crypto currencies, since 2019 has a phone application. The wallet allows you to export private keys that are created locally, and then to upload them back. Private keys can be discounted to removable media and downloaded only when the transaction is completed. If the user decides to leave private keys on the same computer where the wallet is located, keys are securely encrypted. In order to use your wallet ,there is no need to register or to download the entire blockchain — synchronization is taking place online. In addition to wallet services Exodus Wallet provides an integrated crypto-exchange. The installation file weighs 85 mb.

Bitcoin Core

Bitcoin Core is the official Bitcoin wallet. The size of the wallet is 160 gb, but according to the developers of the company, it’s better to give it a separate winchester with the size of 500 gb. From the security viewpoint, it’s suggested to install a security code or a seed phrase, which may consist 8 words. It is also suggested to copy wallet.dat file. — private wallet key, which will allow you to restore access to your funds.

Hardware wallets

Appears like a regular flash drive with an interface (screen, control keys). This wallet can safely store information about the balance and keys, full functionality is available only when connected to a computer, but the latest models have a special button that allows you to confirm the transaction without connecting to a PC. Each time the device offers to generate a new code-password to confirm the transaction, which significantly reduces the probability of hacking. After generating the code, you need to set a mnemonic phrase (seed) — it consists of 12 or 24 words, which are not related to each other in any way. Such type of wallets has a special protection system that allows you to connect even to potentially infected PCs. The wallets themselves won’t be affected by malware.
The obvious cons of hardware wallets are the following:
  1. It is also possible to lose a device that is so small in size.
  2. A physical device can easily fail due to a variety of damages.
  3. It is not recommended to buy such wallets from “hand”, even from friends, as they can be pre-installed with malware.
As you can see, storing crypto currency with a hardware wallets is very safe and secure, however you should take care about the device. Many people who hold a large amount of crypto currency, in order to not to lose a hardware wallet, store it in a safe deposit box, depriving someone of access to it.

Popular Hardware Wallets models

Trezor One

The first hardware wallet produced in 2013 by the Czech company Satoshi Labs. The device has an OLED display with a pin code, public addresses and Seed phrases. Trezor One has won recognition from users due to its multicurrency and affordable price ($65), it is also considered one of the most secure hardware wallets.
Ledger Nano S
The wallet was released in 2016 by the French company Ledger SAS. Distinctive feature from the other wallets, is the Secure Element controller, which meets banking standards and is certified CC EAL 5+. Also, in order to work with each crypto currency you need to install a special application for this currency on the device, it is not quite convenient, however more secure. The average price of the device is $85.
KeepKey
The purse was released in 2015 in the U.S.. Distinctive feature is OLED display — 256 by 64 pixels. Due to this, you can fully see both the address of the wallet, and the seed phrase. Also, the wallet has a built-in exchange service ShapeShift — an opportunity to exchange crypto currency without entering the exchange. The average price of the device is $50.
BitBox01
Ionos Schnelly’s wallet was invented in Switzerland. In size it’s almost the most compact among all representatives of the hardware wallets. A distinctive feature is the availability of a backup — the card can be multiplied and kept in several places, by analogy with the seed-phrase. In November 2020, support for these wallets will be discontinued, but all owners will be given a 30% discount on the new model. The average price of the device is $55.
CoolWalletS
Developed in Taiwan by CoolBitX, which has long been manufacturing components for Visa and MasterCard. As well as Ledger Nano S has a security standard CC EAL 5+. This wallet works only through smartphones, connecting to them through Bluetooch. The average price of the device is $100.

Paper Wallet

In the age of technological process, plain paper has become a rather reliable method for storing cryptocurrency. With the help of special services, such as bitaddress.org, you can generate public and private keys, then writing them down on paper. You can also print keys as a QR code. To accept transactions with such a wallet, you provide the sender with a public key. To access the funds, you need to find any online wallet that supports your crypto currency. Enter your private key into your online wallet, thus integrating your funds into the system. However, you should understand that after this procedure your wallet will become “hot”.
The best of this storage method — paper wallet is free, its safety depends only from you. When storing a paper wallet to protect it from the fire, water and aging. Also, do not tell other people about where your paper wallet is hidden.
The disadvantages of this storage:
  1. If your wallet is lost, it will be impossible to restore it.
  2. Exposed to a physical damage.
  3. After sending the transaction, you will have to create a new cold wallet.

