Ultimate glossary of crypto currency terms, acronyms and abbreviations
Edit: Currently writing a new version of this, dont know when it will be done. Edit: Since first post I have updated a few sections with additional information. I recommend reading it all even if it is very long, I might have placed some relevant info in different sections while thinking about what else needed to be added, plenty of steps remains mostly the same except when I comment directly on it. It is not necessary to do 100% security all the time, unless you absolutely need it, combining some high and some lower security ideas for a balance of security and convenience is useful. I will base this mostly on Windows, Linux users probably know this, and I have no idea how apple machines work (tho many things in here are still relevant for other operating systems, as they are just general tips) Disclaimer: There are certainly other steps that can make you more anonymous or safer, however I think for most people this will surfice. Any software I recommend should be independently verified for security, and examples of software are not to be taken as endorsements. I simply use examples and give recommendations when I believe it necessary, or helpful. I will not really differentiate between anonymity and security, they are often the same thing. As such the word security can mean either more anonymous, less vulnerable, or both. -------- Everyday Simple Info Sec:
Password for the device is an obvious one (8+ characters minimum, best if over +12), if there is sensitive information on any of the drives, either encrypt the entire drive or just the sensitive files, and make encrypted backups on a different memory storage device (There many programs to encrypt files and drives I'm sure a search will figure it out)
-There could be a hidden administrator user on your PC, make sure to change its password
Always use the device on a non admin account
a VPN that doesn't log (use with kill switch on, should be enough for everyday stuff, more safe stuff in the high security section) (VPNs that claim they don't log sometimes do, it's bad, but I would like to point out that not using a VPN will always expose your traffic to your ISP and also remove additional encryption. Even if the VPN tracks, there is no downside because your ISP would track anyways, and VPNs can be more anonymous, and also add extra encryption)
disable location tracking (preferably make all your privacy setting to release minimal info, get rid or cortana, change privacy settings in all of your accounts as well, there's no reason why you should allow Facebook to give you target ads. Use the setting they give you.
TOR, Firefox or similar browser, stay the fuck away from Google Chrome.
your preferred search engine should be duckduckgo (other privacy focused search engines exist as well)
use an adblocker that also prevents the adding of tacking cookies
Use pgp with all your friends or messaging services that implemented end to end encryption (Implemented services can still be bypassed, but are way more convenient so for everyday use they should suffice, some examples should be Telegraph, Signal, WhatsApp etc) (more info on pgp in high security section)
(Snapchat msgs, reddit dms, discord msgs, are just a few examples of msgs that are never encrypted) -Any info even send in encrypted msgs (and obviously non encrypted) should still be kept with possible deniability, don't say "I'm gonna do MDMA", say "I'm going out with molly."
use software (like ccleaner) that purges cookies and other data after every use, before shutting down your device
use a virus scanner daily (I like spy bot Search and destroy, many other options also exist)
never use the same password/passphrase twice (I will address what passphrase are below) (Better yet use randomized passwords that are stored in a master key chain, make them as long as possible (tho it is okay to go with the minimum of 12 never go below 7, I recommend 15+ depending on how often you have to manually enter the password instead of copying/pasting it) Don't generate too long keys for things you need to access regularly without copy/paste, except your master key ring)
its ideal to never use the same email or username as well, especially username, email is obviously tricky and also very annoying, but it would be best to always change the email.
-DO NOT STORE ANY PASSWORDS ON GOOGLE, IF GOOGLE LOGIN IS AUTHENTICATED IT WILL AUTFILL ALL PASSWORDS IT HAS SAVED (same with other similar services) (This means if you are logged in to chrome and someone has access to your machine, they can auto fill passwords without entering a single password) -use a rememberable passphrase, especially for your master key ring aka password manager A long sentence that is memorable makes an okay password (decent example,: "I met my wife at Little Ceasers for the first time on 07/09/20" better even if it's just something you know, if its impersonal, and if you can add special characters or numbers that you won't forget) (A better example for a passphrase is: "There is 0nly 0ne letter that d0esn’t appear in any U.S. state nameQ")
for your main password manager(key ring), I highly recommend Keepass 2, make backups of the file save to separate devices and drives (Flash drives, phone, PC, laptop, etc, if you loose that file, you lose all of your passwords) (Other good password managers exist as well, I don't recommend online password managers as you lose the control over passwords)
-Purge your internet activity frequently, there's a reason why I only have one post, and a few comments appearing in my account, but thousands of kama. Exposing information needlessly is not good. -Never post private information publicly, and if you do, do it vaguely as possible. (Example: Not "I'm 15", say "I'm a teenager") Do not post any vital information ever, no birthdays, mother's maiden name, age, or anything you have ever seen in a security question. Never post your current activities while they are ongoing. You going on a vacation? Don't announce it to the world, taking picture there? Post them when you are home.
