Blockchain Explorer - Search the Blockchain | BTC | ETH | BCH

Technical: The Path to Taproot Activation

Taproot! Everybody wants to have it, somebody wants to make it, nobody knows how to get it!
(If you are asking why everybody wants it, see: Technical: Taproot: Why Activate?)
(Pedants: I mostly elide over lockin times)
Briefly, Taproot is that neat new thing that gets us:
So yes, let's activate taproot!

The SegWit Wars

The biggest problem with activating Taproot is PTSD from the previous softfork, SegWit. Pieter Wuille, one of the authors of the current Taproot proposal, has consistently held the position that he will not discuss activation, and will accept whatever activation process is imposed on Taproot. Other developers have expressed similar opinions.
So what happened with SegWit activation that was so traumatic? SegWit used the BIP9 activation method. Let's dive into BIP9!

BIP9 Miner-Activated Soft Fork

Basically, BIP9 has a bunch of parameters:
Now there are other parameters (name, starttime) but they are not anywhere near as important as the above two.
A number that is not a parameter, is 95%. Basically, activation of a BIP9 softfork is considered as actually succeeding if at least 95% of blocks in the last 2 weeks had the specified bit in the nVersion set. If less than 95% had this bit set before the timeout, then the upgrade fails and never goes into the network. This is not a parameter: it is a constant defined by BIP9, and developers using BIP9 activation cannot change this.
So, first some simple questions and their answers:

The Great Battles of the SegWit Wars

SegWit not only fixed transaction malleability, it also created a practical softforkable blocksize increase that also rebalanced weights so that the cost of spending a UTXO is about the same as the cost of creating UTXOs (and spending UTXOs is "better" since it limits the size of the UTXO set that every fullnode has to maintain).
So SegWit was written, the activation was decided to be BIP9, and then.... miner signalling stalled at below 75%.
Thus were the Great SegWit Wars started.

BIP9 Feature Hostage

If you are a miner with at least 5% global hashpower, you can hold a BIP9-activated softfork hostage.
You might even secretly want the softfork to actually push through. But you might want to extract concession from the users and the developers. Like removing the halvening. Or raising or even removing the block size caps (which helps larger miners more than smaller miners, making it easier to become a bigger fish that eats all the smaller fishes). Or whatever.
With BIP9, you can hold the softfork hostage. You just hold out and refuse to signal. You tell everyone you will signal, if and only if certain concessions are given to you.
This ability by miners to hold a feature hostage was enabled because of the miner-exit allowed by the timeout on BIP9. Prior to that, miners were considered little more than expendable security guards, paid for the risk they take to secure the network, but not special in the grand scheme of Bitcoin.

Covert ASICBoost

ASICBoost was a novel way of optimizing SHA256 mining, by taking advantage of the structure of the 80-byte header that is hashed in order to perform proof-of-work. The details of ASICBoost are out-of-scope here but you can read about it elsewhere
Here is a short summary of the two types of ASICBoost, relevant to the activation discussion.
Now, "overt" means "obvious", while "covert" means hidden. Overt ASICBoost is obvious because nVersion bits that are not currently in use for BIP9 activations are usually 0 by default, so setting those bits to 1 makes it obvious that you are doing something weird (namely, Overt ASICBoost). Covert ASICBoost is non-obvious because the order of transactions in a block are up to the miner anyway, so the miner rearranging the transactions in order to get lower power consumption is not going to be detected.
Unfortunately, while Overt ASICBoost was compatible with SegWit, Covert ASICBoost was not. This is because, pre-SegWit, only the block header Merkle tree committed to the transaction ordering. However, with SegWit, another Merkle tree exists, which commits to transaction ordering as well. Covert ASICBoost would require more computation to manipulate two Merkle trees, obviating the power benefits of Covert ASICBoost anyway.
Now, miners want to use ASICBoost (indeed, about 60->70% of current miners probably use the Overt ASICBoost nowadays; if you have a Bitcoin fullnode running you will see the logs with lots of "60 of last 100 blocks had unexpected versions" which is exactly what you would see with the nVersion manipulation that Overt ASICBoost does). But remember: ASICBoost was, at around the time, a novel improvement. Not all miners had ASICBoost hardware. Those who did, did not want it known that they had ASICBoost hardware, and wanted to do Covert ASICBoost!
But Covert ASICBoost is incompatible with SegWit, because SegWit actually has two Merkle trees of transaction data, and Covert ASICBoost works by fudging around with transaction ordering in a block, and recomputing two Merkle Trees is more expensive than recomputing just one (and loses the ASICBoost advantage).
Of course, those miners that wanted Covert ASICBoost did not want to openly admit that they had ASICBoost hardware, they wanted to keep their advantage secret because miners are strongly competitive in a very tight market. And doing ASICBoost Covertly was just the ticket, but they could not work post-SegWit.
Fortunately, due to the BIP9 activation process, they could hold SegWit hostage while covertly taking advantage of Covert ASICBoost!

UASF: BIP148 and BIP8

When the incompatibility between Covert ASICBoost and SegWit was realized, still, activation of SegWit stalled, and miners were still not openly claiming that ASICBoost was related to non-activation of SegWit.
Eventually, a new proposal was created: BIP148. With this rule, 3 months before the end of the SegWit timeout, nodes would reject blocks that did not signal SegWit. Thus, 3 months before SegWit timeout, BIP148 would force activation of SegWit.
This proposal was not accepted by Bitcoin Core, due to the shortening of the timeout (it effectively times out 3 months before the initial SegWit timeout). Instead, a fork of Bitcoin Core was created which added the patch to comply with BIP148. This was claimed as a User Activated Soft Fork, UASF, since users could freely download the alternate fork rather than sticking with the developers of Bitcoin Core.
Now, BIP148 effectively is just a BIP9 activation, except at its (earlier) timeout, the new rules would be activated anyway (instead of the BIP9-mandated behavior that the upgrade is cancelled at the end of the timeout).
BIP148 was actually inspired by the BIP8 proposal (the link here is a historical version; BIP8 has been updated recently, precisely in preparation for Taproot activation). BIP8 is basically BIP9, but at the end of timeout, the softfork is activated anyway rather than cancelled.
This removed the ability of miners to hold the softfork hostage. At best, they can delay the activation, but not stop it entirely by holding out as in BIP9.
Of course, this implies risk that not all miners have upgraded before activation, leading to possible losses for SPV users, as well as again re-pressuring miners to signal activation, possibly without the miners actually upgrading their software to properly impose the new softfork rules.

BIP91, SegWit2X, and The Aftermath

BIP148 inspired countermeasures, possibly from the Covert ASiCBoost miners, possibly from concerned users who wanted to offer concessions to miners. To this day, the common name for BIP148 - UASF - remains an emotionally-charged rallying cry for parts of the Bitcoin community.
One of these was SegWit2X. This was brokered in a deal between some Bitcoin personalities at a conference in New York, and thus part of the so-called "New York Agreement" or NYA, another emotionally-charged acronym.
The text of the NYA was basically:
  1. Set up a new activation threshold at 80% signalled at bit 4 (vs bit 1 for SegWit).
    • When this 80% signalling was reached, miners would require that bit 1 for SegWit be signalled to achive the 95% activation needed for SegWit.
  2. If the bit 4 signalling reached 80%, increase the block weight limit from the SegWit 4000000 to the SegWit2X 8000000, 6 months after bit 1 activation.
The first item above was coded in BIP91.
Unfortunately, if you read the BIP91, independently of NYA, you might come to the conclusion that BIP91 was only about lowering the threshold to 80%. In particular, BIP91 never mentions anything about the second point above, it never mentions that bit 4 80% threshold would also signal for a later hardfork increase in weight limit.
Because of this, even though there are claims that NYA (SegWit2X) reached 80% dominance, a close reading of BIP91 shows that the 80% dominance was only for SegWit activation, without necessarily a later 2x capacity hardfork (SegWit2X).
This ambiguity of bit 4 (NYA says it includes a 2x capacity hardfork, BIP91 says it does not) has continued to be a thorn in blocksize debates later. Economically speaking, Bitcoin futures between SegWit and SegWit2X showed strong economic dominance in favor of SegWit (SegWit2X futures were traded at a fraction in value of SegWit futures: I personally made a tidy but small amount of money betting against SegWit2X in the futures market), so suggesting that NYA achieved 80% dominance even in mining is laughable, but the NYA text that ties bit 4 to SegWit2X still exists.
Historically, BIP91 triggered which caused SegWit to activate before the BIP148 shorter timeout. BIP148 proponents continue to hold this day that it was the BIP148 shorter timeout and no-compromises-activate-on-August-1 that made miners flock to BIP91 as a face-saving tactic that actually removed the second clause of NYA. NYA supporters keep pointing to the bit 4 text in the NYA and the historical activation of BIP91 as a failed promise by Bitcoin developers.

Taproot Activation Proposals

There are two primary proposals I can see for Taproot activation:
  1. BIP8.
  2. Modern Softfork Activation.
We have discussed BIP8: roughly, it has bit and timeout, if 95% of miners signal bit it activates, at the end of timeout it activates. (EDIT: BIP8 has had recent updates: at the end of timeout it can now activate or fail. For the most part, in the below text "BIP8", means BIP8-and-activate-at-timeout, and "BIP9" means BIP8-and-fail-at-timeout)
So let's take a look at Modern Softfork Activation!

Modern Softfork Activation

This is a more complex activation method, composed of BIP9 and BIP8 as supcomponents.
  1. First have a 12-month BIP9 (fail at timeout).
  2. If the above fails to activate, have a 6-month discussion period during which users and developers and miners discuss whether to continue to step 3.
  3. Have a 24-month BIP8 (activate at timeout).
The total above is 42 months, if you are counting: 3.5 years worst-case activation.
The logic here is that if there are no problems, BIP9 will work just fine anyway. And if there are problems, the 6-month period should weed it out. Finally, miners cannot hold the feature hostage since the 24-month BIP8 period will exist anyway.

PSA: Being Resilient to Upgrades

Software is very birttle.
Anyone who has been using software for a long time has experienced something like this:
  1. You hear a new version of your favorite software has a nice new feature.
  2. Excited, you install the new version.
  3. You find that the new version has subtle incompatibilities with your current workflow.
  4. You are sad and downgrade to the older version.
  5. You find out that the new version has changed your files in incompatible ways that the old version cannot work with anymore.
  6. You tearfully reinstall the newer version and figure out how to get your lost productivity now that you have to adapt to a new workflow
If you are a technically-competent user, you might codify your workflow into a bunch of programs. And then you upgrade one of the external pieces of software you are using, and find that it has a subtle incompatibility with your current workflow which is based on a bunch of simple programs you wrote yourself. And if those simple programs are used as the basis of some important production system, you hve just screwed up because you upgraded software on an important production system.
And well, one of the issues with new softfork activation is that if not enough people (users and miners) upgrade to the newest Bitcoin software, the security of the new softfork rules are at risk.
Upgrading software of any kind is always a risk, and the more software you build on top of the software-being-upgraded, the greater you risk your tower of software collapsing while you change its foundations.
So if you have some complex Bitcoin-manipulating system with Bitcoin somewhere at the foundations, consider running two Bitcoin nodes:
  1. One is a "stable-version" Bitcoin node. Once it has synced, set it up to connect=x.x.x.x to the second node below (so that your ISP bandwidth is only spent on the second node). Use this node to run all your software: it's a stable version that you don't change for long periods of time. Enable txiindex, disable pruning, whatever your software needs.
  2. The other is an "always-up-to-date" Bitcoin Node. Keep its stoarge down with pruning (initially sync it off the "stable-version" node). You can't use blocksonly if your "stable-version" node needs to send transactions, but otherwise this "always-up-to-date" Bitcoin node can be kept as a low-resource node, so you can run both nodes in the same machine.
When a new Bitcoin version comes up, you just upgrade the "always-up-to-date" Bitcoin node. This protects you if a future softfork activates, you will only receive valid Bitcoin blocks and transactions. Since this node has nothing running on top of it, it is just a special peer of the "stable-version" node, any software incompatibilities with your system software do not exist.
Your "stable-version" Bitcoin node remains the same version until you are ready to actually upgrade this node and are prepared to rewrite most of the software you have running on top of it due to version compatibility problems.
When upgrading the "always-up-to-date", you can bring it down safely and then start it later. Your "stable-version" wil keep running, disconnected from the network, but otherwise still available for whatever queries. You do need some system to stop the "always-up-to-date" node if for any reason the "stable-version" goes down (otherwisee if the "always-up-to-date" advances its pruning window past what your "stable-version" has, the "stable-version" cannot sync afterwards), but if you are technically competent enough that you need to do this, you are technically competent enough to write such a trivial monitor program (EDIT: gmax notes you can adjust the pruning window by RPC commands to help with this as well).
This recommendation is from gmaxwell on IRC, by the way.
submitted by almkglor to Bitcoin [link] [comments]

