Welcome, Guest
You have to register before you can post on our site.



Search Forums

(Advanced Search)

Forum Statistics
» Members: 95
» Latest member: Ashh
» Forum threads: 800
» Forum posts: 9,203

Full Statistics

Online Users
There are currently 43 online users.
» 0 Member(s) | 41 Guest(s)
Baidu, Bing

Latest Threads
Efin DEX. TokenPay is beh...
Forum: General discussion
Last Post: Carsten
3 hours ago
» Replies: 0
» Views: 52
What is a smart contract?
Forum: General discussion
Last Post: Carsten
2019-04-17, 12:10 PM
» Replies: 0
» Views: 69
Julian Assange being arre...
Forum: Uncategorized
Last Post: Carsten
2019-04-15, 09:58 PM
» Replies: 5
» Views: 130
Private keys vs. public k...
Forum: General discussion
Last Post: Junior
2019-04-15, 12:23 PM
» Replies: 1
» Views: 89
Some Ripple insights
Forum: Bitcoin and Altcoin
Last Post: Carsten
2019-04-15, 08:51 AM
» Replies: 81
» Views: 6,134
Forum: Bitcoin and Altcoin
Last Post: Hugues
2019-04-14, 03:17 PM
» Replies: 3
» Views: 57
Goldman Sachs CEO Refutes...
Forum: General discussion
Last Post: Hugues
2019-04-13, 01:36 PM
» Replies: 1
» Views: 162
Inner workings of Bitcoin...
Forum: General discussion
Last Post: Hugues
2019-04-13, 01:35 PM
» Replies: 2
» Views: 102
Forum: Bitcoin and Altcoin
Last Post: Hugues
2019-04-10, 03:20 PM
» Replies: 46
» Views: 4,812
Forum: Bitcoin and Altcoin
Last Post: Carsten
2019-04-10, 09:27 AM
» Replies: 23
» Views: 1,960

Posted by: Hugues - 2019-03-15, 03:05 PM - Forum: Uncategorized - Replies (1)

Security token offerings (STO) are similar to the Initial Coin Offerings (ICO). The name initial coin offerings has been chosen unluckily since it is in fact the issue of utility tokens. When a security token offering (STO) is mentioned, it is in fact a regulated open IPO on the blockchain where securities are issued in exchange for financing.

First, let's describe the difference between a utility token and a security token to explain how a Security Token Offering (STO) works.

Difference between utility tokens and security tokens?

Utility tokens are used to access services. Specific example the SGN token is used to gain access to the Signals Trading platform. The purchase of a utility token is comparable to the purchase of user rights for a software or product, such as in-game currencies or pay-per-use Software as a Service offerings. They are developed on the basis of smart contract and blockchain technology. Usually the ERC20 protocol on Ethereum is used for the issuance of utility tokens during token crowd token sales or initial coin offerings.

There is a clear reason why these tokens are also described as such in the white papers. The companies that issue these tokens do not want them to be in the investment contract category. So we try to avoid the word security. This will hopefully prevent the company from getting into trouble with the financial authorities. The American Securities Act in particular is feared and US investors are often denied. There is still a lot of uncertainty about legislation and regulation and serious companies often seek refuge in jurisdictions such as Switzerland and Singapore where the legislation is favorable.

Security tokens represent a share in an organization or a right to profit distribution. This is an investment contract. The issuing of security tokens in a Security Token Offering (STO) is an IPO on the blockchain in which securities are traded. This act is subject to strict securities trading legislation. Organizing a token security offering must therefore be done with policy in consultation with the financial authorities with people who have expertise. Lots of work has to be done on networks and platforms where companies can issue effects on block chains without any problems. There are two American states (Dellaware and Wyoming) that are already changing the legislation to allow these new financial innovations and where security token offerings (STO) can be organized without problems using specialized platforms. Two well-known names in this field are Polymath and tZero.

The importance of STOs and the liberation of securities trading!

Security Token Offerings (STO) actually pose a threat to the old financial system (investment banks). It is quite possible that within 5 years the IPOs will expire completely and that we will only talk about STOs. A P2P securities trade may arise. The securities trade is democratized and leveled, making it easier for capital to flow in. Global securities trading on block chains is not only much safer and more transparent, but above all also fairer and much, much cheaper. The STOs in consultation with the ICOs will be an important component in the realization of a fourth industrial revolution. What we have to realize is that it will be very easy for small businesses to organize an STO.