Any account that is supposed to remain anonymous and as secure as possible should only be used on secured devices. A unsecured device can link you to the account.
always shutdown your machine when leaving it (To prevent access, and to prevent a possible attack vector)
2 factor factor authentication is not great anymore. Unless you can do it over a anonymous source. A cell phone is usually directly connected to you, so it is not a anonymous device. There might still be secure/anonymous 2 factor authentication methods that won't expose you, for example over a secure email. (If there is 2FA that doesn't need a device that removes anonymity and is secure, use it.) (Please don't misunderstand, 2FA is great, however it can remove the anonymity that you worked hard to establish)
-Rethink how you do security questions. Many answers to security questions can be found in your internet history. One could use the first word of the security question as an answer, or a different sceme that will mean you always remember it. (Security question need to go, the amount of personal info an average person puts on the internet makes it easy to attack anything using security question) -------_ High level crimimal information security: The motto here is, "All the Security, All the Time" As one fuck up can end with you leaving a lick of traceability, and you could be fucked. Pre Note: All of your software should always be up to date. Also even perfect info sec does not guarantee you are completely safe, a new zero day (exploit) can still fuck you, but good info security makes you significantly safer, by eliminating as many attacks as possible. -Get a new device (or make a already owned device seem like you never owned it, do this only if you know how to, there's a lot of stuff that goes into that, like changing your mac adress etc) buy with cash, and your face covered, preferably far away from where you live. (Do I need to specify to not bring your phone or anything else that tracks your location to anywhere you want to go anonymously?) (Be aware that even hardware can have vulnerabilities, many cpus have known vulnerabilities, I can't list them all, do some research before buying)
Do not EVER use a high security device at any lower level of security. There are unique identifiers to your device, exposing them once can expose you for everything you do.
-If you know how to use Tails (A linux distro designed for Info sec) use that, preferably on a USB. (Or learn how to use tails, its better, but complicated) Otherwise a clean copy of windows (make sure its not in any way associated with you) can do the job too, tho not as well. (Using a VM might give extra security, since VMs usually erase all data and RAM they were using on shutdown) -Get a non tracking VPN, Enable the kill switch (a setting that disables all traffic that doesn't go through the VPN) (change your firewall settings to only allow the traffic from the VPN, windows guide (Change settings so only traffic from the tor application is send) Edit: (Due to complaints: do not use vpn over tor, use tor over vpn. tor over vpn has no notable downside, if the VPN logs it makes no difference, your ISP will always log anyways, and vpns remove other attack vectors and also provide backup security should tor fail. Again even if the VPN tracks you only change the people doing the tracking, but now you are further removed making it more anonymous and also with less vulnerabilities) -rember privacy settings, cookie cleaner, and antivirus, password (There could be a hidden administrator user on your PC, make sure to change its password) -Always use the device on a non admin account
-Ideally use this device only on networks that are not connected with you. Such as public networks (try to never use the same public networks twice, move around) (a home network should be fine now, as it should never be exposed, but more security is always better) (Its just a conveniences vs security trade) -Never use accounts that have been exposed to lower security on higher security machines -your browser is now TOR (or your preferred security focused browser, if you dont plan on using onion ) Make sure you get the standalone version of tor not the addon build (the standalone is safer, because there are less settings and options to tweak) -Change your tor settings, to safest mode, enable a bridge (to my knowledge there's no difference in security between the build in bridges in tor), enable automatic updates, set duckduckgo onion as your primary browser. Set dark.fail onion page as your home page. (Or your preferred privacy search engine and onion directory)
set up a new pgp (can't use the same one you use for regular use, again less safer accounts are never used on safer devices) Cleopatra is my choice, its simple to use. Make sure you back up the private key multiple times, on safe devices. (Dont let the private key fall into anyone's hands) Give it a generic name like "HighSecurityPGP" do not give the pgp key pair a name that could identify you. (No initials etc) (Some pgp key pair programs want an associated email for a key pair, you can create a safe email, or which I recoend you can use a different program (like Cleopatra) (Feds & LEOs are known to copy private keys if they have your machine, so you will need to set up a new key pair if they ever take a device with a private key copy)
a high security machine that facilitates criminal activity can not use many programs. Many programs collect your devices mac adress, which is a unique identifier, amongst other things. It's should be used only for the activity you want to do.
