Microsoft MakeCode Arcade

Technical: Taproot: Why Activate?

This is a follow-up on https://old.reddit.com/Bitcoin/comments/hqzp14/technical_the_path_to_taproot_activation/
Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners?
And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess.
First, let's consider some principles of Bitcoin.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so).
So, how does Taproot affect those principles?

Taproot and Your /Coins

Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash).
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input).
However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits!
Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh?
With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save!
And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well!
(P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1)
Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service!
So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win!
(even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot)
And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!

Taproot and Your Contracts

No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade.
So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust.
Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade.
However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade.
In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address.
Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants).
But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer).
Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos).
(technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).

Taproot and Your Contracts, Part 2: Cryptographic Boogaloo

Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code.
This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded.
And you can do that, with HTLCs, today.
Of course, HTLCs do have problems:
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar".
Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given public key to you.
Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige).
(Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key).
So:
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script.
(technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)

Quantum Quibbles!

Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable??
Well, in theory yes. In practice, they probably are not.
It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash.
When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key.
So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key.
(public keys should be public, that's why they're called public keys, LOL)
And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions.
So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort.
Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers.
For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
So:
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).

Summary

I Wanna Be The Taprooter!

So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!

But I Hate Taproot!!

That's fine!

Discussions About Taproot Activation

submitted by almkglor to Bitcoin [link] [comments]

[ Bitcoin ] Technical: Taproot: Why Activate?

Topic originally posted in Bitcoin by almkglor [link]
This is a follow-up on https://old.reddit.com/Bitcoin/comments/hqzp14/technical_the_path_to_taproot_activation/
Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners?
And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess.
First, let's consider some principles of Bitcoin.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so).
So, how does Taproot affect those principles?

Taproot and Your /Coins

Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash).
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input).
However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits!
Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh?
With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save!
And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well!
(P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1)
Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service!
So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win!
(even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot)
And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!

Taproot and Your Contracts

No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade.
So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust.
Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade.
However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade.
In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address.
Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants).
But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer).
Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos).
(technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).

Taproot and Your Contracts, Part 2: Cryptographic Boogaloo

Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code.
This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded.
And you can do that, with HTLCs, today.
Of course, HTLCs do have problems:
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar".
Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given private key to you.
Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige).
(Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key).
So:
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script.
(technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)

Quantum Quibbles!

Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable??
Well, in theory yes. In practice, they probably are not.
It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash.
When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key.
So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key.
(public keys should be public, that's why they're called public keys, LOL)
And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions.
So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort.
Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers.
For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
So:
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).

Summary

I Wanna Be The Taprooter!

So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!

But I Hate Taproot!!

That's fine!

Discussions About Taproot Activation

almkglor your post has been copied because one or more comments in this topic have been removed. This copy will preserve unmoderated topic. If you would like to opt-out, please send a message using [this link].
[deleted comment]
[deleted comment]
[deleted comment]
submitted by anticensor_bot to u/anticensor_bot [link] [comments]

Want to know why NEM should be as popular as Ethereum? this will be bigger than any altcoins you see, here's why

Want to know why NEM should be as popular as Ethereum? this will be bigger than any altcoins you see, here's why

Altcoin Explorer: NEM (XEM), the Enterprise-Grade Blockchain Platform


https://preview.redd.it/5ogfihikwkg51.png?width=1300&format=png&auto=webp&s=099780e02777d16d4e2add64b249c46da1cd488b
Nestled among the top 40 cryptocurrencies by reported market cap, New Economy Movement — popularly known as NEM (XEM) – is a peer-to-peer (P2P), dual-layer blockchain smart contract platform written in one of the most influential programming languages, Java. NEM uses the proof-of-importance (POI) consensus algorithm that essentially values the tokens held and the activity conducted by the nodes on the blockchain network.
In this Altcoin Explorer, BTCManager delves deeper into the finer intricacies of the NEM blockchain protocol, including the project’s POI consensus algorithm, its native digital token XEM, and some of its real-world use-cases.
Without further ado, let’s get to the core of this high-performance distributed ledger technology (DLT) platform.

History of NEM

NEM was launched on March 31, 2015, with an aim to develop an enterprise-grade blockchain protocol that could circumvent the infamous trilemma of blockchain: scalability, speed, and privacy.
Operated by a Gibraltar-registered NEM Group, NEM is a fork-out version of the NXT blockchain. After the successful fork, the NEM community decided to build its ecosystem from the ground up and developed its own codebase to make the network more scalable and faster.
NEM’s insistence toward building its own tech infrastructure led to a DLT protocol that is unlike anything resembling other similar platforms.
Today, NEM ranks among the top go-to blockchain platforms for enterprises across the world, rivaling competing protocols including Ethereum (ETH), and TRON (TRX), among others.

NEM’s Proof-of-Importance (POI) Algorithm

Unlike Bitcoin’s (BTC) energy-intensive Proof-of-Work (PoW) and Ethereum’s yet-to-be-implemented Proof-of-Stake (PoS) consensus algorithm, NEM uses PoI consensus mechanism.
The PoI mechanism achieves consensus by incentivizing active user participation in the NEM network. This consensus infrastructure ensures an agile decentralized network by rewarding well-behaved nodes that not only possess a significant stake in the network but are also actively engaged in executing transactions to maintain the network’s robustness.
Specifically, each node in the network possesses an ‘Importance Score’ that impacts the number of times the said node can ‘Harvest’ the XEM altcoin.
Initially, when a user puts XEM tokens into their wallet, they are called ‘unvested coins.’ Over time, as the wallets start accumulating an increasing number of XEM and contribute to the network’s transaction volume, they start collecting importance scores. At the same time, the XEM tokens in these wallets change into ‘vested coins,’ provided that there are at least 10000 tokens in the wallet.
To put things into perspective, let’s take the help of a small example.
On day 1, Joe receives 50,000 XEM in his digital wallet. Now, with each passing day, the NEM network will ‘vest’ 10 percent of the tokens held by Joe. So, on day 2, 5,000 tokens held by Joe are vested into the network. On day 3, 10 percent of the remaining tokens – 15,000 XEM – get vested into the network, leaving Joe with 13,500 XEM, and so one. After a couple of days, Joe sees that the number of XEM vested by him has crossed the 10,000 coins threshold, thereby, making him eligible to seek rewards from the NEM blockchain for his contribution to vesting his tokens.
Close followers of blockchain projects would find the aforementioned network reward mechanism bear a close resemblance to the PoS consensus algorithm. However, it’s worthy of note that vesting coins is just one way of calculating a node’s importance score.
The NEM protocol also rewards nodes that are responsible for most activity on the network. In essence, this means that the higher the number of transactions executed by a node, the more likely it is to gain higher importance points. The balance between vesting XEM and network activity is an important metric to be maintained by NEM nodes as it directly impacts their likelihood of harvesting XEM.
NEM’s consensus algorithm does away with several issues plaguing the more energy-intensive protocols such as PoW. For instance, PoI does not necessarily require high-energy hardware to run the nodes. The decentralized nature of the algorithm means that almost any machine — irrespective of its tech configuration – can participate in the NEM ecosystem ensuring it remains decentralized.