Finally, other terms that you may come across more often in articles for a Security Token Offering is a Tokenized Asset Offering (TAO) or an Equity Token Offering (ETO). In our opinion, a security token offering is a more accurate term to use. Terminology that is more in line with current stock markets is the Depository Receipt. CDRX will publish these existing instruments on the blokchain. For more information: Crypto Depositary Receipts (CDR).

The terminology used may therefore differ per publisher. It is very likely that over a decade this terminology will have completely disappeared and we are simply talking about securities and that smart banks will play a facilitating role here in terms of advice, supervision and compliance. The entire securities trade will move more and more to the blockchain. For example, a bank could purchase CDRX or Polymath and integrate it into its services.

Print this item

  Is Craig Wright the Real Satoshi?
Posted by: Carsten - 2019-03-12, 09:20 PM - Forum: General discussion - Replies (2)

From the Bad crypto Podcast.... Enjoy. Excellent while driving your car or while lifting weights or what the f... you do... 


Print this item

  Urbit: you're in control. Not some megacorp.
Posted by: Hugues - 2019-03-11, 04:51 PM - Forum: Uncategorized - Replies (2)

You're still just a row in someone's database.

This is realy great.

Your digital life is spread across all kinds of accounts, apps and services.

Every one of them does only one thing and is controlled by someone else. They work great, but they're really just big, dystopian toys.
The limits of these fake, single-purpose computers are clear. People deserve better.
Your Urbit is a personal cloud server. A simple, private, general-purpose virtual computer on an encrypted P2P network.
Your Urbit is your digital passport, your digital vault, and your digital assistant. You own it on Ethereum – no one controls it but you.


Please take some time to read and watch the videos.

Print this item

  Blockchain Fundamentals
Posted by: Carsten - 2019-03-10, 04:15 PM - Forum: General discussion - Replies (2)

"Blockchain Fundamentals" is a nice article published in the Microsoft magazine MSDN explaining the concepts of hash, private/public keys, Merkle trees, forming of blocks and consensus algorithms.  It's a bit technical, but does not go into deep details.

"Blockchain Fundamentals

By Jonathan Waldman | March 2018

Back in 1999, the file-sharing network Napster made it easy to share audio files (usually containing music) on a hybrid peer-to-peer network (“hybrid” because it used a central directory server). That file-sharing network did more than just share music files: It allowed all users to retain copies of those shared files such that a single digital asset resulted in a limitless number of perfect copies across a global network. The casual ease with which technology was leveraged by anyone with a computer caught venerable Tower Records by such surprise that it was forced to close all of its 89 U.S.-based stores by 2006.

In 2008, the subprime debacle occurred, during which long-­established, powerful U.S. financial institutions and insurance companies declared or teetered on the brink of bankruptcy. Those circumstances called for immediate federal government intervention in order to avoid a domestic and possibly global financial meltdown. This important event left a populace leery of centralized banks and exposed the danger of having financial ledgers closed to public scrutiny. In March 2008, the Heartland Payment Systems data breach exposed more than 130 million credit card numbers, many of which were later used to make fraudulent purchases.

These events illustrate the perils of living in a digital, connected world that depends on transaction-fee-generating middlemen and leaves people vulnerable to digital exploits, greed and crime. The academic challenge became how to create an available, disintermediated digital infrastructure on which a digital asset can be openly and reliably transferred (rather than copied and shared) from owner to owner, that has no corruptible or fallible central authority, is secure, and can be trusted.

Enter the Bitcoin Blockchain

Seemingly in response to the historical context in which it happened, on Jan. 3, 2009, a new kind of infrastructure mined 50 digital coins and recorded them on a tamper-proof public ledger that’s replicated on a decentralized peer-to-peer network of Internet-connected computers. Those 50 cryptocurrency units, called bitcoins, were recorded as the genesis block—the first link on what would come to be known as the Bitcoin blockchain.

The remarkable thing about this blockchain-powered cryptocurrency is that it lacks any sort of trust authority or governance (such as a bank or government) to validate each transaction. Furthermore, it disintermediates transactions, making it possible to transfer digital currency internationally using a global network with no middleman involvement, such as a broker or agency. Due to its reliance on modern cryptography, the data contained in the blockchain is tamper-proof and pseudonymous. And because a given blockchain is replicated on every node that comprises its peer-to-peer network, there’s no single point of failure, making the technology available and reliable.