-------_ How to use dark net markets (DNMs) If you finished your High Security setup, we can dive right in. Otherwise go do that. This is where all that is essential. Quick info on Tor, and onion sites. There is no search engine. It's all based of directories and addresses you are given by others. Tor will likely not be very quick, it has to pass through multiple networks to get to the destination. DNMs sometimes exit scam, an exit scam is when a market shuts down completely and takes all the money, this is a risk when using DNMs, it's not too common but happens maybe 0-4 times a year. The admins of thoese servers need to get out at some point, before they get jailed, so they exit the game, and scam everyone out of their money. -A very useful onion directory is dark.fail it has a lot of links, for all kinds of stuff. News, email, DNMs, Psychonautwiki (harm reduction website), forums etc. (Other directories also exist) -Pick a market, preferably one that handles secure connection server side instead of requiring you to establish the secure connection. Then create an account. Your account once created should include an entry box in your profile for a pgp key, post your PUBLIC key in there. (Verify the link is not a scam, most markets should provide a pgp signature) -Next is currency setup. All major cryptocurrency exchangers can be used, I can recommend coin base but there could be better ones out there. Unless you find a small non U.S., exchange, they will always ask for your identity. So unless you can find a trustworthy exchange that doesn't ID, you will need to give it to them. (Side note, all major crypto exchangers report to the IRS, if the IRS asks you if you bought cryptocurrency and you bought while having IDed yourself SAY YES, DO NOT COMMIT TAX FRAUD WHEN THEY KNOW YOU DID)
I recommend using Monero, it's hard to track, so it makes your job a lot easier. (If you use bitcoin you should run it through a scrambler, because BTC is tracable to anyone who knows what they are doing)
-Transfer (monero you can send directly, btc you should scramble) to your wallet. There are two options a cold wallet (physical) or a software wallet. Software wallets usually dont cost anything so I recommend them, even if often less safe. Electrum is easy to use, and pretty safe. You can also do your own research and find a wallet that fits your needs.
decide where you want to ship it. You can send to your home, to a PO box, to a PO box that you opened with a fake ID (I don't recommend), an abandoned house, general mail (sending to a post office instead of a street adress) pickup up with fake ID, use a remailing service. These are some options, sending it to your own home, isn't ideal, but its pretty much the only easy way.
-now you are ready to buy, only buy using escrow (it means the money is held by the market as a middle man until the product is delivered, they will also handle any issues like wrong quantity, cuts, etc), judge the reviews for a product, and if available look at the history of the vendor, until you find a product from a vendor you trust. (I recommend to buy within your country as much as possible, so it doesn't go through customs, it's very rare that something is found, but it can happen) -now you get to buy, depending on market, you either have cryptocurrency stored in their wallets (not recommend, you will lose it in an exit scam) or you can send it every order. When you send your delivery adress (or the one you want it to go to) encrypt the adress using the sellers public key. Make sure the adress is correct. -wait for the product, make sure to extend the escrow until the product arrives, if you can't extend it anymore dispute the order, and a moderator will step in -test the product, use it, and leave a review. PLEASE LEAVE A REVIEW, DNMs only work because of reviews. Edit: Didn't imagine I would write over 15000 words. Oh well, it was fun. Hope it helps, if you have any questions feel free to ask. No idea how long this will stay up, I might purge it in 7 days, or never.
The ‘Trilemma’ of Blockchain space - Scalability, Security, and Decentralization - are the three things every blockchain is trying to solve simultaneously. But it’s easier said than done, as proven by the scalability issue faced by Ethereum. Higher scalability transcends to higher market adoption. This is where Cardano and Algorand have come into the picture. They have their similarities and differences that seem to work for them for now. Rather than telling you which one has more potential, it’s better to present the entire case and let you decide how they fare against each other.
Star Player of the Team
Anyone would agree that having a renowned and accomplished team player always gives a boost to the project.
Cardano’s Charles Hoskinson
If the name seems familiar, that’s because he is also the co-founder of Ethereum. A tech entrepreneur and mathematician with an interest in analytic number theory, Charles Hoskinson moved into blockchain space in 2013. He co-developed the Ethereum blockchain with Vitalik Buterin before leaving the project in June 2014. Hoskinson joined crypto and blockchain research firm IOHK to develop Cardano and since then has sponsored various blockchain research labs at the Tokyo Institute of Technology and the University of Edinburgh. He also founded Invictus Innovations. Hoskinson was the founding chairman of the education committee of the Bitcoin Foundation and established the Cryptocurrency Research Group in 2013. His current focus lies in educating people on the use of crypto and decentralization.