The Unofficial Cardano FAQ - V3

(if you would like to add information or see mistakes, just comment below and I will credit you)
What is Cardano? Cardano is an open source and permissionless "Third Generation" blockchain project being developed by IOHK. Development and research started in 2015, with the 1.0 mainnet launching in 2017. Cardano blockchain is currently being developed into two layers. The first one is the ledger of account values, and the second one is the reason why values are transferred from one account to the other.
  1. Cardano Settlement Layer (CSL) - The CSL acts as the ledger of account or balance ledger. This is an idea created as an improvement of bitcoin blockchain. It uses a proof-of-stake consensus algorithm known as Ouroboros to generate new blocks and confirm transactions.
  2. Cardano Computation Layer (CCL) - The CCL contains the data how values are transferred. Since the computation layer is not connected to balance ledger, users of the CCL can create customized rules (smart contracts) when evaluating transactions. (https://support.bitkub.com/hc/en-us/articles/360006678892-What-are-the-two-layers-of-Cardano-)
IOHK has the contract with an undisclosed party to develop the project until the end of 2020, at which point the community may elect another development team - on the assumption that the voting infrastructure has been completed. However CEO Charles Hoskinson has stated that they will develop the project until it is completed, and they are simply financed until the end of 2020.
Cardano was the first project built on a peer-reviewed scientific development method, resulting in dozens of research papers produced by IOHK. Among these papers is Ouroboros Genesis, proving that a Proof of Stake protocol can be just as secure as Proof of Work - which was originally developed for Bitcoin, and refined for Ethereum. This PoS protocol considerably lowers the resources cost to maintain network while still maintaining security and network speed.
Cardano as a financial infrastructure is not yet completed, With significant development to be rolled out.
What were the other two generations of blockchain? Gen 1 was Bitcoin. It exists by itself and talks to nobody but Bitcoin. It is capable of peer to peer transactions without a third party in such a way that you cannot cheat the system. This was a major step forward for the E-cash concept that people have been working on for the 20 years prior.
Gen 2 was Ethereum and other smart-contract platforms that allow other coins and platforms to be built on top of their infrastructure. These coins can interact with others on the platform, but cannot interact with other platforms. Meaning it is still not truly interoperable. Most Gen 2 blockchains are also using Proof of Work likes Bitcoin, which effects scaling. Also missing is a built-in method to pay for upgrades and voting mechanics for decision making.
Gen 3 blockchains are a complete package designed to replace the current financial infrastructure of the world. Cardano is using Proof of Stake to ensure security and decentralisation(Shelley). Scaling through parallel computation (Hydra in Basho), Sidechains to allow the platform to interact with other platforms (Basho), and also include mechanisms for voting for project funding, changes to the protocol and improvement proposals (Voltaire). Finally smart contracts platform for new and established projects that are developer friendly (Goguen).
Who is the team behind Cardano? There are three organisations that are contributing to the development of Cardano. The first is the Cardano Foundation, an objective, non-profit organisation based in Switzerland. Its core responsibilities are to nurture, grow and educate Cardano users and commercial communities, to engage with authorities on regulatory and commercial matters and to act as a blockchain and cryptocurrency standards body. The second entity is IOHK, a leading cryptocurrency research and development company, which holds the contract to develop the platform until 2020. The final business partner is Emurgo, which invests in start-ups and assists commercial ventures to build on the Cardano blockchain.
www.Cardano.org www.emurgo.io https://cardanofoundation.org/en/
What is the difference between Proof of Work and Proof of stake? Both these protocols are known as “consensus protocols” that confirm whether a transaction is valid or invalid without a middleman like Visa or your bank. Every node (active and updated copy of the blockchain) can agree that the transaction did take place legitimately. If more than half validators agree, then the ledger is updated and the transaction is now secured. Proof-of-Work (PoW) happens when a miner is elected to solve an exceptionally difficult math problem and gets credit for adding a verified block to the blockchain. Finding a solution is an arduous guessing game that takes a considerable amount of computing power to compete for the correct answer. It is like “pick a number between 1 and one trillion” and when you get it right, you get $30,000 in Bitcoin, so the more computers you have working on it, the faster you can solve it. Also the more people who are trying to solve the same block, the harder the algorithm, so it may become 1 in 20 trillion. The downside is the massive amounts of power required to run the computers that run the network, and the slow pace that blocks are solved. To “Hack” a PoW system, you need 51% of the computing power, which would allow you to deny transactions, or spend the same coin twice. At the moment there are 8 main mining operations for bitcoin, and 4 of them make up more that 51% of the mining power.
PoS instead selects a coin at random that already exists, and the person who owns that coin is elected to put the work in to validate the block. This means there is no contest and no guessing game. Some computer power is required, but only a fraction of a PoW system. The complex nature of selecting a coin that exists on the correct and longest chain and is owned by someone who can complete the block, AND in such a way that it is secure AND that computer currently running AND that person also having an incentive to complete the work, has made the development of PoS very slow. However only a few years ago it wasn’t even possible. In this method, the more of the coin (ADA) you stake, the more likely you are to be selected to close a block. Cardano also allows you to delegate your stake to someone else to validate the block so they do the work, and you share in the reward for doing so.
To “hack” a PoS blockchain you need to own 51% of the tokens, which is significantly harder than owning 51% of the computing power.
What is ADA and how is it different to Cardano? Cardano is the name of the network infrastructure, and can be thought of like a rail network. ADA is the native token that has been developed alongside Cardano to facilitate the network operation. This helps confusion and maintains distinction, compared to Ethereum being the native token of Ethereum. Similar to bitcoin or any other token, ADA can be sent peer to peer as payment, but is also the reward for running the network, and what is taken as transaction fees.
In this metaphor “Cardano” is the train tracks, that everything runs on. A stake pool would be the locomotive, facilitating transactions on the network while ADA is the coal that powers the locomotive. The train carriages are Decentralised applications (Dapps) that are also running on cardano tracks, but are not actively powering the network.
What is staking Cardano is a Proof of Stake protocol, and uses already existing coins like a marker to ensure security. The protocol chooses a coin at random and the owner of that coin is elected to validate a block of transactions. Staking is the process of adding your ADA coins to a Pool that has the resources to run the network. If the pool you have chosen to "delegate" your stake to is chosen to close/validate a block, then you get a portion of the rewards. The ADA never leaves your wallet, and you can "undelegate" whenever you like. this increases stability of the network and also gives an incentive to pool operators to invest the time and hardware required to run a pool.
What is a stake-pool and how does it work? Cardano.org FAQ on the issue goes into much more detail
A stake pool is where the computing power of the network takes place. During ITN there was 1200 registered stake pools while 300 were creating blocks. You can manage your own stake-pool or delegate your ADA to an already registered pool. Rewards are determined by the protocol, however the pool may elect to charge fee Percentages, or flat rate fee to upkeep their pool.
Can I Stake my ADA right now? The staking testnet has closed, If you participated in the Incentivised Test Net and earned rewards, instructions to check the balance are here.
However if you have just purchased some or it was held on an exchange, then you will need to wait until the Shelley mainnet launch happening at the end of July 2020.
Where do I stake my ADA? Daedalus Flight wallet, and Yoroi Wallet (as a chrome extension) are the current best options. Adalite and several other third-party wallets also exist. Coinbase will also allow staking as a custodial service, and many exchanges may offer “staking as a service” so you can leave your coins on the exchange and still earn rewards if you enjoy trading. I do not recommend leaving coins on an exchange unless you are actively trading.
What are the staking rewards now and what can I expect on a return in the future? The Incentivised Test Net (ITN) Delivered 10%-15%pa returns on average. The future of staking will most likely be lower, but will depend on the amount of ADA staked across the network and the amount of network traffic.
Check https://staking.cardano.org/en/calculato for a clearer picture.
what is a Pledge? To stop one person operating many pools, the rewards that a pool earns will vary depending on the amount of personal ADA they “pledge” to open the pool. This means that 50 pools with a 1,00ADA pledge each will be overall less profitable than 1-2 pool with the max ADA pledge (unknown but likely around 300k). Even if the 50 pools have the same over stake delegated by other users and have a better chance of being selected to close a block, the 50 pools may receive lower rewards.. (at least that is the theory)
Who is IOHK? IOHK is a for-profit software engineering company founded by CEO Charles Hoskinson and Jeremy Wood in 2015 that has taken a scientific approach to the development of blockchain. IOHK started with “first principles” and looked at questions like “what is a blockchain” and “what should a blockchain be able to do” rather than accepting the established paradigm of Bitcoin and Ethereum. IOHK was originally Input Output Hong Kong, but is now Input Output Global and is based in Wyoming USA employing over 230 staff. IOHK has established research labs in several universities in order to complete the Cardano project, and is also developing Ethereum Classic, Atala, Mantis and possibly other Blockchain related programs and infrastructure.
Who is Charles? Charles Hoskinson is an early adopter of cryptocurrencies, American entrepreneur and cryptocurrency specialist. Charles Co-founded Ethereum with Vitalik Buterin and 5-8 others, However he only worked on that project for approximately six-months. Charles is now the CEO of IOHK and the director of The Bitcoin Education Project.
Why isn’t ADA on coinbase? Cardano and coinbase have recently connected in a big way. With IOHK turning over all their ADA to the custodial services of Coinbase. This means that Cardano and Coinbase have been working together for some time and there is a strong partnership forming. Staking and cold storage will be available and trading on Coinbase will most likely become available after the release of Shelley (although no official word yet)
Why Doesn’t Cardano have a Wikipedia Page? Wikipedia has strict guidelines on what can be turned into an article. As there has been no coverage of Cardano from mainstream media or “noteworthy” sources, there is no article yet. Wikipedia will also not accept sources from IOHK as they are not considered “reliable” and must come from a third party. This will most likely change soon.
Cardano does have a dedicated community driven wiki
https://cardanowiki.info/wiki/Home
What is Atala and why do I care?*
Atala is a suite of services being developed on top of the cardano blockchain by IOHK that focusses on credential certification, for things like education, work history and degrees (Atala Prism). Product counterfeiting protection through registering products on a blockchain and create taper-proof provenance. This does not only apply to Gucci handbags, but also medication, art, and anything that can be counterfeited (Atala Scan). As well as supply chain tracking to see issues and inefficiencies with greater transparency(Atala Trace).
Im new, how much is a good investment?
Cardano is still a speculative market and although there is amazing potential here, it is still only potential. When investing in any High risk market like Crypto, only every invest what you are willing to lose. Cardano may be testing the 10c barrier now. But in March it dumped to 1.7c. And if you suddenly need your money back during the dump then you are out of luck. Do your research before you FOMO in. Start with a small amount and send it between wallets and exchanges to understand how the system works. Store your private keys offline (or online cloud service but encrypted) with a method that is unlikely to be damaged AND have multiple copies. So in the case of a house fire or a blow to the head, or the cloud service being shutdown/destroyed, you do not lose your money.
Timelines
https://roadmap.cardano.org/en/
Shelley Decentralisation rollout and news
Goguen smart contract rollout
Voltaire Voting mechanics – no official roll out timeline (though promised for 2020)
Basho scaling and sidechains – no official roll out time line (most likely 2021)
submitted by YourBestMateRobbo to cardano [link] [comments]