Offline transaction signature

For this storage method, you will need two PCs. The essence is that the secret keys are never in contact with the Internet, but are stored digitally. Offline transaction method is suitable for people who do not make a daily transactions and have an access to two devices. The process is below:
  1. A hot wallet is installed on a PC with the Internet. The transaction is created without entering private keys and authorization.
  2. The file with transaction is copied and transferred to the second PC without Internet, where private keys are stored.
  3. The transaction is signed offline, copied and transferred back to the PC with the Internet.
In fact, you can do it with one PC and a USB drive. The USB drive will store private keys. Also, you can create a transaction without entering private keys and authorization, after disconnecting the Internet, connect the flash drive, sign the transaction, turn on the Internet. In this case, you should take care of the antivirus system.
The disadvantages of this method:
  1. Using two PCs or a USB drive involves a lot of actions, which is time consuming.
  2. You need to back up your keys in case your PC or flash drive fails.

Multi-signature wallet

This method implies the creation of a wallet, which can be only withdrawn on condition that the transaction is verified by a predetermined number of users. The maximum number of users who can hold private keys of the wallet- is 15. It is considered as one of the most reliable ways of storage, in fact private keys are not only stored offline, but also divided between different people. Often the wallet with multisignatures is used by large crypto-companies, whose management believes that individually employees can not spend the budget. Moreover, when creating this wallet, the number of required multisignatures is minimal. For example: if one of the six keys is lost, the remaining ones will be enough for the transaction.
The disadvantages of this storage:
  1. If most of the keys are lost, access to the funds cannot be restored.
  2. You will not be able to make transactions on your own without the participation of other key holders.

Private Key Fragmentation

The private wallet key consists of 64 symbols. The key is divided into several fragments. They don’t represent anything separately, but if you put all the fragments together, you can access the funds. The key fragments are similar to multisignatures, but in this case you don’t need a multisig-wallet, and the whole process can be done manually.
The disadvantages of this method:
  1. If one fragment is lost, access to funds will be lost.
  2. The maximum level of protection can only be reached when key fragments are distributed to different places, for example: bookshelf, safe deposit box, car. If you divide the key fragments and put them in different boxes — the required level of protection will not be achieved.
When writing down key fragments on paper, protect the key from fire, water and aging.

Conclusion

Digital currencies are not physically expressed and exist only in the digital code, so cold wallets that doesn’t have an access to the Internet, protect cryptocurrencies from the most important and common problem — hacker theft. However, holders of cold wallets need to understand that the safety of a private key depends only on them. There are different ways to store private keys outside the network, but each of them makes it difficult for the user to make transactions.
Hardware wallets that have been specifically designed for this purpose are considered to be the best option for storing cryptocurrencies. With their help it is possible both to store funds off the network and to make transactions easily, without risking the safety of a private key. If you use other cold wallets, it is recommended to combine them with hot wallets. Keep the required crypto currency for daily transfers on hot wallets, and keep all other crypto on cold wallets.
Please don’t forget to follow us on Telegram and stay updated!
YOUR CRYPTO BOSS
submitted by yourcryptoboss19 to u/yourcryptoboss19 [link] [comments]

Why did I build AmputatorBot?

Why did I build AmputatorBot?
AmputatorBot.com | Remove AMP from URLs in just one click! - More info
Open-sourced on GitHub - More info
Summon AmputatorBot by mentioning it like this: u/AmputatorBot