Algorand’s Silvio Micali
Unlike the innovators of other blockchain projects, Silvio Micali is already a famous name in cryptography long before he started developing Algorand. Deemed as one of the top cryptographers, he is a recipient of the prestigious Turing Award in 2012 and RSA prize for cryptography, Gödel Prize (theoretical computer science) in 1993, and ACM fellowship in 2017. Micali’s work spans around public-key cryptosystems, pseudorandom functions, digital signatures, oblivious transfer, and secure multi-party computation among others. In 1989, he co-invented Zero-Knowledge Proofs with Shafi Goldwasser and Charles Rackoff. He also developed Peppercoin, a cryptographic system for processing micropayments. A professor at MIT’s electrical engineering and computer science department since 1983, Silvio Micali is also working as a computer scientist at MIT Computer Science and Artificial Intelligence Laboratory. His doctoral students include Shai Halevi, Mihir Bellare, Rafail Ostrovsky, Bonnie Berger, Rafael Pass, Chris Peikert, and Phillip Rogaway - each renowned in their respective fields.
Project Partners and Collaborators
For any business, partnerships and collaborations are the most important aspect since they drive growth and innovation.
Cardano has formed 17 partnerships so far that either enhance its capabilities or grow its business.
Metaps Plus: To integrate the ADA coins into the MeTaps Plus, South Korea’s one of the largest mobile payment platforms.
IBM Research: For a software distribution project commissioned by the European Union.
PriceWaterhouseCoopers (PwC): To develop a new commercial strategy, probably to bring enterprise users to Cardano.
New Balance: All customers can authenticate the footwear purchases on the Cardano blockchain.
SIRIN LABS: To integrate the Cardano blockchain in their blockchain smartphone FINNEY and its SIRIN OS.
Konfidio: To drive the adoption of the blockchain business model platform among corporations and governments.
Algoz: To offer liquidity solutions and trading solutions for its native ADA token.
Priviledge: To study and publish decentralized software updates Priviledge is a consortium of renowned companies and scientific universities with the European Union.
South Korea Government-Approved Trade Associations:Signed two MoUs with Korea Mobile Game Association (KMGA) and Korea Blockchain Contents Association (KBCCA) to implement Cardano for Korean mobile gaming and digital content.
Ethiopian Government: To develop a new digital payment system and combine it with identity cards using its Atala blockchain framework.
Georgian Government: Signed MoU to implement Cardano blockchain-enabled projects across education, business, and government services.
Cardano’s other major partnership includes Z/Yen Group’s Distributed Futures practice, COTI Network, and Ellipal Hardware.
Algorand’s innovativeness and potential to be the blockchain leader has helped it bag a plethora of valuable partnerships across the world. Here are a few partnerships out of the 17 -
International Blockchain Monetary Reserve (IBMR): To launch the Southeast Asia Microfinance Platform and create a stablecoin called Asia Reserve Currency Coin (ARCC) to encourage financial inclusion in Southeast Asia.
SFB Technologies: To build the infrastructure to create a CBDC (central bank digital currency) dubbed ‘SOV’ for the Marshall Islands.
Meld: To tokenize gold and track it over the supply chain using stablecoin for the Australian gold industry.
Caratan: To build financial tools and products to promote Fintech adoption at an institutional level.
Italian Society of Authors and Publishers (SIAE): To develop copyright management tools and services.
DUST Identity: To authenticate physical objects and validate transactions over the blockchain.
AssetBlock: A real estate startup launched its tokenized property investment platform on Algorand
PlanetWatch: Focused on environmental monitoring, the first "CERN Spin-off " labeled organization is building the world's first immutable air quality ledger on the Algorand blockchain using IoT technologies.
Other major partnerships include World Chess - the commercial arm of the World Chess Federation, Big Data company Syncsort, and Tether.
Both Cardano and Algorand use PoS or Proof of Stake consensus mechanism at their heart, but that’s where the similarity ends. Each of them has its own spin to it. In the PoS mechanism, a person can validate a block depending on how many stakes or coins he holds. The stake quantity determines the amount of mining power one has. So how does each of them differ?
Cardano’s version is called Ouroboros PoS.
Cardano allows stakeholders to pool their resources together in a single ‘stake pool’, thus delegating their stakes to the pool. This is because every elected stakeholder may not have the expertise to create blocks.
The physical timeline is divided into small blocks called ‘epochs’ that are made up of fixed slots. These epochs are cyclic.
Each such epoch consists of a set of pooled stakeholders.