ETHE & GBTC (Grayscale) Frequently Asked Questions

It is no doubt Grayscale’s booming popularity as a mainstream investment has caused a lot of community hullabaloo lately. As such, I felt it was worth making a FAQ regarding the topic. I’m looking to update this as needed and of course am open to suggestions / adding any questions.
The goal is simply to have a thread we can link to anyone with questions on Grayscale and its products. Instead of explaining the same thing 3 times a day, shoot those posters over to this thread. My hope is that these questions are answered in a fairly simple and easy to understand manner. I think as the sub grows it will be a nice reference point for newcomers.
Disclaimer: I do NOT work for Grayscale and as such am basing all these answers on information that can be found on their website / reports. (Grayscale’s official FAQ can be found here). I also do NOT have a finance degree, I do NOT have a Series 6 / 7 / 140-whatever, and I do NOT work with investment products for my day job. I have an accounting background and work within the finance world so I have the general ‘business’ knowledge to put it all together, but this is all info determined in my best faith effort as a layman. The point being is this --- it is possible I may explain something wrong or missed the technical terms, and if that occurs I am more than happy to update anything that can be proven incorrect
Everything below will be in reference to ETHE but will apply to GBTC as well. If those two segregate in any way, I will note that accordingly.
What is Grayscale? 
Grayscale is the company that created the ETHE product. Their website is https://grayscale.co/
What is ETHE? 
ETHE is essentially a stock that intends to loosely track the price of ETH. It does so by having each ETHE be backed by a specific amount of ETH that is held on chain. Initially, the newly minted ETHE can only be purchased by institutions and accredited investors directly from Grayscale. Once a year has passed (6 months for GBTC) it can then be listed on the OTCQX Best Market exchange for secondary trading. Once listed on OTCQX, anyone investor can purchase at this point. Additional information on ETHE can be found here.
So ETHE is an ETF? 
No. For technical reasons beyond my personal understandings it is not labeled an ETF. I know it all flows back to the “Securities Act Rule 144”, but due to my limited knowledge on SEC regulations I don’t want to misspeak past that. If anyone is more knowledgeable on the subject I am happy to input their answer here.
How long has ETHE existed? 
ETHE was formed 12/14/2017. GBTC was formed 9/25/2013.
How is ETHE created? 
The trust will issue shares to “Authorized Participants” in groups of 100 shares (called baskets). Authorized Participants are the only persons that may place orders to create these baskets and they do it on behalf of the investor.
Source: Creation and Redemption of Shares section on page 39 of the “Grayscale Ethereum Trust Annual Report (2019)” – Located Here
Note – The way their reports word this makes it sound like there is an army of authorizers doing the dirty work, but in reality there is only one Authorized Participant. At this moment the “Genesis” company is the sole Authorized Participant. Genesis is owned by the “Digital Currency Group, Inc.” which is the parent company of Grayscale as well. (And to really go down the rabbit hole it looks like DCG is the parent company of CoinDesk and is “backing 150+ companies across 30 countries, including Coinbase, Ripple, and Chainalysis.”)
Source: Digital Currency Group, Inc. informational section on page 77 of the “Grayscale Bitcoin Trust (BTC) Form 10-K (2019)” – Located Here
Source: Barry E. Silbert informational section on page 75 of the “Grayscale Bitcoin Trust (BTC) Form 10-K (2019)” – Located Here
How does Grayscale acquire the ETH to collateralize the ETHE product? 
An Investor may acquire ETHE by paying in cash or exchanging ETH already owned.
Source: Creation and Redemption of Shares section on page 40 of the “Grayscale Ethereum Trust Annual Report (2019)” – Located Here
Where does Grayscale store their ETH? Does it have a specific wallet address we can follow? 
ETH is stored with Coinbase Custody Trust Company, LLC. I am unaware of any specific address or set of addresses that can be used to verify the ETH is actually there.
As an aside - I would actually love to see if anyone knows more about this as it’s something that’s sort of peaked my interest after being asked about it… I find it doubtful we can find that however.
Source: Part C. Business Information, Item 8, subsection A. on page 16 of the “Grayscale Ethereum Trust Annual Report (2019)” – Located Here
Can ETHE be redeemed for ETH? 
No, currently there is no way to give your shares of ETHE back to Grayscale to receive ETH back. The only method of getting back into ETH would be to sell your ETHE to someone else and then use those proceeds to buy ETH yourself.
Source: Redemption Procedures on page 41 of the “Grayscale Ethereum Trust Annual Report (2019)” – Located Here
Why are they not redeeming shares? 
I think the report summarizes it best:
Redemptions of Shares are currently not permitted and the Trust is unable to redeem Shares. Subject to receipt of regulatory approval from the SEC and approval by the Sponsor in its sole discretion, the Trust may in the future operate a redemption program. Because the Trust does not believe that the SEC would, at this time, entertain an application for the waiver of rules needed in order to operate an ongoing redemption program, the Trust currently has no intention of seeking regulatory approval from the SEC to operate an ongoing redemption program.
Source: Redemption Procedures on page 41 of the “Grayscale Ethereum Trust Annual Report (2019)” – Located Here
What is the fee structure? 
ETHE has an annual fee of 2.5%. GBTC has an annual fee of 2.0%. Fees are paid by selling the underlying ETH / BTC collateralizing the asset.
Source: ETHE’s informational page on Grayscale’s website - Located Here
Source: Description of Trust on page 31 & 32 of the “Grayscale Ethereum Trust Annual Report (2019)” – Located Here
What is the ratio of ETH to ETHE? 
At the time of posting (6/19/2020) each ETHE share is backed by .09391605 ETH. Each share of GBTC is backed by .00096038 BTC.
ETHE & GBTC’s specific information page on Grayscale’s website updates the ratio daily – Located Here
For a full historical look at this ratio, it can be found on the Grayscale home page on the upper right side if you go to Tax Documents > 2019 Tax Documents > Grayscale Ethereum Trust 2019 Tax Letter.
Why is the ratio not 1:1? Why is it always decreasing? 
While I cannot say for certain why the initial distribution was not a 1:1 backing, it is more than likely to keep the price down and allow more investors a chance to purchase ETHE / GBTC.
As noted above, fees are paid by selling off the ETH collateralizing ETHE. So this number will always be trending downward as time goes on.
Source: Description of Trust on page 32 of the “Grayscale Ethereum Trust Annual Report (2019)” – Located Here
I keep hearing about how this is locked supply… explain? 
As noted above, there is currently no redemption program for converting your ETHE back into ETH. This means that once an ETHE is issued, it will remain in circulation until a redemption program is formed --- something that doesn’t seem to be too urgent for the SEC or Grayscale at the moment. Tiny amounts will naturally be removed due to fees, but the bulk of the asset is in there for good.
Knowing that ETHE cannot be taken back and destroyed at this time, the ETH collateralizing it will not be removed from the wallet for the foreseeable future. While it is not fully locked in the sense of say a totally lost key, it is not coming out any time soon.
Per their annual statement:
The Trust’s ETH will be transferred out of the ETH Account only in the following circumstances: (i) transferred to pay the Sponsor’s Fee or any Additional Trust Expenses, (ii) distributed in connection with the redemption of Baskets (subject to the Trust’s obtaining regulatory approval from the SEC to operate an ongoing redemption program and the consent of the Sponsor), (iii) sold on an as-needed basis to pay Additional Trust Expenses or (iv) sold on behalf of the Trust in the event the Trust terminates and liquidates its assets or as otherwise required by law or regulation.
Source: Description of Trust on page 31 of the “Grayscale Ethereum Trust Annual Report (2019)” – Located Here
Grayscale now owns a huge chunk of both ETH and BTC’s supply… should we be worried about manipulation, a sell off to crash the market crash, a staking cartel? 
First, it’s important to remember Grayscale is a lot more akin to an exchange then say an investment firm. Grayscale is working on behalf of its investors to create this product for investor control. Grayscale doesn’t ‘control’ the ETH it holds any more then Coinbase ‘controls’ the ETH in its hot wallet. (Note: There are likely some varying levels of control, but specific to this topic Grayscale cannot simply sell [legally, at least] the ETH by their own decision in the same manner Coinbase wouldn't be able to either.)
That said, there shouldn’t be any worry in the short to medium time-frame. As noted above, Grayscale can’t really remove ETH other than for fees or termination of the product. At 2.5% a year, fees are noise in terms of volume. Grayscale seems to be the fastest growing product in the crypto space at the moment and termination of the product seems unlikely.
IF redemptions were to happen tomorrow, it’s extremely unlikely we would see a mass exodus out of the product to redeem for ETH. And even if there was incentive to get back to ETH, the premium makes it so that it would be much more cost effective to just sell your ETHE on the secondary market and buy ETH yourself. Remember, any redemption is up to the investors and NOT something Grayscale has direct control over.
Yes, but what about [insert criminal act here]… 
Alright, yes. Technically nothing is stopping Grayscale from selling all the ETH / BTC and running off to the Bahamas (Hawaii?). BUT there is no real reason for them to do so. Barry is an extremely public figure and it won’t be easy for him to get away with that. Grayscale’s Bitcoin Trust creates SEC reports weekly / bi-weekly and I’m sure given the sentiment towards crypto is being watched carefully. Plus, Grayscale is making tons of consistent revenue and thus has little to no incentive to give that up for a quick buck.
That’s a lot of ‘happy little feels’ Bob, is there even an independent audit or is this Tether 2.0? 
Actually yes, an independent auditor report can be found in their annual reports. It is clearly aimed more towards the financial side and I doubt the auditors are crypto savants, but it is at least one extra set of eyes. Auditors are Friedman LLP – Auditor since 2015.
Source: Independent Auditor Report starting on page 116 (of the PDF itself) of the “Grayscale Ethereum Trust Annual Report (2019)” – Located Here
As mentioned by user TheCrpytosAndBloods (In Comments Below), a fun fact:
The company’s auditors Friedman LLP were also coincidentally TetheBitfinex’s auditors until They controversially parted ways in 2018 when the Tether controversy was at its height. I am not suggesting for one moment that there is anything shady about DCG - I just find it interesting it’s the same auditor.
“Grayscale sounds kind of lame” / “Not your keys not your crypto!” / “Why is anyone buying this, it sounds like a scam?” 
Welp, for starters this honestly is not really a product aimed at the people likely to be reading this post. To each their own, but do remember just because something provides no value to you doesn’t mean it can’t provide value to someone else. That said some of the advertised benefits are as follows:
So for example, I can set up an IRA at a brokerage account that has $0 trading fees. Then I can trade GBTC and ETHE all day without having to worry about tracking my taxes. All with the relative safety something like E-Trade provides over Binance.
As for how it benefits the everyday ETH holder? I think the supply lock is a positive. I also think this product exposes the Ethereum ecosystem to people who otherwise wouldn’t know about it.
Why is there a premium? Why is ETHE’s premium so insanely high compared to GBTC’s premium? 
There are a handful of theories of why a premium exists at all, some even mentioned in the annual report. The short list is as follows:
Why is ETHE’s so much higher the GBTC’s? Again, a few thoughts:

Are there any other differences between ETHE and GBTC? 
I touched on a few of the smaller differences, but one of the more interesting changes is GBTC is now a “SEC reporting company” as of January 2020. Which again goes beyond my scope of knowledge so I won’t comment on it too much… but the net result is GBTC is now putting out weekly / bi-weekly 8-K’s and annual 10-K’s. This means you can track GBTC that much easier at the moment as well as there is an extra layer of validity to the product IMO.
I’m looking for some statistics on ETHE… such as who is buying, how much is bought, etc? 
There is a great Q1 2020 report I recommend you give a read that has a lot of cool graphs and data on the product. It’s a little GBTC centric, but there is some ETHE data as well. It can be found here hidden within the 8-K filings.Q1 2020 is the 4/16/2020 8-K filing.
For those more into a GAAP style report see the 2019 annual 10-K of the same location.
Is Grayscale only just for BTC and ETH? 
No, there are other products as well. In terms of a secondary market product, ETCG is the Ethereum Classic version of ETHE. Fun Fact – ETCG was actually put out to the secondary market first. It also has a 3% fee tied to it where 1% of it goes to some type of ETC development fund.
In terms of institutional and accredited investors, there are a few ‘fan favorites’ such as Bitcoin Cash, Litcoin, Stellar, XRP, and Zcash. Something called Horizion (Backed by ZEN I guess? Idk to be honest what that is…). And a diversified Mutual Fund type fund that has a little bit of all of those. None of these products are available on the secondary market.
Are there alternatives to Grayscale? 
I know they exist, but I don’t follow them. I’ll leave this as a “to be edited” section and will add as others comment on what they know.
Per user Over-analyser (in comments below):
Coinshares (Formerly XBT provider) are the only similar product I know of. BTC, ETH, XRP and LTC as Exchange Traded Notes (ETN).
It looks like they are fully backed with the underlying crypto (no premium).
https://coinshares.com/etps/xbt-provideinvestor-resources/daily-hedging-position
Denominated in SEK and EUR. Certainly available in some UK pensions (SIPP).
As asked by pegcity - Okay so I was under the impression you can just give them your own ETH and get ETHE, but do you get 11 ETHE per ETH or do you get the market value of ETH in USD worth of ETHE? 
I have always understood that the ETHE issued directly through Grayscale is issued without the premium. As in, if I were to trade 1 ETH for ETHE I would get 11, not say only 2 or 3 because the secondary market premium is so high. And if I were paying cash only I would be paying the price to buy 1 ETH to get my 11 ETHE. Per page 39 of their annual statement, it reads as follows:
The Trust will issue Shares to Authorized Participants from time to time, but only in one or more Baskets (with a Basket being a block of 100 Shares). The Trust will not issue fractions of a Basket. The creation (and, should the Trust commence a redemption program, redemption) of Baskets will be made only in exchange for the delivery to the Trust, or the distribution by the Trust, of the number of whole and fractional ETH represented by each Basket being created (or, should the Trust commence a redemption program, redeemed), which is determined by dividing (x) the number of ETH owned by the Trust at 4:00 p.m., New York time, on the trade date of a creation or redemption order, after deducting the number of ETH representing the U.S. dollar value of accrued but unpaid fees and expenses of the Trust (converted using the ETH Index Price at such time, and carried to the eighth decimal place), by (y) the number of Shares outstanding at such time (with the quotient so obtained calculated to one one-hundred-millionth of one ETH (i.e., carried to the eighth decimal place)), and multiplying such quotient by 100 (the “Basket ETH Amount”). All questions as to the calculation of the Basket ETH Amount will be conclusively determined by the Sponsor and will be final and binding on all persons interested in the Trust. The Basket ETH Amount multiplied by the number of Baskets being created or redeemed is the “Total Basket ETH Amount.” The number of ETH represented by a Share will gradually decrease over time as the Trust’s ETH are used to pay the Trust’s expenses. Each Share represented approximately 0.0950 ETH and 0.0974 ETH as of December 31, 2019 and 2018, respectively.

submitted by Bob-Rossi to ethfinance [link] [comments]

Why choose Bitcoin Cash?