Since Bitcoin’s launch, blockchain technologies continue to mature rapidly. Their implementation details vary dramatically, making the study of blockchains dynamic, vast and complex. Indeed, the term “blockchain” no longer applies only to Bitcoin in particular or to cryptocurrencies in general. Blockchains are being refined and perfected so they work faster and smarter. In fact, some blockchain technologies allow scripting to support smart contracts, which permits custom rules to be applied to transactions. In this way, blockchains have morphed into a new kind of programmable, hacker-proof storage technology, which is one reason why IT professionals, businesses, financial institutions, and others are clamoring to harness their true potential.
If you’ve been sitting on the blockchain sidelines, it’s time to catch up. In this introductory article, it isn’t possible to cover the finer technical details of any particular blockchain technology—each has its own rules, features and customizations—but the ideas I discuss here will help orient you to the core technical underpinnings on which many modern blockchain technologies are based.

How Blockchains Work

The Bitcoin blockchain is the world’s first practical example of blockchain technology. And because of that distinction, “blockchain” is often misunderstood as being synonymous with Bitcoin. However, modern blockchain technology offerings track digital assets other than a digital currency, and those blockchains work quite differently from the way Bitcoin’s blockchain works. Additionally, the Bitcoin blockchain popularized the notion that a blockchain is a data structure that virtualizes a bank ledger by tracking credits and debits while offering a creative, cryptographic solution that effectively bars the double-spending of cryptocurrency units. For this reason, the terms “digital ledger” and “double spend” became associated with cryptocurrency blockchains. Yet these terms, respectively, broadly apply to tracking ownership and enforcing a single transfer of digital assets. When you see these terms, don’t assume they refer solely to cryptocurrency-oriented blockchain technologies.

At its essence, a blockchain is a tamper-proof data structure that tracks something of value or interest as it passes from owner to owner. That “something” can be any kind of digital asset—such as a digital coin, a Word document or the serial number of a Microsoft Surface tablet. In fact, any item that can be associated with a unique digital fingerprint can be tracked on a blockchain. Blockchains solve the so-called “double-spend” problem by requiring that ownership of a digital asset be transferred rather than copied or shared. But what makes a blockchain technology interesting is that it establishes a protocol, enforces transaction rules, and is able to let the nodes on its distributed network of computers self-police the entire operation. And it accomplishes this remarkable feat with no central server or trust authority, speedily and globally (that is, internationally). This promise excites those who see it as a way to eliminate middlemen and reduce or waive transaction fees, making commerce more efficient for businesses and consumers alike.

Blockchain Core Components

The Bitcoin blockchain network is public—anyone can participate anywhere in the world. Yet newer blockchain offerings, such as the Microsoft Azure-hosted blockchain, can be configured as public, private or permissioned networks. Blockchains are considered to be decentralized, but that term requires clarification: As Vitalik Buterin explains (bit.ly/2tEUYyT), “decentralized blockchains” means they’re “politically decentralized (no one controls them) and architecturally decentralized (no infrastructural central point of failure) but they are logically centralized (there is one commonly agreed state and the system behaves like a single computer).” Decentralization offers fault tolerance, attack resistance and collusion resistance (the meaning of this will become clear when I discuss proof-of-work later).
Understanding how to engineer a public blockchain requires knowledge of cryptographic hashes, public key cryptography (PKC), binary hash chains (Merkle trees, in particular), and consensus algorithms. I’ll briefly review these concepts, and then I’ll show that a blockchain is a hash chain that contains a hash chain of transactions. Once you grasp this nested-hash-chain concept, you’ll understand blockchain technology’s fundamental design.

Cryptographic Hashes While there are many one-way crypto­graphic hash algorithm variants, a popular choice is to leverage SHA-256 (bit.ly/29kkpft), a one-way hash function that accepts a message of up to (264-1)/8 bytes and returns a 32-byte hash value (64 hexadecimal characters) in the decimal range of 0 to roughly 1.16 x 1077. To put that number’s magnitude in perspective, a drop of water has about 5 x 1012atoms; the observable universe is estimated to have in the range of 1078 to 1082 atoms. Tweaking any character in the message and re-computing the SHA-256 hash value generates an entirely new hash value. (To experiment, visit onlinemd5.com and set the file or text checksum type to SHA-256.)

