![]() | Dragonchain Public Proposal TL;DR:Dragonchain has demonstrated twice Reddit’s entire total daily volume (votes, comments, and posts per Reddit 2019 Year in Review) in a 24-hour demo on an operational network. Every single transaction on Dragonchain is decentralized immediately through 5 levels of Dragon Net, and then secured with combined proof on Bitcoin, Ethereum, Ethereum Classic, and Binance Chain, via Interchain. At the time, in January 2020, the entire cost of the demo was approximately $25K on a single system (transaction fees locked at $0.0001/txn). With current fees (lowest fee $0.0000025/txn), this would cost as little as $625.Watch Joe walk through the entire proposal and answer questions on YouTube. This proposal is also available on the Dragonchain blog. Hello Reddit and Ethereum community!I’m Joe Roets, Founder & CEO of Dragonchain. When the team and I first heard about The Great Reddit Scaling Bake-Off we were intrigued. We believe we have the solutions Reddit seeks for its community points system and we have them at scale.For your consideration, we have submitted our proposal below. The team at Dragonchain and I welcome and look forward to your technical questions, philosophical feedback, and fair criticism, to build a scaling solution for Reddit that will empower its users. Because our architecture is unlike other blockchain platforms out there today, we expect to receive many questions while people try to grasp our project. I will answer all questions here in this thread on Reddit, and I've answered some questions in the stream on YouTube. We have seen good discussions so far in the competition. We hope that Reddit’s scaling solution will emerge from The Great Reddit Scaling Bake-Off and that Reddit will have great success with the implementation. Executive summaryDragonchain is a robust open source hybrid blockchain platform that has proven to withstand the passing of time since our inception in 2014. We have continued to evolve to harness the scalability of private nodes, yet take full advantage of the security of public decentralized networks, like Ethereum. We have a live, operational, and fully functional Interchain network integrating Bitcoin, Ethereum, Ethereum Classic, and ~700 independent Dragonchain nodes. Every transaction is secured to Ethereum, Bitcoin, and Ethereum Classic. Transactions are immediately usable on chain, and the first decentralization is seen within 20 seconds on Dragon Net. Security increases further to public networks ETH, BTC, and ETC within 10 minutes to 2 hours. Smart contracts can be written in any executable language, offering full freedom to existing developers. We invite any developer to watch the demo, play with our SDK’s, review open source code, and to help us move forward. Dragonchain specializes in scalable loyalty & rewards solutions and has built a decentralized social network on chain, with very affordable transaction costs. This experience can be combined with the insights Reddit and the Ethereum community have gained in the past couple of months to roll out the solution at a rapid pace.Response and PoCIn The Great Reddit Scaling Bake-Off post, Reddit has asked for a series of demonstrations, requirements, and other considerations. In this section, we will attempt to answer all of these requests.Live DemoA live proof of concept showing hundreds of thousands of transactionsOn Jan 7, 2020, Dragonchain hosted a 24-hour live demonstration during which a quarter of a billion (250 million+) transactions executed fully on an operational network. Every single transaction on Dragonchain is decentralized immediately through 5 levels of Dragon Net, and then secured with combined proof on Bitcoin, Ethereum, Ethereum Classic, and Binance Chain, via Interchain. This means that every single transaction is secured by, and traceable to these networks. An attack on this system would require a simultaneous attack on all of the Interchained networks. 24 hours in 4 minutes (YouTube): 24 hours in 4 minutes The demonstration was of a single business system, and any user is able to scale this further, by running multiple systems simultaneously. Our goals for the event were to demonstrate a consistent capacity greater than that of Visa over an extended time period. Tooling to reproduce our demo is available here: https://github.com/dragonchain/spirit-bomb Source CodeSource code (for on & off-chain components as well tooling used for the PoC). The source code does not have to be shared publicly, but if Reddit decides to use a particular solution it will need to be shared with Reddit at some point. ScalingHow it works & scales Architectural ScalingDragonchain’s architecture attacks the scalability issue from multiple angles. Dragonchain is a hybrid blockchain platform, wherein every transaction is protected on a business node to the requirements of that business or purpose. A business node may be held completely private or may be exposed or replicated to any level of exposure desired.Every node has its own blockchain and is independently scalable. Dragonchain established Context Based Verification as its consensus model. Every transaction is immediately usable on a trust basis, and in time is provable to an increasing level of decentralized consensus. A transaction will have a level of decentralization to independently owned and deployed Dragonchain nodes (~700 nodes) within seconds, and full decentralization to BTC and ETH within minutes or hours. Level 5 nodes (Interchain nodes) function to secure all transactions to public or otherwise external chains such as Bitcoin and Ethereum. These nodes scale the system by aggregating multiple blocks into a single Interchain transaction on a cadence. This timing is configurable based upon average fees for each respective chain. For detailed information about Dragonchain’s architecture, and Context Based Verification, please refer to the Dragonchain Architecture Document. Economic ScalingAn interesting feature of Dragonchain’s network consensus is its economics and scarcity model. Since Dragon Net nodes (L2-L4) are independent staking nodes, deployment to cloud platforms would allow any of these nodes to scale to take on a large percentage of the verification work. This is great for scalability, but not good for the economy, because there is no scarcity, and pricing would develop a downward spiral and result in fewer verification nodes. For this reason, Dragonchain uses TIME as scarcity.TIME is calculated as the number of Dragons held, multiplied by the number of days held. TIME influences the user’s access to features within the Dragonchain ecosystem. It takes into account both the Dragon balance and length of time each Dragon is held. TIME is staked by users against every verification node and dictates how much of the transaction fees are awarded to each participating node for every block. TIME also dictates the transaction fee itself for the business node. TIME is staked against a business node to set a deterministic transaction fee level (see transaction fee table below in Cost section). This is very interesting in a discussion about scaling because it guarantees independence for business implementation. No matter how much traffic appears on the entire network, a business is guaranteed to not see an increased transaction fee rate. Scaled DeploymentDragonchain uses Docker and Kubernetes to allow the use of best practices traditional system scaling. Dragonchain offers managed nodes with an easy to use web based console interface. The user may also deploy a Dragonchain node within their own datacenter or favorite cloud platform. Users have deployed Dragonchain nodes on-prem on Amazon AWS, Google Cloud, MS Azure, and other hosting platforms around the world. Any executable code, anything you can write, can be written into a smart contract. This flexibility is what allows us to say that developers with no blockchain experience can use any code language to access the benefits of blockchain. Customers have used NodeJS, Python, Java, and even BASH shell script to write smart contracts on Dragonchain.With Docker containers, we achieve better separation of concerns, faster deployment, higher reliability, and lower response times. We chose Kubernetes for its self-healing features, ability to run multiple services on one server, and its large and thriving development community. It is resilient, scalable, and automated. OpenFaaS allows us to package smart contracts as Docker images for easy deployment. Contract deployment time is now bounded only by the size of the Docker image being deployed but remains fast even for reasonably large images. We also take advantage of Docker’s flexibility and its ability to support any language that can run on x86 architecture. Any image, public or private, can be run as a smart contract using Dragonchain. Flexibility in ScalingDragonchain’s architecture considers interoperability and integration as key features. From inception, we had a goal to increase adoption via integration with real business use cases and traditional systems.We envision the ability for Reddit, in the future, to be able to integrate alternate content storage platforms or other financial services along with the token.
CostCost estimates (on-chain and off-chain) For the purpose of this proposal, we assume that all transactions are on chain (posts, replies, and votes).On the Dragonchain network, transaction costs are deterministic/predictable. By staking TIME on the business node (as described above) Reddit can reduce transaction costs to as low as $0.0000025 per transaction. Dragonchain Fees Table Getting StartedHow to run itBuilding on Dragonchain is simple and requires no blockchain experience. Spin up a business node (L1) in our managed environment (AWS), run it in your own cloud environment, or on-prem in your own datacenter. Clear documentation will walk you through the steps of spinning up your first Dragonchain Level 1 Business node. Getting started is easy...
ArchitectureDragonchain is an open source hybrid platform. Through Dragon Net, each chain combines the power of a public blockchain (like Ethereum) with the privacy of a private blockchain. Dragonchain organizes its network into five separate levels. A Level 1, or business node, is a totally private blockchain only accessible through the use of public/private keypairs. All business logic, including smart contracts, can be executed on this node directly and added to the chain. After creating a block, the Level 1 business node broadcasts a version stripped of sensitive private data to Dragon Net. Three Level 2 Validating nodes validate the transaction based on guidelines determined from the business. A Level 3 Diversity node checks that the level 2 nodes are from a diverse array of locations. A Level 4 Notary node, hosted by a KYC partner, then signs the validation record received from the Level 3 node. The transaction hash is ledgered to the Level 5 public chain to take advantage of the hash power of massive public networks. Dragon Net can be thought of as a “blockchain of blockchains”, where every level is a complete private blockchain. Because an L1 can send to multiple nodes on a single level, proof of existence is distributed among many places in the network. Eventually, proof of existence reaches level 5 and is published on a public network. API DocumentationAPIs (on chain & off) SDK Source
Nobody’s PerfectKnown issues or tradeoffs
Costs and resourcesSummary of cost & resource information for both on-chain & off-chain components used in the PoC, as well as cost & resource estimates for further scaling. If your PoC is not on mainnet, make note of any mainnet caveats (such as congestion issues).Every transaction on the PoC system had a transaction fee of $0.0001 (one-hundredth of a cent USD). At 256MM transactions, the demo cost $25,600. With current operational fees, the same demonstration would cost $640 USD. For the demonstration, to achieve throughput to mimic a worldwide payments network, we modeled several clients in AWS and 4-5 business nodes to handle the traffic. The business nodes were tuned to handle higher throughput by adjusting memory and machine footprint on AWS. This flexibility is valuable to implementing a system such as envisioned by Reddit. Given that Reddit’s daily traffic (posts, replies, and votes) is less than half that of our demo, we would expect that the entire Reddit system could be handled on 2-5 business nodes using right-sized containers on AWS or similar environments. Verification was accomplished on the operational Dragon Net network with over 700 independently owned verification nodes running around the world at no cost to the business other than paid transaction fees. RequirementsScalingThis PoC should scale to the numbers below with minimal costs (both on & off-chain). There should also be a clear path to supporting hundreds of millions of users.During Dragonchain’s 24 hour demo, the above required numbers were reached within the first few minutes. Reddit’s total activity is 9000% more than Ethereum’s total transaction level. Even if you do not include votes, it is still 700% more than Ethereum’s current volume. Dragonchain has demonstrated that it can handle 250 million transactions a day, and it’s architecture allows for multiple systems to work at that level simultaneously. In our PoC, we demonstrate double the full capacity of Reddit, and every transaction was proven all the way to Bitcoin and Ethereum. Reddit Scaling on Ethereum DecentralizationSolutions should not depend on any single third-party provider. We prefer solutions that do not depend on specific entities such as Reddit or another provider, and solutions with no single point of control or failure in off-chain components but recognize there are numerous trade-offs to considerDragonchain’s architecture calls for a hybrid approach. Private business nodes hold the sensitive data while the validation and verification of transactions for the business are decentralized within seconds and secured to public blockchains within 10 minutes to 2 hours. Nodes could potentially be controlled by owners of individual subreddits for more organic decentralization.