Why AMP is a threat to the Open Web

What is AMP?
AMP is an open-source web component framework developed by the AMP Open Source Project, first announced by Google in 2015 as a reaction to Facebook’s Instant Articles and Apple News. While it was originally aimed at accelerating mobile pages (hence AMP), it’s now a much broader project aimed at improving the UX of websites, stories, ads and mail. The AMP framework consists of three components: AMP HTML, which is standard HTML markup with web components; AMP JavaScript, which manages resource loading; and AMP caches, which serves and validates AMP pages.
In plain English: AMP is Google’s attempt at making pages (and more) faster. They did a good job, pages built with the AMP framework will normally load faster. However, as this article explains, you won’t notice much of a difference unless the AMP library is served using the AMP cache, but more on that later.
The controversies with cached AMP pages
The AMP format is itself not much of a problem. In fact, we should applaud search engines that give ranking preference to fast-loading pages like AMP, but four aspects of its implementation are flawed:
  1. Google mobile Search’s Top Stories carousel has a premium position above of all other results, which is only accessible for AMP pages. These pages have to use a technology that was build and maintained mostly by Google (of the top 10 contributors to the AMP project on GitHub, 9 are Google employees), are then served by Google from their infrastructure and placed within a Google controlled user experience. And since this carousel generates a lot of clicks and revenue, publishers are left no choice but to embrace AMP. This has the effect of further reinforcing Google’s dominance of the Web. Fortunately, Google has announced that it's working on opening up the Top Stories carousel to non-AMP pages in 2021.
  2. The biggest performance boost doesn’t come from the AMP framework, but from preloading the page. It begs the question: Should preloading really be exclusive to AMP? They could introduce a way for publishers to allow or disallow preloading and if Google sees fit, they could preload those pages too, alongside AMP.
  3. When a user navigates from Google to a piece of content Google has recommended (or when a user clicks on a shared cached AMP link), they are, unwittingly, remaining within Google’s ecosystem and the publisher’s domain is obscured by the google.com/amp prefix. To work around this Google introduced Signed HTTP Exchanges ([Draft], [1], [2]), a web-standard that allows the browser to display the original site's URL, instead of the actual one (the one with the google.com/prefix). This would solve the original issue, but while doing so it introduced new ones (e.g. it obfuscates the fact that they're delivering the AMP page you're visiting). Interestingly enough, Google's Chrome already has support for this technology, but parties not involved with AMP are not so enthusiastic: Mozilla has deemed it a harmful web standard [2], and Apple has taken a similar stance.
  4. Google’s entire business model is about collecting as much personal data as possible, AMP is just another tool to do so. As described in Google’s Support article:
“When you use the Google AMP Viewer, Google and the publisher that made the AMP page may each collect data about you.”
The controversies with non-cached AMP pages
To be clear, the above flaws are only with AMP pages cached by Google (or another party like Bing or Cloudflare) but there are also plenty of pages simply utilizing the AMP framework, recognized by URLs such as bbc.com/news/amp/. However, these are also problematic, mainly because there's only a small performance improvement when AMP pages aren't cached and AMP pages tend to be less feature-rich and less diverse than their originals. And in some edge cases, it breaks stuff.
One could argue that the more popular the AMP framework becomes, the more AMP threatens the open web. That said, it should be clear that the biggest problem lies with the cached AMP pages.
AMP is open source, but that doesn't make it holy. Or as Ferdy Christant puts it quite nicely in his blog:
Google’s main defense is that AMP is open source. Which isn’t just a weak defense, it’s no defense at all. I can open source a plan for genocide. The term “open source” is meaningless if the thing that is open source is harmful.
Just so we’re clear, I’m not claiming Google or the AMP project is evil (hell, they might even have good intentions!), but the fact is that AMP and it's implementation have some major flaws that threaten the Open Web. And as long as that's the case, AmputatorBot will be there to remove AMP from your URLs.
AmputatorBot scans for AMP pages on Reddit and replies with the canonical version
Learn more
Up next for the nerds among us:
  • AmputatorBot.com
  • Automatic working subreddits
  • Non-working subreddits
  • Changelog
  • Opt-out & opt-back-in
  • Browser extension
  • Support the project by donating, giving feedback, summoning the bot or spreading the word

AmputatorBot.com

Remove AMP in just one click with www.AmputatorBot.com! This is a free online tool (no ads) to remove AMP from your URLs. All you have to do is to copy paste an AMP URL, click the conversion-button and that's all! For more (background) info, check out this post. Here's a quick (no but literally) demo:
A demo of the AMP-removal process over at AmputatorBot.com
Alternatively, you can do it even quicker by doing this:
https://amputatorbot.com/?https://www.google.com/amp/s/electrek.co/2018/06/19/tesla-model-3-assembly-line-inside-tent-elon-musk/amp/
It's build up like this:
https://amputatorbot.com + /? + https://www.google.com/amp/s/electrek.co/2018/06/19/tesla-model-3-assembly-line-inside-tent-elon-musk/amp/