Some of you might be coming to this sub, and wondering why so many people support Bitcoin Cash. This is directly answered in the pinned FAQ, and also briefly goes over the history of the sub. Now onto why Bitcoin Cash has huge potential when it comes to changing the world:
Bitcoin Cash was created with the purpose of bringing economic freedom to everyone all across the globe. With the current banking, financial, and payment systems, there are many issues when it comes to the usability of money. These issues are:
- Sending money across the globe without having to pay high fees (percentage fees), and waiting days or even weeks for your transfer to go through
- Having payment options like Visa and Mastercard that help deal with high-volume business, but having to pay a flat fee ($0.15), and a fee of 2%-3% per purchase
- Having full control over your money, so the government can't devalue your savings by printing more money for their personal interests
- Being able to use your money however you like, without having to get permission from an intermediary, middleman, or financial institution
- Being able to know how much money will be circulating at any given time in the future
- Paying high fees (4%+) for converting currency when travelling
Let's take a look at how Bitcoin Cash solves these problems:
Remittance
When it comes to sending money across the globe from one bank account to another, often times the fees will be very high because when your bank is sending money, it has to go through several intermediary banks that each take from the initial amount of money, making the process slow, and expensive. Currently, Western Union is advertising "free" transfers of currency across the globe. Seems like a good deal, right? Well here's the thing: they're tricking you into thinking that transfers are free when they're actually making money off of the exchange rate. We believe that money (digital cash) should be as frictionless as possible, and that a user shouldn't have to deal with transfer fees, and have to get permission to transfer their money from one bank to another. Currently, the fees on Bitcoin Cash are only $0.0007, and we plan on keeping them that low.
Payment Systems
When it comes to traditional payment systems, like Visa, Mastercard, and American Express, credit card companies often charge a 2%-3% fee on every transaction that takes place, and a transaction can take anywhere from 24-36 hours to confirm, and go into a merchant's bank account. These payment systems are both slow and expensive. With Bitcoin Cash, your funds are available instantly for you to spend, but if you want to take extra security measures, you can always wait ~10 minutes for a confirmation to go through.
Control Over Your Own Money
With the banking system as we currently know it, one of the biggest problems is the lack of control your have over your own money. Every year, people are forced to pay taxes to politicians only to have their money basically wasted on providing effectively nothing to them. Bitcoin Cash solves this problem by giving you full control over your money. Making a wallet does not require anyone to give ID, personal information, or anything that could potentially lead to the government having any say in what you can do with your hard-earned money. Another issue with traditional currencies is the inflationary nature of them. This is another form of taxation that doesn't appear to be as bad as taxing, but it's just a different way of taking money from the hands of citizens. When the government prints more money, your savings get devalued, meaning that the government has effectively stolen money without physically "stealing" it. With Bitcoin Cash, the inflation relies on a purely mathematical system in which the maximum number of Bitcoins will always be 21 million. With mathematical certainty, you can always be sure of the exact supply of Bitcoins based on the block number. I made a graph that helps illustrate this with >99.99997% accuracy on how many Bitcoin Cash will be in circulation based on the block height. This works for Bitcoin, and Bitcoin SV too. You can check the accuracy by putting the block height/number in the brackets of the second expression.
Currency Conversion
Have you ever travelled to another country where you had to convert to the local currency in order to be able to use it? If so, you would've realized that conversion rates can often be very high, and it is impractical to do unless you're converting a large sum of money. Our idea is to increase merchant adoption so that Bitcoin Cash can have its own economy, so it doesn't matter where in the world you are, you can always use Bitcoin Cash, and not have to worry about conversion fees. If you want to "convert" to another currency, you can always use SLP tokens that will eventually come in a variety of local fiat currencies in the near future. Tether USDT is already planning to make SLP tokens too. This is also a great alternative if you aren't sure whether you want to put your money into crypto, and want to stick with fiat instead. Think of SLP tokens as "paper" tokens on top of Bitcoin Cash that can be sent and received for fractions of a penny!
How to use Bitcoin Cash for Buying Goods and Services
Right now, there are many ways you can use Bitcoin Cash, including local usage, and online usage. If you want to see which merchants near you accept Bitcoin Cash, you can check using map.bitcoin.com and see which local merchants are accepting Bitcoin Cash. If you want to buy things online, you can use purse.io, and get 30% off on any Amazon purchase, so you contribute to the economy of growing Bitcoin Cash, and get a great deal for any item you want to buy!
TL;DR: Bitcoin Cash is sound money which you have full control over your own money, and allows you to send any amount of money, anywhere in the world, instantly, and practically for free. If you have any additional questions, feel free to comment.
Resources:
Bitcoin Inflation Graph: https://www.desmos.com/calculatolaijpbrh4s
Buy things on Amazon using Bitcoin Cash: https://purse.io/shop
purse.io chrome extension: https://chrome.google.com/webstore/detail/purse-shop-with-bitcoin-b/amdginnpaflghjbbdkfenpekaeifnpee
See which local merchants accept Bitcoin Cash: https://map.bitcoin.com/
Wallets with Bitcoin Cash: Electron Cash, Bitcoin.com Wallet, Exodus, Badger Wallet
Bitcoin Cash website: https://bitcoincash.org
submitted by 1MightBeAPenguin to btc [link] [comments]

Cardano FAQ - V2

Cardano FAQ
What is Cardano? Cardano is an open source highly secure "Third Generation" blockchain project being developed by IOHK. Development and research started in 2015, with the 1.0 mainnet launching in 2017. Cardano blockchain is currently being developed into two layers. The first one is the ledger of account values, and the second one is the reason why values are transferred from one account to the other.
  1. Cardano Settlement Layer (CSL) - The CSL acts as the ledger of account or balance ledger. This is an idea created as an improvement of bitcoin blockchain. It uses a proof-of-stake consensus algorithm to generate new blocks and confirm transactions.
  2. Cardano Computation Layer (CCL) - The CCL contains the data how values are transferred. Since the computation layer is not connected to balance ledger, users of the CCL can create customized rules when evaluating transactions. (https://support.bitkub.com/hc/en-us/articles/360006678892-What-are-the-two-layers-of-Cardano-)
IOHK has the contract with an undisclosed party to develop the project until the end of 2020, at which point the community may elect another - on the assumption that the voting infrastructure has been completed. However CEO Charles Hoskinson has stated that they will develop the project until it is completed, and they are simply financed until the end of 2020.
Cardano was the first project built on a peer-reviewed scientific development method, resulting in dozens of research papers produced by IOHK. Among these papers is Ouroboros Genesis, proving that a Proof of Stake protocol can be just as secure as Proof of Work, which was originally developed for Bitcoin, and refined for Ethereum. This PoS protocol considerably lowers the resources cost to maintain network while still maintaining security and network speed.
Cardano as a financial infrastructure is not yet completed, With significant development to be rolled out.
What were the other two generations of blockchain? Gen 1 was Bitcoin. It exists by itself and talks to nobody but bitcoin. It is capable of peer to peer transactions without a third party in such a way that you cannot cheat the system. this was a major step forward for the E-cash concept.
Gen 2 was Ethereum and other smart-contract platforms that allow other coins to be built on top of their infrastructure. These coins can interact with others on the platform, but cannot interact with other platforms like Stella, Bitcoin, cardano - and so on. Also most Gen 2 blockchains are also using Proof of Work likes Bitcoin, which effects scaling.
Gen 3 blockchains are using Proof of Stake to ensure scaling, Sidechains to allow the platform to interact with other platforms, like ethereum and bitcoin, and also include smart contracts that are developer friendly.
Who is the team behind Cardano? There are three organisations that are contributing to the development of Cardano. The first is the Cardano Foundation, an objective, non-profit organisation based in Switzerland. Its core responsibilities are to nurture, grow and educate Cardano users and commercial communities, to engage with authorities on regulatory and commercial matters and to act as a blockchain and cryptocurrency standards body. The second entity working on Cardano is IOHK, a leading cryptocurrency research and development company, which holds the contract to develop the platform until 2020. The final business partner is Emurgo, which invests in start-ups and assists commercial ventures to build on the Cardano blockchain. (from https://www.cardano.org/en/help-support/)
What is the difference between PoS and PoW? Both these protocols are known as “consensus protocols” that confirm whether a transaction is valid or invalid without a middleman like Visa or your bank. Every node (active and updated copy of the blockchain) can agree that the transaction did take place legitimately. If more than half the network agrees, then the transaction is validated. Proof-of-Work (PoW) happens when a miner solves an exceptionally difficult math problem and gets credit for adding a verified block to the blockchain. Finding a solution is an arduous guessing game that takes a considerable amount of computing power to compete for the correct answer. It is like “pick a number between 1 and one trillion” and when you get it right, you get $30,000 in Bitcoin, so the more computers you have working on it, the faster you can solve it. Also the more people who are trying to solve the same block, the harder the algorithm, so it may become 1 in 20 trillion. The downside is the massive amounts of power required to run the computers that run the network, and the slow pace that blocks are solved. To “Hack” a PoW system, you need 51% of the computing power, which would allow you to deny transactions, or spend the same coin twice.
PoS instead selects a coin at random that already exists, and the person who owns that coin is elected to put the work in to validate the block. This means there is no contest and no guessing game. Some computer power is required, but only a fraction of a PoW system. The complex nature of selecting a coin that exists on the correct and longest chain and is owned by someone who can complete the block, AND in such a way that it is secure AND that computer currently running AND that person also having an incentive to complete the work, has made the development of PoS very slow. However only a few years ago it wasn’t even possible. In this method, the more of the coin (ADA) you stake, the more likely you are to be selected to close a block. Cardano also allows you to delegate your stake to someone else to validate the block so they do the work, and you share in the reward for doing so.
To “hack” a PoS blockchain you need to own 51% of the tokens, which is significantly harder than owning 51% of the computing power.
What is ADA and how is it different to Cardano? Cardano is the name of the network infrastructure, and can be thought of like a rail network. ADA is the native token that has been developed alongside Cardano to facilitate the network operation. This helps confusion and maintains distinction, compared to Ethereum being the native token of Ethereum. Similar to bitcoin or any other token, ADA can be sent peer to peer as payment, but is also the reward for running the network, and what is taken as transaction fees.
In this metaphor “Cardano” is the train tracks, that everything runs on. A stake pool would be the locomotive, facilitating transactions on the network while ADA is the coal that powers the locomotive. The train carriages are Decentralised applications (Dapps) that are also running on cardano tracks, but are not actively powering the network.
What is staking Cardano is a Proof of Stake protocol, and uses already existing coins like a marker to ensure security. The protocol chooses a coin at random and the owner of that coin is elected to validate a block of transactions. Staking is the process of adding your ADA coins to a Pool that has the resources to run the network. If the pool you have chosen to "delegate" your stake to is chosen to close/validate a block, then you get a portion of the rewards. The ADA never leaves your wallet, and you can "undelegate" whenever you like. this increases stability of the network and also gives an incentive to pool operators to invest the time and hardware required to run a pool.
What is a stake-pool and how does it work? A stake pool is where the computing power of the network takes place. Currently there are 1200 registered stake pools while 300 are creating blocks. You can manage your own stake-pool or delegate your ADA to an already registered pool. Rewards are determined by the protocol, however the pool may elect to charge fee Percentages, or flat rate fee to upkeep their pool.
Can I Stake my ADA right now? If you had ADA in a Yoroi or Daedalus wallet before November 2019 then yes, you can stake. However if you have just purchased some or it was held on an exchange, then you will need to wait until August 18 (hopefully) for pools to start creating blocks, and first staking rewards will be 5 days later.
Where do I stake my ADA? Daedalus Flight wallet - Or Daedalus ITN, and Yoroi Wallet (as a chrome extension) are the current best options.
What are the staking rewards now and what can I expect on a return in the future? At the moment the Incentivised Test Net (ITN) is delivering 10%-15%pa returns on average. The future of staking will most likely be lower, but will depend on the amount of ADA staked across the network and the amount of network traffic. However it should not be completely dissimilar from the ITN, with most speculating 6%-10%pa compounding weekly….at this point there is no solid answer
what is a Pledge? To stop one person operating many pools, the rewards that a pool earns will vary depending on the amount of personal ADA they “pledge” to open the pool. This means that 100 pools with a 10,00ADA pledge will be overall less profitable than 1 pool with 1,000,000 ADA pledge. (at least that is the theory)
Who is IOHK? IOHK is a for-profit software engineering company founded by CEO Charles Hoskinson and Jeremy Wood in 2015 that has taken a scientific approach to the development of blockchain. IOHK started with “first principles” and looked at questions like “what is a blockchain” and “what should a blockchain be able to do” rather than accepting the established paradigm of Bitcoin and Ethereum. IOHK was originally Input Output Hong Kong, but is now Input Output Global and is based in Wyoming USA employing over 230 staff. IOHK has established research labs in several universities in order to complete the Cardano project, and is also developing Ethereum Classic, Atilia, Mantis and possibly other Blockchain related programs and infrastructure.
Who is Charles? Charles Hoskinson is an American entrepreneur and cryptocurrency specialist. Charles is often cited in the media as the Co-founder of Ethereum, but only worked on that project for approximately six-months. Charles is now the CEO of IOHK and the director of The Bitcoin Education Project.
Why isn’t ADA on coinbase? There is no official word specifically as to why Cardano is not on Coinbase, However there prevailing theory is that Coinbase requires the coins to be decentralised. and as Cardano is still being developed, it will not be added Shelley is released, or possibly never, it is totally up to coinbase. However Charles did mention in an AMA that IOG has been working with many exchanges for the Shelley rollout.
Why Doesn’t Cardano have a Wikipedia Page? Wikipedia has strict guidelines on what can be turned into an article. As there has been no coverage of Cardano from mainstream media or “noteworthy” sources, there is no article yet. Wikipedia will also not accept sources from IOHK as they are not considered “reliable” and must come from a third party. This will most likely change soon.
Cardano does have a dedicated community driven wiki
https://cardanowiki.info/wiki/Home
submitted by YourBestMateRobbo to cardano [link] [comments]