Given the same input, the SHA-256 algorithm always produces the same fixed-length output. With respect to blockchain technologies, the value of using SHA-256 cryptographic hashes is that they’re unique enough to serve as a sort of digital fingerprint while also acting as a checksum. Furthermore, one-way hash functions can’t (as a matter of practice) be decoded. Consider the SHA-256 value for my name: 
8F12D83BA54AC0EA7687AD4AFDE5E258BBFF970AA8D60C6588381784C502CA8E. Given that hash value, there’s no practical way to algorithmically reverse it back to my name. (One hacking technique leverages rainbow tables that list already-calculated hash values for common strings, such as “password”—but that’s not algorithmically reversing the hash. To thwart such exploits, it’s customary to embellish the string to be hashed by tacking on a random string, known as a “salt” value.)

If you don’t have a SHA-256 generator handy, consider the table in Figure 1, which shows how strings of various lengths always produce a 64-digit hexadecimal hash value, and that a small change to any particular string produces a completely different result.

Figure 1 Hashing Strings of Various Lengths Using the SHA-256 Algorithm
Input String
SHA-256 Hash Value
March 1, 2018
March 2, 2018

Sometimes a hash value is double-hashed, which means that the first hash is hashed again by applying a second round of the SHA-256 algorithm. If I double-hash the values in Figure 1, I end up with the results in Figure 2.

Figure 2 Double-Hashing the Values in Figure 1
Input String
Double SHA-256 Hash Value
March 1, 2018
March 2, 2018

Public Key Cryptography Recall that one of the primary functions of a blockchain is to track ownership of a digital asset. The digital asset in question may be worth nothing or many millions of dollars, so the ownership test must ensure that the owner can’t be spoofed. To conduct such a test in the digital realm, blockchains leverage PKC, which enables the owner to digitally sign their asset in order to prove ownership and authorize it to be transferred. Unlike symmetric key encryption, wherein a single private (secret) key is used to both encrypt and then decrypt a message, PKC uses asymmetric key encryption.

Because an accurate validation algorithm of digital asset ownership is critical for blockchains, they employ a high-strength public/private key-pair generation strategy that relies on the Elliptic Curve Digital Signature Algorithm, or ECDSA. The beauty of ECDSA is that it creates keys that are shorter in length but cryptographically stronger than same-length keys generated by the usual algorithm: Digital Signature Authorization (DSA). Whenever they’re needed, users access a software application that uses ECDSA to generate the cryptographic key pair. The user must retain a backup of the private key because that key is required to transfer or harness the value held in a digital asset that’s stored on a blockchain. If you have access only to the private key in a private/public key pair, you can regenerate the public key because there’s a mathematical relationship between the two keys. But the private key can’t be generated from the public key (which means if you back up only one key, be sure it’s the private key!).
These keys typically are used in one of two ways. The first use case (see Figure 3) is when you want someone to send you an encrypted message that only you can open. To do that, give the other person your public key and ask them to use it to encrypt the document using software that applies an encryption algorithm and produces a ciphertext—the encrypted version of their message. They then send you only the ciphertext. Because they used your public key to encrypt the document, you must use the correctly paired private key to decrypt it.
[Image: IC879436.png] 
Figure 3 Using PKC When You Want Someone to Send You an Encrypted Document/Message That Only You Can Open

The second use case (see Figure 4) is when you want to encrypt a message and demonstrate that it is indeed from you. To do that, you use your private key to create a ciphertext of your document. You then send that ciphertext to someone else. They use your public key to decrypt it. Because only your public key can decrypt that document, the recipient can assume that the document was encrypted by your private key—and unless your private key has been misappropriated, the document came from you.
[Image: IC879435.png] 
Figure 4 Using PKC When You Want to Send Someone an Encrypted Document/Message to Assure Them That It Indeed Came from You

A third use case employs PKC to prove ownership of a digital asset through a digital-signing process. In this use case (see Figure 5), imagine that Bill has composed a Word document of a legally binding document that he needs to e-mail to Susan. Susan wants to be sure that the copy of the document she receives from Bill is actually from Bill and hasn’t been tampered with en route. Bill first creates a SHA-256 hash of the Word document and records the value as H(W). He next uses his private key to encrypt the document hash, resulting in Enc(H(W)), and then sends the Word document (optionally encrypted) and the Enc(H(W)) value (this is Bill’s digital signature for document W) to Susan.
[Image: IC879434.png] 
Figure 5 Using PKC Along with a Cryptographic Hash to Digitally Sign a Document/Message