Usability Scaling solutions should have a simple end user experience.Users shouldn't have to maintain any extra state/proofs, regularly monitor activity, keep track of extra keys, or sign anything other than their normal transactionsDragonchain and its customers have demonstrated extraordinary usability as a feature in many applications, where users do not need to know that the system is backed by a live blockchain. Lyceum is one of these examples, where the progress of academy courses is being tracked, and successful completion of courses is rewarded with certificates on chain. Our @Save_The_Tweet bot is popular on Twitter. When used with one of the following hashtags - #please, #blockchain, #ThankYou, or #eternalize the tweet is saved through Eternal to multiple blockchains. A proof report is available for future reference. Other examples in use are DEN, our decentralized social media platform, and our console, where users can track their node rewards, view their TIME, and operate a business node. Examples: Transactions complete in a reasonable amount of time (seconds or minutes, not hours or days)All transactions are immediately usable on chain by the system. A transaction begins the path to decentralization at the conclusion of a 5-second block when it gets distributed across 5 separate community run nodes. Full decentralization occurs within 10 minutes to 2 hours depending on which interchain (Bitcoin, Ethereum, or Ethereum Classic) the transaction hits first. Within approximately 2 hours, the combined hash power of all interchained blockchains secures the transaction. Free to use for end users (no gas fees, or fixed/minimal fees that Reddit can pay on their behalf)With transaction pricing as low as $0.0000025 per transaction, it may be considered reasonable for Reddit to cover transaction fees for users. All of Reddit's Transactions on Blockchain (month) Community points can be earned by users and distributed directly to their Reddit account in batch (as per Reddit minting plan), and allow users to withdraw rewards to their Ethereum wallet whenever they wish. Withdrawal fees can be paid by either user or Reddit. This model has been operating inside the Dragonchain system since 2018, and many security and financial compliance features can be optionally added. We feel that this capability greatly enhances user experience because it is seamless to a regular user without cryptocurrency experience, yet flexible to a tech savvy user. With regard to currency or token transactions, these would occur on the Reddit network, verified to BTC and ETH. These transactions would incur the $0.0000025 transaction fee. To estimate this fee we use the monthly active Reddit users statista with a 60% adoption rate and an estimated 10 transactions per month average resulting in an approximate $720 cost across the system. Reddit could feasibly incur all associated internal network charges (mining/minting, transfer, burn) as these are very low and controllable fees. Reddit Internal Token Transaction Fees Reddit Ethereum Token Transaction Fees When we consider further the Ethereum fees that might be incurred, we have a few choices for a solution.
Bonus PointsUsers should be able to view their balances & transactions via a blockchain explorer-style interfaceFrom interfaces for users who have no knowledge of blockchain technology to users who are well versed in blockchain terms such as those present in a typical block explorer, a system powered by Dragonchain has flexibility on how to provide balances and transaction data to users. Transactions can be made viewable in an Eternal Proof Report, which displays raw data along with TIME staking information and traceability all the way to Bitcoin, Ethereum, and every other Interchained network. The report shows fields such as transaction ID, timestamp, block ID, multiple verifications, and Interchain proof. See example here. Node payouts within the Dragonchain console are listed in chronological order and can be further seen in either Dragons or USD. See example here. In our social media platform, Dragon Den, users can see, in real-time, their NRG and MTR balances. See example here. A new influencer app powered by Dragonchain, Raiinmaker, breaks down data into a user friendly interface that shows coin portfolio, redeemed rewards, and social scores per campaign. See example here. Exiting is fast & simpleWithdrawing funds on Dragonchain’s console requires three clicks, however, withdrawal scenarios with more enhanced security features per Reddit’s discretion are obtainable. Interoperability Compatibility with third party apps (wallets/contracts/etc) is necessary.Proven interoperability at scale that surpasses the required specifications. Our entire platform consists of interoperable blockchains connected to each other and traditional systems. APIs are well documented. Third party permissions are possible with a simple smart contract without the end user being aware. No need to learn any specialized proprietary language. Any code base (not subsets) is usable within a Docker container. Interoperable with any blockchain or traditional APIs. We’ve witnessed relatively complex systems built by engineers with no blockchain or cryptocurrency experience. We’ve also demonstrated the creation of smart contracts within minutes built with BASH shell and Node.js. Please see our source code and API documentation. Scaling solutions should be extensible and allow third parties to build on top of it Open source and extensible Documentation should be clear and completeFor full documentation, explore our docs, SDK’s, Github repo’s, architecture documents, original Disney documentation, and other links or resources provided in this proposal.
Third-party permissionless integrations should be possible & straightforward Smart contracts are Docker based, can be written in any language, use full language (not subsets), and can therefore be integrated with any system including traditional system APIs. Simple is better. Learning an uncommon or proprietary language should not be necessary.Advanced knowledge of mathematics, cryptography, or L2 scaling should not be required. Compatibility with common utilities & toolchains is expected. Dragonchain business nodes and smart contracts leverage Docker to allow the use of literally any language or executable code. No proprietary language is necessary. We’ve witnessed relatively complex systems built by engineers with no blockchain or cryptocurrency experience. We’ve also demonstrated the creation of smart contracts within minutes built with BASH shell and Node.js. BonusBonus Points: Show us how it works. Do you have an idea for a cool new use case for Community Points? Build it! TIMECommunity points could be awarded to Reddit users based upon TIME too, whereas the longer someone is part of a subreddit, the more community points someone naturally gained, even if not actively commenting or sharing new posts. A daily login could be required for these community points to be credited. This grants awards to readers too and incentivizes readers to create an account on Reddit if they browse the website often. This concept could also be leveraged to provide some level of reputation based upon duration and consistency of contribution to a community subreddit.Dragon DenDragonchain has already built a social media platform that harnesses community involvement. Dragon Den is a decentralized community built on the Dragonchain blockchain platform. Dragon Den is Dragonchain’s answer to fake news, trolling, and censorship. It incentivizes the creation and evaluation of quality content within communities. It could be described as being a shareholder of a subreddit or Reddit in its entirety. The more your subreddit is thriving, the more rewarding it will be. Den is currently in a public beta and in active development, though the real token economy is not live yet. There are different tokens for various purposes. Two tokens are Lair Ownership Rights (LOR) and Lair Ownership Tokens (LOT). LOT is a non-fungible token for ownership of a specific Lair. LOT will only be created and converted from LOR.Energy (NRG) and Matter (MTR) work jointly. Your MTR determines how much NRG you receive in a 24-hour period. Providing quality content, or evaluating content will earn MTR. Security. Users have full ownership & control of their points.All community points awarded based upon any type of activity or gift, are secured and provable to all Interchain networks (currently BTC, ETH, ETC). Users are free to spend and withdraw their points as they please, depending on the features Reddit wants to bring into production. Balances and transactions cannot be forged, manipulated, or blocked by Reddit or anyone elseUsers can withdraw their balance to their ERC20 wallet, directly through Reddit. Reddit can cover the fees on their behalf, or the user covers this with a portion of their balance. Users should own their points and be able to get on-chain ERC20 tokens without permission from anyone elseThrough our console users can withdraw their ERC20 rewards. This can be achieved on Reddit too. Here is a walkthrough of our console, though this does not show the quick withdrawal functionality, a user can withdraw at any time. https://www.youtube.com/watch?v=aNlTMxnfVHw Points should be recoverable to on-chain ERC20 tokens even if all third-parties involved go offlineIf necessary, signed transactions from the Reddit system (e.g. Reddit + Subreddit) can be sent to the Ethereum smart contract for minting. A public, third-party review attesting to the soundness of the design should be availableTo our knowledge, at least two large corporations, including a top 3 accounting firm, have conducted positive reviews. These reviews have never been made public, as Dragonchain did not pay or contract for these studies to be released. Bonus pointsSee above Compatibility with HSMs & hardware walletsFor the purpose of this proposal, all tokenization would be on the Ethereum network using standard token contracts and as such, would be able to leverage all hardware wallet and Ethereum ecosystem services. Other ConsiderationsMinting/distributing tokens is not performed by Reddit directlyThis operation can be automated by smart contract on Ethereum. Subreddits can if desired have a role to play. One off point burning, as well as recurring, non-interactive point burning (for subreddit memberships) should be possible and scalableThis is possible and scalable with interaction between Dragonchain Reddit system and Ethereum token contract(s). Fully open-source solutions are strongly preferredDragonchain is fully open source (see section on Disney release after conclusion). ConclusionWhether it is today, or in the future, we would like to work together to bring secure flexibility to the highest standards. It is our hope to be considered by Ethereum, Reddit, and other integrative solutions so we may further discuss the possibilities of implementation. In our public demonstration, 256 million transactions were handled in our operational network on chain in 24 hours, for the low cost of $25K, which if run today would cost $625. Dragonchain’s interoperable foundation provides the atmosphere necessary to implement a frictionless community points system. Thank you for your consideration of our proposal. We look forward to working with the community to make something great!Disney Releases Blockchain Platform as Open SourceThe team at Disney created the Disney Private Blockchain Platform. The system was a hybrid interoperable blockchain platform for ledgering and smart contract development geared toward solving problems with blockchain adoption and usability. All objective evaluation would consider the team’s output a success. We released a list of use cases that we explored in some capacity at Disney, and our input on blockchain standardization as part of our participation in the W3C Blockchain Community Group.https://lists.w3.org/Archives/Public/public-blockchain/2016May/0052.html Open SourceIn 2016, Roets proposed to release the platform as open source to spread the technology outside of Disney, as others within the W3C group were interested in the solutions that had been created inside of Disney.Following a long process, step by step, the team met requirements for release. Among the requirements, the team had to:
The Disney Open Source Committee approved the application known as OSSRELEASE-10, and the code was released on October 2, 2016. Disney decided to not issue a press release. Original OSSRELASE-10 document Dragonchain FoundationThe Dragonchain Foundation was created on January 17, 2017. https://den.social/l/Dragonchain/24130078352e485d96d2125082151cf0/dragonchain-and-disney/ |
June 12, 2014: The Guardian • Pentagon preparing for mass civil breakdown. Social science is being militarised to develop 'operational tools' to target peaceful activists and protest movements Source HerePentagon preparing for mass civil breakdown. It seemed ludicrous back in 2014, didn't it? Inconceivable. Sure some preppers believed it, but they're always getting ready and nothing happened. Doomsday was always right around the corner, and then the next corner, and on and on. Televangelists have probably accused more politicians of being the antichrist than the number of politicians went to Epstein's Island.
February 20, 2020: History Network • Here’s Why These Six Ancient Civilizations Mysteriously Collapsed. From the Maya to Greenland’s Vikings, check out six civilizations that seemingly disappeared without a trace. Source HereAll of these civilizations vanished because of some combination of exhausting their natural resources, drought, plauge, and the little ice age. Sound familiar? Don't tell me that the Rockefeller Foundation and BlackRock became environmentally aware out of a sense of obligation to the planet. They're setting the groundwork for what's coming down the pipe. This isn't about money anymore, this is about control and survival. Throw out the rulebook because the rules no longer apply.
March 15, 2012 • More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them. Earlier this month, Petraeus mused about the emergence of an "Internet of Things" -- that is, wired devices -- at a summit for In-Q-Tel, the CIA's venture capital firm. "'Transformational' is an overused word, but I do believe it properly applies to these technologies," Petraeus enthused, "particularly to their effect on clandestine tradecraft." All those new online devices are a treasure trove of data if you're a "person of interest" to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the "smart home," you'd be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room's ambiance. "Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters -- all connected to the next-generation internet using abundant, low-cost, and high-power computing," Petraeus said, "the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing." Petraeus allowed that these household spy devices "change our notions of secrecy" and prompt a rethink of "our notions of identity and secrecy." All of which is true -- if convenient for a CIA director. The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation. That's not the only data exploit intriguing Petraeus. He's interested in creating new online identities for his undercover spies -- and sweeping away the "digital footprints" of agents who suddenly need to vanish. "Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come," Petraeus observed. "Moreover, we have to figure out how to create the digital footprint for new identities for some officers." Source HereThe IoT should be renamed to IoTT (Internet of Tracking Things), shouldn't it. But we can't have people figure out what's really happening, can we? It's a good thing that quantum computing isn't too close, isn’t it?
