8 Cloud Mining Anbieter fürs Bitcoin Mining zum Bitcoins ...

Myriad - A coin for everyone.

Myriad (XMY) is a Multi-PoW consensus protocol secured by 5 mining algorithms. Each one suits different hardware.
[link]

PetroDollar (P$) Community

The PetroDollar (P$): Bringing the gold standard back to the world's oil industry.
[link]

Looking back 18 months.

I was going through old emails today and came across this one I sent out to family on January 4, 2018. It was a reflection on the 2017 crypto bull market and where I saw it heading, as well as some general advice on crypto, investment, and being safe about how you handle yourself in cryptoland.
I feel that we are on the cusp of a new bull market right now, so I thought that I would put this out for at least a few people to see *before* the next bull run, not after. While the details have changed, I don't see a thing in this email that I fundamentally wouldn't say again, although I'd also probably insist that people get a Yubikey and use that for all 2FA where it is supported.
Happy reading, and sorry for some of the formatting weirdness -- I cleaned it up pretty well from the original email formatting, but I love lists and indents and Reddit has limitations... :-/
Also, don't laught at my token picks from January 2018! It was a long time ago and (luckliy) I took my own advice about moving a bunch into USD shortly after I sent this. I didn't hit the top, and I came back in too early in the summer of 2018, but I got lucky in many respects.
----------------------------------------------------------------------- Jan-4, 2018
Hey all!
I woke up this morning to ETH at a solid $1000 and decided to put some thoughts together on what I think crypto has done and what I think it will do. *******, if you could share this to your kids I’d appreciate it -- I don’t have e-mail addresses, and it’s a bit unwieldy for FB Messenger… Hopefully they’ll at least find it thought-provoking. If not, they can use it as further evidence that I’m a nutjob. 😉
Some history before I head into the future.
I first mined some BTC in 2011 or 2012 (Can’t remember exactly, but it was around the Christmas holidays when I started because I had time off from work to get it set up and running.) I kept it up through the start of summer in 2012, but stopped because it made my PC run hot and as it was no longer winter, ********** didn’t appreciate the sound of the fans blowing that hot air into the room any more. I’ve always said that the first BTC I mined was at $1, but looking back at it now, that’s not true – It was around $2. Here’s a link to BTC price history.
In the summer of 2013 I got a new PC and moved my programs and files over before scrapping the old one. I hadn’t touched my BTC mining folder for a year then, and I didn’t even think about salvaging those wallet files. They are now gone forever, including the 9-10BTC that were in them. While I can intellectually justify the loss, it was sloppy and underlines a key thing about cryptocurrency that I believe will limit its widespread adoption by the general public until it is addressed and solved: In cryptoland, you are your own bank, and if you lose your password or account number, there is no person or organization that can help you reset it so that you can get access back. Your money is gone forever.
On April 12, 2014 I bought my first BTC through Coinbase. BTC had spiked to $1000 and been in the news, at least in Japan. This made me remember my old wallet and freak out for a couple of months trying to find it and reclaim the coins. I then FOMO’d (Fear Of Missing Out”) and bought $100 worth of BTC. I was actually very lucky in my timing and bought at around $430. Even so, except for a brief 50% swing up almost immediately afterwards that made me check prices 5 times a day, BTC fell below my purchase price by the end of September and I didn’t get back to even until the end of 2015.
In May 2015 I bought my first ETH at around $1. I sent some guy on bitcointalk ~$100 worth of BTC and he sent me 100 ETH – all on trust because the amounts were small and this was a small group of people. BTC was down in the $250 range at that point, so I had lost 30-40% of my initial investment. This was of the $100 invested, so not that much in real terms, but huge in percentages. It also meant that I had to buy another $100 of BTC on Coinbase to send to this guy. A few months after I purchased my ETH, BTC had doubled and ETH had gone down to $0.50, halving the value of my ETH holdings. I was even on the first BTC purchase finally, but was now down 50% on the ETH I had bought.
The good news was that this made me start to look at things more seriously. Where I had skimmed white papers and gotten a superficial understanding of the technology before FOMO’ing, I started to act as an investor, not a speculator. Let me define how I see those two different types of activity:
So what has been my experience as an investor? After sitting out the rest of 2015 because I needed to understand the market better, I bought into ETH quite heavily, with my initial big purchases being in March-April of 2016. Those purchases were in the $11-$14 range. ETH, of course, dropped immediately to under $10, then came back and bounced around my purchase range for a while until December of 2016, when I purchased a lot more at around $8.
I also purchased my first ICO in August of 2016, HEAT. I bought 25ETH worth. Those tokens are now worth about half of their ICO price, so about 12.5ETH or $12500 instead of the $25000 they would be worth if I had just kept ETH. There are some other things with HEAT that mean I’ve done quite a bit better than those numbers would suggest, but the fact is that the single best thing I could have done is to hold ETH and not spend the effort/time/cost of working with HEAT. That holds true for about every top-25 token on the market when compared to ETH. It certainly holds true for the many, many tokens I tried to trade in Q1-Q2 of 2017. In almost every single case I would have done better and slept better had I just held ETH instead of trying to be smarter than Mr. Market.
But, I made money on all of them except one because the crypto market went up more in USD terms than any individual coin went down in ETH or BTC terms. This underlines something that I read somewhere and that I take to heart: A rising market makes everyone seem like a genius. A monkey throwing darts at a list of the top 100 cryptocurrencies last year would have doubled his money. Here’s a chart from September that shows 2017 year-to-date returns for the top 10 cryptocurrencies, and all of them went up a *lot* more between then and December. A monkey throwing darts at this list there would have quintupled his money.
When evaluating performance, then, you have to beat the monkey, and preferably you should try to beat a Wall Street monkey. I couldn’t, so I stopped trying around July 2017. My benchmark was the BLX, a DAA (Digital Asset Array – think fund like a Fidelity fund) created by ICONOMI. I wasn’t even close to beating the BLX returns, so I did several things.
  1. I went from holding about 25 different tokens to holding 10 now. More on that in a bit.
  2. I used those funds to buy ETH and BLX. ETH has done crazy-good since then and BLX has beaten BTC handily, although it hasn’t done as well as ETH.
  3. I used some of those funds to set up an arbitrage operation.
The arbitrage operation is why I kept the 11 tokens that I have now. All but a couple are used in an ETH/token pair for arbitrage, and each one of them except for one special case is part of BLX. Why did I do that? I did that because ICONOMI did a better job of picking long-term holds than I did, and in arbitrage the only speculative thing you must do is pick the pairs to trade. My pairs are (No particular order):
I also hold PLU, PLBT, and ART. These two are multi-year holds for me. I have not purchased BTC once since my initial $200, except for a few cases where BTC was the only way to go to/from an altcoin that didn’t trade against ETH yet. Right now I hold about the same 0.3BTC that I held after my first $100 purchase, so I don’t really count it.
Looking forward to this year, I am positioning myself as follows:
Looking at my notes, I have two other things that I wanted to work into this email that I didn’t get to, so here they are:
  1. Just like with free apps and other software, if you are getting something of value and you didn’t pay anything for it, you need to ask why this is. With apps, the phrase is “If you didn’t pay for the product, you are the product”, and this works for things such as pump groups, tips, and even technical analysis. Here’s how I see it.
    1. People don’t give tips on stocks or crypto that they don’t already own that stock or token. Why would they, since if they convince anyone to buy it, the price only goes up as a result, making it more expensive for them to buy in? Sure, you will have friends and family that may do this, but people in a crypto club, your local cryptocurrency meetup, or online are generally not your friends. They are there to make money, and if they can get you to help them make money, they will do it. Pump groups are the worst of these, and no matter how enticing it may look, stay as far away as possible from these scams. I even go so far as to report them when I see them advertise on FB or Twitter, because they are violating the terms of use.
    2. Technical analysis (TA) is something that has been argued about for longer than I’ve been alive, but I think that it falls into the same boat. In short, TA argues that there are patterns in trading that can be read and acted upon to signal when one must buy or sell. It has been used forever in the stock and foreign exchange markets, and people use it in crypto as well. Let’s break down these assumptions a bit.
i. First, if crypto were like the stock or forex markets we’d all be happy with 5-7% gains per year rather than easily seeing that in a day. For TA to work the same way in crypto as it does in stocks and foreign exchange, the signals would have to be *much* stronger and faster-reacting than they work in the traditional market, but people use them in exactly the same way.
ii. Another area where crypto is very different than the stock and forex markets centers around market efficiency theory. This theory says that markets are efficient and that the price reflects all the available information at any given time. This is why gold in New York is similar in price to gold in London or Shanghai, and why arbitrage margins are easily <0.1% in those markets compared to cryptoland where I can easily get 10x that. Crypto simply has too much speculation and not enough professional traders in it yet to operate as an efficient market. That fundamentally changes the way that the market behaves and should make any TA patterns from traditional markets irrelevant in crypto.
iii. There are services, both free and paid that claim to put out signals based on TA for when one should buy and sell. If you think for even a second that they are not front-running (Placing orders ahead of yours to profit.) you and the other people using the service, you’re naïve.
iv. Likewise, if you don’t think that there are people that have but together computerized systems to get ahead of people doing manual TA, you’re naïve. The guys that I have programming my arbitrage bots have offered to build me a TA bot and set up a service to sell signals once our position is taken. I said no, but I am sure that they will do it themselves or sell that to someone else. Basically they look at TA as a tip machine where when a certain pattern is seen, people act on that “tip”. They use software to see that “tip” faster and take a position on it so that when slower participants come in they either have to sell lower or buy higher than the TA bot did. Remember, if you are getting a tip for free, you’re the product. In TA I see a system when people are all acting on free preset “tips” and getting played by the more sophisticated market participants. Again, you have to beat that Wall Street monkey.
  1. If you still don’t agree that TA is bogus, think about it this way: If TA was real, Wall Street would have figured it out decades ago and we would have TA funds that would be beating the market. We don’t.
  2. If you still don’t agree that TA is bogus and that its real and well, proven, then you must think that all smart traders use them. Now follow that logic forward and think about what would happen if every smart trader pushing big money followed TA. The signals would only last for a split second and would then be overwhelmed by people acting on them, making them impossible to leverage. This is essentially what the efficient market theory postulates for all information, including TA.
OK, the one last item. Read this weekly newsletter – You can sign up at the bottom. It is free, so they’re selling something, right? 😉 From what I can tell, though, Evan is a straight-up guy who posts links and almost zero editorial comments.
Happy 2018.
submitted by uetani to CryptoCurrency [link] [comments]

AES Crypt security audit (1 serious issue found)

I just learned about privacytools.io this afternoon and started poking around at some of the software I hadn't heard of before. One in particular caught my eye: AES Crypt. It's listed as "Worth Mentioning" under "File Encryption". I found some minor issues and one major issue.
I only looked at the Linux version, written in C. However, most of the issues I highlight are relevant to all versions since it's part of the file format.
Update: So apparently the major issue has been known since 2012, but they've decided not to address it. Therefore Privacy Tools should not be recommending this software.
Update 2: AES Crypt was removed

The Bad News

Let's start with the most serious issue. An unauthenticated field in encrypted files is trusted, and this allows a man-in-the-middle to manipulate the plaintext without being detected. I wrote up a little example scenario in my bug report, along with proof of concept you can try for yourself:
GitHub issue #23: Unauthenticated header data is trusted, making the plaintext malleable
Instead of using a proper padding scheme, the size of the final block is stored in a last_block_size field in the file. Despite being placed between the encrypted message and the authentication tag, it's not authenticated. This is a huge no-no and must be fixed before it would be reasonable to recommend this tool to anyone for any use.
It's not a problem with the code, but the file format itself. Therefore all versions are affected, and the fix will require a new file format (version 3?).
It could be fixed by including the last_block_size field when authenticating, but it would be much better to drop this field and use a standard padding scheme like PKCS#5. As a really minor bonus, this would also hide the exact file length from snoops.