Susan re-computes the H(W) value from the copy of the Word document she received, then uses Bill’s public key to decrypt the Enc(H(W)) value (see Figure 6). If the hash Susan computed is equal to the decrypted H(W) value, Susan can conclude that Bill signed the document and that the copy she received is exactly the same as the one Bill signed.
[Image: IC879433.png] 
Figure 6 Using PKC Along with a Cryptographic Hash to Verify That a Document/Message was Signed by the Expected Party

Using hashing and PKC, a blockchain maintains a history of digital asset ownership using transactions. Transaction data objects are linked to each other, forming a data structure called a hash chain. The way this works is that each transaction record constitutes the message (m) that’s hashed using function (H) and then signed using the owner’s private key (s). (It’s customary to use “s,” for “secret,” to represent the private key so as not to confuse it with “p” for the public key.) This produces a signature (sig):

sig = signature(H(m), s)

When a digital asset transfers from one owner to another, its digital signature is examined, verified, and digitally signed by the new owner, and then registered as a new node on the hash chain. Although the details of the implementation vary dramatically across blockchain technologies and versions, the basic idea is the same for all of them. For example, as shown in Figure 7, Bill is the owner of a digital asset and uses his private key to initiate a transfer of that digital asset to Susan. Susan’s transaction record uses Bill’s public key to verify his signature. After this, Susan’s public key is used to sign the digital asset, making Susan the new owner. This creates a new transaction record—a new link on the transaction hash chain.
[Image: IC879432.png]
Figure 7 The Transaction Hash Chain Uses Digital Signatures to Transfer Ownership of a Digital Asset; Each Transaction Record Maintains a Cryptographic Backlink to the Previous Transaction on the Hash Chain

This hash chain of transactions is cryptographically secure and tamper-proof. Any change to Transaction 0 would cause Sig0 to change, and that would require an update to the hash value stored in Transaction 1 and every subsequent transaction on the hash chain.
The transaction objects here are pictured with data. The data contained by each transaction varies for each blockchain implementation, so I’ve abstracted the underlying data for our purposes because the main point to understand is that the hash chain is a cryptographically linked chain of transactions—linked by the hash value of the previous owner’s transaction record. (In crypto­currency blockchains, each transaction object contains a list of digital-currency inputs and outputs, along with metadata, such as a timestamp and optional transaction fee. These cryptocurrency inputs and outputs provide the transaction detail needed to accurately model a financial ledger.)
Merkle Trees Some blockchains bundle up transactions using another kind of hash chain: the binary hash chain, or Merkle tree. A complete Merkle tree is referred to as a binary tree structure because it branches twice at each level starting at the root, as shown in Figure 8.
[Image: IC879431.png]
Figure 8 A Merkle Tree is a Type of Binary Hash Tree That Produces a Merkle Root Hash; This Data Structure Can Efficiently Add Leaf Nodes and Calculate a New Merkle Root Without Requiring Full Re-Computation