NEM’s Native Digital Token — XEM

XEM, unlike the vast majority of other cryptocurrencies, isn’t mined or staked using Pow or PoS algorithms. Rather, as explained earlier, XEM is ‘harvested’ through the PoI algorithm which ensures a steady supply of the digital token without flooding the market and involving the risk of a dramatic crash in price.
Per data on CoinMarketCap, at the time of writing, XEM trades at $0.04 with a market cap of more than $382 million and a 24-hour trading volume of approximately $6.8 million. The coin reached its all-time high of $1.92 in January 2018.
A large number of reputable cryptocurrency exchanges trade XEM, including Binance, Upbit, OKEx, Bithumb, ProBit, among others. The digital token can be easily traded with BTC, ETH, and USDT trading pairs.
That said, if you wish to vest your XEM to partake in the maintenance of the NEM network and earn rewards, it is recommended you store your tokens in the official NEM Nano wallet for desktop and mobile OS. Only XEM tokens held in the official NEM Nano wallet are eligible for vesting.

NEM Use-Cases

To date, NEM has been deployed for various real-world applications with promising results.
In 2018, Ukraine launched a blockchain-based e-voting trial leveraging the NEM DLT platform.
At the time, Ukraine’s Central Election Commission – with the local NEM Foundation representation – estimated the test vote trial in each polling station could cost as low as $1,227. The organization’s Oleksandr Stelmakh lauded the efforts, saying that using a blockchain-powered voting mechanism would make it impossible for anyone to fiddle with the records. The Commission added that the NEM protocol presents information in a more user-friendly format for voters.
In the same year, Malaysia’s Ministry of Education launched an e-scroll system based on the NEM blockchain to tackle the menace of fake degrees. The University Degree Issuance and Verification System use the NEM blockchain which is interrogated upon scanning of a QR code printed on the degree certificate.
The Ministry added that one of the primary reasons for its decision to selected the NEM platform was its unique and cutting-edge features in managing traceability and authentication requirements.
On a recent note, the Bank of Lithuania announced that it would be issuing its NEM blockchain-powered digital collector’s coin (LBCoin) in July after the successful completion of its testing phase.

Final Thoughts

Summing up, NEM offers a wide array of in-house features that separate it from other blockchain projects in a space that is becoming increasingly congested. NEM’s creative PoI consensus algorithm is a fresh take on the PoS algorithm for performance enhancement. Further, the project’s newly launched enterprise-grade DLT solution, Symbol, offers a tremendous option to businesses to help them cut costs, reduce complexities, and streamline innovation.
NEM uses the Java programming language that makes it an easy project for developers to get involved with, unlike other projects such as Ethereum that use platform-specific programming languages like Solidity. The project’s tech infrastructure not only makes it less power-intensive compared to Bitcoin but also more scalable than its rival projects including Ethereum and NEO.
NEM’s tagline, “Smart Asset Blockchain, Built for Performance,” perfectly captures everything the project has to offer. Over the years, NEM’s active developer community has craftily addressed the notorious bottlenecks in the vast majority of blockchain solutions, The future looks promising for NEM as it continues to foster a trustless and blockchain-driven economy for tomorrow.
Source
submitted by charlesgwynne to CryptocurrencyICO [link] [comments]

Want to know why NEM should be as popular as Ethereum? this will be bigger than any altcoins you see, here's why

Want to know why NEM should be as popular as Ethereum? this will be bigger than any altcoins you see, here's why

Altcoin Explorer: NEM (XEM), the Enterprise-Grade Blockchain Platform


https://preview.redd.it/manbawoqvkg51.png?width=1300&format=png&auto=webp&s=fcbae1f067261326f11641bb9b18cd6f57616966
Nestled among the top 40 cryptocurrencies by reported market cap, New Economy Movement — popularly known as NEM (XEM) – is a peer-to-peer (P2P), dual-layer blockchain smart contract platform written in one of the most influential programming languages, Java. NEM uses the proof-of-importance (POI) consensus algorithm that essentially values the tokens held and the activity conducted by the nodes on the blockchain network.
In this Altcoin Explorer, BTCManager delves deeper into the finer intricacies of the NEM blockchain protocol, including the project’s POI consensus algorithm, its native digital token XEM, and some of its real-world use-cases.
Without further ado, let’s get to the core of this high-performance distributed ledger technology (DLT) platform.

History of NEM

NEM was launched on March 31, 2015, with an aim to develop an enterprise-grade blockchain protocol that could circumvent the infamous trilemma of blockchain: scalability, speed, and privacy.
Operated by a Gibraltar-registered NEM Group, NEM is a fork-out version of the NXT blockchain. After the successful fork, the NEM community decided to build its ecosystem from the ground up and developed its own codebase to make the network more scalable and faster.
NEM’s insistence toward building its own tech infrastructure led to a DLT protocol that is unlike anything resembling other similar platforms.
Today, NEM ranks among the top go-to blockchain platforms for enterprises across the world, rivaling competing protocols including Ethereum (ETH), and TRON (TRX), among others.

NEM’s Proof-of-Importance (POI) Algorithm

Unlike Bitcoin’s (BTC) energy-intensive Proof-of-Work (PoW) and Ethereum’s yet-to-be-implemented Proof-of-Stake (PoS) consensus algorithm, NEM uses PoI consensus mechanism.
The PoI mechanism achieves consensus by incentivizing active user participation in the NEM network. This consensus infrastructure ensures an agile decentralized network by rewarding well-behaved nodes that not only possess a significant stake in the network but are also actively engaged in executing transactions to maintain the network’s robustness.
Specifically, each node in the network possesses an ‘Importance Score’ that impacts the number of times the said node can ‘Harvest’ the XEM altcoin.
Initially, when a user puts XEM tokens into their wallet, they are called ‘unvested coins.’ Over time, as the wallets start accumulating an increasing number of XEM and contribute to the network’s transaction volume, they start collecting importance scores. At the same time, the XEM tokens in these wallets change into ‘vested coins,’ provided that there are at least 10000 tokens in the wallet.
To put things into perspective, let’s take the help of a small example.
On day 1, Joe receives 50,000 XEM in his digital wallet. Now, with each passing day, the NEM network will ‘vest’ 10 percent of the tokens held by Joe. So, on day 2, 5,000 tokens held by Joe are vested into the network. On day 3, 10 percent of the remaining tokens – 15,000 XEM – get vested into the network, leaving Joe with 13,500 XEM, and so one. After a couple of days, Joe sees that the number of XEM vested by him has crossed the 10,000 coins threshold, thereby, making him eligible to seek rewards from the NEM blockchain for his contribution to vesting his tokens.
Close followers of blockchain projects would find the aforementioned network reward mechanism bear a close resemblance to the PoS consensus algorithm. However, it’s worthy of note that vesting coins is just one way of calculating a node’s importance score.
The NEM protocol also rewards nodes that are responsible for most activity on the network. In essence, this means that the higher the number of transactions executed by a node, the more likely it is to gain higher importance points. The balance between vesting XEM and network activity is an important metric to be maintained by NEM nodes as it directly impacts their likelihood of harvesting XEM.
NEM’s consensus algorithm does away with several issues plaguing the more energy-intensive protocols such as PoW. For instance, PoI does not necessarily require high-energy hardware to run the nodes. The decentralized nature of the algorithm means that almost any machine — irrespective of its tech configuration – can participate in the NEM ecosystem ensuring it remains decentralized.

NEM’s Native Digital Token — XEM

XEM, unlike the vast majority of other cryptocurrencies, isn’t mined or staked using Pow or PoS algorithms. Rather, as explained earlier, XEM is ‘harvested’ through the PoI algorithm which ensures a steady supply of the digital token without flooding the market and involving the risk of a dramatic crash in price.
Per data on CoinMarketCap, at the time of writing, XEM trades at $0.04 with a market cap of more than $382 million and a 24-hour trading volume of approximately $6.8 million. The coin reached its all-time high of $1.92 in January 2018.
A large number of reputable cryptocurrency exchanges trade XEM, including Binance, Upbit, OKEx, Bithumb, ProBit, among others. The digital token can be easily traded with BTC, ETH, and USDT trading pairs.
That said, if you wish to vest your XEM to partake in the maintenance of the NEM network and earn rewards, it is recommended you store your tokens in the official NEM Nano wallet for desktop and mobile OS. Only XEM tokens held in the official NEM Nano wallet are eligible for vesting.