Weak key derivation

The encryption key is derived from the user-entered password by iterating SHA-256 8,192 times. It's not a showstopper, but this is very weak, and puts a lot more stress on choosing good passphrases. It is salted with the IV, which helps protect against some kinds of attacks.
This is part of the file format since the passphrase is usable between implementations, so all versions are affected.
Recommendation: Switch to a memory-hard KDF like Argon2 or scrypt. Less good option: allow the number of iterations to be configured, or just use more iterations. It's very easy to parallelize SHA-256, especially thanks to all those hardware implementations designed for mining Bitcoin.

More complicated than necessary

The passphrase is used to encrypt yet another key, which is used to encrypt the message. This offers no additional protection, and it's not used for anything. The only reason you might want something like this is so that you can encrypt the file with more than one passphrase, allowing it to be decrypted with any individual passphrase. But that's not a feature of AES Crypt.
Worse, it actually weakens the format since it makes brute force attacks on the passphrase faster. No need to check guesses against the entire ciphertext, just the fixed-length key!
This is part of the file format so all versions are affected.
Recommendation: Get rid of this. It's not a big deal, it's just pointless.

Some cargo culting

Entropy read from the operating system (/dev/urandom, etc.) isn't entirely trusted for some reason, so it's hashed along with the current time and PID. That's not sufficient to accomplish anything useful. It doesn't hurt, but it's a strange thing to do.
This isn't part of the file format, so it's just a quirk of the Linux and Windows implementations.

Ambiguous licensing

I am unable to find any license governing the C Linux and Windows versions of the software. There's no LICENSE file, and the individual sources are not consistently marked. The AES implementation is embedded and marked as GPL, which suggests the entire source is GPL.
So at the moment a conservative take would be that AES Crypt is source available but not necessarily Open Source.

Perhaps some code quality issues?

There were a couple cases of undefined behavior. I submitted a patch to fix these. (Update: This patch was never accepted, and so AES Crypt still invokes undefined behavior each time it's used to encrypt data, making all its output suspect.)
The very second time I ran the aescrypt command after compiling it, I got a segmentation fault, which was pretty alarming. I submitted a patch to fix this, too (Update: also never accepted), but considering how quickly I found this, I wonder how many more issues are lingering. File name handling is a mess. Though, as a command line program, it's probably reasonable to consider the command line arguments trusted inputs.
I looked mostly at the code that does encryption and decryption, and that part is pretty solid. It does thorough error checking and is even careful to clean up before bailing out.

Variable-time comparison

The memcmp() function is used to verify the authentication tag, which takes a variable amount of time to complete. It's not significant for a command line application like this since it's never going to behave as an oracle for an attacker, but something to notice, especially if the code is reused in, say, a server implementation of AES Crypt.

The Good News

It's not well documented, but the encryption scheme is AES-256 in CBC mode, authenticated with encrypt-then-authenticate HMAC-SHA256. Except for the lack of padding, it's all solid stuff. The IV is generated and used properly, and the (pointless) intermediate key is also generated properly (C version, Linux and Windows).
The program makes consistent and reasonable attempts to sanitize memory holding sensitive information. Well done!
As I noted, the actual file parsing and crypto routines are, for the most part, robust with error checking and input validation. (Though, I did notice the upper four bits of last_block_size is allowed to hold any value with no impact on the result.)
If the padding issue is fixed with a new file format, then it's reasonable to recommend this tool with the caveat that the KDF is weak and so your passphrases must be especially strong.
Disclaimer: I wrote and maintain a similar open source tool called Enchive which is perhaps a "competitor" in this area.
submitted by skeeto to privacytoolsIO [link] [comments]

How do I mine Dogecoin?

How do I mine Dogecoin?
Let’s take a lucky guess that you’re here today because you’ve heard a lot about cryptocurrencies and you want to get involved, right? If you’re a community person, Dogecoin mining might be the perfect start for you!
Bitcoin was the first in 2009, and now there are hundreds of cryptocurrencies. These new coins (that operate on their own native blockchain) are called altcoins or alternative coins. One popular altcoin is Dogecoin. It can be bought, sold and traded, just like Bitcoin. It can also be mined!
So, what is Dogecoin mining?
You’ll know what hardware and what software you need to get started. You’ll also know whether or not Dogecoin mining is for you!
So, where would you like to start? The beginning? Great choice. Let’s have a quick look at how Dogecoin got started.
A (Very) Short History of Dogecoin
In 2013, an Australian named Jackson Palmer and an American named Billy Markus became friends. They became friends because they both liked cryptocurrencies. However, they also thought the whole thing was getting too serious so they decided to create their own.
Palmer and Markus wanted their coin to be more fun and more friendly than other crypto coins. They wanted people who wouldn’t normally care about crypto to get involved.
They decided to use a popular meme as their mascot — a Shiba Inu dog.

https://preview.redd.it/rymnyyz1iil31.png?width=303&format=png&auto=webp&s=f138e3fe56eef9c6b0e7f49b84fefc41fb83e5aa
Dogecoin was launched on December 6th, 2013. Since then it has become popular because it’s playful and good-natured. Just like its mascot!
Dogecoin has become well-known for its use in charitable acts and online tipping. In 2014, $50,000 worth of Dogecoin was donated to the Jamaican Bobsled Team so they could go to the Olympics. Dogecoin has also been used to build wells in Kenya. Isn’t that awesome!
Users of social platforms – like Reddit – can use Dogecoin to tip or reward each other for posting good content.
Dogecoin has the 27th largest market cap of any cryptocurrency.
Note: A market cap (or market capitalization) is the total value of all coins on the market.
So, Dogecoin is a popular altcoin, known for being fun, friendly and kind. It’s a coin with a dog on it! You love it already, don’t you?
Next, I want to talk about how mining works…
What is Mining?
To understand mining, you first need to understand how cryptocurrencies work. Cryptocurrencies are peer-to-peer digital currencies. This means that they allow money to be transferred from one person to another without using a bank.
Every cryptocurrency transaction is recorded on a huge digital database called a blockchain. The database is stored across thousands of computers called nodes. Nodes put together groups of new transactions and add them to the blockchain. These groups are called blocks.
Each block of transactions has to be checked by all the nodes on the network before being added to the blockchain. If nodes didn’t check transactions, people could pretend that they have more money than they really do (I know I would!).
Confirming transactions (mining) requires a lot of computer power and electricity so it’s quite expensive.
Blockchains don’t have paid employees like banks, so they offer a reward to users who confirm transactions. The reward for confirming new transactions is new cryptocurrency. The process of being rewarded with new currency for confirming transactions is what we call “mining”!

https://preview.redd.it/rcut2jx3iil31.png?width=598&format=png&auto=webp&s=8d78d41c764f4fe4e6386da4f40a66556a873b87
It is called mining because it’s a bit like digging for gold or diamonds. Instead of digging with a shovel for gold, you’re digging with your computer for crypto coins!
Each cryptocurrency has its own blockchain. Different ways of mining new currency are used by different coins where different rewards are offered.
So, how do you mine Dogecoin? What’s special about Dogecoin mining? Let’s see…
What is Dogecoin Mining?
Dogecoin mining is the process of being rewarded with new Dogecoin for checking transactions on the Dogecoin blockchain. Simple, right? Well no, it’s not quite that simple, nothing ever is!
Mining Dogecoin is like a lottery. To play the lottery you have to do some work. Well, actually your computer (or node) has to do some work! This work involves the confirming and checking of transactions which I talked about in the last section.
Lots of computers work on the same block of transactions at the same time but the only one can win the reward of new coins. The one that earns the new coins is the node that adds the new block of transactions to the old block of transactions. This is completed using complex mathematical equations.
The node that solves the mathematical problem first wins! It can then attach the newly confirmed block of transactions to the rest of the blockchain.
Most cryptocurrency mining happens this way. However, Dogecoin mining differs from other coins in several important areas. These areas are;
  • Algorithm: Each cryptocurrency has a set of rules for mining new currency. These rules are called a mining or hashing algorithm.
  • Block Time: This is the average length of time it takes for a new block of transactions to be checked and added to the blockchain.
  • Difficulty: This is a number that represents how hard it is to mine each new block of currency. You can use the difficulty number to work out how likely you are to win the mining lottery. Mining difficulty can go up or down depending on how many miners there are. The difficulty is also adjusted by the coin’s protocol to make sure that the block time stays the same.
  • Reward: This is the amount of new currency that is awarded to the miner of each new block.
Now, let’s compare how DogeCoin mining works compared to Litecoin and Bitcoin…
Mining Comparison
Bitcoin uses SHA-256 to guide the mining of new currency and the other two use Scrypt. This is an important difference because Scrypt mining needs a lot less power and is a lot quicker than SHA-256. This makes mining easier for miners with less powerful computers. Fans of Litecoin and Dogecoin think that they are fairer than Bitcoin because more people can mine them.
Note: In 2014, Litecoin and Dogecoin merged mining. This means they made it possible to mine both coins in the same process. Dogecoin mining is now linked with Litecoin mining. It’s like two different football teams playing home games in the same stadium!
Mining Dogecoin is a lot faster than mining Litecoin or Bitcoin. The block reward is much higher too!
Don’t get too excited though (sorry!). Dogecoin is still worth a lot less than Bitcoin and Litecoin. A reward of ten thousand Dogecoin is worth less than thirty US Dollars. A reward of 12.5 Bitcoin is currently worth 86,391.63 US Dollars!
However, it’s not as bad as it sounds. Dogecoin mining difficulty is more than one million times less than Bitcoin mining difficulty. This means you are much more likely to win the block reward when you mine Dogecoin.
Now I’ve told you about what Dogecoin mining is and how it works, would you like to give it a try?
Let’s see what you need to do to become a Dogecoin miner…
How to Mine Dogecoin
There are two ways to mine Dogecoin, solo (by yourself) or in a Dogecoin mining pool.
Note: A Dogecoin pool is a group of users who share their computing power to increase the odds of winning the race to confirm transactions. When one of the nodes in a pool confirms a transaction, it divides the reward between the users of the pool equally.
Dogecoin Mining: Solo vs Pool
When you mine as a part of a Dogecoin pool, you have to pay fees. Also, when the pool mines a block you will only receive a small portion of the total reward. However, pools mine blocks much more often than solo miners. So, your chance of earning a reward (even though it is shared) is increased. This can provide you with a steady new supply of Dogecoin.
If you choose to mine solo then you risk waiting a long time to confirm a transaction because there is a lot of competition. It could be weeks or even months before you mine your first block! However, when you do win, the whole reward will be yours. You won’t have to share it or pay any fees.
As a beginner, I would recommend joining a Dogecoin pool. This way you won’t have to wait as long to mine your first block of new currency. You’ll also feel like you’re part of the community and that’s what Dogecoin is all about!
What You Need To Start Mining Dogecoin
Before you start Dogecoin mining, you’ll need a few basics. They are;
  • A PC with either Windows, OS X or Linux operating system.
  • An internet connection
  • A Shiba Inu puppy (just kidding!)
You’ll also need somewhere to keep the Dogecoin you mine. Go to Dogecoin’s homepage and download a wallet.
Note: A wallet is like an email account. It has a public address for sending/receiving Dogecoin and a private key to access them. Your private keys are like your email’s password. Private keys are very important and need to be kept completely secure.
There are two different types; a light wallet and a full wallet. To mine Dogecoin, you’ll need the full wallet. It’s called Dogecoin Core.
Now that you’ve got a wallet, you need some software and hardware.
Dogecoin Mining Hardware
You can mine Dogecoin with;
  • Your PC’s CPU: The CPU in your PC is probably powerful enough to mine Dogecoin. However, it is not recommended. Mining can cause less powerful computers to overheat which causes damage.
  • A GPU: GPUs (or graphics cards) are used to improve computer graphics but they can also be used to mine Dogecoin. There are plenty of GPUs to choose from but here are a few to get you started;SAPPHIRE Pulse Radeon RX 580 ($426.98)Nvidia GeForce GTX ($579.99)ASUS RX Vega 64 ($944.90)
  • A Scrypt ASIC Miner: This is a piece of hardware designed to do one job only. Scrypt ASIC miners are programmed to mine scrypt based currencies like Litecoin and Dogecoin. ASIC miners are very powerful. They are also very expensive, very loud and can get very hot! Here’s a few for you to check out;Innosilicon A2 Terminator ($760)Bitmain Antminer L3 ($1,649)BW L21 Scrypt Miner ($7,700)
Dogecoin Mining Software
Whether you’re mining with an ASIC, a GPU or a CPU, you’ll need some software to go with it. You should try to use the software that works best with the hardware you’re using. Here’s a short list of the best free software for each choice of mining hardware;
  • CPU: If you just want to give mining a quick try, using your computer’s CPU will work fine. The only software I would recommend for mining using a CPU only is CPU miner which you can download for free here.
  • GPU: If you mine with a GPU there are more software options. Here are a few to check out;CudaMiner– Works best with Nvidia products.CGminer– Works with most GPU hardware.EasyMiner– User-friendly, so it’s good for beginners.
  • Scrypt ASIC miner:MultiMiner– Great for mining scrypt based currencies like Litecoin and Dogecoin. It can also be used to mine SHA-256 currencies like Bitcoin.CGminer and EasyMiner can also be used with ASIC miners.
Recommendations
You’re a beginner, so keep it simple! When you first start mining Dogecoin I would recommend using a GPU like the Radeon RX 580 with EasyMiner software. Then I would recommend joining a Dogecoin mining pool. The best pools to join are multi-currency pools like Multipool or AikaPool.
If you want to mine Dogecoin but don’t want to invest in all the tech, there is one other option…
Dogecoin Cloud Mining
Cloud mining is mining without mining! Put simply, you rent computer power from a huge data center for a monthly or yearly fee. The Dogecoin is mined at the center and then your share is sent to you.
All you need to cloud mine Dogecoin is a Dogecoin wallet. Then choose a cloud mining pool to join. Eobot, Nice Hash and Genesis Mining all offer Scrypt-based cloud mining for a monthly fee.
There are pros and cons to Dogecoin cloud mining;
The Pros
  • It’s cheaper than setting up your own mining operation. There’s also no hot, noisy hardware lying around the house!
  • As a beginner, there isn’t a lot of technical stuff to think about.
  • You get a steady supply of new currency every month.
The Cons
  • Cloud mining pools don’t share much information about themselves and how they work. It can be hard to work out if a cloud mining contract is a good value for money.
  • You are only renting computer power. If the price of Dogecoin goes down, you will still have to pay the same amount for something that is worthless.
  • Dogecoin pools have fixed contracts. The world of crypto can change very quickly. You could be stuck with an unprofitable contract for two years!
  • It’s no fun letting someone else do the mining for you!
Now you know about all the different ways to mine Dogecoin we can ask the big question, can you make tons of money mining Dogecoin?
So, Is Dogecoin Mining Profitable?
The short answer is, not really. Dogecoin mining is not going to make you a crypto billionaire overnight. One Dogecoin is worth 0.002777 US Dollars. If you choose to mine Dogecoin solo, it will be difficult to make a profit. You will probably spend more money on electricity and hardware than you will make from Dogecoin mining. Even if you choose a Dogecoin pool or a cloud pool your profits will be small.
However, if you think I am telling you to not mine Dogecoin, then you’re WRONG! Of course, I think you should mine Dogecoin!
But why? Seriously…
Well, you should mine Dogecoin because it’s fun and you want to be a part of the Dogecoin family. Cryptocurrency is going to change the world and you want to be part of that change, right? Mining Dogecoin is a great way to get involved.
Dogecoin is the coin that puts a smile on people’s faces. By mining Dogecoin you’ll be supporting all the good work its community does. You’ll learn about mining from the friendliest gang in crypto. And who knows? In a few years, the Dogecoin you mine now could be worth thousands or even millions! In 2010, Bitcoin was worthless. Think about that!
Only you can choose whether to mine Dogecoin or not. You now know everything you need to know to make your choice. The future is here. So, what are you going to do?
submitted by alifkhalil469 to BtcNewz [link] [comments]