While the endorsers are elected depending on the weight of the number of stakes held by them, a slot leader (for every epoch) is randomly chosen by a digital coin toss among stakeholders. When the endorsers approve the blocks produced by slot leaders, it gets added to the blockchain.
The slot leader also selects the slot leader for the next epoch through the ‘coin toss’.
Note that having a higher stake increases the probability of getting elected.
Currently, the list of validators is fixed and the succession is known beforehand.
With the launch of the Shelley mainnet, Cardano plans to remove the above issue. But this will be a hard fork. Here, the community will decide on block validators through staking.
The version Algorand uses is called PPoS (Pure Proof of Stake) consensus mechanism.
PPoS randomly selects a token holder as a block producer.
The proposed block gets approved by a committee of 1000 randomly selected token owners and then added to the blockchain.
The algorithm runs a cryptographically verifiable lucky draw over all the accounts to randomly select committee members as well as the block proposer.
This means the identities of the participants are unknown until the blocks are added to the chain.
This selection does not depend on the stake size of the nodes at all.
PPoS runs this lottery process in complete isolation with other nodes in the network.
The completely randomized election and secret identities of the committee members drastically reduce the chances of any foul playing within the network. As the number of users grows, the network gets stronger and more secure. Algorand’s PPoS has embraced a more egalitarian ecosystem to negate the wealth gap present in traditional PoS.
Currently, Cardano offers 50-250 TPS. But with incorporating sharding technology in its Ouroboros Hydra version, the scalability can increase to one million TPS theoretically. The processing speed will increase as more users or nodes join the network.
In Algorand, every lottery takes just a microsecond to run. Since such lotteries run independently of each other, multiple lotteries can run simultaneously. This inherently makes PPoS highly scalable. The mainnet itself has the capability to handle 1000 TPS.
Both Cardano and Algorand have sound tech and teams that believe in extensive research and meticulously designed products. Having an early start, there’s no denying that Cardano has established itself in a superior position thanks to the technological achievement, consistency, and transparency it has showcased. But with Algorand’s ecosystem growing fast, the competition has intensified. Algorand’s aim to bring full transparency, technological innovation, and successful partnerships just within a year have made it a prime challenger to Cardano. While referring to Algorand, Cardano chief Hoskinson voiced similar opinion - “... they are another one of the science coins and we all kind of support each other. Even though we get academically competitive, we're able to reference each other's work and learn from each other and grow from each other.”
﷽ The Federal Reserve and the United States government are pumping extreme amounts of money into the economy, already totaling over $484 billion. They are doing so because it already had a goal to inflate the United States Dollar (USD) so that the market can continue to all-time highs. It has always had this goal. They do not care how much inflation goes up by now as we are going into a depression with the potential to totally crash the US economy forever. They believe the only way to save the market from going to zero or negative values is to inflate it so much that it cannot possibly crash that low. Even if the market does not dip that low, inflation serves the interest of powerful people. The impending crash of the stock market has ramifications for Bitcoin, as, though there is no direct ongoing-correlation between the two, major movements in traditional markets will necessarily affect Bitcoin. According to the Blockchain Center’s Cryptocurrency Correlation Tool, Bitcoin is not correlated with the stock market. However, when major market movements occur, they send ripples throughout the financial ecosystem which necessary affect even ordinarily uncorrelated assets. Therefore, Bitcoin will reach X price on X date after crashing to a price of X by X date.