NEM Use-Cases

To date, NEM has been deployed for various real-world applications with promising results.
In 2018, Ukraine launched a blockchain-based e-voting trial leveraging the NEM DLT platform.
At the time, Ukraine’s Central Election Commission – with the local NEM Foundation representation – estimated the test vote trial in each polling station could cost as low as $1,227. The organization’s Oleksandr Stelmakh lauded the efforts, saying that using a blockchain-powered voting mechanism would make it impossible for anyone to fiddle with the records. The Commission added that the NEM protocol presents information in a more user-friendly format for voters.
In the same year, Malaysia’s Ministry of Education launched an e-scroll system based on the NEM blockchain to tackle the menace of fake degrees. The University Degree Issuance and Verification System use the NEM blockchain which is interrogated upon scanning of a QR code printed on the degree certificate.
The Ministry added that one of the primary reasons for its decision to selected the NEM platform was its unique and cutting-edge features in managing traceability and authentication requirements.
On a recent note, the Bank of Lithuania announced that it would be issuing its NEM blockchain-powered digital collector’s coin (LBCoin) in July after the successful completion of its testing phase.

Final Thoughts

Summing up, NEM offers a wide array of in-house features that separate it from other blockchain projects in a space that is becoming increasingly congested. NEM’s creative PoI consensus algorithm is a fresh take on the PoS algorithm for performance enhancement. Further, the project’s newly launched enterprise-grade DLT solution, Symbol, offers a tremendous option to businesses to help them cut costs, reduce complexities, and streamline innovation.
NEM uses the Java programming language that makes it an easy project for developers to get involved with, unlike other projects such as Ethereum that use platform-specific programming languages like Solidity. The project’s tech infrastructure not only makes it less power-intensive compared to Bitcoin but also more scalable than its rival projects including Ethereum and NEO.
NEM’s tagline, “Smart Asset Blockchain, Built for Performance,” perfectly captures everything the project has to offer. Over the years, NEM’s active developer community has craftily addressed the notorious bottlenecks in the vast majority of blockchain solutions, The future looks promising for NEM as it continues to foster a trustless and blockchain-driven economy for tomorrow.
Source
submitted by charlesgwynne to ico [link] [comments]

Altcoin Explorer: NEM (XEM), the Enterprise-Grade Blockchain Platform

Altcoin Explorer: NEM (XEM), the Enterprise-Grade Blockchain Platform

https://preview.redd.it/f82bxncaxkg51.png?width=1300&format=png&auto=webp&s=34afde717d1781f7e472c8dcacd18a8b9390a78d
Nestled among the top 40 cryptocurrencies by reported market cap, New Economy Movement — popularly known as NEM (XEM) – is a peer-to-peer (P2P), dual-layer blockchain smart contract platform written in one of the most influential programming languages, Java. NEM uses the proof-of-importance (POI) consensus algorithm that essentially values the tokens held and the activity conducted by the nodes on the blockchain network.
In this Altcoin Explorer, BTCManager delves deeper into the finer intricacies of the NEM blockchain protocol, including the project’s POI consensus algorithm, its native digital token XEM, and some of its real-world use-cases.
Without further ado, let’s get to the core of this high-performance distributed ledger technology (DLT) platform.

History of NEM

NEM was launched on March 31, 2015, with an aim to develop an enterprise-grade blockchain protocol that could circumvent the infamous trilemma of blockchain: scalability, speed, and privacy.
Operated by a Gibraltar-registered NEM Group, NEM is a fork-out version of the NXT blockchain. After the successful fork, the NEM community decided to build its ecosystem from the ground up and developed its own codebase to make the network more scalable and faster.
NEM’s insistence toward building its own tech infrastructure led to a DLT protocol that is unlike anything resembling other similar platforms.
Today, NEM ranks among the top go-to blockchain platforms for enterprises across the world, rivaling competing protocols including Ethereum (ETH), and TRON (TRX), among others.

NEM’s Proof-of-Importance (POI) Algorithm

Unlike Bitcoin’s (BTC) energy-intensive Proof-of-Work (PoW) and Ethereum’s yet-to-be-implemented Proof-of-Stake (PoS) consensus algorithm, NEM uses PoI consensus mechanism.
The PoI mechanism achieves consensus by incentivizing active user participation in the NEM network. This consensus infrastructure ensures an agile decentralized network by rewarding well-behaved nodes that not only possess a significant stake in the network but are also actively engaged in executing transactions to maintain the network’s robustness.
Specifically, each node in the network possesses an ‘Importance Score’ that impacts the number of times the said node can ‘Harvest’ the XEM altcoin.
Initially, when a user puts XEM tokens into their wallet, they are called ‘unvested coins.’ Over time, as the wallets start accumulating an increasing number of XEM and contribute to the network’s transaction volume, they start collecting importance scores. At the same time, the XEM tokens in these wallets change into ‘vested coins,’ provided that there are at least 10000 tokens in the wallet.
To put things into perspective, let’s take the help of a small example.
On day 1, Joe receives 50,000 XEM in his digital wallet. Now, with each passing day, the NEM network will ‘vest’ 10 percent of the tokens held by Joe. So, on day 2, 5,000 tokens held by Joe are vested into the network. On day 3, 10 percent of the remaining tokens – 15,000 XEM – get vested into the network, leaving Joe with 13,500 XEM, and so one. After a couple of days, Joe sees that the number of XEM vested by him has crossed the 10,000 coins threshold, thereby, making him eligible to seek rewards from the NEM blockchain for his contribution to vesting his tokens.
Close followers of blockchain projects would find the aforementioned network reward mechanism bear a close resemblance to the PoS consensus algorithm. However, it’s worthy of note that vesting coins is just one way of calculating a node’s importance score.
The NEM protocol also rewards nodes that are responsible for most activity on the network. In essence, this means that the higher the number of transactions executed by a node, the more likely it is to gain higher importance points. The balance between vesting XEM and network activity is an important metric to be maintained by NEM nodes as it directly impacts their likelihood of harvesting XEM.
NEM’s consensus algorithm does away with several issues plaguing the more energy-intensive protocols such as PoW. For instance, PoI does not necessarily require high-energy hardware to run the nodes. The decentralized nature of the algorithm means that almost any machine — irrespective of its tech configuration – can participate in the NEM ecosystem ensuring it remains decentralized.

NEM’s Native Digital Token — XEM

XEM, unlike the vast majority of other cryptocurrencies, isn’t mined or staked using Pow or PoS algorithms. Rather, as explained earlier, XEM is ‘harvested’ through the PoI algorithm which ensures a steady supply of the digital token without flooding the market and involving the risk of a dramatic crash in price.
Per data on CoinMarketCap, at the time of writing, XEM trades at $0.04 with a market cap of more than $382 million and a 24-hour trading volume of approximately $6.8 million. The coin reached its all-time high of $1.92 in January 2018.
A large number of reputable cryptocurrency exchanges trade XEM, including Binance, Upbit, OKEx, Bithumb, ProBit, among others. The digital token can be easily traded with BTC, ETH, and USDT trading pairs.
That said, if you wish to vest your XEM to partake in the maintenance of the NEM network and earn rewards, it is recommended you store your tokens in the official NEM Nano wallet for desktop and mobile OS. Only XEM tokens held in the official NEM Nano wallet are eligible for vesting.