December 19, 2019: New York Times • THE DATA REVIEWED BY TIMES OPINION didn’t come from a telecom or giant tech company, nor did it come from a governmental surveillance operation. It originated from a location data company, one of dozens quietly collecting precise movements using software slipped onto mobile phone apps. You’ve probably never heard of most of the companies — and yet to anyone who has access to this data, your life is an open book. They can see the places you go every moment of the day, whom you meet with or spend the night with, where you pray, whether you visit a methadone clinic, a psychiatrist’s office or a massage parlor. The Times and other news organizations have reported on smartphone tracking in the past. But never with a data set so large. Even still, this file represents just a small slice of what’s collected and sold every day by the location tracking industry — surveillance so omnipresent in our digital lives that it now seems impossible for anyone to avoid. It doesn’t take much imagination to conjure the powers such always-on surveillance can provide an authoritarian regime like China’s. Within America’s own representative democracy, citizens would surely rise up in outrage if the government attempted to mandate that every person above the age of 12 carry a tracking device that revealed their location 24 hours a day. Yet, in the decade since Apple’s App Store was created, Americans have, app by app, consented to just such a system run by private companies. Now, as the decade ends, tens of millions of Americans, including many children, find themselves carrying spies in their pockets during the day and leaving them beside their beds at night — even though the corporations that control their data are far less accountable than the government would be. Source Here
April 5, 2018: Global News • (Project Maven) Over 3,000 Google employees have a signed a petition in protest against the company’s involvement with a U.S. Department of Defense artificial intelligence (AI) project that studies imagery and could eventually be used to improve drone strikes in the battlefield. Source HereHmmm. Maybe Apple will be for the little guy? They have always valued privacy rights, right?
December 12, 2019 • Palantir took over Project Maven defense contract after Google backed out. Source Here
December 29, 2020: Input • Palantir exec says its work is on par with the Manhattan Project. Comparing AI to most lethal weapon in human history isn’t comforting. SourceHere
August 14, 2020: Venture: • Google researchers use quantum computing to help improve image classification. Source Here
October 2, 2013: Vice News • The hacktivist group Anonymous released a video statement with an accompanying Pastebin document claiming that there are definitive links between AuthenTec, the company that developed the iPhone 5S’s fingerprint scanner, and the US government. Source HereAn apple a day helps the NSA. Or Google. Or Microsoft. Or Amazon. Take your pick from the basket, because dem Apple's are all the same. But at least we have fundamental rights, right?
Controversial debates arose as the Protect America Act was published. Constitutional lawyers and civil liberties experts expressed concerns that this Act authorized massive, wide-ranging information gathering with no oversight. Whereas it placed much focus on communications, the Act allowed for information gathering of all shapes and forms. The ACLU called it the "Police America Act" – "authorized a massive surveillance dragnet", calling the blank-check oversight provisions "meaningless," and calling them a "phony court review of secret procedures."So the surveillance state doesn't have checks and balances anymore. The state is preparing for Massive Civil Breakdown. They keep warning us about environmental collapse. Got it? Good. Let's keep on keeping on.
The District of Columbia Organic Act of 1871 created a single new district corporation governing the entire federal territory, called the District of Columbia, thus dissolving the three major political subdivisions of the District (Port of Georgetown, the City of Washington, and Washington County) and their governments. Source Here)There's a reason people call lawyers snakes, it's because most of them speak with forked tounges. So the corporation isn't being held liable, but the shareholders can't be held liable either. That's too insane to even be called a Catch 22. We are literally being set up to have no recourse because there isn’t anybody who can be held responsible. Why is that important when I've been talking about the surveillance state?
The first big leap in corporate personhood from holding mere property and contract rights to possessing more expansive rights was a claim that the Equal Protection Clause applied to corporations. One of the strangest twists in American constitutional law was the moment that corporations gained personhood under the Equal Protection Clause of the Fourteenth Amendment. It occurred in a case called Santa Clara County, and what was odd was that the Supreme Court did not really even decide the matter in the actual opinion. It only appeared in a footnote to the case. What we are likely to have at the conclusion of the Supreme Court term is corporations that are empowered to spend in American elections because of Bellotti and Citizens United; corporations that can make religious objections thanks to Hobby Lobby; and if Jesner turns out as badly as I predict, corporations will be able to aid and abet human rights violations abroad with impunity. Source Here"Having a corporation would allow people to put property into a collective ownership that could be held with perpetual existence," she says. "So it wouldn't be tied to any one person's lifespan, or subject necessarily to laws regarding inheriting property." Later on, in the United States and elsewhere, the advantages of incorporation were essential to efficient and secure economic development. Unlike partnerships, the corporation continued to exist even if a partner died; there was no unanimity required to do something; shareholders could not be sued individually, only the corporation as a whole, so investors only risked as much as they put into buying shares. Source Here
The way that the Arab Bank may get away with this alleged morally troubling behavior, even though it has a New York branch, is by reasserting the basic argument that was made in Nestle USA and Kiobel II: that the federal Alien Tort Statute was not intended to apply to corporations full stop. Given other cases in this area like Mohamad v. PLO, which held the word “individual” in the Torture Victim Protection Act means a natural person and does not impose any liability against organizations, the Arab Bank’s procorporate argument may well prevail. There are multiple federal Circuit Courts which have shot down the argument that corporations are immune from suit under the Alien Tort Statute. The lone outlier is the Second Circuit, which decided in 2010 that corporations are excused from suit in Kiobel I. This is the case that was appealed to the Supreme Court and became Kiobel II. Jesner v. Arab Bank was litigated in the Second Circuit. One question in Jesner was what exactly did Kiobel II do to Kiobel I. So far in the litigation, Jesner concluded that Kiobel I and its conclusion that corporations can’t be sued in federal court using the Alien Tort Statute remained the controlling law of the Second Circuit.
July 14, 2020: The Intercept • Microsoft’s police surveillance services are often opaque because the company sells little in the way of its own policing products. It instead offers an array of “general purpose” Azure cloud services, such as machine learning and predictive analytics tools like Power BI (business intelligence) and Cognitive Services, which can be used by law enforcement agencies and surveillance vendors to build their own software or solutions. A rich array of Microsoft’s cloud-based offerings is on full display with a concept called “The Connected Officer.” Microsoft situates this concept as part of the Internet of Things, or IoT, in which gadgets are connected to online servers and thus made more useful. “The Connected Officer,” Microsoft has written, will “bring IoT to policing.” With the Internet of Things, physical objects are assigned unique identifiers and transfer data over networks in an automated fashion. If a police officer draws a gun from its holster, for example, a notification can be sent over the network to alert other officers there may be danger. Real Time Crime Centers could then locate the officer on a map and monitor the situation from a command and control center. Source HereUhm, I guess it's really is all connected, isn’t it?
June 18, 2020: The Guardian • How Target, Google, Bank of America and Microsoft quietly fund police through private donations. More than 25 large corporations in the past three years have contributed funding to private police foundations, new report says. Source HereLong live the Military Industrial Techno Surveillance State. If you have nothing to hide, than you have nothing to worry about. Really? Are we still believing that line? Cause it's a load of crap. If we have nothing to worry about, then why are they worried enough to be implementing surveillance systems with corresponding units on the ground? Got your attention there, didn't I?
August 19, 2019: Big Think • Though the term "Orwellian" easily applies to such a technology, Michel's illuminating reporting touches something deeper. Numerous American cities have already been surveilled using these god-like cameras, including Gorgon Stare, a camera-enabled drone that can track individuals over a 50-square kilometer radius from 20,000 feet. Here's the real rub: the feature that allows users to pinch and zoom on Instagram is similar to what WAMI allows. Anything within those 50-square kilometers is now under the microscope. If this sounds like some futuristic tech, think again: Derivations of this camera system have been tested in numerous American cities. Say there is a big public protest. With this camera you can follow thousands of protesters back to their homes. Now you have a list of the home addresses of all the people involved in a political movement. If on their way home you witness them committing some crime—breaking a traffic regulation or frequenting a location that is known to be involved in the drug trade—you can use that surveillance data against them to essentially shut them up. That's why we have laws that prevent the use of surveillance technologies because it is human instinct to abuse them. That's why we need controls. Source HereWant to know more about the Gorgon Stare? Flatten the Curve. Part 12. Source Here
MEDUSA (Mob Excess Deterrent Using Silent Audio) is a directed-energy non-lethal weapon designed by WaveBand Corporation in 2003-2004 for temporary personnel incapacitation. The weapon is based on the microwave auditory effect resulting in a strong sound sensation in the human head when it is subject to certain kinds of pulsed/modulated microwave radiation. The developers claimed that through the combination of pulse parameters and pulse power, it is possible to raise the auditory sensation to a “discomfort” level, deterring personnel from entering a protected perimeter or, if necessary, temporarily incapacitating particular individuals. In 2005, Sierra Nevada Corporation acquired WaveBand Corporation.Ok. Get it? The Gorgon eye in the sky stares at you while the Medusa makes you immobile. Not good, but at least it'll just freeze you in your tracks.
July 6, 2008: Gizmodo • The Sierra Nevada Corporation claimed this week that it is ready to begin production on the MEDUSA, a damned scary ray gun that uses the "microwave audio effect" to implant sounds and perhaps even specific messages inside people's heads. Short for Mob Excess Deterrent Using Silent Audio, MEDUSA creates the audio effect with short microwave pulses. The pulses create a shockwave inside the skull that's detected by the ears, and basically makes you think you're going balls-to-the-wall batshit insane. Source HereUhm. And drive you insane.
July 26, 2008: Gizmodo • The MEDUSA crowd control ray gun we reported on earlier this month sounded like some pretty amazing-and downright scary-technology. Using the microwave auditory effect, the beam, in theory, would have put sounds and voice-like noises in your head, thereby driving you away from the area. Crowd control via voices in your head. Sounds cool. However, it turns out that the beam would actually kill you before any of that happy stuff started taking place, most likely by frying or cooking your brain inside your skull. Can you imagine if this thing made it out into the field? Awkward! Source HereAnnnnnnnndddddd it'll kill you.
From the earliest Chinese dynasties to the present, the jade deposits most used were not only those of Khotan in the Western Chinese province of Xinjiang but other parts of China as well, such as Lantian, Shaanxi.Remember, words matter. Look at Gorgon Stare and Medusa. They don't randomly grab names out of a hat, or pick them because they think it sounds dystopian. They pick words for a reason.
July 7, 2017: The Warzone • There only appears to be one official news story on this exercise at all and it's available on the website of Air Mobility Command’s Eighteenth Air Force, situated at Joint Base Charleston. At the time of writing, a google shows that there were more than a half dozen more copies on other Air Force pages, as well as number of photographs. For some reason, someone appears to have taken these offline or otherwise broken all the links. Using Google to search the Defense Video Imagery Distribution System, which is the main U.S. military's public affairs hub, brings up more broken links. Oh, and unless there's been some sort of mistake, JADE HELM actually stands for the amazingly obtuse Joint Assistance for Deployment Execution Homeland Eradication of Local Militants. A separate web search for this phrase does not turn up any other results. Source HereNow, using an acronym that indicates training to Eradicate Local Militants seems pretty dumb. It may be used in that manner if environmental collapse triggers riots, but i don't think they would warn everyone ahead of time, do you? So I dug a little bit more.