Automatic working subreddits

u/amputatorbot currently works automatically in a select number of subreddits: Afghanistan, Africa, against5G, againstRFID, amputatorbot, anime_titties, Argentina, Assyria, Azerbaijan, Bangladesh, Bosnia, Brasil, Bulgaria, Business, CenturyClubStairs, Chile, Chodi, chrome, Colombia, conspiracy, CorpFree, cyberpunk, Cuba, DeAmazon, DebunkThis, DeFacebook, deGoogle, deMicrosoft, economy, Ecuador, entertainment, Environment, europe, Europe, europrivacy, FakeNews, Features, Fijian, firefox, France, freesoftware, gamernews, Germany, Greece, Guyana, hacking, helpmefind, hockey, HumanRights, Hungary, ID_news, indiaspeaks, initFreedom, Iranian, Iraq, Israel, Italy, Kazakhstan, Kerala, Kurdistan, LeopardsAteMyFace, LevantineWar, MachineLearning, Malaysia, Mexico, MiddleEastNews, MideastPeace, Moldova, Nepal, NewsOfTheWeird, Nicaragua, NorthKoreaNews, Oceania, OnGuardForThee, Pakistan, Palestine, pcgaming, PeerTube, Philippines, Piracy, Poland, praisetheeditor, privacy, PuertoRico, robotics, Russia, Scotland, security, selfhosted, seo, Serbia, singapore, socialism, spacex, Spain, suckless, Switzerland, Syria, tech, technology, TechnologyDetox, test, TrueCrime, TrueCrimeDiscussion, TrueReddit, Turkey, Turkey, Ukraina, Ukraine, UkrainianConflict, UnresolvedMysteries, upliftingnews, Uruguay, USA, Venezuela, web_design, Westpapua, whatisthisthing, worldnews, Yemen and YemeniCrisis.
Feel free to hit me up with suggestions for subreddits to add!
You can summon the bot almost everywhere else by typing: u/AmputatorBot, more info here.

Non-working subreddits

AmputatorBot doesn't work in these subreddits android, androiddev, armenia, AskHistorians, askscience, AskScienceDiscussion, audio, australia, awfuleverything, bayarea, beer, belgium, bitcoin, books, canada, CanadaPolitics, cars, CCW, childfree, China, collapse, conservative, Cringetopia, croatia, CryptoCurrency, DataHoarder, disneyvacation, economics, ELI5, facepalm, flying, Futurology, gadgets, Games, gaming, gatesopencomeonin, geopolitics, Georgia, GlobalTalk, google, history, India, insaneparents, insanepeoplefacebook, instantkarma, iphone, iran, ireland, kitchener, korea, meme, moviedetails, movies, news, newzealand, nextfuckinglevel, nottheonion, oklahoma, pcmasterrace, Pete_Buttigieg, Philosophy, pihole, PoliticalDiscussion, politics, popheads, programming, raisedbynarcissists, rareinsults, Romania, science, SeattleWA, Sikh, SouthAfrica, space, survivor, television, Thailand, thenetherlands, TikTokCringe, TIL_Uncensored, todayilearned, trashy, tumblr, TwoXChromosomes, ukpolitics, unitedkingdom, unpopularopinion, USANews, warplaneporn, WatchPeopleDieInside, wellthatsucks, whatcouldgowrong, worldevents, worldpolitics, YouShouldKnow and almost all subreddits moderated by u/BotDefense or u/BotTerminator for diverse reasons. When you summon the bot there, you'll receive a DM with the canonical URL instead.p
If you're moderating a subreddit that is incorrectly listed here or if you would like AmputatorBot to work in your subreddit that's using u/BotDefense or u/BotTerminator please contact me.

Changelog

Check out the changelog here. Latest update: 22/08/2020

Opt out & opt back in

The bot works automatically in the subreddits mentioned above and manually using mentions.
Opt out: If you want to prevent the bot from replying to your comments and submissions, click here to opt out.
Opt back in: Did you opt-out and regret it? NP! Click here to opt back in.
Note: If you want to opt out from AmputatorBot on Twitter, please contact me or block it.