Decred Journal — June 2018

Note: You can read this on GitHub, Medium or old Reddit to see the 207 links.

Development

The biggest announcement of the month was the new kind of decentralized exchange proposed by @jy-p of Company 0. The Community Discussions section considers the stakeholders' response.
dcrd: Peer management and connectivity improvements. Some work for improved sighash algo. A new optimization that gives 3-4x faster serving of headers, which is great for SPV. This was another step towards multipeer parallel downloads – check this issue for a clear overview of progress and planned work for next months (and some engineering delight). As usual, codebase cleanup, improvements to error handling, test infrastructure and test coverage.
Decrediton: work towards watching only wallets, lots of bugfixes and visual design improvements. Preliminary work to integrate SPV has begun.
Politeia is live on testnet! Useful links: announcement, introduction, command line voting example, example proposal with some votes, mini-guide how to compose a proposal.
Trezor: Decred appeared in the firmware update and on Trezor website, currently for testnet only. Next steps are mainnet support and integration in wallets. For the progress of Decrediton support you can track this meta issue.
dcrdata: Continued work on Insight API support, see this meta issue for progress overview. It is important for integrations due to its popularity. Ongoing work to add charts. A big database change to improve sorting on the Address page was merged and bumped version to 3.0. Work to visualize agenda voting continues.
Ticket splitting: 11-way ticket split from last month has voted (transaction).
Ethereum support in atomicswap is progressing and welcomes more eyeballs.
decred.org: revamped Press page with dozens of added articles, and a shiny new Roadmap page.
decredinfo.com: a new Decred dashboard by lte13. Reddit announcement here.
Dev activity stats for June: 245 active PRs, 184 master commits, 25,973 added and 13,575 deleted lines spread across 8 repositories. Contributions came from 2 to 10 developers per repository. (chart)

Network

Hashrate: growth continues, the month started at 15 and ended at 44 PH/s with some wild 30% swings on the way. The peak was 53.9 PH/s.
F2Pool was the leader varying between 36% and 59% hashrate, followed by coinmine.pl holding between 18% and 29%. In response to concerns about its hashrate share, F2Pool made a statement that they will consider measures like rising the fees to prevent growing to 51%.
Staking: 30-day average ticket price is 94.7 DCR (+3.4). The price was steadily rising from 90.7 to 95.8 peaking at 98.1. Locked DCR grew from 3.68 to 3.81 million DCR, the highest value was 3.83 million corresponding to 47.87% of supply (+0.7% from previous peak).
Nodes: there are 240 public listening and 115 normal nodes per dcred.eu. Version distribution: 57% on v1.2.0 (+12%), 25% on v1.1.2 (-13%), 14% on v1.1.0 (-1%). Note: the reported count of non-listening nodes has dropped significantly due to data reset at decred.eu. It will take some time before the crawler collects more data. On top of that, there is no way to exactly count non-listening nodes. To illustrate, an alternative data source, charts.dcr.farm showed 690 reachable nodes on Jul 1.
Extraordinary event: 247361 and 247362 were two nearly full blocks. Normally blocks are 10-20 KiB, but these blocks were 374 KiB (max is 384 KiB).

ASICs

Update from Obelisk: shipping is expected in first half of July and there is non-zero chance to meet hashrate target.
Another Chinese ASIC spotted on the web: Flying Fish D18 with 340 GH/s at 180 W costing 2,200 CNY (~340 USD). (asicok.comtranslated, also on asicminervalue)
dcrASIC team posted a farewell letter. Despite having an awesome 16 nm chip design, they decided to stop the project citing the saturated mining ecosystem and low profitability for their potential customers.

Integrations

bepool.org is a new mining pool spotted on dcred.eu.
Exchange integrations:
Two OTC trading desks are now shown on decred.org exchanges page.
BitPro payment gateway added Decred and posted on Reddit. Notably, it is fully functional without javascript or cookies and does not ask for name or email, among other features.
Guarda Wallet integrated Decred. Currently only in their web wallet, but more may come in future. Notable feature is "DCR purchase with a bank card". See more details in their post or ask their representative on Reddit. Important: do your best to understand the security model before using any wallet software.

Adoption

Merchants:
BlueYard Capital announced investment in Decred and the intent to be long term supporters and to actively participate in the network's governance. In an overview post they stressed core values of the project:
There are a few other remarkable characteristics that are a testament to the DNA of the team behind Decred: there was no sale of DCR to investors, no venture funding, and no payment to exchanges to be listed – underscoring that the Decred team and contributors are all about doing the right thing for long term (as manifested in their constitution for the project).
The most encouraging thing we can see is both the quality and quantity of high calibre developers flocking to the project, in addition to a vibrant community attaching their identity to the project.
The company will be hosting an event in Berlin, see Events below.
Arbitrade is now mining Decred.

Events

Attended:
Upcoming:

Media

stakey.club: a new website by @mm:
Hey guys! I'd like to share with you my latest adventure: Stakey Club, hosted at stakey.club, is a website dedicated to Decred. I posted a few articles in Brazilian Portuguese and in English. I also translated to Portuguese some posts from the Decred Blog. I hope you like it! (slack)
@morphymore translated Placeholder's Decred Investment Thesis and Richard Red's write-up on Politeia to Chinese, while @DZ translated Decred Roadmap 2018 to Italian and Russian, and A New Kind of DEX to Italian and Russian.
Second iteration of Chinese ratings released. Compared to the first issue, Decred dropped from 26 to 29 while Bitcoin fell from 13 to 17. We (the authors) restrain ourselves commenting on this one.
Videos:
Audio:
Featured articles:
Articles:

Community Discussions

Community stats: Twitter followers 40,209 (+1,091), Reddit subscribers 8,410 (+243), Slack users 5,830 (+172), GitHub 392 stars and 918 forks of dcrd repository.
An update on our communication systems:
Jake Yocom-Piatt did an AMA on CryptoTechnology, a forum for serious crypto tech discussion. Some topics covered were Decred attack cost and resistance, voting policies, smart contracts, SPV security, DAO and DPoS.
A new kind of DEX was the subject of an extensive discussion in #general, #random, #trading channels as well as Reddit. New channel #thedex was created and attracted more than 100 people.
A frequent and fair question is how the DEX would benefit Decred. @lukebp has put it well:
Projects like these help Decred attract talent. Typically, the people that are the best at what they do aren’t driven solely by money. They want to work on interesting projects that they believe in with other talented individuals. Launching a DEX that has no trading fees, no requirement to buy a 3rd party token (including Decred), and that cuts out all middlemen is a clear demonstration of the ethos that Decred was founded on. It helps us get our name out there and attract the type of people that believe in the same mission that we do. (slack)
Another concern that it will slow down other projects was addressed by @davecgh:
The intent is for an external team to take up the mantle and build it, so it won't have any bearing on the current c0 roadmap. The important thing to keep in mind is that the goal of Decred is to have a bunch of independent teams on working on different things. (slack)
A chat about Decred fork resistance started on Twitter and continued in #trading. Community members continue to discuss the finer points of Decred's hybrid system, bringing new users up to speed and answering their questions. The key takeaway from this chat is that the Decred chain is impossible to advance without votes, and to get around that the forker needs to change the protocol in a way that would make it clearly not Decred.
"Against community governance" article was discussed on Reddit and #governance.
"The Downside of Democracy (and What it Means for Blockchain Governance)" was another article arguing against on-chain governance, discussed here.
Reddit recap: mining rig shops discussion; how centralized is Politeia; controversial debate on photos of models that yielded useful discussion on our marketing approach; analysis of a drop in number of transactions; concerns regarding project bus factor, removing central authorities, advertising and full node count – received detailed responses; an argument by insette for maximizing aggregate tx fees; coordinating network upgrades; a new "Why Decred?" thread; a question about quantum resistance with a detailed answer and a recap of current status of quantum resistant algorithms.
Chats recap: Programmatic Proof-of-Work (ProgPoW) discussion; possible hashrate of Blake-256 miners is at least ~30% higher than SHA-256d; how Decred is not vulnerable to SPV leaf/node attack.