The work in setting up a Merkle tree is to create a series of leaf nodes by computing the SHA-256 hash for the data contained in each transaction object (the Bitcoin blockchain double-hashes each Merkle node; double-hashing can help strengthen the cryptographic value in the hash result should a vulnerability be discovered in the SHA-256 algorithm). The Merkle tree requires an even number of leaf nodes—it’s customary to duplicate the last leaf node if starting with an odd number. Then each pair of leaf nodes is hashed together, producing a new hash value. In Figure 8, Leaf A shows the hash for Transaction A as HA; Leaf B shows the hash for Transaction B as HB and so on. This pattern continues at each tree level until you reach the final root node. The root node’s hash value is the crypto­graphic hash sum of all of the other hash sums in the tree. Any change to the data in any of the leaf nodes causes the recomputed Merkle tree root hash value to change.
The Merkle binary hash tree structure offers some advantages. For example, it makes it easy to update data within a transaction and compute a new Merkle root hash without having to build the entire Merkle tree from scratch. For example, if Transaction E changes (it’s highlighted in Figure 8), all you need to do is walk the tree efficiently back to the Merkle root, computing new hashes once for each level. Thus, you first compute the new Leaf hash HE; then compute HEF from HE and HF; then compute HEFGH from HEFand HGH; then compute a new Merkle root hash from HABCD and HEFGH. Updating the Merkle root hash required only four computations versus the 15 required to build the Merkle tree from scratch!
Building a Blockchain
To build a blockchain (see Figure 9), the binary hash chain data object containing transactions must somehow be committed to a tamper-proof data store that everyone can use (remember, this is a public blockchain—any node on the network can read from or write to it). The Merkle tree structure contains transactions and is tamper-proof, so it would seem it could serve as the blockchain. But there are several problems. In order for Bill to send his digital asset to Susan, Bill must trust the service or Web site that acts as an agent to process his digital-asset transfer request, and he must trust the server that persists the hash structure. Without a central node to process a new transaction or a central authority to delegate them for processing, any node could process Bill’s pending transaction. A rogue or dominant node having superior processing power could allow invalid or fraudulent transactions to occur and those could propagate to honest nodes. To solve that, the network could try to randomly assign a node to process Bill’s transaction, but that again centralizes control and requires trust that the random number generator is indeed enforcing randomness. To eliminate this issue, blockchains use consensus algorithms, described next.
[Image: IC879430.png]
Figure 9 The Blockchain Is Composed of Blocks That, in Turn, Include Transaction Hash Trees; Blocks on the Blockchain Are Back-Linked to Previous Blocks and Are Validated Using a Proof-of-Work Algorithm

Consensus Algorithms Blockchain technologies avoid centralized data store and trust-authority issues by honoring a protocol that dictates how blocks are added and maintained. They do so by enforcing a blockchain-building consensus algorithm. There are different kinds of consensus algorithms—I’ll discuss how the proof-of-work (PoW) algorithm works.
PoW is based on the idea that a node on the network needs to prove its honorable intentions by incurring a cost and consuming the time required to solve a computationally challenging problem. To induce a node to participate in such a system and play by its rules, the network offers an incentive—often money—that is, node operators get paid when they add a block to the blockchain. To earn that money, nodes must validate all transactions (to ensure that they meet a blockchain’s specific rules) and then solve a cryptographic puzzle.
Earlier, I mentioned that a central authority could randomly assign a node to process a batch of new transactions. That approach would require a central random-number generator, which could be flawed, hacked or disabled. However, giving nodes a difficult puzzle to solve yields the desired effect: The node that will first solve the puzzle can’t be determined in advance, making for a sort of node-lottery on the network. No central authority is needed—and that’s one of the key innovations of blockchain technologies. I also mentioned that blockchains are decentralized and therefore offer “collusion resistance.” Because PoW takes time and costs money in computational power, it’s practically impossible for any single node or group of nodes to collude on the network and have a blockchain-making advantage over other peer nodes. (There is a “51 percent attack” risk that suggests collusion can occur if a group of nodes ends up with 51 percent of the computational power, but employing a PoW consensus algorithm makes the possibility of such an attack infeasible.)
To construct a block of transactions, a node grabs unprocessed transactions stored on the network and builds a Merkle tree in order to compute the Merkle root hash. Therefore, a candidate block contains a list of transactions along with a block header that includes the Merkle root hash value, a current timestamp and PoW difficulty level (and sometimes additional header data). Then it must solve the PoW puzzle, which involves computing a double hash of the entire 256-bit block hash value, then finding a 32-bit number, called the nonce, which can be concatenated to it so that the hash of the resulting 288-bit number produces a result that has a certain number of leading zeroes. The 32-bit nonce has a range of 0 to 232 (4,294,967,295), so instead of just trying to guess the nonce, it’s typical to start with nonce 0, generate the SHA-256 hash, and determine if it has the target number of leading zeroes (that is, the resulting hash is below a target value); if it doesn’t, the node increments the nonce value and tries again. If the node attempts all nonce values without solving the puzzle, its recalculates the block hash value. This guarantees the production of a different block hash value because a timestamp in the block header is included in the block-hash calculation. At any time, a node can select a different batch of pending transactions for inclusion in the new block (or add new pending transactions that might have appeared since it last checked), and this changes the Merkle root hash value, which, along with the timestamp, changes the newly computed block hash value. Each time the block hash is recomputed, the node iterates over all 4 billion-plus nonces again.
In time, some node on the network will solve its cryptographic puzzle. When it does so, it adds the new block to the end of its copy of the blockchain (every node maintains a copy of the blockchain) and then broadcasts the new block to every other node on the network so that they can update their blockchain copy. When a node broadcasts a new block, other nodes don’t simply trust that a new block is valid—they prove it to themselves by validating the block. To validate, a node simply verifies the PoW puzzle solution by computing the block’s SHA-256 hash concatenated with the nonce value and verifies that the answer produces a hash that has the number of leading zeroes specified by that block’s PoW difficulty value.
Incidentally, on some blockchains, the PoW difficulty value is continually adjusted by the protocol so that new blocks are added to the blockchain at a prescribed time interval. This continual adjustment is necessary because nodes are constantly appearing and disappearing from the network and thus the average computational power of the nodes is always changing. Remember that in PoW, there is an incentive to add blocks to the blockchain, so node administrators often beef up their hardware in order to compete for an award. On the Bitcoin blockchain, the difficulty value is tweaked every 2016 blocks so that blocks continue to be added at an average rate of 10 minutes per block.
Sometimes branches occur. That’s because on a large network, new-block propagation takes time. It’s possible that during propagation, another node solves its PoW puzzle, adds a new block to its copy of the blockchain, then broadcasts that blockchain on the network. Receiving nodes will always add a valid block to their copy of the blockchain—and because each block is cryptographically tethered to the previous block, two new blocks published by two different nodes will result in a branch linked to the same block at the end of the chain. That’s OK, however. Over time, nodes will add new blocks to the end of what the protocol deems to be the “longest chain.” For example, given a branch, the longest chain could be defined as the one with the most-recent block timestamp. Over time, a single branch will prevail in length and blocks from abandoned (shorter) branches will be removed, returning their transactions to the pool of unprocessed transactions.
Wrapping Up
In this article, I’ve shown how to construct a public blockchain that’s composed of cryptographically linked blocks—each of which contains its own hash chain of cryptographically linked transactions—on a decentralized peer-to-peer network of nodes. I covered the basics of blockchain technologies, trying not to focus on any single implementation but instead concentrating on some of the more typical technical features they all share. If you want to explore the subject further, I suggest choosing a specific blockchain technology, such as Bitcoin, Ethereum or Ripple, and trying to master the details of its particular implementation. If you want to experiment with blockchains on your own, take a look at Azure-hosted blockchain offerings at bit.ly/2Gj2zaC.