Cardano FAQ - V1 - Feedback requested

Cardano FAQ
What is Cardano? - Cardano is an open source highly secure blockchain 3.0 project being developed by IOHK. Development and research started in 2015, with the 1.0 mainnet launching in 2017. Cardano blockchain is currently being developed into two layers. The first one is the ledger of account values and the second one is the reason why values are transferred from one account to the other.
  1. Cardano Settlement Layer (CSL) - The CSL acts as the ledger of account or balance ledger. This is an idea created as an improvement of bitcoin blockchain. It uses a proof-of-stake consensus algorithm to generate new blocks and confirm transactions.
  2. Cardano Computation Layer (CCL) - The CCL contains the data how values are transferred. Since the computation layer is not connected to balance ledger, users of the CCL can create customized rules when evaluating transactions. (https://support.bitkub.com/hc/en-us/articles/360006678892-What-are-the-two-layers-of-Cardano-)
IHOK has the contract with an undisclosed party to develop the project until the end of 2020, at which point the community may elect another - on the assumption that the voting infrastructure has been completed. However CEO Charles Hoskinson has stated that they will develop the project until it is completed, and they are simply financed until the end of 2020.
Cardano was the first project built on a peer-reviewed scientific development method, resulting in dozens of research papers produced by IOHK. Amongst these papers is Ouroboros Genesis, proving that a Proof of Stake protocol can be just as secure as Proof of Work, which was originally developed for Bitcoin, and refined for Ethereum. This PoS protocol considerably lowers the resources cost to maintain network while still maintaining security and network speed.
Cardano as a financial infrastructure is not yet completed, With significant development to be rolled out.
Who is the team behind Cardano? There are three organisations that are contributing to the development of Cardano. The first is the Cardano Foundation, an objective, non-profit organisation based in Switzerland. Its core responsibilities are to nurture, grow and educate Cardano users and commercial communities, to engage with authorities on regulatory and commercial matters and to act as a blockchain and cryptocurrency standards body. The second entity working on Cardano is IOHK, a leading cryptocurrency research and development company, which holds the contract to develop the platform until 2020. The final business partner is Emurgo, which invests in start-ups and assists commercial ventures to build on the Cardano blockchain. (from https://www.cardano.org/en/help-support/)
What is the difference between PoS and PoW? Both these protocols are known as “consensus protocols” that confirm whether a transaction is valid or invalid without a middleman like Visa or your bank. Every node (active and updated copy of the blockchain) can agree that the transaction did take place legitimately. If more than half the network agrees, then the transaction is validated. Proof-of-Work (PoW) happens when a miner solves an exceptionally difficult math problem and gets credit for adding a verified block to the blockchain. Finding a solution is an arduous guessing game that takes a considerable amount of computing power to compete for the correct answer. It is like “pick a number between 1 and one trillion” and when you get it right, you get $30,000 in Bitcoin, so the more computers you have working on it, the faster you can solve it. Also the more people who are trying to solve the same block, the harder the algorithm, so it may become 1 in 20 trillion. The downside is the massive amounts of power required to run the computers that run the network, and the slow pace that blocks are solved. To “Hack” a PoW system, you need 51% of the computing power, which would allow you to deny transactions, or spend the same coin twice.
PoS instead selects a coin at random that already exists, and the person who owns that coin is elected to put the work in to validate the block. This means there is no contest and no guessing game. Some computer power is required, but only a fraction of a PoW system. The complex nature of selecting a coin that exists on the correct and longest chain and is owned by someone who can complete the block, AND in such a way that it is secure AND that computer currently running AND that person also having an incentive to complete the work, has made the development of PoS very slow. However only a few years ago it wasn’t even possible. In this method, the more of the coin (ADA) you stake, the more likely you are to be selected to close a block. Cardano also allows you to delegate your stake to someone else to validate the block so they do the work, and you share in the reward for doing so.
To “hack” a PoS blockchain you need to own 51% of the tokens, which is significantly harder than owning 51% of the computing power.
What is ADA and how is it different to Cardano?
Cardano is the name of the network infrastructure, and can be thought of like a rail network. ADA is the native token that has been developed alongside Cardano to facilitate the network operation. This helps confusion and maintains distinction, compared to Ethereum being the native token of Ethereum. Similar to bitcoin or any other token, ADA can be sent peer to peer as payment, but is also the reward for running the network, and what is taken as transaction fees.
In this metaphor “Cardano” is the train tracks, that everything runs on. A stake pool would be the locomotive, facilitating transactions on the network while ADA is the coal that powers the locomotive. The train carriages are Decentralised applications (Dapps) that are also running on cardano tracks, but are not actively powering the network.
Can I Stake my ADA right now? If you had ADA in a Yoroi or Daedalus wallet before November 2019 then yes, you can stake. However if you have just purchased some or it was held on an exchange, then you will need to wait until August 18 (hopefully) for the release of the full staking capability. Where do I stake my ADA? Daedalus Flight wallet - Or Daedalus ITN, and Yoroi Wallet (as a chrome extension) are the current best options.
What are the staking rewards now and what can I expect on a return in the future? At the moment the Incentivised Test Net (ITN) is delivering 10%-15%pa returns on average. The future of staking will most likely be lower, but will depend on the amount of ADA staked across the network and the amount of network traffic. However it should not be completely dissimilar from the ITN, with most speculating 6%-10%pa compounding weekly….at this point there is no solid answer
What is a stake-pool and how does it work? A stake pool is where the computing power of the network takes place. Currently there are 1200 registered stake pools while 300 are creating blocks. You can manage your own stake-pool or delegate your ADA to an already registered pool. Rewards are determined by the protocol, however the pool may elect to charge fee Percentages, or flat rate fee to upkeep their pool.
what is a Pledge? To stop one person operating many pools, the rewards that a pool earns will vary depending on the amount of personal ADA they “pledge” to open the pool. This means that 100 pools with a 10,00ADA pledge will be overall less profitable than 1 pool with 1,000,000 ADA pledge. (at least that is the theory)
Who is IOHK? IOHK is a for-profit software engineering company founded by CEO Charles Hoskinson and Jeremy Wood in 2015 that has taken a scientific approach to the development of blockchain. IOHK started with “first principles” and looked at questions like “what is a blockchain” and “what should a blockchain be able to do” rather than accepting the established paradigm of Bitcoin and Ethereum. IOHK was originally Input Output Hong Kong, but is now Input Output Global and is based in Wyoming USA employing over 230 staff. IOHK has established research labs in several universities in order to complete the Cardano project, and is also developing Ethereum Classic, Atilia, Mantis and possibly other Blockchain related programs and infrastructure.
Who is Charles? Charles Hoskinson is an American entrepreneur and cryptocurrency specialist. Charles is often cited in the media as the Co-founder of Ethereum, but only worked on that project for approximately six-months. Charles is now the CEO of IOHK and the director of The Bitcoin Education Project.
Why isn’t ADA on coinbase? Coinbase requires the coins to essentially be “finished” and as Cardano is still being developed, it will not be added until there is more development rolled out.
Why Doesn’t Cardano have a Wikipedia Page? Wikipedia has strict guidelines on what can be turned into an article. As there has been no coverage of Cardano from mainstream media or “noteworthy” sources, there is no article yet. Wikipedia will also not accept sources from IOHK as they are not considered “reliable” and must come from a third party. This will most likely change soon.
submitted by YourBestMateRobbo to cardano [link] [comments]

Privacy-o-meter — a free tool to assess the privacy level of your BTC transactions. Privacy-o-meter is the first step to defend yourself against heuristics blockchain surveillance companies use.

Privacy-o-meter — a free tool to assess the privacy level of your BTC transactions. Privacy-o-meter is the first step to defend yourself against heuristics blockchain surveillance companies use.
Blockchair has released Privacy-o-meter in its public block explorer and API to measure the privacy level of Bitcoin transactions. The free feature makes use of 50 heuristics and allows visitors to look up how much information about their identity has been leaked. In a later stage, wallets and exchanges will be able to use the feature to notify users about how much information will be leaked before sending out a transaction.
While Bitcoin is considered to be a privacy-oriented system, the blockchain is open to be analyzed by anyone, and there are numerous transaction tracing tools like Chainalysis, Elliptic, CipherTrace, and Crystal. These are paid tools and often only available to a handful of individuals and companies. Bitcoin users thus rarely have the opportunity to see how deep the rabbit hole goes regarding their privacy loss.
A transaction with a low privacy score
Blockchair launched a simple transaction scoring tool and will expand this further in the upcoming months. It currently uses indicators that reveal user information such as:
  • Is an address reused or not?
  • Is one of the outputs a rounded number, thus the recipient?
  • How many input addresses have been used?
But also more technical heuristics such as:
  • Which script or multi-sig type has been used to sign a transaction?
  • How are output scripts compared to input scripts?
  • How are inputs or outputs ordered?
As mentioned by Blockchair, transaction tracing is relatively simple as most users aren’t concerned enough about their privacy and often make ‘mistakes’ like sending round BTC amounts. Wallet providers are often also not highly concerned about user privacy. Taking the previous example in context, there are no warnings if a user tries to send a rounded amount.
A transaction with a high privacy score
In comparison with protocols such as Zcash, Monero and Dash, in the Bitcoin network there are no transaction obfuscating implementations, and due to the lack of scalability so-called Mixers are expensive and cumbersome to use.
Blockchair provides the privacy-o-meter for free as it hopes it will help Bitcoin users take some of their privacy back.
submitted by blockchair to Bitcoin [link] [comments]

/r/Scams Common Scam Master Post

Hello visitors and subscribers of scams! Here you will find a master list of common (and uncommon) scams that you may encounter online or in real life. Thank you to the many contributors who helped create this thread!

If you know of a scam that is not covered here, write a comment and it will be added to the next edition.

Previous threads: https://old.reddit.com/Scams/search?q=common+scams+master+post&restrict_sr=on
Blackmail email scam thread: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5//
Some of these articles are from small, local publications and refer to the scam happening in a specific area. Do not think that this means that the scam won't happen in your area.

Spoofing

Caller ID spoofing
It is very easy for anyone to make a phone call while having any number show up on the caller ID of the person receiving the phone call. Receiving a phone call from a certain number does not mean that the person/company who owns that number has actually called you.
Email spoofing
The "from" field of an email can be set by the sender, meaning that you can receive scam emails that look like they are from legitimate addresses. It's important to never click links in emails unless absolutely necessary, for example a password reset link you requested or an account activation link for an account you created.
SMS spoofing
SMS messages can be spoofed, so be wary of messages that seem to be from your friends or other trusted people.