October 17, 2018: The Carolinan • In 2016, 75 percent of American forces were private contractors. In 2017, Erik Prince, former head of Blackwater, and Stephen Feinberg, head of Dyncorp, discussed plans for contractors completely taking over U.S. operations in Afghanistan. Although ultimately unsuccessful, it remains to be seen if the current administration will change its mind. Contractors are involved in almost every military task, such as intelligence analysis, logistics and training allied soldiers. Contractors are even involved in U.S. special ops missions. This is because contractors are essentially untraceable and unaccountable. Most are born in other countries; only 33 percent are registered U.S. citizens. Private military firms don’t have to report their actions to Congress, unlike the military or intelligence agencies. They also aren’t subject to the Freedom of Information Act, so private citizens and journalists aren’t allowed to access their internal documents. There are also no international laws to regulate private military firms. It’s been proven that many contractors are involved in illegal activities. The larger multinational companies sometimes hire local subcontractors. These contractors sometimes aren’t background-checked. A 2010 investigation by the Senate found that many subcontractors were linked to murders, kidnappings, bribery and anti-coalition activities. Some subcontractors even formed their own unlicensed mercenary groups after coalition forces leave. A 2010 House investigation showed evidence that the Department of Defense had hired local warlords for security services. In 2007, Blackwater contractors massacred 17 civilians. This eventually led Blackwater to being restructured and renamed as Academi. Source HereMilitary Exercises. Private Defense Firms. No oversight. And it's all coming soon. Read more at Flatten the Curve. Part 20. Upcoming war and catastrophes. Source Here
![]() | Altcoin Explorer: NEM (XEM), the Enterprise-Grade Blockchain Platformhttps://preview.redd.it/5ogfihikwkg51.png?width=1300&format=png&auto=webp&s=099780e02777d16d4e2add64b249c46da1cd488b Nestled among the top 40 cryptocurrencies by reported market cap, New Economy Movement — popularly known as NEM (XEM) – is a peer-to-peer (P2P), dual-layer blockchain smart contract platform written in one of the most influential programming languages, Java. NEM uses the proof-of-importance (POI) consensus algorithm that essentially values the tokens held and the activity conducted by the nodes on the blockchain network. In this Altcoin Explorer, BTCManager delves deeper into the finer intricacies of the NEM blockchain protocol, including the project’s POI consensus algorithm, its native digital token XEM, and some of its real-world use-cases. Without further ado, let’s get to the core of this high-performance distributed ledger technology (DLT) platform. History of NEMNEM was launched on March 31, 2015, with an aim to develop an enterprise-grade blockchain protocol that could circumvent the infamous trilemma of blockchain: scalability, speed, and privacy.Operated by a Gibraltar-registered NEM Group, NEM is a fork-out version of the NXT blockchain. After the successful fork, the NEM community decided to build its ecosystem from the ground up and developed its own codebase to make the network more scalable and faster. NEM’s insistence toward building its own tech infrastructure led to a DLT protocol that is unlike anything resembling other similar platforms. Today, NEM ranks among the top go-to blockchain platforms for enterprises across the world, rivaling competing protocols including Ethereum (ETH), and TRON (TRX), among others. NEM’s Proof-of-Importance (POI) AlgorithmUnlike Bitcoin’s (BTC) energy-intensive Proof-of-Work (PoW) and Ethereum’s yet-to-be-implemented Proof-of-Stake (PoS) consensus algorithm, NEM uses PoI consensus mechanism.The PoI mechanism achieves consensus by incentivizing active user participation in the NEM network. This consensus infrastructure ensures an agile decentralized network by rewarding well-behaved nodes that not only possess a significant stake in the network but are also actively engaged in executing transactions to maintain the network’s robustness. Specifically, each node in the network possesses an ‘Importance Score’ that impacts the number of times the said node can ‘Harvest’ the XEM altcoin. Initially, when a user puts XEM tokens into their wallet, they are called ‘unvested coins.’ Over time, as the wallets start accumulating an increasing number of XEM and contribute to the network’s transaction volume, they start collecting importance scores. At the same time, the XEM tokens in these wallets change into ‘vested coins,’ provided that there are at least 10000 tokens in the wallet. To put things into perspective, let’s take the help of a small example. On day 1, Joe receives 50,000 XEM in his digital wallet. Now, with each passing day, the NEM network will ‘vest’ 10 percent of the tokens held by Joe. So, on day 2, 5,000 tokens held by Joe are vested into the network. On day 3, 10 percent of the remaining tokens – 15,000 XEM – get vested into the network, leaving Joe with 13,500 XEM, and so one. After a couple of days, Joe sees that the number of XEM vested by him has crossed the 10,000 coins threshold, thereby, making him eligible to seek rewards from the NEM blockchain for his contribution to vesting his tokens. Close followers of blockchain projects would find the aforementioned network reward mechanism bear a close resemblance to the PoS consensus algorithm. However, it’s worthy of note that vesting coins is just one way of calculating a node’s importance score. The NEM protocol also rewards nodes that are responsible for most activity on the network. In essence, this means that the higher the number of transactions executed by a node, the more likely it is to gain higher importance points. The balance between vesting XEM and network activity is an important metric to be maintained by NEM nodes as it directly impacts their likelihood of harvesting XEM. NEM’s consensus algorithm does away with several issues plaguing the more energy-intensive protocols such as PoW. For instance, PoI does not necessarily require high-energy hardware to run the nodes. The decentralized nature of the algorithm means that almost any machine — irrespective of its tech configuration – can participate in the NEM ecosystem ensuring it remains decentralized. NEM’s Native Digital Token — XEMXEM, unlike the vast majority of other cryptocurrencies, isn’t mined or staked using Pow or PoS algorithms. Rather, as explained earlier, XEM is ‘harvested’ through the PoI algorithm which ensures a steady supply of the digital token without flooding the market and involving the risk of a dramatic crash in price.Per data on CoinMarketCap, at the time of writing, XEM trades at $0.04 with a market cap of more than $382 million and a 24-hour trading volume of approximately $6.8 million. The coin reached its all-time high of $1.92 in January 2018. A large number of reputable cryptocurrency exchanges trade XEM, including Binance, Upbit, OKEx, Bithumb, ProBit, among others. The digital token can be easily traded with BTC, ETH, and USDT trading pairs. That said, if you wish to vest your XEM to partake in the maintenance of the NEM network and earn rewards, it is recommended you store your tokens in the official NEM Nano wallet for desktop and mobile OS. Only XEM tokens held in the official NEM Nano wallet are eligible for vesting. NEM Use-CasesTo date, NEM has been deployed for various real-world applications with promising results.In 2018, Ukraine launched a blockchain-based e-voting trial leveraging the NEM DLT platform. At the time, Ukraine’s Central Election Commission – with the local NEM Foundation representation – estimated the test vote trial in each polling station could cost as low as $1,227. The organization’s Oleksandr Stelmakh lauded the efforts, saying that using a blockchain-powered voting mechanism would make it impossible for anyone to fiddle with the records. The Commission added that the NEM protocol presents information in a more user-friendly format for voters. In the same year, Malaysia’s Ministry of Education launched an e-scroll system based on the NEM blockchain to tackle the menace of fake degrees. The University Degree Issuance and Verification System use the NEM blockchain which is interrogated upon scanning of a QR code printed on the degree certificate. The Ministry added that one of the primary reasons for its decision to selected the NEM platform was its unique and cutting-edge features in managing traceability and authentication requirements. On a recent note, the Bank of Lithuania announced that it would be issuing its NEM blockchain-powered digital collector’s coin (LBCoin) in July after the successful completion of its testing phase. Final ThoughtsSumming up, NEM offers a wide array of in-house features that separate it from other blockchain projects in a space that is becoming increasingly congested. NEM’s creative PoI consensus algorithm is a fresh take on the PoS algorithm for performance enhancement. Further, the project’s newly launched enterprise-grade DLT solution, Symbol, offers a tremendous option to businesses to help them cut costs, reduce complexities, and streamline innovation.NEM uses the Java programming language that makes it an easy project for developers to get involved with, unlike other projects such as Ethereum that use platform-specific programming languages like Solidity. The project’s tech infrastructure not only makes it less power-intensive compared to Bitcoin but also more scalable than its rival projects including Ethereum and NEO. NEM’s tagline, “Smart Asset Blockchain, Built for Performance,” perfectly captures everything the project has to offer. Over the years, NEM’s active developer community has craftily addressed the notorious bottlenecks in the vast majority of blockchain solutions, The future looks promising for NEM as it continues to foster a trustless and blockchain-driven economy for tomorrow. Source |
![]() | submitted by tkeycoin to Tkeycoin_Official [link] [comments] https://preview.redd.it/o29r0qu664j51.png?width=700&format=png&auto=webp&s=b34a6841ca97bbd70c9a23fe5ed83813d5f513d1 Hello everyone! Today we will talk about the results of the development of the TkeyNet system and related products, as well as share the test results and release date. To date, the Protocol has fully debugged. The process of debugging the TkeyNet system is moving with decisive steps — 94.7% of testing of all the functions that TkeyNet includes has completed. During the tests, the following properties and functions tested with different scenarios:
Documentation for the TkeyNet system will release on the website tkey.org as well as reviews of the system TkeyNet will be published in the company’s blog.Back-end TkeyNet developed in the C++ and C) programming languages, to improve performance, some of the code written in C. The C programming language is the world’s fastest high-level programming language. It is called a high-level assembler, but unlike an assembler, code on it can be compile without changes on any device.The specified stack is selected to meet the stringent requirements of the financial sector: enhanced security, scalability, and the ability of the system to work 24/7/365. The TkeyNet system is adapted to the world standards: ISO, ISIN. https://preview.redd.it/x9g2rlz864j51.png?width=700&format=png&auto=webp&s=b2cf80ee5cd722abdb306803d6454e2afde899b0 TkeyNet supports the structured query language and interacts with flexible SQLite and PostgreSQL databases. PostgreSQL complies with ANSI/ISO SQL standards, and unlike other DBMSs, it has object-oriented functionality, including full support for the ACID concept. An SQLite was selected to improve the speed and performance of operations. SQLite will also serve as an excellent solution for mobile applications that will be created based on TkeyNet. PostgreSQL is the most advanced RDBMS, focusing primarily on full compliance with standards and extensibility. During this period, we also completed work on a powerful API. The API is designed for organizations and developers to use the full power of TkeyNet in individual solutions. Software developers, whether mobile apps or local software, will get APIs and client libraries that will simplify the interaction of the corporate market with TkeyNet. The API provides guaranteed availability, scalable volumes, and responds within milliseconds. Test results: transaction and operation speed in TkeyNetTo date, testing shows excellent results on the speed of payments made via TkeyNet.Last week’s results: unlike the first Protocol, where it took at least 10 minutes to validate a transaction, payment transactions in TkeyNet processed in 25 seconds without losing security properties. Performance improved by 2400% compared to Core 1.0 The block generation time in Core 1.0 is at least 10 minutes, and in TkeyNet — 25 seconds according to the test results. If it took at least 10 minutes to confirm a block, and sometimes it took two or more hours, in TkeyNet developers achieved a stable indicator of 25 seconds without losing security properties. To achieve our goal of launching the Protocol — we identify possible changes, theorize solutions, model proposals, and test our theories in practice. This process involves a lot of internal discussions and collaboration with external parties who provide feedback on the operation of a particular module, and the entire system as a whole.Before the launch of TkeyNet, work will carry out to optimize and improve performance. The team plans to increase its performance indicators by 6000% compared to Core 1.0. The Core 1.0 block generation time is 10 minutes. TkeyNet test network — 25 seconds. TkeyNet main network-up to 10 seconds. To do this, we will work with individual modules and libraries of databases, transactions, and consensus. The goal for developers is to process payment transactions for up to 10 seconds at most. The process secure in the logic of consensus, which solves a complex problem in a matter of seconds. High throughput rates of the TkeyNet Protocol. B2B & B2C sectors.To meet the needs of companies, startups, and corporations, — TkeyNet responds with fast processing of trades*.Payment transactions — exchange of currency or shares, exchange operations, interbank settlements, etc.For a better understanding, let’s analyze the obtained characteristics at the time of testing TkeyNet: https://preview.redd.it/t31c3kih64j51.png?width=466&format=png&auto=webp&s=daad005d8cd5066e9d3cb67e9f147d0a7b362d97 Results: 1,225,000 trades per block. https://preview.redd.it/gerxtesi64j51.png?width=472&format=png&auto=webp&s=e0b96995b7d6fbede61fe7761a55005ec20de403 The scaling of the TkeyNet systemThe TkeyNet system is easily scalable by increasing the RAM and CPU parameters. We have launched three nodes on powerful servers with the following characteristics:
https://preview.redd.it/mvot6c3l64j51.png?width=617&format=png&auto=webp&s=23f4ea57f30fd6978568d12948c0ecb571f2f071 Vertical scalingUnlike Bitcoin and other blockchain systems, where increasing the power of the miner’s hardware does not lead to an increase in network bandwidth.Usually in such networks, increasing the power is a direct necessity, otherwise, transactions will not take place at all or will take hours, or even days. Because of what actually appears “manipulation of miners” and various types of network attacks. On practice in such networks, increasing power is a direct necessity otherwise, transactions will not take place at all or will take hours or even days. Therefore of what appears “manipulation of miners” and various types of network attacks.TkeyNet uses vertical scaling. With increasing node capacity, the throughput of the entire TkeyNet system increases. It turns out that regardless of the number and power of nodes, transactions will take place in 25 seconds, and with increasing power nodes — the number of processed transactions will grow. As we said above, our developers are working to improve these indicators, where the block validation time will take no more than 10 seconds. Transactions will take place for 1 second to 10 seconds maximum. Also, this parameter significantly increases the volume of trades conducted via TkeyNet. Front-end. Graphical user interface.https://preview.redd.it/wrjfa95n64j51.png?width=700&format=png&auto=webp&s=a5137fac7774864fab431fdd7ac51c73ffca3075 During August, the web products team continues working on secure wallets and a blockchain Explorer. The new software is under development, but it has already come a long way from layouts and graphic design and is ready to move to the stage of connecting the TkeyNet back-end with native products. If everything is in the final stage on the back-end side, then the client part (front-end*) needs time to complete debugging. We needed to design applications per best security practices. \The Front-end developer creates the user interface.* Testing of blockchain applications is not much different from testing regular applications and resembles functional testing of a payment system. Test cases include checking the balance, fields, transaction statuses, and so on.Also, we conduct continuous testing during development, taking into account the severity and scale of the TkeyNet system that will be used by organizations, corporations, and users, respectively. According to the results of testing and a meeting of the development team, the launch of TkeyNet is agreed for September 25–mid-October, possibly earlier. Website tkey.org — will be updated in October 2020, taking into account the volume of documentation, packaging all the meanings of the perfect new product TkeyNet. Tkeycoin.com — updated earlier, before launching TkeyNet. Also, to the upcoming launch of TkeyNet, the management decided to open a representative office of TKEY in the UK for the development of digital Banking and digitalization of assets. Working with partners in the UK will focus on implementing TKEY’s corporate strategy and market solutions that meet customer needs, create new revenue sources, and provide opportunities for Corporations growth. We create a great future for people by continuously improving our services and business products. All our actions are concentrate on becoming a leader in the market.We also remind you that after the launch of TkeyNet, the start date of TKey trading will announce. The fourth quarter will be hot, get ready! https://i.redd.it/ynv5xknq64j51.gif |
![]() | Altcoin Explorer: NEM (XEM), the Enterprise-Grade Blockchain Platformhttps://preview.redd.it/manbawoqvkg51.png?width=1300&format=png&auto=webp&s=fcbae1f067261326f11641bb9b18cd6f57616966 Nestled among the top 40 cryptocurrencies by reported market cap, New Economy Movement — popularly known as NEM (XEM) – is a peer-to-peer (P2P), dual-layer blockchain smart contract platform written in one of the most influential programming languages, Java. NEM uses the proof-of-importance (POI) consensus algorithm that essentially values the tokens held and the activity conducted by the nodes on the blockchain network. In this Altcoin Explorer, BTCManager delves deeper into the finer intricacies of the NEM blockchain protocol, including the project’s POI consensus algorithm, its native digital token XEM, and some of its real-world use-cases. Without further ado, let’s get to the core of this high-performance distributed ledger technology (DLT) platform. History of NEMNEM was launched on March 31, 2015, with an aim to develop an enterprise-grade blockchain protocol that could circumvent the infamous trilemma of blockchain: scalability, speed, and privacy.Operated by a Gibraltar-registered NEM Group, NEM is a fork-out version of the NXT blockchain. After the successful fork, the NEM community decided to build its ecosystem from the ground up and developed its own codebase to make the network more scalable and faster. NEM’s insistence toward building its own tech infrastructure led to a DLT protocol that is unlike anything resembling other similar platforms. Today, NEM ranks among the top go-to blockchain platforms for enterprises across the world, rivaling competing protocols including Ethereum (ETH), and TRON (TRX), among others. NEM’s Proof-of-Importance (POI) AlgorithmUnlike Bitcoin’s (BTC) energy-intensive Proof-of-Work (PoW) and Ethereum’s yet-to-be-implemented Proof-of-Stake (PoS) consensus algorithm, NEM uses PoI consensus mechanism.The PoI mechanism achieves consensus by incentivizing active user participation in the NEM network. This consensus infrastructure ensures an agile decentralized network by rewarding well-behaved nodes that not only possess a significant stake in the network but are also actively engaged in executing transactions to maintain the network’s robustness. Specifically, each node in the network possesses an ‘Importance Score’ that impacts the number of times the said node can ‘Harvest’ the XEM altcoin. Initially, when a user puts XEM tokens into their wallet, they are called ‘unvested coins.’ Over time, as the wallets start accumulating an increasing number of XEM and contribute to the network’s transaction volume, they start collecting importance scores. At the same time, the XEM tokens in these wallets change into ‘vested coins,’ provided that there are at least 10000 tokens in the wallet. To put things into perspective, let’s take the help of a small example. On day 1, Joe receives 50,000 XEM in his digital wallet. Now, with each passing day, the NEM network will ‘vest’ 10 percent of the tokens held by Joe. So, on day 2, 5,000 tokens held by Joe are vested into the network. On day 3, 10 percent of the remaining tokens – 15,000 XEM – get vested into the network, leaving Joe with 13,500 XEM, and so one. After a couple of days, Joe sees that the number of XEM vested by him has crossed the 10,000 coins threshold, thereby, making him eligible to seek rewards from the NEM blockchain for his contribution to vesting his tokens. Close followers of blockchain projects would find the aforementioned network reward mechanism bear a close resemblance to the PoS consensus algorithm. However, it’s worthy of note that vesting coins is just one way of calculating a node’s importance score. The NEM protocol also rewards nodes that are responsible for most activity on the network. In essence, this means that the higher the number of transactions executed by a node, the more likely it is to gain higher importance points. The balance between vesting XEM and network activity is an important metric to be maintained by NEM nodes as it directly impacts their likelihood of harvesting XEM. NEM’s consensus algorithm does away with several issues plaguing the more energy-intensive protocols such as PoW. For instance, PoI does not necessarily require high-energy hardware to run the nodes. The decentralized nature of the algorithm means that almost any machine — irrespective of its tech configuration – can participate in the NEM ecosystem ensuring it remains decentralized. NEM’s Native Digital Token — XEMXEM, unlike the vast majority of other cryptocurrencies, isn’t mined or staked using Pow or PoS algorithms. Rather, as explained earlier, XEM is ‘harvested’ through the PoI algorithm which ensures a steady supply of the digital token without flooding the market and involving the risk of a dramatic crash in price.Per data on CoinMarketCap, at the time of writing, XEM trades at $0.04 with a market cap of more than $382 million and a 24-hour trading volume of approximately $6.8 million. The coin reached its all-time high of $1.92 in January 2018. A large number of reputable cryptocurrency exchanges trade XEM, including Binance, Upbit, OKEx, Bithumb, ProBit, among others. The digital token can be easily traded with BTC, ETH, and USDT trading pairs. That said, if you wish to vest your XEM to partake in the maintenance of the NEM network and earn rewards, it is recommended you store your tokens in the official NEM Nano wallet for desktop and mobile OS. Only XEM tokens held in the official NEM Nano wallet are eligible for vesting. NEM Use-CasesTo date, NEM has been deployed for various real-world applications with promising results.In 2018, Ukraine launched a blockchain-based e-voting trial leveraging the NEM DLT platform. At the time, Ukraine’s Central Election Commission – with the local NEM Foundation representation – estimated the test vote trial in each polling station could cost as low as $1,227. The organization’s Oleksandr Stelmakh lauded the efforts, saying that using a blockchain-powered voting mechanism would make it impossible for anyone to fiddle with the records. The Commission added that the NEM protocol presents information in a more user-friendly format for voters. In the same year, Malaysia’s Ministry of Education launched an e-scroll system based on the NEM blockchain to tackle the menace of fake degrees. The University Degree Issuance and Verification System use the NEM blockchain which is interrogated upon scanning of a QR code printed on the degree certificate. The Ministry added that one of the primary reasons for its decision to selected the NEM platform was its unique and cutting-edge features in managing traceability and authentication requirements. On a recent note, the Bank of Lithuania announced that it would be issuing its NEM blockchain-powered digital collector’s coin (LBCoin) in July after the successful completion of its testing phase. Final ThoughtsSumming up, NEM offers a wide array of in-house features that separate it from other blockchain projects in a space that is becoming increasingly congested. NEM’s creative PoI consensus algorithm is a fresh take on the PoS algorithm for performance enhancement. Further, the project’s newly launched enterprise-grade DLT solution, Symbol, offers a tremendous option to businesses to help them cut costs, reduce complexities, and streamline innovation.NEM uses the Java programming language that makes it an easy project for developers to get involved with, unlike other projects such as Ethereum that use platform-specific programming languages like Solidity. The project’s tech infrastructure not only makes it less power-intensive compared to Bitcoin but also more scalable than its rival projects including Ethereum and NEO. NEM’s tagline, “Smart Asset Blockchain, Built for Performance,” perfectly captures everything the project has to offer. Over the years, NEM’s active developer community has craftily addressed the notorious bottlenecks in the vast majority of blockchain solutions, The future looks promising for NEM as it continues to foster a trustless and blockchain-driven economy for tomorrow. Source |
![]() | submitted by charlesgwynne to BlockchainStartups [link] [comments] https://preview.redd.it/f82bxncaxkg51.png?width=1300&format=png&auto=webp&s=34afde717d1781f7e472c8dcacd18a8b9390a78d Nestled among the top 40 cryptocurrencies by reported market cap, New Economy Movement — popularly known as NEM (XEM) – is a peer-to-peer (P2P), dual-layer blockchain smart contract platform written in one of the most influential programming languages, Java. NEM uses the proof-of-importance (POI) consensus algorithm that essentially values the tokens held and the activity conducted by the nodes on the blockchain network. In this Altcoin Explorer, BTCManager delves deeper into the finer intricacies of the NEM blockchain protocol, including the project’s POI consensus algorithm, its native digital token XEM, and some of its real-world use-cases. Without further ado, let’s get to the core of this high-performance distributed ledger technology (DLT) platform. History of NEMNEM was launched on March 31, 2015, with an aim to develop an enterprise-grade blockchain protocol that could circumvent the infamous trilemma of blockchain: scalability, speed, and privacy.Operated by a Gibraltar-registered NEM Group, NEM is a fork-out version of the NXT blockchain. After the successful fork, the NEM community decided to build its ecosystem from the ground up and developed its own codebase to make the network more scalable and faster. NEM’s insistence toward building its own tech infrastructure led to a DLT protocol that is unlike anything resembling other similar platforms. Today, NEM ranks among the top go-to blockchain platforms for enterprises across the world, rivaling competing protocols including Ethereum (ETH), and TRON (TRX), among others. NEM’s Proof-of-Importance (POI) AlgorithmUnlike Bitcoin’s (BTC) energy-intensive Proof-of-Work (PoW) and Ethereum’s yet-to-be-implemented Proof-of-Stake (PoS) consensus algorithm, NEM uses PoI consensus mechanism.The PoI mechanism achieves consensus by incentivizing active user participation in the NEM network. This consensus infrastructure ensures an agile decentralized network by rewarding well-behaved nodes that not only possess a significant stake in the network but are also actively engaged in executing transactions to maintain the network’s robustness. Specifically, each node in the network possesses an ‘Importance Score’ that impacts the number of times the said node can ‘Harvest’ the XEM altcoin. Initially, when a user puts XEM tokens into their wallet, they are called ‘unvested coins.’ Over time, as the wallets start accumulating an increasing number of XEM and contribute to the network’s transaction volume, they start collecting importance scores. At the same time, the XEM tokens in these wallets change into ‘vested coins,’ provided that there are at least 10000 tokens in the wallet. To put things into perspective, let’s take the help of a small example. On day 1, Joe receives 50,000 XEM in his digital wallet. Now, with each passing day, the NEM network will ‘vest’ 10 percent of the tokens held by Joe. So, on day 2, 5,000 tokens held by Joe are vested into the network. On day 3, 10 percent of the remaining tokens – 15,000 XEM – get vested into the network, leaving Joe with 13,500 XEM, and so one. After a couple of days, Joe sees that the number of XEM vested by him has crossed the 10,000 coins threshold, thereby, making him eligible to seek rewards from the NEM blockchain for his contribution to vesting his tokens. Close followers of blockchain projects would find the aforementioned network reward mechanism bear a close resemblance to the PoS consensus algorithm. However, it’s worthy of note that vesting coins is just one way of calculating a node’s importance score. The NEM protocol also rewards nodes that are responsible for most activity on the network. In essence, this means that the higher the number of transactions executed by a node, the more likely it is to gain higher importance points. The balance between vesting XEM and network activity is an important metric to be maintained by NEM nodes as it directly impacts their likelihood of harvesting XEM. NEM’s consensus algorithm does away with several issues plaguing the more energy-intensive protocols such as PoW. For instance, PoI does not necessarily require high-energy hardware to run the nodes. The decentralized nature of the algorithm means that almost any machine — irrespective of its tech configuration – can participate in the NEM ecosystem ensuring it remains decentralized. NEM’s Native Digital Token — XEMXEM, unlike the vast majority of other cryptocurrencies, isn’t mined or staked using Pow or PoS algorithms. Rather, as explained earlier, XEM is ‘harvested’ through the PoI algorithm which ensures a steady supply of the digital token without flooding the market and involving the risk of a dramatic crash in price.Per data on CoinMarketCap, at the time of writing, XEM trades at $0.04 with a market cap of more than $382 million and a 24-hour trading volume of approximately $6.8 million. The coin reached its all-time high of $1.92 in January 2018. A large number of reputable cryptocurrency exchanges trade XEM, including Binance, Upbit, OKEx, Bithumb, ProBit, among others. The digital token can be easily traded with BTC, ETH, and USDT trading pairs. That said, if you wish to vest your XEM to partake in the maintenance of the NEM network and earn rewards, it is recommended you store your tokens in the official NEM Nano wallet for desktop and mobile OS. Only XEM tokens held in the official NEM Nano wallet are eligible for vesting. NEM Use-CasesTo date, NEM has been deployed for various real-world applications with promising results.In 2018, Ukraine launched a blockchain-based e-voting trial leveraging the NEM DLT platform. At the time, Ukraine’s Central Election Commission – with the local NEM Foundation representation – estimated the test vote trial in each polling station could cost as low as $1,227. The organization’s Oleksandr Stelmakh lauded the efforts, saying that using a blockchain-powered voting mechanism would make it impossible for anyone to fiddle with the records. The Commission added that the NEM protocol presents information in a more user-friendly format for voters. In the same year, Malaysia’s Ministry of Education launched an e-scroll system based on the NEM blockchain to tackle the menace of fake degrees. The University Degree Issuance and Verification System use the NEM blockchain which is interrogated upon scanning of a QR code printed on the degree certificate. The Ministry added that one of the primary reasons for its decision to selected the NEM platform was its unique and cutting-edge features in managing traceability and authentication requirements. On a recent note, the Bank of Lithuania announced that it would be issuing its NEM blockchain-powered digital collector’s coin (LBCoin) in July after the successful completion of its testing phase. Final ThoughtsSumming up, NEM offers a wide array of in-house features that separate it from other blockchain projects in a space that is becoming increasingly congested. NEM’s creative PoI consensus algorithm is a fresh take on the PoS algorithm for performance enhancement. Further, the project’s newly launched enterprise-grade DLT solution, Symbol, offers a tremendous option to businesses to help them cut costs, reduce complexities, and streamline innovation.NEM uses the Java programming language that makes it an easy project for developers to get involved with, unlike other projects such as Ethereum that use platform-specific programming languages like Solidity. The project’s tech infrastructure not only makes it less power-intensive compared to Bitcoin but also more scalable than its rival projects including Ethereum and NEO. NEM’s tagline, “Smart Asset Blockchain, Built for Performance,” perfectly captures everything the project has to offer. Over the years, NEM’s active developer community has craftily addressed the notorious bottlenecks in the vast majority of blockchain solutions, The future looks promising for NEM as it continues to foster a trustless and blockchain-driven economy for tomorrow. Source |
![]() | Author: Gamals Ahmed, CoinEx Business Ambassador submitted by CoinEx_Institution to kybernetwork [link] [comments] https://preview.redd.it/9k31yy1bdcg51.jpg?width=936&format=pjpg&auto=webp&s=99bcb7c3f50b272b7d97247b369848b5d8cc6053 ABSTRACTIn this research report, we present a study on Kyber Network. Kyber Network is a decentralized, on-chain liquidity protocol designed to make trading tokens simple, efficient, robust and secure.Kyber design allows any party to contribute to an aggregated pool of liquidity within each blockchain while providing a single endpoint for takers to execute trades using the best rates available. We envision a connected liquidity network that facilitates seamless, decentralized cross-chain token swaps across Kyber based networks on different chains. Kyber is a fully on-chain liquidity protocol that enables decentralized exchange of cryptocurrencies in any application. Liquidity providers (Reserves) are integrated into one single endpoint for takers and users. When a user requests a trade, the protocol will scan the entire network to find the reserve with the best price and take liquidity from that particular reserve. 1.INTRODUCTIONDeFi applications all need access to good liquidity sources, which is a critical component to provide good services. Currently, decentralized liquidity is comprised of various sources including DEXes (Uniswap, OasisDEX, Bancor), decentralized funds and other financial apps. The more scattered the sources, the harder it becomes for anyone to either find the best rate for their trade or to even find enough liquidity for their need.Kyber is a blockchain-based liquidity protocol that aggregates liquidity from a wide range of reserves, powering instant and secure token exchange in any decentralized application. The protocol allows for a wide range of implementation possibilities for liquidity providers, allowing a wide range of entities to contribute liquidity, including end users, decentralized exchanges and other decentralized protocols. On the taker side, end users, cryptocurrency wallets, and smart contracts are able to perform instant and trustless token trades at the best rates available amongst the sources. The Kyber Network is project based on the Ethereum protocol that seeks to completely decentralize the exchange of crypto currencies and make exchange trustless by keeping everything on the blockchain. Through the Kyber Network, users should be able to instantly convert or exchange any crypto currency. 1.1 OVERVIEW ABOUT KYBER NETWORK PROTOCOLThe Kyber Network is a decentralized way to exchange ETH and different ERC20 tokens instantly — no waiting and no registration needed.Using this protocol, developers can build innovative payment flows and applications, including instant token swap services, ERC20 payments, and financial DApps — helping to build a world where any token is usable anywhere. Kyber’s fully on-chain design allows for full transparency and verifiability in the matching engine, as well as seamless composability with DApps, not all of which are possible with off-chain or hybrid approaches. The integration of a large variety of liquidity providers also makes Kyber uniquely capable of supporting sophisticated schemes and catering to the needs of DeFi DApps and financial institutions. Hence, many developers leverage Kyber’s liquidity pool to build innovative financial applications, and not surprisingly, Kyber is the most used DeFi protocol in the world. The Kyber Network is quite an established project that is trying to change the way we think of decentralised crypto currency exchange. The Kyber Network has seen very rapid development. After being announced in May 2017 the testnet for the Kyber Network went live in August 2017. An ICO followed in September 2017, with the company raising 200,000 ETH valued at $60 million in just one day. The live main net was released in February 2018 to whitelisted participants, and on March 19, 2018, the Kyber Network opened the main net as a public beta. Since then the network has seen increasing growth, with network volumes growing more than 500% in the first half of 2019. Although there was a modest decrease in August 2019 that can be attributed to the price of ETH dropping by 50%, impacting the overall total volumes being traded and processed globally. They are developing a decentralised exchange protocol that will allow developers to build payment flows and financial apps. This is indeed quite a competitive market as a number of other such protocols have been launched. In Brief - Kyber Network is a tool that allows anyone to swap tokens instantly without having to use exchanges. - It allows vendors to accept different types of cryptocurrency while still being paid in their preferred crypto of choice. - It’s built primarily for Ethereum, but any smart-contract based blockchain can incorporate it. At its core, Kyber is a decentralized way to exchange ETH and different ERC20 tokens instantly–no waiting and no registration needed. To do this Kyber uses a diverse set of liquidity pools, or pools of different crypto assets called “reserves” that any project can tap into or integrate with. A typical use case would be if a vendor allowed customers to pay in whatever currency they wish, but receive the payment in their preferred token. Another example would be for Dapp users. At present, if you are not a token holder of a certain Dapp you can’t use it. With Kyber, you could use your existing tokens, instantly swap them for the Dapp specific token and away you go. All this swapping happens directly on the Ethereum blockchain, meaning every transaction is completely transparent. 1.1.1 WHY BUILD THE KYBER NETWORK?While crypto currencies were built to be decentralized, many of the exchanges for trading crypto currencies have become centralized affairs. This has led to security vulnerabilities, with many exchanges becoming the victims of hacking and theft.It has also led to increased fees and costs, and the centralized exchanges often come with slow transfer times as well. In some cases, wallets have been locked and users are unable to withdraw their coins. Decentralized exchanges have popped up recently to address the flaws in the centralized exchanges, but they have their own flaws, most notably a lack of liquidity, and often times high costs to modify trades in their on-chain order books. Some of the Integrations with Kyber Protocol The Kyber Network was formed to provide users with a decentralized exchange that keeps everything right on the blockchain, and uses a reserve system rather than an order book to provide high liquidity at all times. This will allow for the exchange and transfer of any cryptocurrency, even cross exchanges, and costs will be kept at a minimum as well. The Kyber Network has three guiding design philosophies since the start:
1.1.2 WHO INVENTED KYBER?Kyber’s founders are Loi Luu, Victor Tran, Yaron Velner — CEO, CTO, and advisor to the Kyber Network.1.1.3 WHAT DISTINGUISHES KYBER?Kyber’s mission has always been to integrate with other protocols so they’ve focused on being developer-friendly by providing architecture to allow anyone to incorporate the technology onto any smart-contract powered blockchain. As a result, a variety of different dapps, vendors, and wallets use Kyber’s infrastructure including Set Protocol, bZx, InstaDApp, and Coinbase wallet.Besides, dapps, vendors, and wallets, Kyber also integrates with other exchanges such as Uniswap — sharing liquidity pools between the two protocols. A typical use case would be if a vendor allowed customers to pay in whatever currency they wish, but receive the payment in their preferred token. Another example would be for Dapp users. At present, if you are not a token holder of a certain Dapp you can’t use it. With Kyber, you could use your existing tokens, instantly swap them for the Dapp specific token and away you go. Limit orders on Kyber allow users to set a specific price in which they would like to exchange a token instead of accepting whatever price currently exists at the time of trading. However, unlike with other exchanges, users never lose custody of their crypto assets during limit orders on Kyber. The Kyber protocol works by using pools of crypto funds called “reserves”, which currently support over 70 different ERC20 tokens. Reserves are essentially smart contracts with a pool of funds. Different parties with different prices and levels of funding control all reserves. Instead of using order books to match buyers and sellers to return the best price, the Kyber protocol looks at all the reserves and returns the best price among the different reserves. Reserves make money on the “spread” or differences between the buying and selling prices. The Kyber wants any token holder to easily convert one token to another with a minimum of fuss. 1.2 KYBER PROTOCOLThe protocol smart contracts offer a single interface for the best available token exchange rates to be taken from an aggregated liquidity pool across diverse sources. ● Aggregated liquidity pool. The protocol aggregates various liquidity sources into one liquidity pool, making it easy for takers to find the best rates offered with one function call. ● Diverse sources of liquidity. The protocol allows different types of liquidity sources to be plugged into. Liquidity providers may employ different strategies and different implementations to contribute liquidity to the protocol. ● Permissionless. The protocol is designed to be permissionless where any developer can set up various types of reserves, and any end user can contribute liquidity. Implementations need to take into consideration various security vectors, such as reserve spamming, but can be mitigated through a staking mechanism. We can expect implementations to be permissioned initially until the maintainers are confident about these considerations.The core feature that the Kyber protocol facilitates is the token swap between taker and liquidity sources. The protocol aims to provide the following properties for token trades: ● Instant Settlement. Takers do not have to wait for their orders to be fulfilled, since trade matching and settlement occurs in a single blockchain transaction. This enables trades to be part of a series of actions happening in a single smart contract function. ● Atomicity. When takers make a trade request, their trade either gets fully executed, or is reverted. This “all or nothing” aspect means that takers are not exposed to the risk of partial trade execution. ● Public rate verification. Anyone can verify the rates that are being offered by reserves and have their trades instantly settled just by querying from the smart contracts. ● Ease of integration. Trustless and atomic token trades can be directly and easily integrated into other smart contracts, thereby enabling multiple trades to be performed in a smart contract function. How each actor works is specified in Section Network Actors. 1. Takers refer to anyone who can directly call the smart contract functions to trade tokens, such as end-users, DApps, and wallets. 2. Reserves refer to anyone who wishes to provide liquidity. They have to implement the smart contract functions defined in the reserve interface in order to be registered and have their token pairs listed. 3. Registered reserves refer to those that will be cycled through for matching taker requests. 4. Maintainers refer to anyone who has permission to access the functions for the adding/removing of reserves and token pairs, such as a DAO or the team behind the protocol implementation. 5. In all, they comprise of the network, which refers to all the actors involved in any given implementation of the protocol. The protocol implementation needs to have the following: 1. Functions for takers to check rates and execute the trades 2. Functions for the maintainers to registeremove reserves and token pairs 3. Reserve interface that defines the functions reserves needs to implement https://preview.redd.it/d2tcxc7wdcg51.png?width=700&format=png&auto=webp&s=b2afde388a77054e6731772b9115ee53f09b6a4a 1.3 KYBER CORE SMART CONTRACTSKyber Core smart contracts is an implementation of the protocol that has major protocol functions to allow actors to join and interact with the network. For example, the Kyber Core smart contracts provide functions for the listing and delisting of reserves and trading pairs by having clear interfaces for the reserves to comply to be able to register to the network and adding support for new trading pairs. In addition, the Kyber Core smart contracts also provide a function for takers to query the best rate among all the registered reserves, and perform the trades with the corresponding rate and reserve. A trading pair consists of a quote token and any other token that the reserve wishes to support. The quote token is the token that is either traded from or to for all trades. For example, the Ethereum implementation of the Kyber protocol uses Ether as the quote token.In order to search for the best rate, all reserves supporting the requested token pair will be iterated through. Hence, the Kyber Core smart contracts need to have this search algorithm implemented. The key functions implemented in the Kyber Core Smart Contracts are listed in Figure 2 below. We will visit and explain the implementation details and security considerations of each function in the Specification Section. 1.4 HOW KYBER’S ON-CHAIN PROTOCOL WORKS?Kyber is the liquidity infrastructure for decentralized finance. Kyber aggregates liquidity from diverse sources into a pool, which provides the best rates for takers such as DApps, Wallets, DEXs, and End users.1.4.1 PROVIDING LIQUIDITY AS A RESERVEAnyone can operate a Kyber Reserve to market make for profit and make their tokens available for DApps in the ecosystem. Through an open reserve architecture, individuals, token teams and professional market makers can contribute token assets to Kyber’s liquidity pool and earn from the spread in every trade. These tokens become available at the best rates across DApps that tap into the network, making them instantly more liquid and useful.MAIN RESERVE TYPES Kyber currently has over 45 reserves in its network providing liquidity. There are 3 main types of reserves that allow different liquidity contribution options to suit the unique needs of different providers. 1. Automated Price Reserves (APR) — Allows token teams and users with large token holdings to have an automated yet customized pricing system with low maintenance costs. Synthetix and Melon are examples of teams that run APRs. 2. Fed Price Reserves (FPR) — Operated by professional market makers that require custom and advanced pricing strategies tailored to their specific needs. Kyber alongside reserves such as OneBit, runs FPRs. 3. Bridge Reserves (BR) — These are specialized reserves meant to bring liquidity from other on-chain liquidity providers like Uniswap, Oasis, DutchX, and Bancor into the network. 1.5 KYBER NETWORK ROLESThere Kyber Network functions through coordination between several different roles and functions as explained below: - Users — This entity uses the Kyber Network to send and receive tokens. A user can be an individual, a merchant, and even a smart contract account. - Reserve Entities — This role is used to add liquidity to the platform through the dynamic reserve pool. Some reserve entities are internal to the Kyber Network, but others may be registered third parties. Reserve entities may be public if the public contributes to the reserves they hold, otherwise they are considered private. By allowing third parties as reserve entities the network adds diversity, which prevents monopolization and keeps exchange rates competitive. Allowing third party reserve entities also allows for the listing of less popular coins with lower volumes. - Reserve Contributors — Where reserve entities are classified as public, the reserve contributor is the entity providing reserve funds. Their incentive for doing so is a profit share from the reserve. - The Reserve Manager — Maintains the reserve, calculates exchange rates and enters them into the network. The reserve manager profits from exchange spreads set by them on their reserves. They can also benefit from increasing volume by accessing the entire Kyber Network. - The Kyber Network Operator — Currently the Kyber Network team is filling the role of the network operator, which has a function to adds/remove Reserve Entities as well as controlling the listing of tokens. Eventually, this role will revert to a proper decentralized governance.1.6 BASIC TOKEN TRADEA basic token trade is one that has the quote token as either the source or destination token of the trade request. The execution flow of a basic token trade is depicted in the diagram below, where a taker would like to exchange BAT tokens for ETH as an example. The trade happens in a single blockchain transaction. 1. Taker sends 1 ETH to the protocol contract, and would like to receive BAT in return. 2. Protocol contract queries the first reserve for its ETH to BAT exchange rate. 3. Reserve 1 offers an exchange rate of 1 ETH for 800 BAT. 4. Protocol contract queries the second reserve for its ETH to BAT exchange rate. 5. Reserve 2 offers an exchange rate of 1 ETH for 820 BAT. 6. This process goes on for the other reserves. After the iteration, reserve 2 is discovered to have offered the best ETH to BAT exchange rate. 7. Protocol contract sends 1 ETH to reserve 2. 8. The reserve sends 820 BAT to the taker.1.7 TOKEN-TO-TOKEN TRADEA token-to-token trade is one where the quote token is neither the source nor the destination token of the trade request. The exchange flow of a token to token trade is depicted in the diagram below, where a taker would like to exchange BAT tokens for DAI as an example. The trade happens in a single blockchain transaction. 1. Taker sends 50 BAT to the protocol contract, and would like to receive DAI in return. 2. Protocol contract sends 50 BAT to the reserve offering the best BAT to ETH rate. 3. Protocol contract receives 1 ETH in return. 4. Protocol contract sends 1 ETH to the reserve offering the best ETH to DAI rate. 5. Protocol contract receives 30 DAI in return. 6. Protocol contract sends 30 DAI to the user.2.KYBER NETWORK CRYSTAL (KNC) TOKENKyber Network Crystal (KNC) is an ERC-20 utility token and an integral part of Kyber Network.KNC is the first deflationary staking token where staking rewards and token burns are generated from actual network usage and growth in DeFi. The Kyber Network Crystal (KNC) is the backbone of the Kyber Network. It works to connect liquidity providers and those who need liquidity and serves three distinct purposes. The first of these is to collect transaction fees, and a portion of every fee collected is burned, which keeps KNC deflationary. Kyber Network Crystals (KNC), are named after the crystals in Star Wars used to power light sabers. The KNC also ensures the smooth operation of the reserve system in the Kyber liquidity since entities must use third-party tokens to buy the KNC that pays for their operations in the network. KNC allows token holders to play a critical role in determining the incentive system, building a wide base of stakeholders, and facilitating economic flow in the network. A small fee is charged each time a token exchange happens on the network, and KNC holders get to vote on this fee model and distribution, as well as other important decisions. Over time, as more trades are executed, additional fees will be generated for staking rewards and reserve rebates, while more KNC will be burned. - Participation rewards — KNC holders can stake KNC in the KyberDAO and vote on key parameters. Voters will earn staking rewards (in ETH) - Burning — Some of the network fees will be burned to reduce KNC supply permanently, providing long-term value accrual from decreasing supply. - Reserve incentives — KNC holders determine the portion of network fees that are used as rebates for selected liquidity providers (reserves) based on their volume performance. Finally, the KNC token is the connection between the Kyber Network and the exchanges, wallets, and dApps that leverage the liquidity network. This is a virtuous system since entities are rewarded with referral fees for directing more users to the Kyber Network, which helps increase adoption for Kyber and for the entities using the Network. And of course there will soon be a fourth and fifth uses for the KNC, which will be as a staking token used to generate passive income, as well as a governance token used to vote on key parameters of the network. The Kyber Network Crystal (KNC) was released in a September 2017 ICO at a price around $1. There were 226,000,000 KNC minted for the ICO, with 61% sold to the public. The remaining 39% are controlled 50/50 by the company and the founders/advisors, with a 1 year lockup period and 2 year vesting period. Currently, just over 180 million coins are in circulation, and the total supply has been reduced to 210.94 million after the company burned 1 millionth KNC token in May 2019 and then its second millionth KNC token just three months later. That means that while it took 15 months to burn the first million KNC, it took just 10 weeks to burn the second million KNC. That shows how rapidly adoption has been growing recently for Kyber, with July 2019 USD trading volumes on the Kyber Network nearly reaching $60 million. This volume has continued growing, and on march 13, 2020 the network experienced its highest daily trading activity of $33.7 million in a 24-hour period. Currently KNC is required by Reserve Managers to operate on the network, which ensures a minimum amount of demand for the token. Combined with future plans for burning coins, price is expected to maintain an upward bias, although it has suffered along with the broader market in 2018 and more recently during the summer of 2019. It was unfortunate in 2020 that a beginning rally was cut short by the coronavirus pandemic, although the token has stabilized as of April 2020, and there are hopes the rally could resume in the summer of 2020. 2.1 HOW ARE KNC TOKENS PRODUCED?The native token of Kyber is called Kyber Network Crystals (KNC). All reserves are required to pay fees in KNC for the right to manage reserves. The KNC collected as fees are either burned and taken out of the total supply or awarded to integrated dapps as an incentive to help them grow.2.2 HOW DO YOU GET HOLD OF KNC TOKENS?Kyber Swap can be used to buy ETH directly using a credit card, which can then be used to swap for KNC. Besides Kyber itself, exchanges such as Binance, Huobi, and OKex trade KNC.2.3 WHAT CAN YOU DO WITH KYBER?The most direct and basic function of Kyber is for instantly swapping tokens without registering an account, which anyone can do using an Etheruem wallet such as MetaMask. Users can also create their own reserves and contribute funds to a reserve, but that process is still fairly technical one–something Kyber is working on making easier for users in the future.2.4 THE GOAL OF KYBER THE FUTUREThe goal of Kyber in the coming years is to solidify its position as a one-stop solution for powering liquidity and token swapping on Ethereum. Kyber plans on a major protocol upgrade called Katalyst, which will create new incentives and growth opportunities for all stakeholders in their ecosystem, especially KNC holders. The upgrade will mean more use cases for KNC including to use KNC to vote on governance decisions through a decentralized organization (DAO) called the KyberDAO.With our upcoming Katalyst protocol upgrade and new KNC model, Kyber will provide even more benefits for stakeholders. For instance, reserves will no longer need to hold a KNC balance for fees, removing a major friction point, and there will be rebates for top performing reserves. KNC holders can also stake their KNC to participate in governance and receive rewards. 