NEM Use-Cases

To date, NEM has been deployed for various real-world applications with promising results.
In 2018, Ukraine launched a blockchain-based e-voting trial leveraging the NEM DLT platform.
At the time, Ukraine’s Central Election Commission – with the local NEM Foundation representation – estimated the test vote trial in each polling station could cost as low as $1,227. The organization’s Oleksandr Stelmakh lauded the efforts, saying that using a blockchain-powered voting mechanism would make it impossible for anyone to fiddle with the records. The Commission added that the NEM protocol presents information in a more user-friendly format for voters.
In the same year, Malaysia’s Ministry of Education launched an e-scroll system based on the NEM blockchain to tackle the menace of fake degrees. The University Degree Issuance and Verification System use the NEM blockchain which is interrogated upon scanning of a QR code printed on the degree certificate.
The Ministry added that one of the primary reasons for its decision to selected the NEM platform was its unique and cutting-edge features in managing traceability and authentication requirements.
On a recent note, the Bank of Lithuania announced that it would be issuing its NEM blockchain-powered digital collector’s coin (LBCoin) in July after the successful completion of its testing phase.

Final Thoughts

Summing up, NEM offers a wide array of in-house features that separate it from other blockchain projects in a space that is becoming increasingly congested. NEM’s creative PoI consensus algorithm is a fresh take on the PoS algorithm for performance enhancement. Further, the project’s newly launched enterprise-grade DLT solution, Symbol, offers a tremendous option to businesses to help them cut costs, reduce complexities, and streamline innovation.
NEM uses the Java programming language that makes it an easy project for developers to get involved with, unlike other projects such as Ethereum that use platform-specific programming languages like Solidity. The project’s tech infrastructure not only makes it less power-intensive compared to Bitcoin but also more scalable than its rival projects including Ethereum and NEO.
NEM’s tagline, “Smart Asset Blockchain, Built for Performance,” perfectly captures everything the project has to offer. Over the years, NEM’s active developer community has craftily addressed the notorious bottlenecks in the vast majority of blockchain solutions, The future looks promising for NEM as it continues to foster a trustless and blockchain-driven economy for tomorrow.
Source
submitted by charlesgwynne to BlockchainStartups [link] [comments]

Choosing The Best Multi-Currency Wallet For Crypto in 2020

Crypto differs from fiat in terms of storage. It is saved not in some kind of virtual bank, but directly in the blockchain. The coins, information on the distribution of digital assets between users, transaction history – all this data is stored by the chain. Such data cannot be changed or erased in any way. And without a crypto wallet, you cannot manage your assets.

Let’s have a look at different types of crypto wallets.

A cryptocurrency wallet stores your “private” and “public” keys used to send and receive various crypto tokens. The interface and design of the programs help users to get all the necessary information about their digital savings.
There are two types of wallets:

How do cryptocurrency wallets work?

Cryptocurrency wallets are not designed to actually store digital assets; instead, they provide the tools necessary to interact with the blockchain network. The wallet includes a public address, which is an identifier in the form of a set of letters and numbers. This address is a kind of location on the blockchain where you can send coins. You can share your public address with another user to receive funds, but you should never show your private key to anyone.
A private key provides access to your cryptocurrencies, regardless of which wallet you use. Thus, even if your computer or smartphone was compromised, you can still access your funds from any other device, provided that you have the appropriate private key (or seed phrase).

Types of wallets

Web wallet

This type of wallet is suitable for beginners, since it does not require the purchase of devices, software installation, or downloading the blockchain. It is enough for the user to register on the site. Web wallets are simple and convenient to use, they do not take up space on the HDD and are constantly synchronized with the blockchain network, even when your computer is offline.
Cryptopay enables customers to transfer money directly between their Cryptopay wallet and SEPA (Single Euro Payments Area) bank account, store their funds safely in a multi-coin portfolio, protected by two-factor authentication to increase security.
Coinbase is a trading service that many retailers use to receive digital currencies from sales. Private keys are stored on the server, and client funds are stored on a cold wallet. You can enable two-factor authentication and install the smartphone app.

Desktop wallet

The local wallet is installed on the hard drive and loaded with the operating system. Such wallets are divided into “thick” (full-node clients) and “thin” (light-node clients). Thick ones can take up to hundreds of gigabytes of hard drive space. Thin local wallet is actually a program that makes requests to the blockchain through a trusted site.
Bitcoin Core is a Bitcoin wallet created by the Bitcoin Foundation. If you want to get a truly secure place for your digital assets, choose this thick desktop wallet.
Exodus is a universal thin crypto wallet. It supports 100+ altcoins and has a built-in exchange service. Also, Exodus can interact with the Trezor Crypto Hardware Wallet.

Mobile phone and browser wallets

Mobile wallets are available through special applications. You can use them for shopping in real stores where crypto is accepted – just like ApplePay.
Benefits of Mobile Wallets:
Disadvantages of mobile wallets:
Coinomi is a multi-currency application with two integrated exchange services (Shapeshift and Changelly). The wallet supports 100+ virtual coins, the keys are stored exclusively in the application.
Browser wallet is an extension for Chrome and Opera browsers. It is very easy to use: you just enter seed phrases and get access to the savings.
The Jaxx extension for Chrome from the team of developers of the browser wallet KryptoKit, supports not only Bitcoin, but Ethereum as well.

Hardware wallet

This is the most reliable option for saving virtual assets. They look like ordinary USB flash drives. The user inserts a USB, logs on a wallet program by entering a password and thus gets access to the funds. All operations are performed not in the system, but directly on the flash drive itself, which eliminates extraneous access to data.
Trezor wallet supports most of the top coins, it can be synchronized with the MyEtherWallet online wallet, as well as Chrome and Firefox browsers to get access to crypto funds.
Ledger Nano S is miniature, safe, and easy to use and has several levels of protection. Asset management is performed through the Ledger Manager utility.

Paper wallet

A paper wallet is a piece of paper that usually has QR codes that can be quickly scanned to get the address to a crypto account. The main advantage of services like BitAddress and Bitcoin Paper Wallet is that the keys are actually stored offline, which makes them immune to hacker attacks. The main drawback, however, is that the paper wallet can be stolen or lost.

Which wallet is the safest?

An offline crypto wallet is the most reliable one. You can install a local wallet on a PC that is not connected to the Internet and store your digital assets on it, but this is not very convenient if you need to quickly complete a transaction.

Conclusion

The choice depends on how you plan to use your tokens. Small amounts of crypto can be stored on thin local or Internet wallets, and for long-term storage of large amounts, it is better to get thick or hardware wallets. In any case, remember to strictly observe all security measures.
submitted by CoinjoyAssistant to u/CoinjoyAssistant [link] [comments]

Groestlcoin 6th Anniversary Release

Introduction

Dear Groestlers, it goes without saying that 2020 has been a difficult time for millions of people worldwide. The groestlcoin team would like to take this opportunity to wish everyone our best to everyone coping with the direct and indirect effects of COVID-19. Let it bring out the best in us all and show that collectively, we can conquer anything.
The centralised banks and our national governments are facing unprecedented times with interest rates worldwide dropping to record lows in places. Rest assured that this can only strengthen the fundamentals of all decentralised cryptocurrencies and the vision that was seeded with Satoshi's Bitcoin whitepaper over 10 years ago. Despite everything that has been thrown at us this year, the show must go on and the team will still progress and advance to continue the momentum that we have developed over the past 6 years.
In addition to this, we'd like to remind you all that this is Groestlcoin's 6th Birthday release! In terms of price there have been some crazy highs and lows over the years (with highs of around $2.60 and lows of $0.000077!), but in terms of value– Groestlcoin just keeps getting more valuable! In these uncertain times, one thing remains clear – Groestlcoin will keep going and keep innovating regardless. On with what has been worked on and completed over the past few months.