Markets

DCR opened the month at ~$93, reached monthly high of $110, gradually dropped to the low of $58 and closed at $67. In BTC terms it was 0.0125 -> 0.0150 -> 0.0098 -> 0.0105. The downturn coincided with a global decline across the whole crypto market.
In the middle of the month Decred was noticed to be #1 in onchainfx "% down from ATH" chart and on this chart by @CoinzTrader. Towards the end of the month it dropped to #3.

Relevant External

Obelisk announced Launchpad service. The idea is to work with coin developers to design a custom, ASIC-friendly PoW algorithm together with a first batch of ASICs and distribute them among the community.
Equihash-based ZenCash was hit by a double spend attack that led to a loss of $450,000 by the exchange which was targeted.
Almost one year after collecting funds, Tezos announced a surprise identification procedure to claim tokens (non-javascript version).
A hacker broke into Syscoin's GitHub account and implanted malware stealing passwords and private keys into Windows binaries. This is a painful reminder for everybody to verify binaries after download.
Circle announced new asset listing framework for Poloniex. Relevant to recent discussions of exchange listing bribery:
Please note: we will not accept any kind of payment to list an asset.
Bithumb got hacked with a $30 m loss.
Zcash organized Zcon0, an event in Canada that focused on privacy tech and governance. An interesting insight from Keynote Panel on governance: "There is no such thing as on-chain governance".
Microsoft acquired GitHub. There was some debate about whether it is a reason to look into alternative solutions like GitLab right now. It is always a good idea to have a local copy of Decred source code, just in case.
Status update from @sumiflow on correcting DCR supply on various sites:
To begin with, none of the below sites were showing the correct supply or market cap for Decred but we've made some progress. coingecko.com, coinlib.io, cryptocompare.com, livecoinwatch.com, worldcoinindex.com - corrected! cryptoindex.co, onchainfx.com - awaiting fix coinmarketcap.com - refused to fix because devs have coins too? (slack)

About This Issue

This is the third issue of Decred Journal after April and May.
Most information from third parties is relayed directly from source after a minimal sanity check. The authors of Decred Journal have no ability to verify all claims. Please beware of scams and do your own research.
The new public Matrix logs look promising and we hope to transition from Slack links to Matrix links. In the meantime, the way to read Slack links is explained in the previous issue.
As usual, any feedback is appreciated: please comment on Reddit, GitHub or #writers_room. Contributions are welcome too, anything from initial collection to final review to translations.
Credits (Slack names, alphabetical order): bee and Richard-Red. Special thanks to @Haon for bringing May 2018 issue to medium.
submitted by jet_user to decred [link] [comments]

Frequently Asked Questions

NOTICE

This post is a temporary resting place for FAQs while we wait for the release of VertDocs.

What is Vertcoin?

Vertcoin is a digital peer to peer currency focused on decentralization and ASIC resistance. Vertcoin is aiming to be easily accessible to the everyday user without extensive technical knowledge. Vertcoin has started to lower the barrier of entry with lots of video guides and the development of the One Click Miner (OCM).

Why does ASIC Resistance Matter?

ASICs (Application Specific Integrated Circuits) are dedicated mining devices that can only mine one algorithm. Coins like Bitcoin and Litecoin both made GPU mining obsolete when SHA-256 and Scrypt ASICs were created.
ASIC Resistance and How it Makes Vertcoin Decentralized
Vertcoin believes that ASIC resistance goes hand in hand with decentralization.
ASICs are made by companies like Bitmain and almost all the original sellers of ASICs sell on a preorder basis. When pre ordering an ASIC you are buying from a limited batch that the ASIC company has produced. Often times the batch will not be fully filled and the ASIC company will often have left over ASICs. When the ASIC company has left over ASICs they will put them to work mining. Soon enough the ASIC company will have a very large amount of unsold ASICs that are mining and slowly the ASIC company starts to own a large part of the network’s hashrate. When an ASIC company(s) starts to own a large majority of the hashrate the network can become very centralized after a while.
Having your network consist of a few large companies can be very dangerous as they could eventually get 51% hashing power and 51% attack your network, destabilizing the network. When your network is made out of a lot of smaller miners, like Vertcoin, it is much harder for your network to be 51% attacked, therefore increasing network security. By having centralized hashing power your coin effectively centralizing the network as the centralized hashing power can deny transactions and stop any activity they don’t want.

What Ways is Vertcoin Superior to Litecoin and Bitcoin?

Network Difficulty Adjustments with Kimoto Gravity Well
Vertcoin uses a difficulty adjustment called Kimoto Gravity Well which adjusts the difficulty every block, whereas Bitcoin and Litecoin’s difficulty changes every 2016 blocks. By adjusting the difficulty every block Vertcoin’s block time can stay consistent by adjusting for the fluctuation in network hash rate from hash rate renting and part time miners. If a large miner switches off Bitcoin or Litecoin mining the network could be slowed to a crawl until 2016 blocks are mined and the difficulty can change to adjust for the new network hash rate. We observed this happen to Bitcoin when Bitcoin Cash became more profitable than Bitcoin and Bitcoin’s network hash rate saw a steep fall off, slowing the network to a crawl. If this was to happen with Vertcoin the difficulty would adjust after 1 block was mined, allowing Vertcoin to always be profitable to mine.
Anyone can Meaningfully help Verify Transactions
In Proof-of-Work crypto currencies miners help secure the blockchain and get rewarded with the block reward. In ASIC mineable coins like Bitcoin and Litecoin you can’t meaningfully verify transactions unless you pay 1000-2000$ for a ASIC miner. When you mine with a CPU or GPU in a ASIC mineable coin you make no meaningful impact on the network. It is like trying to break concrete with a shovel while everyone else has a jackhammer.
Simple Upgrades Aren’t Held back by 1-2 Large Miners
In ASIC market people buy ASICs in batches in a preorder. With Bitcoin ASICs there is not enough demand for ASICs so the batch often doesn’t get sold out so now the manufacturer has spare ASICs. Now that the manufacturer has spare ASICs they will often start mining with them and eventually the ASIC company has one of the highest hash rates. If the ASIC company doesn’t want a certain upgrade to go through, for example SegWit, they can vote with their hash rate to hold back the upgrade forever or at least until people who want SegWit get more hash rate.
You Have a Say in Protocol Rules and Consensus
In Bitcoin you are a passive observer because you can only issue transactions and you have no part in the process after that. In Vertcoin you can be apart of the process for deciding the ordering of transactions and deciding what transactions get into blocks.
Block Rewards and Transaction Fees are Distributed Evenly
In Bitcoin and Litecoin the block rewards and transaction fees are often given to the large miners in China due to mining centralization created by ASICs. Vertcoin distributes its mining rewards to people all around the world thanks to the mining decentralization.

When will Atomic Swaps Be Ready?

Atomic Swaps can be done in two flavors: On-chain and Off-chain (via Lightning Network). On-chain swaps were actually done already using Blocknet, you can see it in use on Youtube. We're looking into doing it again using Interledger.
However our main focus is to do off-chain Atomic Swaps using Lightning Network technology. Because it has the same benefits as Lightning transactions: No network fees and instant transactions.
For off-chain swaps we need Lightning Network to be fully operational. It's difficult to give an ETA on that since we aren't the ones developing it. U/gertjaap posted a video on the current state of the Lightning Network for Vertcoin a while ago, which you can see here.
This was actually the "bleeding edge" of Lightning Network at the time. was able to use it on VTC's main net, meaning that our blockchain is ready for the good stuff. As you can see however, it can't yet be considered production ready (most users would want a little better UX than a command line app).
Now off-chain Atomic Swaps is a technique based on the same principles as Lightning Network, but adds an extra complexity for it being across chains. So it's basically the same as a "multi hop" Lightning payment, which is not yet built by any of the implementations. They're still working hard on making the single-hop payments robust. So in order for AS to be possible, LN has to be fully operational.
A timeline cannot be given at this time, because frankly we don't know. The implementation of Lightning Network we feel has the most potential is LIT, because it supports multiple currencies in its protocol (where LND is bitcoin-only at the time and requires significant work to support other currencies, which is an essential part of being able to work across multiple blockchains).
LIT is open source and there's nothing secretive about its progress, you can see the development on Github. We even have our lead dev James Lovejoy (u/jamesl22) close to the action and contributing to it where possible (and our team as well through testing it on the Vertcoin chain).
So we're not developing LN or AS ourselves, we're just ready with our blockchain technology whenever it becomes available.
If we have any real progress that has some substance, you can expect us to let the world know. We're not interested in fluffy marketing - we post something when we achieve real progress. And we are not keeping that secret.

How do I Choose the Right Vertcoin Wallet?

Deciding what Vertcoin wallet you should choose can be a difficult process. You can choose between three different wallets: Core, Electrum and Paper. Once you decide you can use the "How to Setup Your Vertcoin Wallets" video guide to assist you.

Core

The Core wallet is the wallet that most people should use. It will store the entire blockchain (~2GB) on your computer. The Core wallet is the only wallet that fully supports P2Pool mining. You will also have to use the Core wallet if you plan to run a P2Pool node or any Vertcoin related server.

Electrum

The Electrum wallet is a light wallet for Vertcoin. You do not have to download the blockchain on your computer, but you will still have your own private keys on your computer. This is recommended for people who don't need to store Vertcoins for very long and just need a quick but secure place to store them.

Paper

The Paper wallet is as the name implies, a physical paper wallet. When generating a paper wallet you will get a pdf that will need to print out. A paper wallet is normally used for long term storage since it is the safest way to store Vertcoins. A paper wallet can also be called "cold storage." Cold storage references the storage of your coins offline, preventing you from getting hacked over the internet.

Ledger Nano S

The Ledger Nano S is a hardware wallet designed by Ledger. A hardware wallet is similar to a paper wallet since it is normally used for cold storage. The hardware wallet is on par with the security of a paper wallet while being easy to use and setup. Note: You should never mine directly to a Ledger hardware wallet.

How do I start mining Vertcoin?

We have many guides available for you to use depending on your computer specifications.
Nvidia GPUs on Windows
Nvidia GPUs on Linux
AMD GPUs on Windows WARNING: Very unprofitable, AMD optimized miner is coming very soon.

Where can I get the One Click Miner (OCM)

You can get the latest version of the One Click Miner in the Vertcoin Discord. The download is pinned to the top of the #oneclick channel.