Stock Market Crash
The Federal Reserve has caused some serious consternation with their release of ridiculous amounts of money in an attempt to buoy the economy. At face value, it does not seem to have any rationale or logic behind it other than keeping the economy afloat long enough for individuals to profit financially and politically. However, there is an underlying basis to what is going on which is important to understand in order to profit financially. All markets are functionally price probing systems. They constantly undergo a price-discovery process. In a fiat system, money is an illusory and a fundamentally synthetic instrument with no intrinsic value – similar to Bitcoin. The primary difference between Bitcoin is the underlying technology which provides a slew of benefits that fiat does not. Fiat, however, has an advantage in being able to have the support of powerful nation-states which can use their might to insure the currency’s prosperity. Traditional stock markets are composed of indices (pl. of index). Indices are non-trading market instruments which are essentially summaries of business values which comprise them. They are continuously recalculated throughout a trading day, and sometimes reflected through tradable instruments such as Exchange Traded Funds or Futures. Indices are weighted by market capitalizations of various businesses. Price theory essentially states that when a market fails to take out a new low in a given range, it will have an objective to take out the high. When a market fails to take out a new high, it has an objective to make a new low. This is why price-time charts go up and down, as it does this on a second-by-second, minute-by-minute, day-by-day, and even century-by-century basis. Therefore, market indices will always return to some type of bull market as, once a true low is formed, the market will have a price objective to take out a new high outside of its’ given range – which is an all-time high. Instruments can only functionally fall to zero, whereas they can grow infinitely. So, why inflate the economy so much? Deflation is disastrous for central banks and markets as it raises the possibility of producing an overall price objective of zero or negative values. Therefore, under a fractional reserve system with a fiat currency managed by a central bank – the goal of the central bank is to depreciate the currency. The dollar is manipulated constantly with the intention of depreciating its’ value. Central banks have a goal of continued inflated fiat values. They tend to ordinarily contain it at less than ten percent (10%) per annum in order for the psyche of the general populace to slowly adjust price increases. As such, the markets are divorced from any other logic. Economic policy is the maintenance of human egos, not catering to fundamental analysis. Gross Domestic Product (GDP) growth is well-known not to be a measure of actual growth or output. It is a measure of increase in dollars processed. Banks seek to produce raising numbers which make society feel like it is growing economically, making people optimistic. To do so, the currency is inflated, though inflation itself does not actually increase growth. When society is optimistic, it spends and engages in business – resulting in actual growth. It also encourages people to take on credit and debts, creating more fictional fiat. Inflation is necessary for markets to continue to reach new heights, generating positive emotional responses from the populace, encouraging spending, encouraging debt intake, further inflating the currency, and increasing the sale of government bonds. The fiat system only survives by generating more imaginary money on a regular basis. Bitcoin investors may profit from this by realizing that stock investors as a whole always stand to profit from the market so long as it is managed by a central bank and does not collapse entirely. If those elements are filled, it has an unending price objective to raise to new heights. It also allows us to realize that this response indicates that the higher-ups believe that the economy could crash in entirety, and it may be wise for investors to have multiple well-thought-out exit strategies.
Economic Analysis of Bitcoin
The reason why the Fed is so aggressively inflating the economy is due to fears that it will collapse forever or never rebound. As such, coupled with a global depression, a huge demand will appear for a reserve currency which is fundamentally different than the previous system. Bitcoin, though a currency or asset, is also a market. It also undergoes a constant price-probing process. Unlike traditional markets, Bitcoin has the exact opposite goal. Bitcoin seeks to appreciate in value and not depreciate. This has a quite different affect in that Bitcoin could potentially become worthless and have a price objective of zero. Bitcoin was created in 2008 by a now famous mysterious figure known as Satoshi Nakamoto and its’ open source code was released in 2009. It was the first decentralized cryptocurrency to utilize a novel protocol known as the blockchain. Up to one megabyte of data may be sent with each transaction. It is decentralized, anonymous, transparent, easy to set-up, and provides myriad other benefits. Bitcoin is not backed up by anything other than its’ own technology. Bitcoin is can never be expected to collapse as a framework, even were it to become worthless. The stock market has the potential to collapse in entirety, whereas, as long as the internet exists, Bitcoin will be a functional system with a self-authenticating framework. That capacity to persist regardless of the actual price of Bitcoin and the deflationary nature of Bitcoin means that it has something which fiat does not – inherent value. Bitcoin is based on a distributed database known as the “blockchain.” Blockchains are essentially decentralized virtual ledger books, replete with pages known as “blocks.” Each page in a ledger is composed of paragraph entries, which are the actual transactions in the block. Blockchains store information in the form of numerical transactions, which are just numbers. We can consider these numbers digital assets, such as Bitcoin. The data in a blockchain is immutable and recorded only by consensus-based algorithms. Bitcoin is cryptographic and all transactions are direct, without intermediary, peer-to-peer. Bitcoin does not require trust in a central bank. It requires trust on the technology behind it, which is open-source and may be evaluated by anyone at any time. Furthermore, it is impossible to manipulate as doing so would require all of the nodes in the network to be hacked at once – unlike the stock market which is manipulated by