UPDATED - Groestlcoin Core 2.18.2

This is a major release of Groestlcoin Core with many protocol level improvements and code optimizations, featuring the technical equivalent of Bitcoin v0.18.2 but with Groestlcoin-specific patches. On a general level, most of what is new is a new 'Groestlcoin-wallet' tool which is now distributed alongside Groestlcoin Core's other executables.
NOTE: The 'Account' API has been removed from this version which was typically used in some tip bots. Please ensure you check the release notes from 2.17.2 for details on replacing this functionality.

How to Upgrade?

Windows
If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes for older versions), then run the installer.
OSX
If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes for older versions), run the dmg and drag Groestlcoin Core to Applications.
Ubuntu
http://groestlcoin.org/forum/index.php?topic=441.0

Other Linux

http://groestlcoin.org/forum/index.php?topic=97.0

Download

Download the Windows Installer (64 bit) here
Download the Windows Installer (32 bit) here
Download the Windows binaries (64 bit) here
Download the Windows binaries (32 bit) here
Download the OSX Installer here
Download the OSX binaries here
Download the Linux binaries (64 bit) here
Download the Linux binaries (32 bit) here
Download the ARM Linux binaries (64 bit) here
Download the ARM Linux binaries (32 bit) here

Source

ALL NEW - Groestlcoin Moonshine iOS/Android Wallet

Built with React Native, Moonshine utilizes Electrum-GRS's JSON-RPC methods to interact with the Groestlcoin network.
GRS Moonshine's intended use is as a hot wallet. Meaning, your keys are only as safe as the device you install this wallet on. As with any hot wallet, please ensure that you keep only a small, responsible amount of Groestlcoin on it at any given time.

Features

Download

iOS
Android

Source

ALL NEW! – HODL GRS Android Wallet

HODL GRS connects directly to the Groestlcoin network using SPV mode and doesn't rely on servers that can be hacked or disabled.
HODL GRS utilizes AES hardware encryption, app sandboxing, and the latest security features to protect users from malware, browser security holes, and even physical theft. Private keys are stored only in the secure enclave of the user's phone, inaccessible to anyone other than the user.
Simplicity and ease-of-use is the core design principle of HODL GRS. A simple recovery phrase (which we call a Backup Recovery Key) is all that is needed to restore the user's wallet if they ever lose or replace their device. HODL GRS is deterministic, which means the user's balance and transaction history can be recovered just from the backup recovery key.

Features

Download

Main Release (Main Net)
Testnet Release

Source

ALL NEW! – GroestlcoinSeed Savior

Groestlcoin Seed Savior is a tool for recovering BIP39 seed phrases.
This tool is meant to help users with recovering a slightly incorrect Groestlcoin mnemonic phrase (AKA backup or seed). You can enter an existing BIP39 mnemonic and get derived addresses in various formats.
To find out if one of the suggested addresses is the right one, you can click on the suggested address to check the address' transaction history on a block explorer.

Features

Live Version (Not Recommended)

https://www.groestlcoin.org/recovery/

Download

https://github.com/Groestlcoin/mnemonic-recovery/archive/master.zip

Source

ALL NEW! – Vanity Search Vanity Address Generator

NOTE: NVidia GPU or any CPU only. AMD graphics cards will not work with this address generator.
VanitySearch is a command-line Segwit-capable vanity Groestlcoin address generator. Add unique flair when you tell people to send Groestlcoin. Alternatively, VanitySearch can be used to generate random addresses offline.
If you're tired of the random, cryptic addresses generated by regular groestlcoin clients, then VanitySearch is the right choice for you to create a more personalized address.
VanitySearch is a groestlcoin address prefix finder. If you want to generate safe private keys, use the -s option to enter your passphrase which will be used for generating a base key as for BIP38 standard (VanitySearch.exe -s "My PassPhrase" FXPref). You can also use VanitySearch.exe -ps "My PassPhrase" which will add a crypto secure seed to your passphrase.
VanitySearch may not compute a good grid size for your GPU, so try different values using -g option in order to get the best performances. If you want to use GPUs and CPUs together, you may have best performances by keeping one CPU core for handling GPU(s)/CPU exchanges (use -t option to set the number of CPU threads).

Features

Usage

https://github.com/Groestlcoin/VanitySearch#usage

Download

Source

ALL NEW! – Groestlcoin EasyVanity 2020

Groestlcoin EasyVanity 2020 is a windows app built from the ground-up and makes it easier than ever before to create your very own bespoke bech32 address(es) when whilst not connected to the internet.
If you're tired of the random, cryptic bech32 addresses generated by regular Groestlcoin clients, then Groestlcoin EasyVanity2020 is the right choice for you to create a more personalised bech32 address. This 2020 version uses the new VanitySearch to generate not only legacy addresses (F prefix) but also Bech32 addresses (grs1 prefix).

Features

Download

Source

Remastered! – Groestlcoin WPF Desktop Wallet (v2.19.0.18)

Groestlcoin WPF is an alternative full node client with optional lightweight 'thin-client' mode based on WPF. Windows Presentation Foundation (WPF) is one of Microsoft's latest approaches to a GUI framework, used with the .NET framework. Its main advantages over the original Groestlcoin client include support for exporting blockchain.dat and including a lite wallet mode.
This wallet was previously deprecated but has been brought back to life with modern standards.

Features

Remastered Improvements

Download

Source

ALL NEW! – BIP39 Key Tool

Groestlcoin BIP39 Key Tool is a GUI interface for generating Groestlcoin public and private keys. It is a standalone tool which can be used offline.

Features

Download

Windows
Linux :
 pip3 install -r requirements.txt python3 bip39\_gui.py 

Source

ALL NEW! – Electrum Personal Server

Groestlcoin Electrum Personal Server aims to make using Electrum Groestlcoin wallet more secure and more private. It makes it easy to connect your Electrum-GRS wallet to your own full node.
It is an implementation of the Electrum-grs server protocol which fulfils the specific need of using the Electrum-grs wallet backed by a full node, but without the heavyweight server backend, for a single user. It allows the user to benefit from all Groestlcoin Core's resource-saving features like pruning, blocks only and disabled txindex. All Electrum-GRS's feature-richness like hardware wallet integration, multi-signature wallets, offline signing, seed recovery phrases, coin control and so on can still be used, but connected only to the user's own full node.
Full node wallets are important in Groestlcoin because they are a big part of what makes the system be trust-less. No longer do people have to trust a financial institution like a bank or PayPal, they can run software on their own computers. If Groestlcoin is digital gold, then a full node wallet is your own personal goldsmith who checks for you that received payments are genuine.
Full node wallets are also important for privacy. Using Electrum-GRS under default configuration requires it to send (hashes of) all your Groestlcoin addresses to some server. That server can then easily spy on your transactions. Full node wallets like Groestlcoin Electrum Personal Server would download the entire blockchain and scan it for the user's own addresses, and therefore don't reveal to anyone else which Groestlcoin addresses they are interested in.
Groestlcoin Electrum Personal Server can also broadcast transactions through Tor which improves privacy by resisting traffic analysis for broadcasted transactions which can link the IP address of the user to the transaction. If enabled this would happen transparently whenever the user simply clicks "Send" on a transaction in Electrum-grs wallet.
Note: Currently Groestlcoin Electrum Personal Server can only accept one connection at a time.