What do all the Numbers Mean on P2Pool’s Web Interface

I've seen a lot of confusion from new miners on public p2pool nodes, so here's a primer for the most common static node page style, for first time miners: https://imgur.com/K48GmMw

Active Miners on this Node

Address - This is the list of addresses currently mining on this node. If your address does not show up here, you are not mining on this node.
Hashrate
This is a snapshot of your hashrate as seen by the node. It will fluctuate up to 15% from the hashrate you are seeing on your mining software, but will average out to match the output in your mining software.
Rejected Hashrate
This is the amount of your hashing contribution that is rejected, both in hashrate and as a percentage of your total contribution. Running your own p2pool node minimizes this number. Mining on a node that is geographically close to reduce lag also minimizes this number. Ideally you would like it to be less than 1%, but most people seem happy keeping it under 3%.
Share Difficulty
This speaks for itself, it is the difficulty of the share being currently worked on. Bigger numbers are more difficult.
Time to Share
This is how long you need to mine before you will receive any payouts, or any "predicted payout." The lower your hashrate, the higher your time to share.
Predicted Payout
This is the reward you would receive if a block was found by p2pool right now. If it reads "no shares yet" then you have not yet been mining the requisite amount of time as seen in the previous "time to share" column.

Status

Network Hashrate
This is the total hashrate of all the miners mining vertcoin everywhere, regardless of where or how.
Global Pool Hashrate
This is the total hashrate of all the miners mining vertcoin on this p2pool network, be it the first network or the second network.
Local Pool Hashrate
This is the total hashrate of all the miners mining Vertcoin on this node.
Current Block Value
This is the reward that will be given for mining the current block. The base mining reward is currently 50 VTC per block, so any small decimal over that amount is transaction fees being paid by people using the network.
Network Block Difficulty
This is the difficulty of the block being mined. The higher the number, the higher the difficulty. This number rises as the "Network Hashrate" rises, so that blocks will always be found every 2.5 minutes. Inversely, this number falls when the "Network Hashrate" lowers as well.
Expected Time to Block
This is a guess at how much time will elapse between blocks being found by this p2pool network. This guess is accurate on average, but very inaccurate in the short term. Since you only receive a payout when the network finds a block, you can think of this as "Estimated Time to Payout."

Why is P2Pool Recommended Over Traditional Pools?

Decentralisation

P2Pool is peer to peer allowing a decentralized pool mining system. There are many nodes setup around the world that connect to each other too mine together. Many other coins have 1 very large pool that many miners connect to and sometimes the largest pool can have 51% or more of the network hash rate which makes the network vulnerable to a 51% attack. If P2Pool is the largest network then that prevents the Vertcoin network to be susceptible to a 51% attack as P2Pool is decentralized.

PPLNS Payout System

P2Pool uses a PPLNS (Pay Per Last N Shares) payout system which awards miners more the longer they mine, sort of like a loyalty system. A drawback to this system is that part time miners that aren't 24/7 won't be able to earn that much.

2 Networks

While Network 1 is catered towards 24/7 miners and people who have dedicated mining rigs, Vertcoin has a second P2Pool network where part time miners and miners under 100 MH/s can go to mine.

Mines Directly to Your Wallet

P2Pool mines directly to your wallet and cuts out the middleman. This reduces the likely hood that the pool will run away with your coins.

No Downtime

Since P2Pool is decentralized and has different nodes for you to choose from there will be no downtime because the P2Pool network does not die if one node goes down. You can setup a backup server in your miner so that you will have no downtime when mining.

Anonymity and Security

When using P2Pool you use a wallet address making your real identity anonymous, you are simply known by a random 34 letter string. Along with using a wallet address instead of a username there is no password involved P2Pool preventing the possibility of cracking your pool account (If you were on a traditional pool,) and stealing all your coins.

How do I Find a Nearby P2Pool Node

You can find the public p2pool nodes the the P2Pool Node Scanners. If you want to find a network 1 node go here. If you want to find a network 2 node go here.

How do I setup a P2Pool Node?

Linux P2Pool Setup
Windows P2Pool Setup (Text)
Windows P2Pool Setup (Video) This guide setups a network 2 node. When downloading Python download the 32bit version, not the 64bit. Downloading the 64bit version causes problems with the twisted install.
How do I setup a change my node to network 1 or network 2?
In the P2Pool startup script when you type the --network flag add vertcoin1 for network 1 and vertcoin2 for network 2 right after.

How do I Buy Vertcoin?

You can see a video guide on Youtube, "How to Buy Vertcoin with Fiat Using Bittrex and Coinbase"

How can I get help with "X problem?"

The quickest way for you to get help is for you to join the Vertcoin Discord Group. We almost always have knowledgable Vertans, whether that be developers or experienced Vertans, online to help you with whatever problems you may have.

How can I donate to the Developers?

You can donate to the dev fund at https://vertcoin.org/donate/. You can select what you want your funds to go to by donating to the corresponding address. You can also see how much funding is required and how much we have donated.

Where can I see what exchanges Vertcoin is on?

You can see what exchanges Vertcoin is listed on at CoinMarketCap. You can see what exchanges Vertcoin has applied to be on at this google docs spreadsheet.

Where can I see Vertcoin's Roadmap?

The Vertcoin developers currently have a trello board where you can see the goals and what the status of said goal is. You can also vote on what you want the Vertcoin developers to focus on next.

What is the Status of the AMD Optimized Miner?

The AMD Optimized Miner internal beta is aiming to be ready by the end of September. The AMD Optimized Miner is currently being developed by @turekaj on the Vertcoin Discord. He currently does not have a Reddit account and Discord is the only way you can contact him.

What Does Halving Mean?

Halving means that the block reward for miners will be split in half. Halving happens around every 4 years for Vertcoin or 840,000 blocks. This means around December miners will only receive 25 VTC per block instead of the current 50 VTC per block.
If you would like to add another question to this list please comment it and I will get around to adding it ASAP.
submitted by asianboygames to vertcoin [link] [comments]

Reasons to believe Julian Assange is in CIA custody and WikiLeaks under duress.