Browser-extension

Check out this browser-extension by Daniel Aleksandersen: 'Redirect AMP to HTML', it makes it that every time you click an AMP page, you will be redirected to the canonical page instead. In other words, it does the the same as u/AmputatorBot and AmputatorBot.com, but fully automatic. I can't recommend this one enough!

Support the project

.. By summoning the bot: If you've spotted an AMP URL on Reddit and u/AmputatorBot seems absent, you can summon the bot by mentioning u/AmputatorBot in a reply to the comment or submission containing the AMP URL. You'll receive a confirmation through PM. For more details, check out this post!
.. By giving feedback: Most of the new features were made after suggestions from you guys, so hit me up if you have any feedback! You can contact me on Reddit, fill an issue or make a pull request.
.. By sponsoring: The bot and website cost approximately €8.26 a month to host and while that might not seem like much, it adds up. All donations will be used ONLY to pay for hosting. You can specify any amount you want, but please keep in mind that I only want to try to cover some of the costs. Thank you so much! - https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=EU6ZFKTVT9VH2
.. By spreading the word: In the end, the only goal of AmputatorBot is to allow people to have an informed choice. You can help by spreading the word in whatever way you deem the most appropriate.

From the bottom of my heart, thank you so much for the tremendous support you've given me and AmputatorBot <3

https://preview.redd.it/fzhy8jedu6e51.png?width=3890&format=png&auto=webp&s=581561e0e267bb53ee3961a5e894633f8d6ff73f
submitted by Killed_Mufasa to AmputatorBot [link] [comments]

Bitcoin Generator 2020 FREE Bitcoin Adder Official Video 2019 Free Bitcoin Generator Tool 2019 2020 FREE BITCOIN GENERATOR!! Free bitcoin generator - Free BTC [2019]! - YouTube Free Bitcoin Generator tool 18

Bitcoin is the new changing way of people think about money. Learn more about this innovative payment system. About Free BTC Generator. Free BTC Generator is an online software that allows you to extract bitcoins, which are then added to your account. Use peer-to-peer encryption to generate the required amount. Represents a transaction check by ... free bitcoin generator hack tool v3.0: free bitcoin generator no survey: free bitcoin generator online: free bitcoin generator online bitcoins generator: free bitcoin generator tool: free bitcoin generator working: free bitcoin generators: free bitcoin hack: free generate barcode online: free generate business name : free generate code: free generate lottery numbers: free generate math ... Now you can generate free bitcoins up to 1 bitcoin, this is the easiest way to get free bitcoin. giving you access to the best tool for btc generator online. 100% White Hat Ethics Our software is 100% white-hat and it uses the newest technologies for mining bitcoin. With this free Bitcoin Generator you can generate as many free BTC as you want. The site isn't limited to users. And the BTC Hack System is suitable both for people who are newbies and the ones who are in the business longer. It's the simplest tool you can find in the whole Internet. We don't need your money for our services. You don't need to pay any fee and you don't need any crypto to start ... Bitcoin Generator Free Bitcoin Generator Tool Online 2017. We are currently getting too much traffic! You are just able to use this generator for the next 14:44 minutes! ClaimBitcoin is the Bitcoin generator that everyone has been waiting for. Currently it is the only working Bitcoin generator out there, and at the moment it can generate anywhere from 0.001 to 0.009 Bitcoins per day ...

[index] [18481] [1429] [10043] [39467] [46609] [6079] [33467] [7371] [12262] [24705]

Bitcoin Generator 2020 FREE

hello friends today we learn about blockchain mining /bitcoin . in this video we are reviewing a best tool to hack btc ! DISCLAIMER :we are not responsible for any crime and illegal activity Bitcoin Adder Official Video 2019 Free Bitcoin Generator Tool 2019 Steven Spicher Tuto. Loading... Unsubscribe from Steven Spicher Tuto? Cancel Unsubscribe. Working... Subscribe Subscribed ... Free bitcoin generator - Free BTC [2019]. LINK IN COMMENTS!! free bitcoin generator Hey today I'll teach you how to get free bitcoins instantly! Just follow ... This video is unavailable. Watch Queue Queue. Watch Queue Queue bitcoin hack, bitcoin hack tool, bitcoin hack software, free bitcoin, free btc, earn bitcoin, bitcoin hack adder, bitcoin hack bot, bitcoin hack blockchain, how to hack bitcoin, bitcoin hack download,

#