Features

Download

Windows
Linux / OSX (Instructions)

Source

UPDATED – Android Wallet 7.38.1 - Main Net + Test Net

The app allows you to send and receive Groestlcoin on your device using QR codes and URI links.
When using this app, please back up your wallet and email them to yourself! This will save your wallet in a password protected file. Then your coins can be retrieved even if you lose your phone.

Changes

Download

Main Net
Main Net (FDroid)
Test Net

Source

UPDATED – Groestlcoin Sentinel 3.5.06 (Android)

Groestlcoin Sentinel is a great solution for anyone who wants the convenience and utility of a hot wallet for receiving payments directly into their cold storage (or hardware wallets).
Sentinel accepts XPUB's, YPUB'S, ZPUB's and individual Groestlcoin address. Once added you will be able to view balances, view transactions, and (in the case of XPUB's, YPUB's and ZPUB's) deterministically generate addresses for that wallet.
Groestlcoin Sentinel is a fork of Groestlcoin Samourai Wallet with all spending and transaction building code removed.

Changes

Download

Source

UPDATED – P2Pool Test Net

Changes

Download

Pre-Hosted Testnet P2Pool is available via http://testp2pool.groestlcoin.org:21330/static/

Source

submitted by Yokomoko_Saleen to groestlcoin [link] [comments]