2.5 BUYING & STORING KNCThose interested in buying KNC tokens can do so at a number of exchanges. Perhaps your best bet between the complete list is the likes of Coinbase Pro and Binance. The former is based in the USA whereas the latter is an offshore exchange.The trading volume is well spread out at these exchanges, which means that the liquidity is not concentrated and dependent on any one exchange. You also have decent liquidity on each of the exchange books. For example, the Binance BTC / KNC books are wide and there is decent turnover. This means easier order execution. KNC is an ERC20 token and can be stored in any wallet with ERC20 support, such as MyEtherWallet or MetaMask. One interesting alternative is the KyberSwap Android mobile app that was released in August 2019. It allows for instant swapping of tokens and has support for over 70 different altcoins. It also allows users to set price alerts and limit orders and works as a full-featured Ethereum wallet. 2.6 KYBER KATALYST UPGRADEKyber has announced their intention to become the de facto liquidity layer for the Decentralized Finance space, aiming to have Kyber as the single on-chain endpoint used by the majority of liquidity providers and dApp developers. In order to achieve this goal the Kyber Network team is looking to create an open ecosystem that garners trust from the decentralized finance space. They believe this is the path that will lead the majority of projects, developers, and users to choose Kyber for liquidity needs. With that in mind they have recently announced the launch of a protocol upgrade to Kyber which is being called Katalyst.The Katalyst upgrade will create a stronger ecosystem by creating strong alignments towards a common goal, while also strengthening the incentives for stakeholders to participate in the ecosystem. The primary beneficiaries of the Katalyst upgrade will be the three major Kyber stakeholders: 1. Reserve managers who provide network liquidity; 2. dApps that connect takers to Kyber; 3. KNC holders. These stakeholders can expect to see benefits as highlighted below: Reserve Managers will see two new benefits to providing liquidity for the network. The first of these benefits will be incentives for providing reserves. Once Katalyst is implemented part of the fees collected will go to the reserve managers as an incentive for providing liquidity. This mechanism is similar to rebates in traditional finance, and is expected to drive the creation of additional reserves and market making, which in turn will lead to greater liquidity and platform reach. Katalyst will also do away with the need for reserve managers to maintain a KNC balance for use as network fees. Instead fees will be automatically collected and used as incentives or burned as appropriate. This should remove a great deal of friction for reserves to connect with Kyber without affecting the competitive exchange rates that takers in the system enjoy. dApp Integrators will now be able to set their own spread, which will give them full control over their own business model. This means the current fee sharing program that shares 30% of the 0.25% fee with dApp developers will go away and developers will determine their own spread. It’s believed this will increase dApp development within Kyber as developers will now be in control of fees. KNC Holders, often thought of as the core of the Kyber Network, will be able to take advantage of a new staking mechanism that will allow them to receive a portion of network fees by staking their KNC and participating in the KyberDAO. 2.7 COMING KYBERDAOWith the implementation of the Katalyst protocol the KNC holders will be put right at the heart of Kyber. Holders of KNC tokens will now have a critical role to play in determining the future economic flow of the network, including its incentive systems.The primary way this will be achieved is through KyberDAO, a way in which on-chain and off-chain governance will align to streamline cooperation between the Kyber team, KNC holders, and market participants. The Kyber Network team has identified 3 key areas of consideration for the KyberDAO: 1. Broad representation, transparent governance and network stability 2. Strong incentives for KNC holders to maintain their stake and be highly involved in governance 3. Maximizing participation with a wide range of options for voting delegation Interaction between KNC Holders & Kyber This means KNC holders have been empowered to determine the network fee and how to allocate the fees to ensure maximum network growth. KNC holders will now have three fee allocation options to vote on: - Voting Rewards: Immediate value creation. Holders who stake and participate in the KyberDAO get their share of the fees designated for rewards. - Burning: Long term value accrual. The decreasing supply of KNC will improve the token appreciation over time and benefit those who did not participate. - Reserve Incentives:Value creation via network growth. By rewarding Kyber reserve managers based on their performance, it helps to drive greater volume, value, and network fees. 2.8 TRANSPARENCY AND STABILITYThe design of the KyberDAO is meant to allow for the greatest network stability, as well as maximum transparency and the ability to quickly recover in emergency situations. Initally the Kyber team will remain as maintainers of the KyberDAO. The system is being developed to be as verifiable as possible, while still maintaining maximum transparency regarding the role of the maintainer in the DAO.Part of this transparency means that all data and processes are stored on-chain if feasible. Voting regarding network fees and allocations will be done on-chain and will be immutable. In situations where on-chain storage or execution is not feasible there will be a set of off-chain governance processes developed to ensure all decisions are followed through on. 2.9 KNC STAKING AND DELEGATIONStaking will be a new addition and both staking and voting will be done in fixed periods of times called “epochs”. These epochs will be measured in Ethereum block times, and each KyberDAO epoch will last roughly 2 weeks.This is a relatively rapid epoch and it is beneficial in that it gives more rapid DAO conclusion and decision-making, while also conferring faster reward distribution. On the downside it means there needs to be a new voting campaign every two weeks, which requires more frequent participation from KNC stakeholders, as well as more work from the Kyber team. Delegation will be part of the protocol, allowing stakers to delegate their voting rights to third-party pools or other entities. The pools receiving the delegation rights will be free to determine their own fee structure and voting decisions. Because the pools will share in rewards, and because their voting decisions will be clearly visible on-chain, it is expected that they will continue to work to the benefit of the network. 3. TRADINGAfter the September 2017 ICO, KNC settled into a trading price that hovered around $1.00 (decreasing in BTC value) until December. The token has followed the trend of most other altcoins — rising in price through December and sharply declining toward the beginning of January 2018.The KNC price fell throughout all of 2018 with one exception during April. From April 6th to April 28th, the price rose over 200 percent. This run-up coincided with a blog post outlining plans to bring Bitcoin to the Ethereum blockchain. Since then, however, the price has steadily fallen, currently resting on what looks like a $0.15 (~0.000045 BTC) floor. With the number of partners using the Kyber Network, the price may rise as they begin to fully use the network. The development team has consistently hit the milestones they’ve set out to achieve, so make note of any release announcements on the horizon. 4. COMPETITIONThe 0x project is the biggest competitor to Kyber Network. Both teams are attempting to enter the decentralized exchange market. The primary difference between the two is that Kyber performs the entire exchange process on-chain while 0x keeps the order book and matching off-chain.As a crypto swap exchange, the platform also competes with ShapeShift and Changelly. 5.KYBER MILESTONES• June 2020: Digifox, an all-in-one finance application by popular crypto trader and Youtuber Nicholas Merten a.k.a DataDash (340K subs), integrated Kyber to enable users to easily swap between cryptocurrencies without having to leave the application. • June 2020: Stake Capital partnered with Kyber to provide convenient KNC staking and delegation services, and also took a KNC position to participate in governance. • June 2020: Outlined the benefits of the Fed Price Reserve (FPR) for professional market makers and advanced developers. • May 2020: Kyber crossed US$1 Billion in total trading volume and 1 Million transactions, performed entirely on-chain on Ethereum. • May 2020: StakeWith.Us partnered Kyber Network as a KyberDAO Pool Master. • May 2020: 2Key, a popular blockchain referral solution using smart links, integrated Kyber’s on-chain liquidity protocol for seamless token swaps • May 2020: Blockchain game League of Kingdoms integrated Kyber to accept Token Payments for Land NFTs. • May 2020: Joined the Zcash Developer Alliance , an invite-only working group to advance Zcash development and interoperability. • May 2020: Joined the Chicago DeFi Alliance to help accelerate on-chain market making for professionals and developers. • March 2020: Set a new record of USD $33.7M in 24H fully on-chain trading volume, and $190M in 30 day on-chain trading volume. • March 2020: Integrated by Rarible, Bullionix, and Unstoppable Domains, with the KyberWidget deployed on IPFS, which allows anyone to swap tokens through Kyber without being blocked. • February 2020: Popular Ethereum blockchain game Axie Infinity integrated Kyber to accept ERC20 payments for NFT game items. • February 2020: Kyber’s protocol was integrated by Gelato Finance, Idle Finance, rTrees, Sablier, and 0x API for their liquidity needs. • January 2020: Kyber Network was found to be the most used protocol in the whole decentralized finance (DeFi) space in 2019, according to a DeFi research report by Binance. • December 2019: Switcheo integrated Kyber’s protocol for enhanced liquidity on their own DEX. • December 2019: DeFi Wallet Eidoo integrated Kyber for seamless in-wallet token swaps. • December 2019: Announced the development of the Katalyst Protocol Upgrade and new KNC token model. • July 2019: Developed the Waterloo Bridge , a Decentralized Practical Cross-chain Bridge between EOS and Ethereum, successfully demonstrating a token swap between Ethereum to EOS. • July 2019: Trust Wallet, the official Binance wallet, integrated Kyber as part of its decentralized token exchange service, allowing even more seamless in-wallet token swaps for thousands of users around the world. • May 2019: HTC, the large consumer electronics company with more than 20 years of innovation, integrated Kyber into its Zion Vault Wallet on EXODUS 1 , the first native web 3.0 blockchain phone, allowing users to easily swap between cryptocurrencies in a decentralized manner without leaving the wallet. • January 2019: Introduced the Automated Price Reserve (APR) , a capital efficient way for token teams and individuals to market make with low slippage. • January 2019: The popular Enjin Wallet, a default blockchain DApp on the Samsung S10 and S20 mobile phones, integrated Kyber to enable in-wallet token swaps. • October 2018: Kyber was a founding member of the WBTC (Wrapped Bitcoin) Initiative and DAO. • October 2018: Developed the KyberWidget for ERC20 token swaps on any website, with CoinGecko being the first major project to use it on their popular site.Full Article |
Universal access – You can start day trading bitcoins anywhere on the planet, 24 hours a day, 7 days a week, 365 days a year. You simply need an internet connection. You simply need an internet connection. Yes you can be rest assured that Bitcoin trades 24 hours a day non-stop. Remember that it is a global digital currency that has no restriction across the global. People are making transactions every single minute of the day coupled with the different time zones across the globe. Cryptocurrencies like bitcoin — which have surged in value and popularity over the past year — trade seamlessly for 24 hours a day, 7 days a week throughout the world, possibly showing that ... Yes, Bitcoin trades 24 hours a day, every single day. Unlike traditional assets such as stocks and bonds, which have specified trading hours, Bitcoin can be bought and sold at any time. -The Ryze Team ryzecrypto.com It may seem like an anomaly, but since Bitcoin is an industry with it’s own rules of operation and can do so 24/7 that is simply how it is. No other reason in truth.
[index] [794] [444] [144] [205] [688] [679] [346] [631] [459] [46]
binary options, binary, options, binary option, option, digital options, trading, scam, scammers, scam alert, scammed Investors have the opportunity to trade 24 hours a day, 7 days a week, just one of the many excellent features Binary Options provide the trader. Your Binary Options Trading Strategy is very important and should be your foundation. Stock markets close while futures markets trade 24 hours a day. This provides a smoother view of how equities are being priced. We interpret and explain price moves in real-time, 24 hours a day. 🚨 MEGA BITCOIN BLUEPRINT SALE 🚨 https://www.btcblueprint.com 🔥 Up To $600 Discount - Limited Time 🔥 🔲 My Top 3 Recommended Exchanges 🔵 Phemex http ... You do not have to trade 24 hours a day, you just have to pick your most convenient hours for trading everyday. If you learnt something in this video give us a thumbs up. Bitcoin Wallet: Ledger Nano S & Trezor One Hardware Wallets Step-by-Step Guide (For Beginners!) - Duration: 46:02. Crypto Casey 128,186 views