Jonathan Waldman is a Microsoft Certified Professional who has worked with Microsoft technologies since their inception and who specializes in software ergonomics. Waldman is a member of the Pluralsight technical team and he currently leads institutional and private-sector software-development projects. He can be reached at jonathan.waldman@live.com."



Print this item

  JSECoin ads on the site
Posted by: Carsten - 2019-03-10, 10:37 AM - Forum: Uncategorized - Replies (4)

As you know this site has client side mining by the use of JSECoin java script. It means you donate a small portion of your CPU power to mine JSECoins. A while ago JSECoin also introduced ads which I think is totally against the whole idea of the project. Now the ads seems to have been forced to show (if you don't have ad blocker) without me enabling ads.

Just for your information.

Print this item

  Cryptopia is running again, BUT you can not withdraw your coins
Posted by: Carsten - 2019-03-08, 10:13 AM - Forum: General discussion - Replies (5)

Cryptopia has been down since the site was hacked and a lot of crypto stolen from the exchange. Now it's back up, BUT you can not withdraw your coins.


Print this item

  Is decentralization fading away?
Posted by: Hugues - 2019-03-05, 09:16 AM - Forum: Uncategorized - Replies (1)

Coinbase’s Controversial Neutrino Acquisition Makes Waves Within Crypto Community

After Coinbase acquired Neutrino, the exchange users started to do some research and found out quite controversial details.


Why Decentralization Matters

Spencer Bogart from Blockchain Capital wrote an excellent piece titled “The Long Game in Crypto: Why Decentralization Matters” as a response to an EOS report. Spencer explores the crux of the debate on DPoS versus other, more decentralized consensus algorithms. This could be an important public discussion with massive ramifications that should be heavily debated, as there are billions of dollars at stake.