Telegram AMA - Summary

Telegram AMA - Summary
https://preview.redd.it/hml53mmh5er41.png?width=568&format=png&auto=webp&s=3f0cd662e1836bcb2ea37793cbbbfd6f8a5e9723
Zhuling Chen
It’s always great to hang out in this group. This group means a lot to the Aelf community. It is the first Aelf community and has been there through all the ups and downs in the world. I would like to start with wishing everyone is staying safe at home during the virus outbreak. It definitely has been a difficult time for all of us, but together we can pull through it.
We understand that the situation is quite striking to all of us. But I really believe that the solution to the virus outbreak is about more global coordination and collaboration.
All of you to be assured, our team in different places are all safe and working from home as normal.
The Aelf team in Beijing were among the early ones experiencing the virus outbreak. As everyone was on the way home for Lunar New Year holiday and then experienced a total city lock-down followed by a 40 days’ work from home policy. It was definitely not easy for them, but our team stayed strong, took necessary precautions and focused on work with the right morale. Mappo has recently published some tips on how to work from home effectively based on our experience. Do check it out. Despite not working in the office since February, we have achieved great progress, including launching Aelf 1.0 preview, which is an important milestone in technical delivery and also the roadmap to mainnet launch (which listed out the essential steps for the community to work together to launch a successful public network)
Let's first talk about Aelf v1.0 preview. It is the cornerstone of the mainnet launch. The product itself has all the features that the public network is needed. The codebase has been reviewed and tested rigorously by the team. And a few highlights of how the network would look like:
  1. The code allows a stable and high throughput blockchain network to operate publicly.
  2. For developers, they will love how flexible the system is to be customized, the number of tools and documentation to help them start developing applications on the network
  3. For the whole community, the system is an ever-evolving one where the voting system is ready in place to conduct network-wide voting on various topics, such as transaction fee adjustment, network protocol upgrade, incentive adjustment, etc
  4. Aelf system is able to run multi-chain architecture where each side chain will host different applications and still ready to work with each other
So you may ask since the software is ready, why have we not yet launched the public network? The answer, in short, is that a public blockchain is launched not by a team but through a community effort and that's why we are coordinating the community effort based on the roadmap we proposed. Aelf team has launched the public testnet based on Aelf v1.0 preview and currently, all nodes are under the team. The goal is to let the community and elected nodes to take it over and launch it on a global scale. Not only launch it but also be familiar with the network and also set the launch parameters in a decentralized way. If we take a car as an example, we have made the car, but ultimately the drivers are you guys and therefore before it really hits on the road, we need to guide the community to do a test drive, adjust the car based on what really works for YOU, and ultimately let YOU drive the car freely and safely
So how are we going to help the community launch the network:
First of all, we have launched the codes, documents about the economic system and governance model and technical features. With all the things available, you are able to understand what the system is about, as a token holder what's your benefit in the system, and being a node in the system plays a big role in the governance
Next, without yet electing the nodes, we will get all token holders to join the current Aelf network through a mapping event. That means as long as you have Aelf tokens, you will be able to get 1:1 test tokens on the public testnet. that gives you full access to all the features, and you will feel like you are already using the mainnet. You will get rewarded in making transactions, voting, etc.
Do try out the Aelf wallet and voting features, you will see how easy to transfer tokens cross-chain. and also how flexible the system allows people to make changes. For example, the community may want to adjust the block rewarding parameters or fees to use certain services on mainnet, they can initiate a discussion and then vote in the system and once voted through, it will be reflected on mainnet.
For people or organizations that want to play a bigger role in the system, we will do a dry run of node election. Take it as the real node election before mainnet launch. We will see who the active members of the community are and being trusted by the community. Among the nodes, we will form a network launch committee. The committee will be the crucial party to oversees and ensures the smooth launch of Aelf mainnet, instead of just relying on the Aelf team. This is our step towards decentralization.
The committee will agree on the actual launch process, final checking all the parameters in the system to be ready for launch and then decide when the criteria are met to launch the network. Once all that is decided. We will invite all interested nodes to apply for the election and let the community know what's their plan to grow the Aelf network. the network will initially be launched with a few nodes from the committee and gradually be replaced by the selected nodes (a bootstrap phase). Along the way, we will work with exchanges to conduct token swap (which we are also designing an innovative system to further enhance security and usability of Aelf tokens in exchanges)
Among this isolated and worrisome time, at least we all have something to look forward to: a successful launch of Aelf network! Once it is launched, we are excited to see a vibrant and technically superior network that is good for Dapps to run on top of it.
https://preview.redd.it/yp28n1jj5er41.png?width=559&format=png&auto=webp&s=c470cdedd7f8923f29a3b1bd777476f22cc76521
Doris Guo Q1: As a Blockchain start-up, what difficulties have you overcome when starting Aelf project? What motivates you to solve difficulties and achieve success today?
Zhuling Chen First, just like launching any start-up, its community and investors are usually regional. There is always some bias on if Asian projects are solid. It is really rare to have an Asian project to be supported by western funds and community from day 1. We were lucky to have overcome that obstacle. Having a global investor line-up from day 1. Having a global team from day 1 and also working with a global community from day 1. This benefited us to have an international perspective which is crucial in the blockchain industry.
Secondly, as a hardcore technology company, it is really hard to put in plain words what is our ambition. Our ambition is huge, achieving key innovations in multiple fronts of blockchain technology and organically combined them to serve real users for the future. Our marketing team has been working really hard to elaborate on what Aelf is. Now we have come to a point that the product is ready. Therefore, it is much easier for all of us to understand how solid Aelf is by trying out the network ourselves! That's exactly what the following events will be about - Try out all the exciting features of Aelf network before mainnet launch.
Doris Guo Q2: What critical problems do you see occurring in the blockchain industry nowadays? How does Aelf solve these problems?
Haobo Ma First, we need to distinguish the difference between BTC and ETH. One is Digital Cash and the other is the Smart Contract Platform. Aelf addresses most of the latter's problems. In short, it can be summarized as performance, end-user friendly, developer-friendly, network economy, and self-governance and upgrading. Each of these areas will probably take up a lot of space, and as a whole are the issues described in our two white papers. In short, Aelf is faster, end-users do not need to know the rules of the blockchain, developers can set up the development environment in 10 minutes, have a good economic model and can carry out proposal governance on the chain.
Doris Guo Q3: What is your long-term vision about the industry which Aelf is working at? Are you afraid someday there will be another project with more innovative technology can replace Aelf?
Haobo Ma Let's talk about where Aelf stands in the traditional Internet. It is essentially a cloud service provider, Aelf provides resources and infrastructure for developers to deploy their services, known as smart contracts. We eventually want Aelf to grow like AAA (Amazon, Azure, AliCloud). Because Aelf is a network that can be dynamically scaled, we can accept any new technology, some of the more advanced technologies we can put on a side chain.
Doris Guo Q4: Why did Aelf choose for cross-chain interaction?
Haobo Ma As I mentioned earlier, Aelf solves the Smart Contract Platform problem. However, there are other digital cash problems as well which we would need to use existing infrastructure such as Bitcoin's chain in order to interact with Bitcoin. There are a lot of infrastructures on Ethereum that we want to interact with. Multi-chain on Aelf network mainly is to isolate resources to improve network performance and network stability.
Doris Guo Q5: What difficulties do the Aelf team have now (I talk about COVID-19)? How does the Aelf team solve it? Have you changed the roadmap?
Haobo Ma There is no great impact. The teams in Singapore and Beijing are communicating with each other remotely on a regular basis. The only change is that most of us are now working from home which has no impact and in fact, it seems conducive to the acceptance of more community developers in the future to come. From the internal working schedule and development timeline, there is no great impact. We do not publish specific timeline as we do not want short term holders (traders) to create too much negative pressure on product development.
Doris Guo Q6: Aelf is an open-source blockchain, and there's the common problem of taking a substantial amount of time for the different participants to agree on strategic decisions. What types of governance models do you use in Aelf to address this issue???
Haobo Ma The issue is about public blockchain network, and who can decide the direction of the network. Our answer is long-term holders. For the short-term holders (traders), we refuse to allow them to participate in any discussion of the direction of Aelf because the short-term holders are likely to make a profit and sell quickly, which is essentially the same example of a person who cheats the President and then runs away for his personal gain. We defined a number of proposal processes, including the logic of the two-party system in the United States, and the participation in the referendum to ensure that the final proposal represents the majority. At the same time, we are looking for some legal solutions to avoid bifurcation, such as prohibiting exchanges from intervening in bifurcated new tokens. While we cannot limit a community, we should be able to find ways to limit a centralized organization. This restriction is akin to a ban on national secession.
Doris Guo Q7: How will Aelf empower Investors, Companies, Developers, Platform Users to deliver impactful solutions and bring value to people all over the world?
Haobo Ma We will learn from the operational experience of successful foundations such as the LINUX foundation and license some commercial companies to use Aelf solutions to solve business problems. At the same time, Aelf is an open-source product under the MIT License, and we accept any use that does not violate this open-source principle.
Zhuling Chen Let me add on to Haobo’s statement: to incentivize and empower the community, we are also exploring ways to let the community decide how to use the funds for Aelf (allocate to where it matters to our community) once mainnet is launched. This means you guys can decide what are the projects to be funded on Aelf, etc
Doris Guo Q8:When will the node campaign start? How will Aelf attract users to participate in nodes election?
Haobo Ma According to our published roadmap, the timeline can be dynamic, but I don't think it will be too long. The main idea is to let everyone understand what we envision Aelf to be like, and what are the rights and benefits of being a node in the future. We hope to find nodes that fully recognize the efforts of Aelf at the present stage and are willing to participate in the future development of Aelf. We will run a simulation of the node campaign on the testnet and set up a temporary mainnet launch committee. Please follow our official Twitter for more upcoming details!
Doris Guo Q9: Token swap form 2 is some kind of cross-chain transfer? It will be handled by a smart contract?
Haobo Ma It is handled by the smart contract, we define an asset cross-chain transfer protocol, but it may be opened after a snapshot.
Doris Guo Q10: Which Exchanges will support token swap? Do you have any plan to list Aelf in some big exchange like Binance, Houbi, Kucoin, .......?
Haobo Ma We are already in talks with some exchanges, there is still competition between exchanges, and many are still hoping to attract more users by getting access to mainnet token swap early.
Doris Guo Q11: Aside conversion of the current tokens to mainnet tokens, what other main features will be accomplished with the mainnet launch?
Haobo Ma We have a documentation file that has been published, which has listed some features: https://Aelf.io/gridcn/Aelf_public_testnet_and_supporting_features_introduction_en_v1.0.pdf
Doris Guo Q12: Do you have any plan to burn or buyback your coin?
Haobo Ma We have plans for the community to govern through DAO, we have no interest in short-term price incentive adjustment as we would prefer to drive the project to higher adoption. After mainnet starts operation, there will be a part of network revenue get destroyed automatically.
Doris Guo Q13: Often, as a newbie developer, I face difficulties on most blockchains. How easy and convenient is it for me on Aelf, and what programming language and tools are needed??
Haobo Ma We set up staging for DAPP developers on GitHub and configured CI. Develop a smart contract using C# with React Native on the front end. So, in fact, developers can fork the source code without setting up the environment locally, and you can conduct unit testing with the help of CI. You can also release the smart contract and generate the installation package of iOS and android online. https://github.com/AElfProject/Aelf-boilerplate
Doris Guo Q14: What is the progress of business development and what are some of your commercial partnerships? How will Aelf rapidly develop the number & performance of DAPP?
Haobo Ma First of all, the blockchain industry is still fairly small and users with ETH and EOS wallets are considered a very small group and its not effective to even promote within these groups. What we need to consider is how to enable users who have never been exposed to blockchain to use DAPP. The competitiveness of Aelf is to make it easier for Aelf developers to promote their DAPP to ordinary users, rather than to teach ordinary users a lot on blockchain knowledge. The average user doesn't like to hear about private keys, mnemonic, Gas Price, RAM, CPU, etc. Only until we solve such problems, companies that need to solve problems through blockchain will be more inclined to use Aelf in technology selection. Therefore, our main work is to explain the competitive advantages of Aelf, ETH and EOS to everyone. We have some business cooperation’s, but we also believe that simply through case-by-case business cooperation will not be able to gain adoption so quickly, therefore we still need to put our products to stay ahead of the next generation.
Doris Guo Q15: What other activities can encourage more people to be confident about Aelf?
Haobo Ma We are only going to state the truth by having those that have faith in us to stay and those that don't to leave. The development of Aelf is not driven by a single foundation, but by a steady stream of contributions from the community. In the future, we will also place the activities in the DAO for on-chain governance, and let the community make decisions by itself.