The most common scams

The fake check scam (Credit to nimble2 for this part)
The fake check scam arises from many different situations (for instance, you applied for a job, or you are selling something on a place like Craigslist, or someone wants to purchase goods or services from your business, or you were offered a job as a mystery shopper, you were asked to wrap your car with an advertisement, or you received a check in the mail for no reason), but the bottom line is always something like this:
General fraudulent funds scams If somebody is asking you to accept and send out money as a favour or as part of a job, it is a fraudulent funds scam. It does not matter how they pay you, any payment on any service can be fraudulent and will be reversed when it is discovered to be fraudulent.
Phone verification code scams Someone will ask you to receive a verification text and then tell you to give them the code. Usually the code will come from Google Voice, or from Craigslist. In the Google version of the scam, your phone number will be used to verify a Google Voice account that the scammer will use to scam people with. In the Craigslist version of the scam, your phone number will be used to verify a Craigslist posting that the scammer will use to scam people. There is also an account takeover version of this scam that will involve the scammer sending a password reset token to your phone number and asking you for it.
Bitcoin job scams
Bitcoin job scams involve some sort of fraudulent funds transfer, usually a fake check although a fraudulent bank transfer can be used as well. The scammer will send you the fraudulent money and ask you to purchase bitcoins. This is a scam, and you will have zero recourse after you send the scammer bitcoins.
Email flooding
If you suddenly receive hundreds or thousands of spam emails, usually subscription confirmations, it's very likely that one of your online accounts has been taken over and is being used fraudulently. You should check any of your accounts that has a credit card linked to it, preferably from a computer other than the one you normally use. You should change all of your passwords to unique passwords and you should start using two factor authentication everywhere.
Boss/CEO scam A scammer will impersonate your boss or someone who works at your company and will ask you to run an errand for them, which will usually be purchasing gift cards and sending them the code. Once the scammer has the code, you have no recourse.
Employment certification scams
You will receive a job offer that is dependent on you completing a course or receiving a certification from a company the scammer tells you about. The scammer operates both websites and the job does not exist.
Craigslist fake payment scams
Scammers will ask you about your item that you have listed for sale on a site like Craigslist, and will ask to pay you via Paypal. They are scamming you, and the payment in most cases does not actually exist, the email you received was sent by the scammers. In cases where you have received a payment, the scammer can dispute the payment or the payment may be entirely fraudulent. The scammer will then either try to get you to send money to them using the fake funds that they did not send to you, or will ask you to ship the item, usually to a re-shipping facility or a parcel mule.
General fraudulent funds scams The fake check scam is not the only scam that involves accepting fraudulent/fake funds and purchasing items for scammers. If your job or opportunity involves accepting money and then using that money, it is almost certainly a frauduent funds scam. Even if the payment is through a bank transfer, Paypal, Venmo, Zelle, Interac e-Transfer, etc, it does not matter.
Credit card debt scam
Fraudsters will offer to pay off your bills, and will do so with fraudulent funds. Sometimes it will be your credit card bill, but it can be any bill that can be paid online. Once they pay it off, they will ask you to send them money or purchase items for them. The fraudulent transaction will be reversed in the future and you will never be able to keep the money. This scam happens on sites like Craigslist, Twitter, Instagram, and also some dating sites, including SeekingArrangement.
The parcel mule scam
A scammer will contact you with a job opportunity that involves accepting and reshipping packages. The packages are either stolen or fraudulently obtained items, and you will not be paid by the scammer. Here is a news article about a scam victim who fell for this scam and reshipped over 20 packages containing fraudulently acquired goods.
The Skype sex scam
You're on Facebook and you get a friend request from a cute girl you've never met. She wants to start sexting and trading nudes. She'll ask you to send pictures or videos or get on webcam where she can see you naked with your face in the picture. The scam: There's no girl. You've sent nudes to a guy pretending to be a girl. As soon as he has the pictures he'll demand money and threaten to send the pictures to your friends and family. Sometimes the scammer will upload the video to a porn site or Youtube to show that they are serious.
What to do if you are a victim of this scam: You cannot buy silence, you can only rent it. Paying the blackmailer will show them that the information they have is valuable and they will come after you for more money. Let your friends and family know that you were scammed and tell them to ignore friend requests or messages from people they don't know. Also, make sure your privacy settings are locked down and consider deactivating your account.
The underage girl scam
You're on a dating site or app and you get contacted by a cute girl. She wants to start sexting and trading nudes. Eventually she stops communicating and you get a call from a pissed off guy claiming to be the girl's father, or a police officer, or a private investigator, or something else along those lines. Turns out the girl you were sexting is underage, and her parents want some money for various reasons, such as to pay for a new phone, to pay for therapy, etc. There is, of course, no girl. You were communicating with a scammer.
What to do if you are a victim of this scam: Stop picking up the phone when the scammers call. Do not pay them, or they will be after you for more money.
Phishing
Phishing is when a scammer tries to trick you into giving information to them, such as your password or private financial information. Phishing messages will usually look very similar to official messages, and sometimes they are identical. If you are ever required to login to a different account in order to use a service, you should be incredibly cautious.
The blackmail email scam The exact wording of the emails varies, but there are generally four main parts. They claim to have placed software/malware on a porn/adult video site, they claim to have a video of you masturbating or watching porn, they threaten to release the video to your friends/family/loved ones/boss/dog, and they demand that you pay them in order for them to delete the video. Rest assured that this is a very common spam campaign and there is no truth behind the email or the threats. Here are some news articles about this scam.
The blackmail mail scam
This is very similar to the blackmail email scam, but you will receive a letter in the mail.
Rental scams Usually on local sites like Craigslist, scammers will steal photos from legitimate real estate listings and will list them for rent at or below market rate. They will generally be hesitant to tell you the address of the property for "safety reasons" and you will not be able to see the unit. They will then ask you to pay them a deposit and they claim they will ship you the keys. In reality, your money is gone and you will have no recourse.
Craigslist vehicle scams A scammer will list a vehicle on Craigslist and will offer to ship you the car. In many cases they will also falsely claim to sell you the car through eBay or Amazon. If you are looking for a car on Craigslist and the seller says anything about shipping the car, having an agent, gives you a long story about why they are selling the car, or the listing price is far too low, you are talking to a scammer and you should ignore and move on.
Advance-fee scam, also known as the 419 scam, or the Nigerian prince scam. You will receive a communication from someone who claims that you are entitled to a large sum of money, or you can help them obtain a large sum of money. However, they will need money from you before you receive the large sum.
Man in the middle scams
Man in the middle scams are very common and very hard to detect. The scammer will impersonate a company or person you are legitimately doing business with, and they will ask you to send the money to one of their own bank accounts or one controlled by a money mule. They have gained access to the legitimate persons email address, so there will be nothing suspicious about the email. To prevent this, make contact in a different way that lets you verify that the person you are talking to is the person you think you are talking to.
Cam girl voting/viewer scam
You will encounter a "cam girl" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to go to their site and sign up with your credit card. They may offer a free show, or ask you to vote for them, or any number of other fake stories.
Amateur porn recruitment scam
You will encounter a "pornstar" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to create an adult film with hehim, but first you need to do something. The story here is usually something to do with verifying your age, or you needing to take an STD test that involves sending money to a site operated by the scammer.
Hot girl SMS spam
You receive a text from a random number with a message along the lines of "Hey babe I'm here in town again if you wanted to meet up this time, are you around?" accompanied by a NSFW picture of a hot girl. It's spam, and they'll direct you to their scam website that requires a credit card.
Identity verification scam
You will encounter someone on a dating/messaging/social media/whatever site/app, and the scammer will ask that you verify your identity as they are worried about catfishing. The scammer operates the site, and you are not talking to whoever you think you are talking to.
This type of scam teases you with something, then tries to make you sign up for something else that costs money. The company involved is often innocent, but they turn a blind eye to the practice as it helps their bottom line, even if they have to occasionally issue refunds. A common variation takes place on dating sites/dating apps, where you will match with someone who claims to be a camgirl who wants you to sign up for a site and vote for her. Another variation takes place on local sites like Craigslist, where the scammers setup fake rental scams and demand that you go through a specific service for a credit check. Once you go through with it, the scammer will stop talking to you. Another variation also takes place on local sites like Craigslist, where scammers will contact you while you are selling a car and will ask you to purchase a Carfax-like report from a specific website.
Multi Level Marketing or Affiliate Marketing
You apply for a vague job listing for 'sales' on craigslist. Or maybe an old friend from high school adds you on Facebook and says they have an amazing business opportunity for you. Or maybe the well dressed guy who's always interviewing people in the Starbucks that you work at asks if you really want to be slinging coffee the rest of your life. The scam: MLMs are little more than pyramid schemes. They involve buying some sort of product (usually snake oil health products like body wraps or supplements) and shilling them to your friends and family. They claim that the really money is recruiting people underneath you who give you a slice of whatever they sell. And if those people underneath you recruit more people, you get a piece of their sales. Ideally if you big enough pyramid underneath you the money will roll in without any work on your part. Failure to see any profit will be your fault for not "wanting it enough." The companies will claim that you need to buy their extra training modules or webinars to really start selling. But in reality, the vast majority of people who buy into a MLM won't see a cent. At the end of the day all you'll be doing is annoying your friends and family with your constant recruitment efforts. What to look out for: Recruiters love to be vague. They won't tell you the name of the company or what exactly the job will entail. They'll pump you up with promises of "self-generating income", "being your own boss", and "owning your own company." They might ask you to read books about success and entrepreneurs. They're hoping you buy into the dream first. If you get approached via social media, check their timelines. MLMs will often instruct their victims to pretend that they've already made it. They'll constantly post about how they're hustling and making the big bucks and linking to youtube videos about success. Again, all very vague about what their job actually entails. If you think you're being recruited: Ask them what exactly the job is. If they can't answer its probably a MLM. Just walk away.

Phone scams

You should generally avoid answering or engaging with random phone calls. Picking up and engaging with a scam call tells the scammers that your phone number is active, and will usually lead to more calls.
Tax Call
You get a call from somebody claiming to be from your countries tax agency. They say you have unpaid taxes that need to be paid immediately, and you may be arrested or have other legal action taken against you if it is not paid. This scam has caused the American IRS, Canadian CRA, British HMRC, and Australian Tax Office to issue warnings. This scam happens in a wide variety of countries all over the world.
Warrant Call
Very similar to the tax call. You'll get a phone call from an "agent", "officer", "sheriff", or other law enforcement officer claiming that there is a warrant out for your arrest and you will be arrested very soon. They will then offer to settle everything for a fee, usually paid in giftcards.
[Legal Documents/Process Server Calls]
Very similar to the warrant call. You'll get a phone call from a scammer claiming that they are going to serve you legal documents, and they will threaten you with legal consequences if you refuse to comply. They may call themselves "investigators", and will sometimes give you a fake case number.
Student Loan Forgiveness Scam
Scammers will call you and tell you about a student loan forgiveness program, but they are interested in obtaining private information about you or demanding money in order to join the fake program.
Tech Support Call You receive a call from someone with a heavy accent claiming to be a technician Microsoft or your ISP. They inform you that your PC has a virus and your online banking and other accounts may be compromised if the virus is not removed. They'll have you type in commands and view diagnostics on your PC which shows proof of the virus. Then they'll have you install remote support software so the technician can work on your PC, remove the virus, and install security software. The cost of the labor and software can be hundreds of dollars. The scam: There's no virus. The technician isn't a technician and does not work for Microsoft or your ISP. Scammers (primarily out of India) use autodialers to cold-call everyone in the US. Any file they point out to you or command they have you run is completely benign. The software they sell you is either freeware or ineffective. What to do you if you're involved with this scam: If the scammers are remotely on your computer as you read this, turn off your PC or laptop via the power button immediately, and then if possible unplug your internet connection. Some of the more vindictive tech scammers have been known to create boot passwords on your computer if they think you've become wise to them and aren't going to pay up. Hang up on the scammers, block the number, and ignore any threats about payment. Performing a system restore on your PC is usually all that is required to remove the scammer's common remote access software. Reports of identity theft from fake tech calls are uncommon, but it would still be a good idea to change your passwords for online banking and monitor your accounts for any possible fraud. How to avoid: Ignore any calls claiming that your PC has a virus. Microsoft will never contact you. If you're unsure if a call claiming to be from your ISP is legit, hang up, and then dial the customer support number listed on a recent bill. If you have elderly relatives or family that isn't tech savvy, take the time to fill them in on this scam.
Chinese government scam
This scam is aimed at Chinese people living in Europe and North America, and involves a voicemail from someone claiming to be associated with the Chinese government, usually through the Chinese consulate/embassy, who is threatening legal action or making general threats.
Chinese shipping scam
This scam is similar to the Chinese government scam, but involves a seized/suspicious package, and the scammers will connect the victim to other scammers posing as Chinese government investigators.
Social security suspension scam
You will receive a call from someone claiming to work for the government regarding suspicious activity, fraud, or serious crimes connected to your social security number. You'll be asked to speak to an operator and the operator will explain the steps you need to follow in order to fix the problems. It's all a scam, and will lead to you losing money and could lead to identity theft if you give them private financial information.
Utilities cutoff
You get a call from someone who claims that they are from your utility company, and they claim that your utilities will be shut off unless you immediately pay. The scammer will usually ask for payment via gift cards, although they may ask for payment in other ways, such as Western Union or bitcoin.
Relative in custody Scammer claims to be the police, and they have your son/daughtenephew/estranged twin in custody. You need to post bail (for some reason in iTunes gift cards or MoneyGram) immediately or the consequences will never be the same.
Mexican family scam
This scam comes in many different flavours, but always involves someone in your family and Mexico. Sometimes the scammer will claim that your family member has been detained, sometimes the scammer will claim that your family member has been kidnapped, and sometimes the scammer will claim that your family member is injured and needs help.
General family scams
Scammers will gather a large amount of information about you and target your family members using different stories with the goal of gettimg them to send money.
One ring scam
Scammers will call you from an international number with the goal of getting you to return their call, causing you to incur expensive calling fees.

Online shopping scams

THE GOLDEN RULE OF ONLINE SHOPPING: If it sounds too good to be true, it probably is.
Dropshipping
An ad on reddit or social media sites like Facebook and Instagram offers items at huge discounts or even free (sometimes requiring you to reblog or like their page). They just ask you to pay shipping. The scam: The item will turn out to be very low quality and will take weeks or even months to arrive. Sometimes the item never arrives, and the store disappears or stops responding. The seller drop-ships the item from China. The item may only cost a few dollars, and the Chinese government actually pays for the shipping. You end up paying $10-$15 dollars for a $4 item, with the scammer keeping the profit. If you find one of these scams but really have your heart set on the item, you can find it on AliExpress or another Chinese retailer.
Influencer scams
A user will reach out to you on a social media platform, usually Instagram, and offer you the chance to partner with them and receive a free/discounted product, as long as you pay shipping. This is a different version of the dropshipping scam, and is just a marketing technique to get you to buy their products.
Triangulation fraud
Triangulation fraud occurs when you make a purchase on a site like Amazon or eBay for an item at a lower than market price, and receive an item that was clearly purchased new at full price. The scammer uses a stolen credit card to order your item, while the money from the listing is almost all profit for the scammer.
Instagram influencer scams
Someone will message you on Instagram asking you to promote their products, and offering you a discount code. The items are Chinese junk, and the offer is made to many people at a time.
Cheap Items
Many websites pop up and offer expensive products, including electronics, clothes, watches, sunglasses, and shoes at very low prices. The scam: Some sites are selling cheap knock-offs. Some will just take your money and run. What to do if you think you're involved with this scam: Contact your bank or credit card and dispute the charge. How to avoid: The sites often have every brand-name shoe or fashion item (Air Jordan, Yeezy, Gucci, etc) in stock and often at a discounted price. The site will claim to be an outlet for a major brand or even a specific line or item. The site will have images at the bottom claiming to be Secured by Norton or various official payment processors but not actual links. The site will have poor grammar and a mish-mash of categories. Recently, established websites will get hacked or their domain name jacked and turned into scam stores, meaning the domain name of the store will be completely unrelated to the items they're selling. If the deal sounds too good to be true it probably is. Nobody is offering brand new iPhones or Beats or Nintendo Switches for 75% off.
Cheap Amazon 3rd Party Items
You're on Amazon or maybe just Googling for an item and you see it for an unbelievable price from a third-party seller. You know Amazon has your back so you order it. The scam: One of three things usually happen: 1) The seller marks the items as shipped and sends a fake tracking number. Amazon releases the funds to the seller, and the seller disappears. Amazon ultimately refunds your money. 2) The seller immediately cancels the order and instructs you to re-order the item directly from their website, usually with the guarantee that the order is still protected by Amazon. The seller takes your money and runs. Amazon informs you that they do not offer protection on items sold outside of Amazon and cannot help you. 2) The seller immediately cancels the order and instructs you to instead send payment via an unused Amazon gift card by sending the code on the back via email. Once the seller uses the code, the money on the card is gone and cannot be refunded. How to avoid: These scammers can be identified by looking at their Amazon storefronts. They'll be brand new sellers offering a wide range of items at unbelievable prices. Usually their Amazon names will be gibberish, or a variation on FIRSTNAME.LASTNAME. Occasionally however, established storefronts will be hacked. If the deal is too good to be true its most likely a scam.
Scams on eBay
There are scams on eBay targeting both buyers and sellers. As a seller, you should look out for people who privately message you regarding the order, especially if they ask you to ship to a different address or ask to negotiate via text/email/a messaging service. As a buyer you should look out for new accounts selling in-demand items, established accounts selling in-demand items that they have no previous connection to (you can check their feedback history for a general idea of what they bought/sold in the past), and lookout for people who ask you to go off eBay and use another service to complete the transaction. In many cases you will receive a fake tracking number and your money will be help up for up to a month.
Scams on Amazon
There are scams on Amazon targeting both buyers and sellers. As a seller, you should look out for people who message you about a listing. As a buyer you should look out for listings that have an email address for you to contact the person to complete the transaction, and you should look out for cheap listings of in-demand items.
Scams on Reddit
Reddit accounts are frequently purchased and sold by fraudsters who wish to use the high karma count + the age of the account to scam people on buy/sell subreddits. You need to take precautions and be safe whenever you are making a transaction online.
Computer scams
Virus scam
A popup or other ad will say that you have a virus and you need to follow their advice in order to remove it. They are lying, and either want you to install malware or pay for their software.