UPDATE (11/01/2017 - UK Date Format): Julian Assange is alive and still in the Embassy. He confirms WikiLeaks has not been compromised. Julian took questions from the Reddit AmA but answered them via live, current and interactive video. He did this very intentionally, and by so doing, was true to his word. Watch a recording of the live event here:
https://www.youtube.com/watch?v=rC2EjKYMCeg
On the 26th of September 2016 Secretary of State John Kerry (self admitted Skull and Bones member) visited Colombia. WikiLeaks reported that inside sources had confirmed that John Kerry also met with Ecuadorean President Rafael Correa in Ecuador to personally ask Ecuador to stop Assange from publishing documents about Clinton. This was initially fervently denied in the press only later to be confirmed by the Ecuadorian embassy who admitted cutting off Julian’s internet due to pressure from the US. Ecuador wanted to appear impartial.
For over four years, the Ecuadorian embassy has been under surveillance and Julian's human rights violated as he has been unlawfully detained termed "illegal arbitrary detention" by a recent UN ruling. During that time, it has been possible for intelligence agencies to gather critical information and build a detailed profile and plan to circumvent Julian's dead man's switch.
Both John Kerry and US intelligence agencies know perfectly well that cutting off Julian's internet would have no impact on the release of the leaked emails that are damaging to Hillary's campaign. It has been very clear for a long time that many US officials wanted Julian Assange dead, Hillary Clinton even has remarked, "can't we just drone the guy".
The cutting off of Julian's internet access was not for the purpose of preventing the leaks of the Podesta and Hillary emails. Unless intelligence agencies are truly inept, they know that media organisations already have the entire leaked email database and a schedule for release, they also know WikiLeaks staff would continue to leak regardless of Julian's ability to communicate.
Removing Assange would not be enough, they would need to circumvent his dead man's switch and then tarnish WikiLeaks reputation. Removing Assange's internet could have the effect of causing Assange to take steps that can be followed to prevent the automatic triggering of his DMS.
From the day Julian's internet was cut off, a series of peculiar and uncharacteristic events started to take place. The same day that Julian's internet was cut off, CBS reported that Pamela Anderson visited Assange and had "Tortured" him with a vegan sandwich. A few days before on the 14th, John Podesta tweeted "I bet the lobster risotto is better than the food at the Ecuadorian Embassy". Then on October the 16th the SHA-256 prerelease keys were issued on WikiLeaks twitter feed, although these events are odd and seemingly inconsequential, combined with John Kerry being in the UK from the 16th to the 17th sparked concern among the community for Julian's safety.
Assange supporters started to gather at the embassy to keep Assange safe and witness any foul play, some of these witnesses have claimed that a very swift police armed raid took place that lasted only 5 minutes while the crowd was kept under control and prevented from approaching, there have also been reports that they were prevented from taking photographs and that their phones were confiscated. A live periscope feed was also cut off. There have also been some reports of the presence of a mobile jamming van.
If Assange has been seized, any recognition by mainstream media would be detrimental to Hillary's campaign. A covert operation with media blackout would be the only effective way of seizing him at this time. On October the 18th Fox News said that Julian Assange would be "arrested soon, maybe in a matter of hours.". The was video was then promptly removed and articles relating to it have disappeared. However, one reddit user was able to find an alternative source and now the video can be found again on YouTube.
Although Julian's primary DMS (the release of insurance file encryption keys) did not activate, on October the 18th one of Julian's contingencies did activate, a script was activated that made https://file.wikileaks.org/file publicly visible and set all the file date and time stamps to 01/01/1984 (Orwell reference). This file repository contains many documents that had not been released prior.
Staffers Kristinn Hrafnsson and Sarah Harrison, have gone silent while the Ecuadorian embassy is refusing to provide any updates on Assange’s fate. There is a recorded call made to the embassy by a journalist where the receptionist refused to confirm that Julian was at the embassy, she also refused to confirm that Julian was even alive. Julian has not made an appearance at the window of the embassy since being cut off.
WikiLeaks suggested in a tweet that its supporters were responsible for the DDOS attacks on the 21st. Neither Assange or WikiLeaks would ever insinuate such a thing. WikiLeaks deceptively tweeted a video of Michael Moore that was actually recorded in June. The video was posted on the 24th of October giving the impression that Michael Moore had been speaking with Assange in the embassy. Why would WikiLeaks do this when they know they are already under suspicion?
WikiLeaks have been using their Twitter account to give the appearance of his safety while providing no concrete evidence of his safety. They issued a poll asking what proof would satisfy the public that Julian was safe. WikiLeaks have yet to follow up on the conclusive result of a video or window appearance.
Julian Assange is known for his attention to detail and his consistently good spelling and grammar. Currently the twitter feed has very poor spelling, there are numerous uncharacteristic spelling errors, for example, an accomplished cryptographer knows how to correctly spell algorithm and so do WikiLeaks staff.
On the 21st of October, there was a massive widespread DDOS attack that disrupted US and EU internet. Also on the 21st of October London City Airport was evacuated. The next day (the 22nd), Gavin MacFayden is reported dead. WikiLeaks made a further blunder by stating his death as the 23rd.
There has been a number of high level WikiLeaks deaths recently too. John Jones QC - WikiLeaks U.N. lawyer died on April 16th 2016. Michael Ratner - WikiLeaks chief counsel died on May 11th 2016. Seth Rich - Employee of the Democratic National Committee (DNC) was fatally shot on July 10th 2016 and Gavin MacFadyen - WikiLeaks director died October 22nd 2016.
If WikiLeaks has been compromised, it is already preparing the scene for future discrepancy to seriously tarnish WikiLeaks reputation. Nothing WikiLeaks has shared since the 15th of October 2016 should be trusted until Julian has been fully verified as alive.
My speculative fears are that Julian has been seized and removed from the Embassy. His internet being cut not being related to the release of the emails, but rather as a component of a plan of 4 years in the making to as secretly as possible remove Assange from the embassy, circumvent his DMS and hijack WikiLeaks with the key team members silenced or under duress.
My fears would be confirmed by no future public (mass witnessing and recorded/televised) appearance of Julian Assange discussing recent topics. His death by whatever means after the US presidential election would be extremely suspect. Until proof of life, assume the following compromised:
SHA-256 verification Keys posted after the 15th. WikiLeaks submission process and/or platform. WikiLeaks twitter feed. Any WikiLeaks leaks after the 15th October 2016.
EDIT: (01/11/2016 - 17:18GMT) URL and spelling corrections.
EDIT: Update 16/12/2016
Why demanding proof that WikiLeaks is not compromised is necessary:
https://www.facebook.com/events/309760466089922/ (PoL Event @ Ecuadorian Embassy London 17th December 2016) – If you live in the UK please come and let’s get REAL PoL. Please circulate.
1) Still no PGP (GPG) signed short message from WikiLeaks. 2) RiseUp’s warning canary may be dead (RiseUp is believed to host WL Twitter email account) 3) Julian’s internet hasn’t been restored as promised 4) The pre-commitment file hashes released in October do not match the released insurance files 5) Julian’s Swedish defense lawyer Per Samuelson was denied access during case questioning. No one actually saw Julian through the whole process.
Additional points:
-UK disregard for international law -Capabilities of combined intelligence agencies -WikiLeaks down on October 17th -Mass censorship -WikiLeaks reposting old stuff -See timelines below
Various timelines, some with minor errors: https://www.reddit.com/WikileaksTimeline/wiki/index https://www.reddit.com/WhereIsAssange/comments/5dmr57/timeline_of_events_regarding_julian_assange_and/ https://regated.com/2016/11/julian-assange-missing/
[Still no PGP (GPG) signed short message from WikiLeaks] Watch this https://youtu.be/GSIDS_lvRv4 video for a simple and good explanation of public/private key cryptography. Here https://riseup.net/en/canary is an example of how a legitimate cryptographically capable organisation uses PGP to sign a message and prove authenticity. WikiLeaks has this setup too. Why do they not use it and prove they are not compromised?
WikiLeaks could easily do this. They have their private key. The public has WikiLeaks public key. Even if Julian isn’t in possession of the key, WL most certainly is, no excuse for WL not to prove themselves. This has been heavily requested of WikiLeaks. I’d like to hear from the individuals who claim that their requests were removed (please leave comments). Of all the red flags, not posting a PGP signed message is by far the most damming. If we are to believe that the person in the audio recording at the FCM 2016 is Julian Assange, then what he says about the keys is missing the point. If he himself is not in possession of the key, then WikiLeaks will be. If WikiLeaks use the key to prove themselves, then we know they are not compromised. By extension, we will also be assured that Julian is safe as an uncompromised WikiLeaks would be in a position to confirm his safety and be believed. This audio file includes everything that he says regarding PGP keys: http://picosong.com/UyVw/ (I am not convinced this is Julian).
[RiseUp’s warning canary may be dead (RiseUp is believed to host WL Twitter email account)] RiseUp is an activist ISP providing secure services to activists. Its mission is to support liberatory social change via fighting social control and mass surveillance through distribution of secure tools (https://en.wikipedia.org/wiki/Riseup). RiseUp use a warrant canary as a means to protect their users in case RiseUp are ever issued with a NSL or gag order etc (https://riseup.net/en/canary). This is renewed quarterly, assuming no warrant has been issued. However, this is now considerably overdue so the assumption is that the canary is dead, and just like the canaries used in coal mines, everyone should get the hell out of there when it dies. https://theintercept.com/2016/11/29/something-happened-to-activist-email-provider-riseup-but-it-hasnt-been-compromised/. I would be grateful if someone could provide a source for the WikiLeaks twitter email account being hosted by RiseUp.
[Julian’s internet hasn’t been restored as promised] https://twitter.com/wikileaks/status/787889195507417088 https://twitter.com/wikileaks/status/788099178832420865 On the 26th of September 2016 Secretary of State John Kerry visited Colombia. WikiLeaks reported that inside sources had confirmed that John Kerry also met with Ecuadorean President Rafael Correa in Ecuador to personally ask Ecuador to stop Assange from publishing documents about Clinton. This was initially fervently denied in the press only later to be confirmed by the Ecuadorian Embassy who admitted cutting off Julian’s internet due to pressure from the US. Ecuador wanted to appear impartial.
Both John Kerry and US intelligence agencies knew perfectly well that cutting off Julian's internet would have no impact on the release of the leaked emails that were damaging to Hillary's campaign. The cutting off of Julian's internet access was not for the purpose of preventing the leaks of the Podesta and Hillary emails. Unless intelligence agencies are truly inept, they knew that media organisations already have the entire leaked email database and a schedule for release, they also knew WikiLeaks staff would continue to leak regardless of Julian's ability to communicate.
Now it is long after the election and Ecuador have still not restored Julian’s internet. Ecuador have no grounds to continue to restrict Julian’s internet. It does nothing apart from increase tensions and raise suspicion. Ecuador have always been supportive of Julian. However, after John Kerry applied pressure on Ecuador, that whole dynamic changed. Ecuador cut Julian's Internet. He then essentially threatened Ecuador, the UK and John Kerry by submitting those pre-commitment file hashes on Twitter. Since then we have only seen hostility towards Julian from all three parties. Ecuador didn't restore his internet and didn't let his lawyer interview him and no one actually saw him. The U.K. Denied him access to Gavin's funeral and denied him access to medical treatment. The UK also continually disregard the UN. The dynamic now is totally different. He has no political friends. It seems that both the UK and Ecuador are now working against Julian and Wikileaks. An environment where a collaborated siege would be feasible.
Finally, many have speculated about mobile signals being blocked at the Embassy. I can confirm that there is 4G signal right outside the Embassy door. I was there, with my phone, and tested it. There is no reason to think Julian cannot use a MiFi device (or similar) connected to a cellular network.
[The pre-commitment file hashes released in October do not match the released insurance files] Here are the October tweets with the file hashes:
https://twitter.com/wikileaks/status/787777344740163584 https://twitter.com/wikileaks/status/787781046519693316 https://twitter.com/wikileaks/status/787781519951720449
These 3 pre-commitment Twitter posts are SHA-256 file hashes. SHA-256 file hashes are 64 characters long. They are not encryption keys for insurance files. They simply are a mathematical formula for verifying that later released files are genuine and have not been altered.
These hashes were released because Julian felt threatened and in increased danger. They specifically targeted the UK FCO, Ecuador and John Kerry. All of whom are key players in his current predicament. On November 7th, WikiLeaks released 3 new insurance files. These files names match the names given in the pre-commitment hash tweets:
2016-11-07_WL-Insurance_EC.aes256 2016-11-07_WL-Insurance_UK.aes256 2016-11-07_WL-Insurance_US.aes256
EC = Ecuador, UK = UK FCO, US = John Kerry. Soon after these files were released, the 3 files hashes were compared to the 3 hashes posted on the 16th of October. They did not match. When this was brought to WikiLeaks attention, WikiLeaks released the following statement in a tweet: https://twitter.com/wikileaks/status/798997378552299521
“NOTE: When we release pre-commitment hashes they are for decrypted files (obviously). Mr. Assange appreciates the concern.”
This firstly proved that the hashes and the insurance files were related (a fact that was already clear). Secondly, it was a lie, as it implied historical use of pre-commitment hashes in this manner. Thirdly, the (obviously) comment was also a deception and an insult to supporters. It was not obvious to anyone, not even to our crypto guys in /cryptography/, on the contrary, they thought it highly suspicious. Additionally, what they suggest would be absolutely pointless. Pointless as a threat, as the UK, Ecuador and John Kerry would have no practical way of identifying the documents to confirm the threat. There's absolutely no scenario where an uncompromised WikiLeaks would either post bad file hashes or altered insurance files.
[Julian’s Swedish defense lawyer Per Samuelson was denied access during case questioning] This is highly unusual and very suspicious. Also, Jennifer Robinson was not in the room with Assange. https://www.youtube.com/watch?v=MYR0Pw9LfUQ&feature=youtu.be&t=9m55s and neither was the chief prosecutor http://www.bbc.co.uk/news/world-europe-37972528 “Swedish chief prosecutor Ingrid Isgren will not speak to Mr Assange directly”.
[UK disregard for international law] The UK threat is very real. Back in August 2012 the UK was poised to break international law citing the Diplomatic and Consular Premises Act of 1987 as a basis for entering the Embassy and arresting Assange (http://www.bbc.co.uk/news/world-19259623). It all became very public, very quickly and fortunately never happened (http://www.telegraph.co.uk/news/worldnews/southamerica/ecuado9488996/Ecuadors-president-raiding-embassy-to-snatch-Julian-Assange-suicidal.html). I expressed my concern at the time that the UK shouldn’t have even been contemplating such action, let alone threatening it in writing to Ecuador. More recently, the UK disregarded the UN ruling that Julian Assange was being arbitrarily detained (https://www.theguardian.com/media/2016/feb/04/julian-assange-wikileaks-arrest-friday-un-investigation). The UK appealed, and then finally lost their appeal in November (https://www.rt.com/news/368746-un-ruling-free-assange/). Julian has also been refused to leave the Embassy with a police escort for medical treatment as well as denied to attend Gavin MacFadyen’s funeral. The UK’s behaviour is appalling and clearly has no respect for international law. The reported raid on the Embassy during the latter part of October seems more plausible when taken in the context of past behavior.
This is the Britain I now live in: http://www.independent.co.uk/life-style/gadgets-and-tech/news/investigatory-powers-bill-act-snoopers-charter-browsing-history-what-does-it-mean-a7436251.html. I never used to be ashamed to be British.
[Combined capabilities of intelligence agencies] We know much about the combined powers of the intelligence agencies. We know what they are capable of, thanks to the leaks of Edward Snowden. The combined powers of the NSA, CIA and the UK’s GCHQ are capable of pulling off such a massive takeover of Wikileaks. We know the NSA works with other US intelligence agencies, we know that the NSA works with GCHQ.
We know about Tempora, we know about JTRIG, we know about PRISM, we know about HAVOK. We know that websites can be altered on the fly, we know that real-time voice profiling is trivial for these agencies. We know that censorship is happening.
https://usnewsghost.wordpress.com/2014/07/15/new-july-14-edward-snowden-nsa-leaks-gchq-attacks-and-censors-internet-nsa-leaks-recent/ http://www.independent.co.uk/life-style/gadgets-and-tech/gchqs-favourite-memes-and-sexual-slang-reveals-a-shared-culture-with-trolls-and-hackers-9608065.html https://en.wikipedia.org/wiki/Tempora https://en.wikipedia.org/wiki/PRISM_(surveillance_program)
The NSA has a remit to be 10 years ahead of the curve. We have commercial products that can be purchased off the shelf today that can easily manipulate audio and video. Just imagine what the NSA and the military are capable of.
Real time facial manipulation: https://www.youtube.com/watch?v=ohmajJTcpNk Signs of editing: https://www.youtube.com/watch?v=2O9t_TEE1aw. Both Julian Assange and John Pilger are not filmed together at any time during the interview. There is also no establishing shot. It is also claimed that Assange’s audio is spliced and edited. No recent events mentioned by Assange, only Pilger. Unfortunately, this interview is not sufficient proof of life.
What the NSA can’t do, is that they cannot break PGP encryption. This has been expressed by Glenn Greenwald who was one of the journalists that Edward Snowden leaked to. He commented that he knows how secure PGP is because the NSA keep moaning about not being able to crack it in their documents he is reading. This is another reason why a signed PGP message can be the only true proof that WL isn’t compromised. Mathematics cannot lie, people can and do. A compromised WL can’t sign a message without the private key. Edward Snowden revealed that in 2013 the NSA were capable of 3 trillion password attempts per second. As it is now almost 2017, that number will likely be multiple times higher (anywhere between 9 to 15 trillion attempts per second would be my guess based on Moore’s law).
https://en.wikipedia.org/wiki/Joint_Threat_Research_Intelligence_Group https://en.wikipedia.org/wiki/Tempora https://en.wikipedia.org/wiki/PRISM_(surveillance_program) https://www.schneier.com/gchq-catalog/ https://en.wikipedia.org/wiki/Government_Communications_Headquarters
[WikiLeaks down on October 17th] The alleged raid on the Embassy supposedly took place on the 17th just after 1am GMT. On Monday the 17th of October 2016 WikiLeaks website was reported down (http://www.isitdownrightnow.com/wikileaks.org.html expand the comments) https://postimg.org/image/6t68fe4kj/. The internet was alive with reports of mass censorship around this time. This all coincides with when the alleged WikiLeaks takeover occurred. It also coincides with John Kerry being in the UK.
[Christine Assange audio only radio interview] Julian's family had their identities changed quite a few years ago after receiving death threats. It is odd that his mother has now revealed herself to a news agency. If you do a YouTube search for Christine Assange (her original name), you'll find all the videos are older than 3 years. She's in hiding, not openly talking on radio shows (https://en.wikipedia.org/wiki/Julian_Assange scroll down to the personal life section).
[WikiLeaks bitcoin account was emptied on the 18th of November] Interestingly it was after the bitcoin account was emptied that the encoded message in the blockchain was left. Why would WikiLeaks go to all that trouble when they could just sign a message with their PGP key? Is it because bitcoin accounts can be cracked and the PGP keys can’t?
[Mass censorship] Facebook is censoring this event (https://www.facebook.com/events/309760466089922/). It has been advertised for weeks now any only a handful of people are attending. Recently Wikileaks was live on FB. 50% of the viewers (roughly 2.5k) were commenting #PoL, #Whereisassange, RIP etc. The live event was only a prerecorded video being played in loop. Once it concluded, the whole Live event along with all the comments including the comments asking for PoL and PGP signed message were deleted. It was as if it never took place. When Julian’s DMS had supposedly been activated, I saw posts in threads being deleted within minutes. Supposedly with encryption keys, but it all happened too fast for anyone to collate. I took PDF printouts of the pages and then later noticed that posts and entire links were taken down. I have PDF's of pages that now no longer exist. I've been following this since mid-October and seen the censorship first hand. I know many people here on reddit witnessed the same (please comment with your experiences).
[WikiLeaks reposting old stuff] There are many examples of this already mentioned in the timelines. One for example is the Palantir Technologies report. Palantir Technologies prepared a report on how to destroy WikiLeaks that was leaked in 2011. The proposal was submitted to Bank of America through its outside law firm, Hunton & Williams. Palantir later apologised for their involvement. But WikiLeaks has recently regurgitated it as if it was new. There are many examples of this. I have watched as WikiLeaks have increasingly destroyed their credibility.
submitted by neonnexus to conspiracy [link] [comments]