https://preview.redd.it/e66vhqvl5er41.png?width=555&format=png&auto=webp&s=412a2dd831ba3817806e48855f158482bf671770
Kun Aguero As you know that in the present market situation many new coins or either dying or thriving for liquidity? How will you manage this liquidity problem?
Zhuling Chen Aelf started in 2017. we have gone through a few cycles in the market, still, remember the big down period in 2018-2019. Aelf is financially solid and the team has always been working hard. if you are referring to liquidity in exchanges, we are among the lucky ones that are listed in all major exchanges
Xinshu Dong Hello, great discussions! I would like to ask what are the criteria to join the committee for launching the mainnet? Would love to participate
Zhuling Chen Hi xinshu, great to see you here. The committee will be chosen among the nodes elected during the testnet dry run. Which means, it is really important to participate in the testnet dry run and also start to establish your reputation in the community so that people will elect you as a node. The detailed criteria will include what is your plan to help Aelf to grow, tech competency and reputation.
An Da What are Aelf’s achievements in 2019? Who had supported you to get those things?
Zhuling Chen To name a few, in 2019, Aelf is one of the most active projects on GitHub. This means Aelf is evolving and improving fast in this space and our team has the tech strength. In addition, we have also successfully listed on all major cloud service providers, such as AWS, Azure, Google. So large companies can easily launch Aelf side chains in their organization with minimum hassle.
John How does the voting for master nodes candidates occur? And why is the development of this system important for your project?
Zhuling Chen Voting is going to be pretty simple. All token holders can vote for the nodes they support on our block explorer.
Miha After mainnet lunch, how will you assure that transactional fees will stay low? We know what sometimes happens to fees on ETH blockchain.
Zhuling Chen First of all, due to the fact that is Aelf is scalability, this will reduce transaction fee. Secondly, all transaction fees will be voted by the nodes (which will be elected by you). So they will represent your interest
Bobbyfernandito Currently, as we see All projects are concerned with the speed and security. So, tell us here - what are the facilities Aelf provide to their user and investors?
Haobo Ma Security: we have an automated smart contract code audit. During contract deployment, production nodes and the community audit participation are required. On the other hand, we are also planning to provide a standardized model of centralized exchange access for 100% asset certification and emergency measures to deal with exchange attacks, which we will be released later. Speed: Aelf has been working on improving performance, which is transparent to users which they can also experience by themselves.
An Da What effect does Aelf token have on the Aelf ecosystem? Holding Aelf, what benefits will users receive?
Zhuling Chen Holding ELF enables you to use all the services on the Aelf network. ELF has a deflating system where the total amount will reduce as the network grows. token holders can also vote for the nodes to run the network and also vote for big decisions in the network. part of the fees in the system will also be distributed to token holders via a smart contract
ahihi132 Which companies do you view them as potential partners and that they are somewhat also beneficial for both the user base and Aelf itself?
Zhuling Chen Great question, if I could write a wish list, that will be: let medium-sized financial institutions to use Aelf to challenge the big boys. Let telecommunication companies use Aelf for micro-payment and other innovative business models. We also would like to try out a few public sector projects, which blockchain will is still more transparency and trust
Misun Q1: Which programming languages are you using in your project? And why? Q2-What are another big MILESTONES you have planned for 2020 roadmap and how are they supposed to benefit your costumers? Will it be an exciting year?
Haobo Ma For Q1: We mainly use C# for development, I personally like it. Performance is good, development environment IDEs are strong, and C# creators are influential in the industry. We believe in the right thing, though it may take a while to develop. The smart contract will then add support for multiple languages, such as WebAssembly, depending on the needs of the community. Now it seems that C# is enough.
Hambi crypto Which platforms are your competitors? How will you soar above them, and what better things do you offer than them? So, What’s your outlook on the future of cryptocurrencies in this year and next few years?
Haobo Ma As I have already mentioned this before, Eth and Eos. We provide better performance, cross-chain support (already implemented), end-users do not need to know the details of the blockchain, developer’s payment models and so on.
Floris-Jan What plans is Aelf making to prevent centralized exchange to take over the DPoS algorithm like what happened to Steem? Are we talking about blacklisting exchange wallets, or having the foundation say "No", or putting all trust in the community?
Zhuling Chen Great question, Floris. I’m not going to give away all the details of what Haobo has proposed to work on this, but in a nutshell, in Aelf system, exchange wallets will not be allowed to vote, but only the sub-wallets for each individual can vote. This will also help exchanges to prevent hacking and theft in the future
Alex What your plans in place for global expansion, are Aelf wallet focusing on the only market at this time? Or focus on building and developing or getting customers and users, or partnerships? Can you explain this?
Haobo Ma Our core focus will be through the developers to promote, developers will help Aelf to attract more users. So our product has to be attractive to developers. Just like AWS, they only focus on getting their service right, their developers will think about how to promote it. We don't want to burden them in their promotion process.
Ellkay What do you think are the major threats and barriers that could face the development and adoption of Aelf?
Haobo Ma If I'm a DAPP developer and I need to promote my APP to people who don't recognize blockchain, then I'd like to choose a platform that doesn't have to explain a lot of blockchain details to the end-user, so they can use it easily. We've provided some options in the Boilerplate that allow you to log-in simply via QR code + Password, and our recommended Dapp is an independent wallet and a separate iOS/Android application.
ahihi132 Give me some important reasons why we need to hold Aelf token where in fact hundreds of projects failed and it went to bankruptcy or even developers run when they collect millions/billions of funds?
Haobo Ma First of all, we will not give any suggestions as we only describe the fact that the long-term token holder will be able to govern the Aelf network, get Aelf mining reward and Aelf network profit. At the same time, Aelf network is a deflation model, Aelf network received transaction fees, profit dividends will immediately destroy 10% etc. All investments are risky, and we don't judge the behaviour of other developers. There are so many things in this world that cannot be understood and unfair. It is important to do our job well. I cannot explain these things.
见愁 I remember that boss Ma mentioned to only find those truly innovative applications and enterprises with blockchain, how to find and win partners in these aspects?
Haobo Ma When Linus was developing Linux, I did not think he would find a lot of collaboration when the code was not good. The response we can give is that we already have a lot of interest in cooperation, including what we have announced, what we have not announced, etc.
见愁 How interested are cloud computing providers in participating nodes?
Haobo Ma The vast majority of our nodes should be using cloud services, and as long as a large number of our 17 nodes and other candidate nodes are based on cloud services, our network robustness is determined by these cloud computing providers. Of course, in the expansion, we can also use cloud computing services.
submitted by Floris-Jan to aelfofficial [link] [comments]

How to create a CasinoCoin payment request QR code How to Send & Receive Bitcoin with Cash App - YouTube Create A Working QR Code In Microsoft Word - YouTube How To Create QR Codes - YouTube How to Create a amazing FREE QR Code Generator -2016

Develop your programming skills by quickly creating and modding retro arcade games with Blocks and JavaScript in the MakeCode editor Make enables the end user to build and install your package without knowing the details of how that is done -- because these details are recorded in the makefile that you supply. Make figures out automatically which files it needs to update, based on which source files have changed. QR Code readers require a white margin to detect QR Codes. So make sure to print it on a light background instead. The QR Code is only displayed at a size of 200px but it will be saved at a size of 200px. Every student has the potential to change the world. Help them get started. #CSforGood QR Code is a two-dimensional version of the barcode, typically made up of black and white pixel patterns. Denso Wave, a Japanese subsidiary of the Toyota supplier Denso, developed them for marking components in order to accelerate logistics processes for their automobile production.

[index] [9653] [10479] [21053] [11390] [1464] [3966] [790] [32492] [1001] [23051]

How to create a CasinoCoin payment request QR code

These QR codes will never expire and you can use them to promote your business or just about anything. Now you can generate these QR codes scan to a website, facebook, twitter, instagram and much ... Visit https://blockchain.wtf to learn even more about cryptocurrency & blockchains! Welcome to Blockchain A-Z! In this clip, we talk about "qr code", an acronym for "quick response" code", which ... In this tutorial I will teach you how to create your own fully working QR Code right within Microsoft Word. This will also work in Excel and PowerPoint too, ... In this video I'll show you how to make a QR ( quick response ) code online quickly, easily and for free. These QR codes will never expire and you can use them to promote your business or just ... With QRzebra you can also create a Dynamic qr code and qr codes in bulk. This QR code generator with logo is super easy to use for QR code marketing and used by many major brands and startups.

#