Assorted scams

Chinese Brushing / direct shipping
If you have ever received an unsolicited small package from China, your address was used to brush. Vendors place fake orders for their own products and send out the orders so that they can increase their ratings.
Money flipping
Scammer claims to be a banking insider who can double/triple/bazoople any amount of money you send them, with no consequences of any kind. Obviously, the money disappears into their wallet the moment you send it.

Door to door scams

As a general rule, you should not engage with door to door salesmen. If you are interested in the product they are selling, check online first.
Selling Magazines
Someone or a group will come to your door and offer to sell a magazine subscription. Often the subscriptions are not for the duration or price you were told, and the magazines will often have tough or impossible cancellation policies.
Energy sales
Somebody will come to your door claiming to be from an energy company. They will ask to see your current energy bill so that they can see how much you pay. They will then offer you a discount if you sign up with them, and promise to handle everything with your old provider. Some of these scammers will "slam" you, by using your account number that they saw on your bill to switch you to their service without authorization, and some will scam you by charging higher prices than the ones you agreed on.
Security system scams
Scammers will come to your door and ask about your security system, and offer to sell you a new one. These scammers are either selling you overpriced low quality products, or are casing your home for a future burglary.
They ask to enter your home
While trying to sell you whatever, they suddenly need to use your bathroom, or they've been writing against the wall and ask to use your table instead. Or maybe they just moved into the neighborhood and want to see how you decorate for ideas.
They're scoping out you and your place. They want to see what valuables you have, how gullible you are, if you have a security system or dogs, etc.

Street scams

Begging With a Purpose
"I just need a few more dollars for the bus," at the bus station, or "I just need $5 to get some gas," at a gas station. There's also a variation where you will be presented with a reward: "I just need money for a cab to get uptown, but I'll give you sports tickets/money/a date/a priceless vase."
Three Card Monte, Also Known As The Shell Game
Unbeatable. The people you see winning are in on the scam.
Drop and Break
You bump into someone and they drop their phone/glasses/fancy bottle of wine/priceless vase and demand you pay them back. In reality, it's a $2 pair of reading glasses/bottle of three-buck-chuck/tasteful but affordable vase.
CD Sales
You're handed a free CD so you can check out the artist's music. They then ask for your name and immediately write it on the CD. Once they've signed your name, they ask you for money, saying they can't give it to someone else now. Often they use dry erase markers, or cheap CD sleeves. Never use any type of storage device given to you by a random person, as the device can contain malware.
White Van Speaker Scam
You're approached and offered speakers/leather jackets/other luxury goods at a discount. The scammer will have an excuse as to why the price is so low. After you buy them, you'll discover that they are worthless.
iPhone Street Sale
You're approached and shown an iPhone for sale, coming in the box, but it's open and you can see the phone. If you buy the phone, you'll get an iPhone box with no iPhone, just some stones or cheap metal in it to weigh it down.
Buddhist Monk Pendant
A monk in traditional garb approaches you, hands you a gold trinket, and asks for a donation. He holds either a notebook with names and amounts of donation (usually everyone else has donated $5+), or a leaflet with generic info. This is fairly common in NYC, and these guys get aggressive quickly.
Friendship Bracelet Scam More common in western Europe, you're approached by someone selling bracelets. They quickly wrap a loop of fabric around your finger and pull it tight, starting to quickly weave a bracelet. The only way to (easily) get it off your hand is to pay. Leftover sales
This scam involves many different items, but the idea is usually the same: you are approached by someone who claims to have a large amount of excess inventory and offers to sell it to you at a great price. The scammer actually has low quality items and will lie to you about the price/origin of the items.
Dent repair scams
Scammers will approach you in public about a dent in your car and offer to fix it for a low price. Often they will claim that they are mechanics. They will not fix the dent in your car, but they will apply large amounts of wax or other substances to hide the dent while they claim that the substance requires time to harden.
Gold ring/jewelry/valuable item scam
A scammer will "find" a gold ring or other valuable item and offers to sell it to you. The item is fake and you will never see the scammer again.
Distraction theft
One person will approach you and distract you, while their accomplice picks your pockets. The distraction can take many forms, but if you are a tourist and are approached in public, watch closely for people getting close to you.

General resources

Site to report scams in the United Kingdom: http://www.actionfraud.police.uk/
Site to report scams in the United States: https://www.ic3.gov/default.aspx
Site to report scams in Canada: www.antifraudcentre-centreantifraude.ca/reportincident-signalerincident/index-eng.htm
Site to report scams in Europe: https://www.europol.europa.eu/report-a-crime/report-cybercrime-online
FTC scam alerts: https://www.consumer.ftc.gov/scam-alerts
Microsoft's anti-scam guide: https://www.microsoft.com/en-us/safety/online-privacy/avoid-phone-scams.aspx
https://www.usa.gov/common-scams-frauds
https://www.usa.gov/scams-and-frauds
https://www.consumer.ftc.gov/features/scam-alerts
https://www.fbi.gov/scams-and-safety/common-fraud-schemes
submitted by EugeneBYMCMB to Scams [link] [comments]

UMI – the Best of Cryptocurrencies and Fiat Payment Systems

UMI – the Best of Cryptocurrencies and Fiat Payment Systems

https://preview.redd.it/dv0mdncf7sa51.jpg?width=1023&format=pjpg&auto=webp&s=b5928548ebdd497bc1cbad43dce27e29bfcbc42b
Greetings from the UMI Team!
The UMI cryptocurrency has been repeatedly described as a revolution in the payment system market. Most interestingly, in this case, a revolution isn't about the development of any new technologies or formulas. We just selected the best and well-tried technologies and incorporated them into something new. UMI is the best of cryptocurrencies and fiat payment systems––it has comprised all the best features and got rid of the disadvantages.
UMI vs banks
We won't compare the ways UMI and banks operate in detail in order not to get into complex technical issues, which are of no interest to us. Instead, let's have a look at the impact banks have on people on a daily basis and those of fundamental changes UMI makes to the services we regularly use.
There are banks that allow you to make financial transfers. Banks have savings accounts where money grows at a certain interest rate. Banks also have a range of mobile apps and online banking systems. All of that may appear pretty convenient. But keep in mind, the banking infrastructure, as well as VISA and MasterCard payment systems, were created long ago and based on old technologies. They are not conforming to present-day developments, mostly because they cannot ensure their users a sufficient security level.
With this in mind, instead of inventing something new, UMI improves the things that everyone is accustomed to. The result is a digital payment tool working in an absolutely familiar way. Conducting transfers with UMI is similar to making them via a bank. And even the format of UMI is much alike to conventional money––UMI and UMI-cents are the equivalent of the dollar and cents.
In UMI, just as in a bank, you have a current account (standard UMI address) and savings account––addresses used by structures for UMI staking. You can transfer money from one account to the other one in one click. The difference is that, in most banks, you receive your interest in a month at the earliest. In other words, you can get your money back with interest if you kiss it goodbye for 30 days, minimum. In UMI, earnings are accrued every second––you don't have to wait a long time for "your funds to be unlocked".
But what is the most significant is dividends. UMI staking allows any network user to earn up to 40% per month. Holding your money in a savings account even for a year, much less for a month, you will never make this profit. Why?
1) Because banks make good money on your deposits, instead of paying higher interests, they take the lion's share of what they could pay you into their pocket.
2) Secondly, a large part of your deposits is used to maintain the banking infrastructure: salaries for staff, rental payments, maintenance of offices, utility bills, and other various expenses.
3) Third, banks are not interested in making people rich, because otherwise, they will not be able to make money on loans and control people.
Let's not spout out empty rhetoric, but move on instead. The VISA and MasterCard payment systems declare their ability to process thousands of transactions per second, but in real fact, even if received funds are displayed instantly in your account, you receive a transfer after a few days only. Especially if it concerns international money transfers or ATM transfers. The truth is that VISA and MasterCard transfers are delayed by a series of confirmations required by banks and actually reach a recipient's account only in a few days.
After having been sent, any transaction can be blocked or canceled, and funds in your account can be frozen on the slightest suspicion. Even if before receiving all the confirmations required by banks, you have already withdrawn the funds via an ATM or transferred them to someone, the bank may take this amount from your account a few days later. Thus, you may surprisingly find out that your balance is negative. Keep in mind that banks charge transaction fees. Fees for oversea transfers may range from $10 up to 10% of the transaction amount. Thus, instead of $1,000, a recipient receives only $900.
The UMI network uses validator nodes which in a couple of seconds verify the correctness of transactions and allow users to check their balance for the sufficiency of funds. All transactions are instant. A transfer cannot be canceled or blocked, as well as money in your account cannot be frozen. Unlike VISA and MasterCard, transferred funds are available straight after a transaction has been added to the blockchain. Moreover, no fees are charged for that. Each and every transaction, international or not, is completely free.
Don't forget about permanent internet connection, which is required for conducting transactions with VISA and MasterCard. A validator node used by the UMI network can create any transaction, even offline one, with no Internet connection. You can send a transaction to the network via Wi-Fi, Bluetooth, or even a radio wave. Therefore, if there were a sudden cataclysm and people from all over the globe lost internet connection, the UMI network would easily adapt to new conditions and keep working.
UMI vs Bitcoin
Now let's compare the UMI network with the first-ever created cryptocurrency––Bitcoin. It has proved itself to be a reliable payment system, with a number of significant disadvantages, though. Let's focus on the most essential ones.
1) The transaction processing capacity of the bitcoin network is limited by the network itself. In the best-case scenario, it takes users several tens of minutes to receive their funds. However, quite often there is a several-hour, or even several-day, delay.
2) High fees. When the network is experiencing an increased load, transfer fees can skyrocket immensely. In 2017, there were cases where Bitcoin transaction fee reached a high of around $40. Under normal conditions, it's not that bad. A few-dollar fees are common for Bitcoin users.
3) Centralized mining pools. In the pursuit of profit from mining, greed-driven participants join mining pools thus undermining the idea behind decentralization and leading to centralization. The reality is that if several leading pools unite, they will control most of the hashing power and will be able to perform a 51% attack. The attackers will be able to send nonexistent bitcoins, confirm invalid transactions, and roughly speaking, manipulate the network as they like.

https://preview.redd.it/29tfznixasa51.png?width=1306&format=png&auto=webp&s=f587f4e19f88710c45287bcaa00b1890c25540ef
Bitcoin Mining Pools Statistics Source.

The reality is that we have a slow network that creates problems for itself. Moreover, if we talk about Bitcoin in terms of programming, the Bitcoin network is more similar to physical fiat money. For this reason, any actions with the code, including the development of wallets and applications, are a tough non-typical task that only the most advanced blockchain specialists can cope with.
While using the same technologies that Bitcoin is based on, UMI betters its disadvantages and incorporates only benefits. The network doesn't limit the block processing time, but instead, do everything to shorten the processing time and increase the network capacity. Modern cryptography algorithms reduce the load on nodes, thus allowing them to process more transactions with spending less computing power. The UMI network can process 500 million transactions carried out in the Bitcoin network over 12 years in less than a week. Each transaction will be completely free.
The concept of balances UMI uses is different from that of fiat money, but has a lot in common with the idea of digital money. For this reason, using UMI is so extremely easy. In a similar way, it simplifies the process of developing and maintaining new wallets and other applications. Contributing to the UMI ecosystem's growth is extremely convenient.
So, what's the most essential? Over its 10-year history, Bitcoin has demonstrated that its implementation of the idea of decentralization doesn't work at all. This is why UMI is based on decentralization implemented in a different way. Unlike Bitcoin mining pools, users join structures that help the network grow and support its effective functioning, with no threat to its security.
UMI is something that we all already use, but much better.
Consequently, UMI is not about anything super-unique, beyond understanding and comprehension. This is about the same old money that we use on a day-to-day basis. The same financial transfers, the same deposits that we have in banks, and the same blockchain technology and decentralization that Bitcoin is based on. The only difference is that UMI implements all the above-mentioned features in a lot better and higher performing way –– which is more convenient, secure, and higher-quality. UMI is a twenty-first-century universal money tool working for the sake of all people!
submitted by UMITop to u/UMITop [link] [comments]

Privacy-o-meter — a free tool to assess the privacy level of your BTC transactions and the first step to defending yourself against heuristics used by blockchain surveillance companies.