SMART GAMES - BASED ON TRON NETWORK

SMART GAMES - BASED ON TRON NETWORK
https://preview.redd.it/8ik8zjy186i31.png?width=711&format=png&auto=webp&s=8ed89c795ab5199dd47146e23521d16046cc743a
Except if you’re stowing away under the stone, I am certain you’d have known about Bitcoins and Blockchain. All things considered, they are the drifting and media’s preferred subjects nowadays the popular expressions of the year.
Indeed, even the individuals who’ve never mined a digital currency or see how it functions, are discussing it. I have more non-specialized companions than specialized ones. They have been pestering me for quite a long time to disclose this new popular expression to them.
I surmise there are thousands out there who feel the equivalent.
For what reason is the Smart-games stage unique?
In the following couple of years, Smart Games will pull in numerous players who currently use benefits that have not yet actualized the blockchain. They will be eager to change to Smart Games due to one exceptionally extraordinary bit of leeway it offers.
Each game played, paying little mind to the size of the wager, will compensate the client with a stage token. The quantity of tokens issued is constrained and not expose to expansion. When playing their preferred game, the stage customer will turn into a co-proprietor of Smart-games.
The more they play, the more tokens they will get. What they do with tokens is their decision: they can sell it on the trade or cause them to get profits that the undertaking will pay to every single token holder as per the extent of their proprietorship. This plan is made progressively alluring by the way that profits are paid not once in a year just like the case with offers, yet at regular intervals. All profits will be paid in TRON and sent to the client’s wallet. This cash can be pulled back quickly, used to pay for products and enterprises, or traded with fiat or other cryptographic money.
Smart-games make games and wagering significantly increasingly appealing gratitude to their one of a kind and easy to understand plan and incredible client support. Appreciate greater, increasingly incessant successes and get profits at regular intervals! This is the ideal spot for the individuals who need to play and win, yet additionally produce each day in the games showcase. Play without enrollment and store from your very own wallet and get a stage token for it.
Step by step instructions to play:
  1. Ensure you have entered your TRONLink wallet or other wallet that supports the TRON arrange. Ensure there is a TRX cryptographic money in your wallet that is basically utilized by the TRON organize. Enter the wager sum that you will play in the “Your wager” line.
  2. You have to modify the slider territory from 0 to 99, where your fortunate number may be. When you move the slider, your odds and winning rate will be balanced naturally.
  3. You can likewise pick “Move Under” or “Move Over”. at that point Click the “Move” catch to put down a wager.
  4. Affirm the worth exchange in your wallet. At that point the smart contract will arbitrarily produce a fortunate number from 0 to 99.
  5. On the off chance that the fortunate number is in the territory you pick – you WIN!
Every single Smart-Game exchanges are brought out through our smart contracts on the TRON organize. This guarantees everything is reasonable and reasonable, regardless of whether the client changes the underlying worth they need to utilize. In the event that SEED is changed, arbitrary SEED will be created to guarantee decency. RNG Principle: when a player dispatches a smart contract, SHA-256 arbitrary hash, current time stamp and past hash obstruct from CoinBase are produced. At that point they will all be combined to deliver irregular hashes. It will be blended with timestamps and hashes from the past square to produce arbitrary numbers if the client utilizes his own underlying worth.
Step by step instructions to get Dividends
To get stage profits, you should solidify your token in the “Profit” window. Profits are credited to your equalization on the stage in TRX cryptographic money consequently. Collections are made distinctly for tokens that are solidified toward the part of the arrangement.
Least token for solidifying = 1 NSG token. To stop, drop, or pull back a Dividend – clients must guarantee that they have at any rate 1 TRX in their wallet to pay for the exchange. Tokens that don’t stop can most recent 12 hours. Sans non NSGs don’t get profits. To add TRX to your wallet balance, you should tap the “Pull back” catch.
you can win these “smart tokens’ basically by playing games on their stage, so you procure in any case whether you win or lose! “that is astonishing!” YES, it is, what’s considerably all the more astounding is the way that the more tokens you possess the more offers you get, and the to a greater extent a true stage proprietor you become, the more you play, the more tokens you get. The more tokens you get the more portions of the stage you HOLD. The more offers that you HOLD the more profits you get !! when will you get these profits? hows at regular intervals sound to you? shouldn’t something be said about paid directly to your TRX wallet in TRX ? not sufficient? go eat cheddar at that point! (pardon my french) It’s fundamentally free cash now boys&girls.
On the off chance that you don’t care for having full control of your gaming stages and getting day by day salary in profits while having butt-heaps of fun! (pardon my french) this is the stage for you!
Befuddled? try not to be, simply look at their stage now and begin playing games! WHY??? since the measure of tokens you get from wagering is limited! which means they will run out, which means the cost will inevitably skyrocket and you don’t wanna be stuck on the ground when you can be on the moon.
Official Links
Platform link – : https://smart-games.io/
Social Platforms/Platform information Listed Below: WP: https://smart-games.io/whitepaper.pdf Twitter: https://twitter.com/smartgames_io Facebook: https://www.facebook.com/SmartGames.io/ Telegram: https://t.me/SmartGames_io
Author: mrcryptohunter https://bitcointalk.org/index.php?action=profile;u=2669197
trx wallet: TXJAJ8cuBM4yq5FceJ1VanSndt1r1HJSGQ
submitted by youngcrypt to u/youngcrypt [link] [comments]

12-30 21:33 - 'That's not true. The core has more features than electrum- it just requires use of the CLI. Honestly, you shouldn't be using multi-sig in the first place if you can't figure out how to generate an address using the CLI...' by /u/Nycmdthroaway removed from /r/Bitcoin within 43-53min

'''
That's not true. The core has more features than electrum- it just requires use of the CLI. Honestly, you shouldn't be using multi-sig in the first place if you can't figure out how to generate an address using the CLI.
Open up the debug window CLI tab, type `help' and you'll see how much you can do and the information you can ascertain with the core node that you can't with electrum.
Electrum relies on the core node for all of its functionality, save their proprietary mnemonic seed backup algorithm, which is much less secure than BIP33 (which can be generated with the core; electrum literally provides you with the dictionary to carry out an attack on its addresses, and it doesn't use an EC in its cryptographic process, meaning the encryption entropy is low and the nonces are predictable).
I could order some RIPEMD-160 ASIC chips for $2/piece and have a Chinese fabricator design a PCB using some cheap 22nm SHA-256 chips and the RIPEMD chips, replace cgminer or bfgminer's computational sections with the ultra optimized vanitygen algos for brute forcing priv keys, switch out stratum for JTR-style threaded rainbow tables based on a few hundred thousand rounds of mnemonic generation using electrum's suite- along with some open source code analysis, and in a month I could create a machine that could generate and test hundreds of thousands to millions of mnemonics per second.
The only reason this hasn't been an active practice is because destroying bitcoins keypair-cryptography (or at least appearing to have done so) would send the price under a dollar in 24hours. An update would be patched within a few days and it should be a lot of hard work for nothing. But I wouldn't be surprised if this is occurring actively on a small scale, with old addresses presumed to be "lost." Even if an active address was hit, as long as it wasn't overdone, people would shrug it off as a physical compromise of their own network/machine/software, not an epidemic- but considering the frequency of exchanges getting "hacked" and the actual ease by which the attack could be carried out, I think there's an equal possibility that the security is already completely compromised.
Theoretically all mnemonic backups are inherently insecure (as is any password using dictionary words, no matter how long) but at least using ECDHE and a deterministic seed, you're actually getting a password with a strength equal to that of the sum of its characters as ASCI to BASE/56 encoded bits. Without that, you may as well have a 12 character passphrase (with the possible characters equal to the number of words in the abridged electrum dictionary.) So it's {POSSIBLE WORDS}12 for electrum vs. something closer to {(POSSIBLE WORDS60)(POSSIBLE HD-SEEDS)}256 for a BIP33 mnemonic using SecP256k ECDHE algo (assuming average number of letters in a word are 5 and HD seeds are pseudo-random.) But mnemonic seeds are still insecure even with BIP33. Use the core wallet and you get a key with true randomness using entropy from blockchain derived sources, 2 rounds of SHA-256 and a final RIPEMD-160 round with a 256-Bit secret generated in conjunction with with an extremely secure ECDHE curve=trillions upon trillions of possibilities. That not only makes a single key harder to break, it means there is a much less likely chance of someone randomly guessing secrets and testing them to see if they come out to a funded address in the whole scheme of things.
It's like if I tried to break into every Dell server. If many people were using weak passwords, and I could try a password on all of them at the same time- I'd surely crack a bunch, and make Dell look bad as a company, even though the servers were inherently fine. Keeping the network strong means making sure you do your part to save face, after all bitcoin is owned and CONTROLLED by the userbase.
As a side note, RIPEMD was only used in the public scheme along with SHA256 (despite being significantly weaker) because at the time SHA256 was the only widely implemented and highly secure algorithm- meaning it could be as widely adopted and widely mined as possible. So SHA-256 was the logical choice for the main block algorithm. There wasn't another option for the wallet address' scheme that would be secure tunneling enough and still computationally feasible and easy to integrate. So SHA-256 was most secure, but without the round of RIPEMD-160 as the deterministic round, wallets could be brute forced at the same time as mining, with the same hardware.
For the most secure, fool-proof, uncrackable wallet, here's what I do/used to do: Use the Core node to bake Segwit P2SH addresses. I don't use HD wallets period, but HD is secure enough as long as you're using a truly random secret. Remember that the secret in a BIP33 HD wallet is the master privkey, additionally, each address has it's own xpriv, which, considering the combinations possible, saving the individual xprivs makes the most sense anyway. If you plan on spending the coins soon, just secure the wallet .dat file with a strong 16+ character (A-Z,a-z,()$&@#$/?¿%÷,0-9) passphrase (this is just the wallet file pw it has nothing to do with your addresses) then just throw the wallet on a flash drive or better yet an SD card or 2 and call it a day.
For addresses you plan to put on ice for a while, concat your coins into a handful of accounts, don't store more than $1,000/address. Then using the `dumpprivkey' Core CLI command (I think that's the command, it's something like that, type help and you'll see it if I'm wrong), a text encrypting program (for good measure) and a barcode/QR code generator (all offline!), get the private keys for each address, encrypt the text with an easy to remember password (you'll be taking the keys offline, and storing physically, so no need to worry too much about that pass, it's better to just keep them physically safe), and then generate QR codes for each. Paste them all into a word doc with the corresponding (lightly) encrypted numbers you generated the QRs with. Print out a couple copies and then delete the addresses from the wallet.
Put those paper wallets somewhere safe. You could also split the key down the middle and store the 2 parts of the paper wallets in different places instead of encrypting the plaintext xprivs. So you'd need to scan both paper keys and paste the solutions together to access the coins.
That's all a bit extreme... in reality, unless you're super paranoid and storing millions, you'll be fine by keeping your coins in the core node with decent firewall and a good .dat passphrase.
BUT ELECTRUM IS NO GOOD!
'''
Context Link
Go1dfish undelete link
unreddit undelete link
Author: Nycmdthroaway
submitted by removalbot to removalbot [link] [comments]