Spencer’s core argument is that platform-grade censorship resistance, while nice in theory, will not hold up in practice, and that the only viable long-term path is hyper-decentralization. He argues that DPoS (and EOS) will be sovereign-grade censorship resistant in practice, they just take a different path than Bitcoin to get there.

Read the article: https://medium.com/@Bitcom21/the-long-ga...d681ff5ed0

Print this item

  Lisk Dev Update: Core’s Brand New Database Layer, 1.5.0-rc.2 in QA for Testnet....
Posted by: Carsten - 2019-03-03, 08:51 AM - Forum: Bitcoin and Altcoin - No Replies

Good news from Lisk. It's a great German project. Many serious developers are working for Lisk.

"Lisk Dev Update: Core’s Brand New Database Layer, 1.5.0-rc.2 in QA for Testnet and Lisk Mobile’s upcoming BTC Integration"


Print this item

  Operation Crypto - Message from NZ Police about the Cryptopia hack
Posted by: Carsten - 2019-03-01, 08:46 AM - Forum: General discussion - No Replies


Good morning,

This email is in response to recent emails received by affected Cryptopia customers.  

Copied below is themost recent update from police that explains our position – you may have already received it.  We reiterate thatthis is going to be a protracted investigation and like all investigations we remain objective and our enquiries are based on fact and evidence led.   New Zealand Police, along with other domesticand international partner agencies, are looking into every aspect of this complex offending in a challenging environment.

In the past few days, Cryptopia have updated their Twitter and we understand that further updates by them will be ongoing.  Please refer to their Twitter page for further information around company matters.

Thank you for your ongoing patience.


Operation Crypto Investigation Team

NZ Police

Update to Cryptopia customers who have contacted New Zealand Police - 11 February 2018:

Policeacknowledge your frustration with the time the investigation appears to be taking and appreciate your patience.    Cryptopia’s customer base is very large with over 2 million global users, according to the company, so police have to manage numerous queries from affected investors.

Ifyou continue to look online for any media updates as that is generally how information is disseminated to the public by New Zealand Police.   This will be an ongoing enquiry for some timeand police are often constrained as to what we can release as we do not want to potentially compromise an active investigation or subsequent prosecution.

Themost recent media release on the 7 February 2019 is below:

The Police investigation into the Cryptopia hack and theft of cryptocurrency is progressing well and is advancing on several fronts.  The focus is on identifying those behind this offending and retrieving the stolen cryptocurrency.

This is a complex investigation involving the theft of cryptocurrency, in an unregulated environment.  The stolencryptocurrency is being actively tracked by the Police and specialists worldwide due to the nature of the cryptocurrency blockchains being publicly available. 

Excellent progress is being made in the investigation and we are working with Cryptopia management, current and ex-employees who have been providing valuable assistance in this part of the investigation.  We are working closely with our international partners and cybercrime experts to continue the investigation.

Cryptopia’s managers are on site at their Christchurch address and police are expected to finish at the premises by the end of next week (15/2/19). This investigation is expected to take a considerableamount of time to resolve due to the complexity of the cyber environment.


Weacknowledge that your primary concerns are essentially:

·         What has happened to my investment?   Is it currently safe?

·         When can I access my funds?

·         Will I ever be able to recover my funds/receive any compensation if my coins have been stolen?

Thesetype of questions need to be addressed by Cryptopia management.   Whilst police continue to work alongside themto establish the facts of the security breach, we cannot give any commentary in respect of your primary concerns as they are company affairs for Cryptopia to address.

Werecommend you continue to check Cryptopia’s website and twitter page for company updates.

The information contained in this email message is intended for the addressee only and may contain privileged information. It may also be subject to the provisions of section 50 of the Policing Act 2008, which creates an offence to have unlawful possession of Police property. If you are not the intended recipient of this message or have received this message in error, you must not peruse, use, distribute or copy this message or any of its contents.
Also note, the views expressed in this message may not necessarily reflect those of the New Zealand Police. If you have received this message in error, please email or telephone the sender immediately"

Print this item

  Samsung Announces Galaxy S10 Crypto Partners, Bitcoin and Ethereum Support
Posted by: Carsten - 2019-02-27, 10:34 AM - Forum: General discussion - Replies (4)

Samung releases a wallet that can hold Ethereum, Bitcoin and two other coins in their new phones!!


Print this item