Privacy-o-meter — a free tool to assess the privacy level of your BTC transactions and the first step to defending yourself against heuristics used by blockchain surveillance companies.
Blockchair has released Privacy-o-meter in its public block explorer and API to measure the privacy level of Bitcoin transactions. The free feature makes use of 50 heuristics and allows visitors to look up how much information about their identity has been leaked just by searching for their transaction hash. In a later stage, wallets and exchanges will be able to use the feature to notify users about how much information will be leaked before sending out a transaction.
While Bitcoin is considered to be a privacy-oriented system, the blockchain is open to be analyzed by anyone, and there are numerous transaction tracing tools like Chainalysis, Elliptic, CipherTrace, and Crystal. These are paid tools and often only available to a handful of individuals and companies. Bitcoin users thus rarely have the opportunity to see how deep the rabbit hole goes regarding their privacy loss.
A transaction with a low privacy score
Blockchair launched a simple transaction scoring tool and will expand this further in the upcoming months. It currently uses indicators that reveal user information such as:
  • Is an address reused or not?
  • Is one of the outputs a rounded number, thus the recipient?
  • How many input addresses have been used?
But also more technical heuristics such as:
  • Which script or multi-sig type has been used to sign a transaction?
  • How are output scripts compared to input scripts?
  • How are inputs or outputs ordered?
As mentioned by Blockchair, transaction tracing is relatively simple as most users aren’t concerned enough about their privacy and often make ‘mistakes’ like sending round BTC amounts. Wallet providers are often also not highly concerned about user privacy. Taking the previous example in context, there are no warnings if a user tries to send a rounded amount.
A transaction with a high privacy score
In comparison with protocols such as Zcash, Monero and Dash, in the Bitcoin network there are no transaction obfuscating implementations, and due to the lack of scalability so-called Mixers are expensive and cumbersome to use.
Blockchair provides the privacy-o-meter for free as it hopes it will help Bitcoin users take some of their privacy back.
submitted by blockchair to WasabiWallet [link] [comments]

Blockchain in Healthcare – Webcast Q&A

Blockchain in Healthcare – Webcast Q&A
On our website, you can find the original article: https://block.co/webcastqa-blockchain-in-healthcare/
Block.co third webcast ” Blockchain in Healthcare: Bridging Trust in response to COVID-19“ received amazing feedback! We gathered some of the best experts in the field, Georgina Kyriakoudes, Ahmed Abdulla, Dimitri Neocleous, Dr. Alice Loveys to share their experience in the industry and discuss with us the latest updates in the sphere of Healthcare! In its third series of webcasts, Block.co gathered 253 people watching the event from 59 different countries, for a 90-minute webcast where guests answered participants’ questions.
Below is a list of the questions that were made and were not answered due to time constraints during the Blockchain in Healthcare webcast. Please note that the below information is only for educational purposes!
Question 1: I like what Dimitrios was saying regarding ownership and transfer. Health and social care have invested much in Information Management systems and processes. Transfer between NHS and social care is a typical block. Can you elaborate on how the blockchain sits across that – leapfrogs yet goes with the grain of what is already there in terms of shared records protocols, the exponentially growing types of professionals, pharmacists, careers, etc. that need early access to these records for better decision making.
Block.co Team Answer: Blockchain technology has the potential to improve healthcare, placing the patient at the center of the health care ecosystem, while providing security, privacy, and interoperability of health data. Blockchain could provide a new model for health information exchanges and transform electronic medical records to be more efficient, disintermediated, and secure. While it is not a cure, this new, Blockchain in Healthcare rapidly evolving field provides a sandbox for experimentation, investment, and proof-of-concept testing.
Healthcare systems around the world are preparing road maps that define critical policy and technical components needed for nationwide interoperability, including:
  • Ubiquitous, secure network infrastructure
  • Verifiable identity and authentication of all participants
  • Consistent illustration of authorization to access electronic health data, and several other requirements.
However, current technologies don’t totally address these necessities, and as a result, they face limitations associated with security, privacy, and full ecosystem interoperability.
Blockchain technology creates distinctive opportunities to scale back complexity, improve trustless collaboration, and create secure and immutable data. National Healthcare Systems need to track this rapidly evolving field to identify trends and sense the areas where government support may be needed for the technology to realize its full potential in health care. To form blockchain’s future, they ought to take into account mapping and gathering the blockchain ecosystem, establishing a blockchain framework to coordinate early-adopters, and supporting a pool for dialogue and discovery.
https://preview.redd.it/p17us55i6f851.png?width=800&format=png&auto=webp&s=80570ea170e78a728d69abb1602effeed1a50116
Question 2: What about the “compatibility” of blockchain solutions in healthcare with GDPR and/or other regulations about personal data protection.
Block.co Team Answer: The General Data Protection Regulation (GDPR), Europe’s new framework for data protection laws, has a vital impact on healthcare organizations. During this more and more patient-centric world where global healthcare organizations collect a large set of data on patients to produce improved health outcomes, this increased regulation has an even larger impact.
GDPR presents challenges across all industries and includes language that has a special impact on healthcare. The regulation defines “personal” data as “any information relating to an identified or identifiable natural person (data subject); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.” On top of this definition, GDPR contains three extra, important definitions that pertain to health data:
  1. “Data concerning health” is defined by the GDPR as “personal data related to the physical or mental health of a natural person, including the provision of health care services, which reveal information about his or her health status.”
  2. “Genetic data” is outlined by the GDPR as “personal data relating to inherited or acquired genetic characteristics of a natural person which give unique information about the physiology or the health of that natural person and which result, in particular, from an analysis of a biological sample from the natural person in question.”
  3. “Biometric data” is “personal data resulting from specific technical processing relating to the physical, physiological, or behavioral characteristics of a natural person, which allows or confirms the unique identification of that natural person, such as facial images or dactyloscopic data.”
As described in Article 6 of GDPR, processing of personal data is considered lawful if: (1) the data subject has given consent; (2) it is necessary for the performance of a contract to which the data subject is a party; (3) it is necessary for compliance with a legal obligation; (4) it is necessary to protect the vital interest of the data subject or another natural person; (5) it is necessary for the performance of a task carried out in the public interest; (6) it is necessary for the purposes of the legitimate interests pursued by the controller or third party.
However, healthcare organizations that usually manage health data, have an added responsibility to take care of “data concerning health,” “genetic data,” and “biometric data” to a higher standard of protection than personal data, in general. GDPR prohibits the processing of these forms of health data unless one of the three conditions below would apply as per Article 9.
a. The data subject must have given “explicit consent.”
b. “Processing is necessary for the purposes of preventive or occupational medicine, for the assessment of the working capacity of the employee, medical diagnosis, the provision of health or social care or treatment or the management of health or social care systems and services …”
c. “Processing is necessary for reasons of public interest in the area of public health, such as protecting against serious cross-border threats to health or ensuring high standards of quality and safety of health care and of medicinal products or medical devices …”
Consent VS Explicit Consent – If one pays attention, there’s a difference in the GDPR’s health data use conditions (calls for “explicit consent”) and the general definition (calls for “consent”). Thus, there’s an ongoing debate as to what constitutes the difference between “unambiguous” and “explicit” consent. Despite the debate and the final legal clarifications, there is no doubt that in the purposes of the healthcare the “explicit consent” must have the strongest agreement form listing in detail the use(s) of data and covering the cases of data transfers and storage.
Question 3: How can we use blockchain technology by the government in Africanflavored government, say by Ministry of health to have patient autonomy of medical records that can be accessed by any government hospital irrespective of the ailment and record printed by the previous hospital and doctor, such as referral cases without having to open a new file in the referred hospital.
Block.co Team Answer: Perhaps that would be an ideal implementation of the Block.co solution issuing a digital certificate of medical examination on an Open Public Blockchain such as the Bitcoin blockchain, that would be decentralized in nature, easy to validate online without any special wallets, and would be provided by the patient on-demand, to refer to treatments received in other hospitals or areas. But this would require that the practitioner is aware and can use the open-source code or use Block.co services to issue these certificates. Alternatively, there could be the use of a wallet to store these medical credentials to be submitted on demand to health practitioners. Moreover, there would need to be an alignment of regulation in the matter as decentralized repositories are not recognized at the moment.

Question 4: Is there any data breach threat in the blockchain using a poorly protected private key at communication?
Block.co Team Answer: Millions of health care records have already been breached, and in attempts to combat this issue, solutions often result in the inaccessibility of health records. Health providers often send information to other providers, and this often ends up in mishandling of data, losing records, or passing on inaccurate and old data. In some cases, only one copy of an updated health record exists, and this may result in the loss of information. Health records often contain personal information such as names, social security numbers, and home addresses. When it comes to Blockchain in Healthcare, a poorly protected private key is always a factor to consider. A private key allows us to sign a transaction and spend funds residing in an address (public key) by providing ownership with the signature. It is a unique string of information that represents proof of identification inside the blockchain, which includes the right to access and control the participant’s wallet. It must be kept secret, as it is effectively a personal password. In the case that that private key is poorly protected, there is always a data breach threat.
Question 5: The medical record of a patient is owned by the patient. What happens if a doctor accesses the record without the consent of the patient? Using the smart contract, could there be a governing body, say a legal system that can call the doctor to order?
Block.co Team Answer: Rather than having each physical and electronic copies of records, blockchains may enable the shift to electronic health records (EHR). When looking at Blockchain in Healthcare, medical records on the blockchain would be within the management of the patient rather than a third party, through the patients’ private and public keys. Patients may then control access to their health records, making transferring information less cumbersome. Because blockchain ledgers are immutable, health information may not be deleted or tampered with. Blockchain transactions would be accompanied by a timestamp, permitting those with access to maintain updated information. The doctor would not be able to access the record without the consent of the patient. A patient would need to sign the transaction in a smart contract in order to transfer patient details to the doctor.
Question 6: So, how are private data protected when the patient is simply notified that unauthorized access just took place on her medical record? and, how are the negative results of this breach rectified towards the patient?
Block.co Team Answer: The patient would be notified to sign a transaction enabling access to the party requesting access to the specific medical record. In other cases, there could be a multi-signature wallet requiring multiple transactions in the cases where the patient may need assistance, for example, when underage or when not in a healthy state of mind, or being non-responsive or in critical condition. The patient needs to be responsible for his own data and be empowered through awareness and know-how of this technology. With great power, comes also great responsibility, although it is yet a challenge to enable computer illiterate people to interact with this technology.
Question 7: Can the same record of a patient still be shared with private hospitals and say another government/private hospital abroad on the same blockchain?
Block.co Team Answer: Depending on whether the information is on a public blockchain or a private blockchain. When on a private blockchain, they will need to be granted permission to access the blockchain accordingly.
Question 8: No one has directly spoken about ownership where a large research institution/ consortium is working with the data – it is not solely the person who has said so…
Block.co Team Answer: Indeed, it is solely not the person who has a say so. Technology may be used in both evil and good ways and it is still the obligation and responsibility of people within governments to ensure human liberties and rights are preserved when utilizing such powerful technologies such as blockchain and sometimes the combination of blockchain with AI, IoT, and biometrics. Blockchain in Healthcare, in the same way, that it can empower individuals and increase their standard of living and prosperity, at the same time, it can also empower corrupt governments with alternative agendas and totalitarian states. Block.co believes it is most important for people to be educated around the matter and be able to form a voice and movement to safeguard their human liberties and rights, hence our continuous effort on discussing these matters with our community and providing education, powered by the pioneers in the space, the University of Nicosia.
We would like to thank everyone for attending our webcast and hoping to interact with you in future webinars. If you would like to watch the webinar again, then click here!
For more info, contact Block.co directly or email at [email protected].
Tel +357 70007828
Get the latest from Block.co, like and follow us on social media:
✔️Facebook
✔️LinkedIn
✔️Twitter
✔️YouTube
✔️Medium
✔️Instagram
✔️Telegram
✔️Reddit
✔️GitHub
submitted by BlockDotCo to u/BlockDotCo [link] [comments]

How To Check Someone Bitcoin Wallet Balance And Bitcoin Transactions  2020 Setting up a Tezos node and bakery via command line, just copy and paste! Ravencoin Review: Why RVN Has Potential in 2020! How to find the transaction ID in your Blockchain.info Bitcoin wallet What Does Getting Started with Bitcoin, Digital Currency,

Buying crypto like Bitcoin and Ether is as easy as verifying your identity, adding a payment and clicking "Buy". Sign up for our Wallet today. (Number of unique (from or to) addresses per day) 734,798: 100 Largest Transactions: last 24h: 173,096 BTC ($1,594,405,826 USD) 21.97% Total: First Block (Bitcoin creation date) 2009-01-09: Blockchain Size (Bitcoin database size) 335.93 GB: Reddit subscribers: 1,515,435: Tweets per day #Bitcoin: 24,865: Github release: v0.20.0 (2020-06-03 The number of Blockchain wallets has been growing since the creation of the Bitcoin virtual currency in 2009, reaching over 47 million Blockchain wallet users at the end of March 2020. Bitcoin’s built-in reward system compensates successful miners with a chunk of bitcoins. The reward changes over time per Bitcoin’s programming, and the block reward halves about every four years. The current reward for each new block of verified transactions is about 12.5 bitcoins. The mining processes have become increasingly sophisticated. The Bitcoin reward is divided by 2 every 210,000 blocks, or approximately four years. Some of the Bitcoins in circulation are believed to be lost forever or unspendable, for example because of lost passwords, wrong output addresses or mistakes in the output scripts.

[index] [4650] [5732] [7044] [780] [12520] [457] [13739] [13735] [2521] [12032]

How To Check Someone Bitcoin Wallet Balance And Bitcoin Transactions 2020

Bitcoin Wallet: Ledger Nano S & Trezor One Hardware Wallets Step-by-Step Guide (For Beginners!) - Duration: 46:02. Crypto Casey 121,397 views #Somveerkumar #unknownNumberBlock #Calls_Block Anjan number ko block karna sikhe How to block a number on android in hindi आपके अपने चैनल में बहुत ... A short introduction to how Bitcoin Works. Want more? Check out my new in-depth course on the latest in Bitcoin, Blockchain, and a survey of the most exciting projects coming out (Ethereum, etc ... In this short video, I show you how to find the transaction ID for a "Send" transaction, from your Blockchain.Info Bitcoin wallet. If you need any more info on Bitcoin, you can comment below, and ... Firstly, you have a 1 minute block time compared to Bitcoin's 10 minutes. Secondly, Ravencoin has a 21 billion max supply which is 1,000 times larger than Bitcoin's 21 million.