Changelog 4.2.6 (18 Dec 2017)

Version 4.2.6
Version 4.2.5
Version 4.2.4
Version 4.2.3
Version 4.2.2
Version 4.2.1
Version 4.2
Version 4.1.2
Version 4.1.1
Version 4.1
IMPORTANT: CcMiner 2.2.2 requires nVidia Drivers 384.xx or later for Cuda9 support.
Version 4.0.7
Version 4.0.6
Version 4.0.5
Version 4.0.4
Version 4.0.3
Version 4.0.2
Version 4.0.1
Version 4.0
submitted by exigesDB to AwesomeMiner [link] [comments]

**Why I Am Mining Dogecoin**

I began seriously mining Dogecoin yesterday. I spent the last several days assembling and configuring a computer for this (among other uses). I developed a strong interest in digital currency in the last month, and have been gently wading into this exciting new world that we are all building together. I have a wife, children, and a day job, and have had an unsuccessful time explaining why I'm so interested in this, and why altcoins and Bitcoin are not a pyramid scam, a joke, etc.
Here, I hope to explain my personal reasons for choosing to spend time and money in Dogecoin mining, since it may be useful to others coming into digital currencies, as they are gaining more and more press and publicity lately with many articles in the mainstream press on Bitcoin, Coinye, etc.
Only a month ago, I began to notice that Bitcoin was really being mentioned a lot in the media. I had known about it for several years, but had assumed it would just go away. It never made sense to me (it does now!), but I didn't spend much time thinking about it. I figured, "after all, there's nothing backing it", and left it at that. Obviously, I knew nothing about currencies or monetary systems at the time, and neglected the fact that nothing tangible backs a USD either.
After hearing about the Dread Pirate Roberts / Silk Road bust, I was surprised to learn that Bitcoin was alive and had grown to such an impressive value (it was around $1,000 USD per 1 BTC at the time, as I recall). Later, I heard a longer story about Bitcoin on the radio (on NPR, I believe), and was further surprised that several legitimate, real-life businesses had started to accept Bitcoins. Now, I was hooked, and needed to learn more. By the end of December, I'd read enough about Bitcoin to know I wanted to participate, but wasn't comfortable speculating in it with real money.
I knew it wasn't going to be profitable, but in early January, I spent about $40 on a USB ASIC "Block Erupter" for Bitcoin mining. This runs at 334 MH/s (using Bitcoin's SHA-256 algorithm, not Dogecoin's scrypt algorithm). This has been sufficient to generate approximately $0.75 worth of Bitcoins over the last 2 weeks that I've been running it. It gave me something to play with, but was pathetic compared to what the professional miners were doing (measured in TH/s, tens of thousands of times faster than my capability). Reaching their levels required more specialized ASIC hardware (not just a single USB key-sized device).
The higher performing Bitcoin mining hardware was all backordered or available only from relatively unestablished companies that I would not want to send thousands of dollars for. Furthermore, the hardware seems to only really be usable for Bitcoin mining; it had no other obvious utility.
BUT, through cryptsy it was easily possible to convert other altcoins into BTC or vice-versa. Litecoin, Dogecoin, and others were mentioned in several mainstream news articles. Dogecoin was treated as a joke and novelty. However, on looking into it, along with several other altcoins, I decided it was more than serious.
Dogecoin:
Few or no other altcoins seemed to have all these properties to the same degree as Dogecoin. I started CPU-mining it immediately, lacking any GPU hardware in my house (I am not a gamer).
Even the modest CPU power in my home PCs (used for web surfing, primarily) was able to generate a little less than 1,000 DOGE per day (which was roughly $0.25 - $0.30 at the time). Not super-impressive, but enough to play with and check out the rest of the Dogecoin universe.
I became hooked. I decided that not only was this a fun thing to play with, but it was also potentially a very good investment. Not having much spare cash, not having a high risk tolerance, and not having any desire in being a "speculator", I decided that rather than convert USD to Dogecoin, I would build a more capable mining computer. I will share more details on this later, if there is interest.
Dogecoin mining on GPUs and CPUs is easy, and the cost of building a machine for this is very reasonable, considering that the machine has many other uses, including:
This is vastly superior to me, compared to investing the same amount of money in Bitcoin hardware, which is useless for anything else. Rather than speculating in Bitcoins, I decided there was no risk at all in building a computer with high-powered GPUs that would be useful for Dogecoin's scrypt-based altcoin mining, since even if it never made economic sense, I could use the system for many other things.
I had not built a PC in over 10 years, and would up spending about $2000. Since yesterday night, I am now mining Dogecoin at a consistent rate of 1.2 MH/s (my hardware can go to 1.6 MH/s, but the temperatures did not seem healthy to me, so I slowed it down while I study them).
This is extremely fun, and I'm proud to be contributing to the Dogecoin ecosystem.
submitted by wes_doge to dogecoin [link] [comments]

Need help with block eruptors

I can't get my new block eruptors to work. I followed this guide, https://bitcointalk.org/index.php?topic=220450.0 And it doesn't work. The eruptors are the new 3.0 version ones. I am using cgminer 3.7.2 I am running windows 7
What am I doing wrong?
I know bitcoin mining isn't profitable, I wanted to try and mine an sha-256 alt coin
submitted by howardrya to BitcoinMining [link] [comments]

Things I've learned in my first 3 days of mining

These are just a couple of the discoveries I've made in my first couple days of mining. Most of these will be things that are likely obvious to experienced miners, but can cause some confusion for new shibes like myself. So maybe someone else will be able to benefit from my mistakes.
I'm happy to say I've just seen my first hundred Doge from mining, and I'm excited to see how far I can go (to the moon?). I'm sure I'm still mistaken about lots of things, and if I missed anything here, let me know.
submitted by tragicmuffin to dogemining [link] [comments]

What is a Bitcoin hash and SHA-256 - YouTube HashFlare how to setup pools on SHA-256 mine Bitcoins. What is SHA256?  Bitcoin mining using Raspberry Pi Hashflare SHA 256 EARN BITCOINS EASILY Zcash Bitcoin SHA-256 Mining, changed the Mining setup 2, s2's Antminer

Bitcoin Miner is a software for bitcoin mining for the windows platform that gives your computer the ability to make some money for you. Considering that bitcoins can be exchanged for cash, the software is a great choice for those who want to generate money at work and home. P2Pool for Mac OS X. Details. Rating: 3.7/5. Price: Free. Download. P2Pool is a software for bitcoin mining available to ... Bitcoin mining. Antminer S19 PRO; Antminer S17 & S17 PRO; Antminer S9; Dash miner; Zcash miner. ASICminer Zeon 180 ksol/s; Antminer Z11 135ksol/s; Scrypt miner . Antminer L3+ Grin mining. Obelisk GRN1 Mini 70.00 h/s; Innosilicon G32-500 100.00 h/s; Innosilicon G32-1800 328.00 h/s; Obelisk GRN1 420.00 h/s; Ethash Miner; Sia miner. Obelisk SC1 SLIM 550 GH/s; Obelisk SC1, Gen 2 Dual Board 1.1 TH ... The miner is intended for mining Scrypt and SHA-256 crypto currencies and the biggest advantage is the support for many ASIC miners, though most of these are still for Bitcoin mining and not for Scrypt. If used for Gridseed ASIC mining the advantage here is that you don’t need to replace the virtual USB to COM drivers with WinUSB or to send as parameters the COM ports for the ASIC devices to ... Litecoin is an early-stage altcoin developed by a former Google Engineer, Charlie Lee in October 2011. Lee wanted to create a cryptocurrency faster than Bitcoin and easily accessible, with the aim to process block in every two and a half minutes compared to ten minutes of bitcoin. (Source: Bitinfocharts) Currently, hashrate… Bitcoin SV mining calculator for SHA-256: Price 159.25$, 272.3419G difficulty, 2.0739 EH/s network hashrate, 6.2524 BSV block reward. Bitcoin SV mining pools list and list of best mining software.

[index] [33253] [7214] [28856] [29596] [16908] [13569] [31743] [48187] [9405] [35963]

What is a Bitcoin hash and SHA-256 - YouTube

What is SHA256? Bitcoin Mining using Raspberry Pi explains to you about bitcoin mining from its very basics. Initially, you will learn about all the different terminologies associated with the ... Mine Bitcoin, Ethereum and other crypto with HashFlare - https://goo.gl/Tm9waV Use code - cElIM5 - and get 3% off every purchase on GM. https://www.genesis-m... Have changed the Bitcoin Mining over to 2,s2's from s1,s. Zcash Bitcoin SHA-256 Mining, changed the Mining setup 2, s2's Antminer Welcome back to cursed mining, and today it is time to expand the #USB #mining farm with #Gekkoscience 2PACs. CGMINER WITH DRIVER (from bitshopper.de) http:/... This is a BFL 50 Gh/s mining rig mining sha-256 algorithm crypto coins. Stable at ~ 55 Gh/s using MinePeon on a Raspberry Pi.

#