the government and “Market Makers”. Bitcoin is also private in that, though the ledge is openly distributed, it is encrypted. Bitcoin’s blockchain has one of the greatest redundancy and information disaster recovery systems ever developed. Bitcoin has a distributed governance model in that it is controlled by its’ users. There is no need to trust a payment processor or bank, or even to pay fees to such entities. There are also no third-party fees for transaction processing. As the ledge is immutable and transparent it is never possible to change it – the data on the blockchain is permanent. The system is not easily susceptible to attacks as it is widely distributed. Furthermore, as users of Bitcoin have their private keys assigned to their transactions, they are virtually impossible to fake. No lengthy verification, reconciliation, nor clearing process exists with Bitcoin. Bitcoin is based on a proof-of-work algorithm. Every transaction on the network has an associated mathetical “puzzle”. Computers known as miners compete to solve the complex cryptographic hash algorithm that comprises that puzzle. The solution is proof that the miner engaged in sufficient work. The puzzle is known as a nonce, a number used only once. There is only one major nonce at a time and it issues 12.5 Bitcoin. Once it is solved, the fact that the nonce has been solved is made public. A block is mined on average of once every ten minutes. However, the blockchain checks every 2,016,000 minutes (approximately four years) if 201,600 blocks were mined. If it was faster, it increases difficulty by half, thereby deflating Bitcoin. If it was slower, it decreases, thereby inflating Bitcoin. It will continue to do this until zero Bitcoin are issued, projected at the year 2140. On the twelfth of May, 2020, the blockchain will halve the amount of Bitcoin issued when each nonce is guessed. When Bitcoin was first created, fifty were issued per block as a reward to miners. 6.25 BTC will be issued from that point on once each nonce is solved. Unlike fiat, Bitcoin is a deflationary currency. As BTC becomes scarcer, demand for it will increase, also raising the price. In this, BTC is similar to gold. It is predictable in its’ output, unlike the USD, as it is based on a programmed supply. We can predict BTC’s deflation and inflation almost exactly, if not exactly. Only 21 million BTC will ever be produced, unless the entire network concedes to change the protocol – which is highly unlikely. Some of the drawbacks to BTC include congestion. At peak congestion, it may take an entire day to process a Bitcoin transaction as only three to five transactions may be processed per second. Receiving priority on a payment may cost up to the equivalent of twenty dollars ($20). Bitcoin mining consumes enough energy in one day to power a single-family home for an entire week.
Trading or Investing?
The fundamental divide in trading revolves around the question of market structure. Many feel that the market operates totally randomly and its’ behavior cannot be predicted. For the purposes of this article, we will assume that the market has a structure, but that that structure is not perfect. That market structure naturally generates chart patterns as the market records prices in time. In order to determine when the stock market will crash, causing a major decline in BTC price, we will analyze an instrument, an exchange traded fund, which represents an index, as opposed to a particular stock. The price patterns of the various stocks in an index are effectively smoothed out. In doing so, a more technical picture arises. Perhaps the most popular of these is the SPDR S&P Standard and Poor 500 Exchange Traded Fund ($SPY). In trading, little to no concern is given about value of underlying asset. We are concerned primarily about liquidity and trading ranges, which are the amount of value fluctuating on a short-term basis, as measured by volatility-implied trading ranges. Fundamental analysis plays a role, however markets often do not react to real-world factors in a logical fashion. Therefore, fundamental analysis is more appropriate for long-term investing. The fundamental derivatives of a chart are time (x-axis) and price (y-axis). The primary technical indicator is price, as everything else is lagging in the past. Price represents current asking price and incorrectly implementing positions based on price is one of the biggest trading errors. Markets and currencies ordinarily have noise, their tendency to back-and-fill, which must be filtered out for true pattern recognition. That noise does have a utility, however, in allowing traders second chances to enter favorable positions at slightly less favorable entry points. When you have any market with enough liquidity for historical data to record a pattern, then a structure can be divined. The market probes prices as part of an ongoing price-discovery process. Market technicians must sometimes look outside of the technical realm and use visual inspection to ascertain the relevance of certain patterns, using a qualitative eye that recognizes the underlying quantitative nature Markets and instruments rise slower than they correct, however they rise much more than they fall. In the same vein, instruments can only fall to having no worth, whereas they could theoretically grow infinitely and have continued to grow over time. Money in a fiat system is illusory. It is a fundamentally synthetic instrument which has no intrinsic value. Hence, the recent seemingly illogical fluctuations in the market. According to trade theory, the unending purpose of a market or instrument is to create and break price ranges according to the laws of supply and demand. We must determine when to trade based on each market inflection point as defined in price and in time as opposed to abandoning the trend (as the contrarian trading in this sub often does). Time and Price symmetry must be used to be in accordance with the trend. When coupled with a favorable risk to reward ratio, the ability to stay in the market for most of the defined time period, and adherence to risk management rules; the trader has a solid methodology for achieving considerable gains. We will engage in a longer term market-oriented analysis to avoid any time-focused pressure. The Bitcoin market is open twenty-four-hours a day, so trading may be done when the individual is ready, without any pressing need to be constantly alert. Let alone, we can safely project months in advance with relatively high accuracy. Bitcoin is an asset which an individual can both trade and invest, however this article will be focused on trading due to the wide volatility in BTC prices over the short-term.
Technical Indicator Analysis of Bitcoin
Technical indicators are often considered self-fulfilling prophecies due to mass-market psychology gravitating towards certain common numbers yielded from them. They are also often discounted when it comes to BTC. That means a trader must be especially aware of these numbers as they can prognosticate market movements. Often, they are meaningless in the larger picture of things.
Volume – derived from the market itself, it is mostly irrelevant. The major problem with volume for stocks is that the US market open causes tremendous volume surges eradicating any intrinsic volume analysis. This does not occur with BTC, as it is open twenty-four-seven. At major highs and lows, the market is typically anemic. Most traders are not active at terminal discretes (peaks and troughs) because of levels of fear. Volume allows us confidence in time and price symmetry market inflection points, if we observe low volume at a foretold range of values. We can rationalize that an absolute discrete is usually only discovered and anticipated by very few traders. As the general market realizes it, a herd mentality will push the market in the direction favorable to defending it. Volume is also useful for swing trading, as chances for swing’s validity increases if an increase in volume is seen on and after the swing’s activation. Volume is steadily decreasing. Lows and highs are reached when volume is lower.
Therefore, due to the relatively high volume on the 12th of March, we can safely determine that a low for BTC was not reached.
VIX – Volatility Index, this technical indicator indicates level of fear by the amount of options-based “insurance” in portfolios. A low VIX environment, less than 20 for the S&P index, indicates a stable market with a possible uptrend. A high VIX, over 20, indicates a possible downtrend. VIX is essentially useless for BTC as BTC-based options do not exist. It allows us to predict the market low for $SPY, which will have an indirect impact on BTC in the short term, likely leading to the yearly low. However, it is equally important to see how VIX is changing over time, if it is decreasing or increasing, as that indicates increasing or decreasing fear. Low volatility allows high leverage without risk or rest. Occasionally, markets do rise with high VIX.
As VIX is unusually high, in the forties, we can be confident that a downtrend for the S&P 500 is imminent.
RSI (Relative Strength Index): The most important technical indicator, useful for determining highs and lows when time symmetry is not availing itself. Sometimes analysis of RSI can conflict in different time frames, easiest way to use it is when it is at extremes – either under 30 or over 70. Extremes can be used for filtering highs or lows based on time-and-price window calculations. Highly instructive as to major corrective clues and indicative of continued directional movement. Must determine if longer-term RSI values find support at same values as before. It is currently at 73.56.
Secondly, RSI may be used as a high or low filter, to observe the level that short-term RSI reaches in counter-trend corrections. Repetitions based on market movements based on RSI determine how long a trade should be held onto. Once a short term RSI reaches an extreme and stay there, the other RSI’s should gradually reach the same extremes. Once all RSI’s are at extreme highs, a trend confirmation should occur and RSI’s should drop to their midpoint.
Trend Definition Analysis of Bitcoin
Trend definition is highly powerful, cannot be understated. Knowledge of trend logic is enough to be a profitable trader, yet defining a trend is an arduous process. Multiple trends coexist across multiple time frames and across multiple market sectors. Like time structure, it makes the underlying price of the instrument irrelevant. Trend definitions cannot determine the validity of newly formed discretes. Trend becomes apparent when trades based in counter-trend inflection points continue to fail. Downtrends are defined as an instrument making lower lows and lower highs that are recurrent, additive, qualified swing setups. Downtrends for all instruments are similar, except forex. They are fast and complete much quicker than uptrends. An average downtrend is 18 months, something which we will return to. An uptrend inception occurs when an instrument reaches a point where it fails to make a new low, then that low will be tested. After that, the instrument will either have a deep range retracement or it may take out the low slightly, resulting in a double-bottom. A swing must eventually form. A simple way to roughly determine trend is to attempt to draw a line from three tops going upwards (uptrend) or a line from three bottoms going downwards (downtrend). It is not possible to correctly draw a downtrend line on the BTC chart, but it is possible to correctly draw an uptrend – indicating that the overall trend is downwards. The only mitigating factor is the impending stock market crash.
Time Symmetry Analysis of Bitcoin
Time is the movement from the past through the present into the future. It is a measurement in quantified intervals. In many ways, our perception of it is a human construct. It is more powerful than price as time may be utilized for a trade regardless of the market inflection point’s price. Were it possible to perfectly understand time, price would be totally irrelevant due to the predictive certainty time affords. Time structure is easier to learn than price, but much more difficult to apply with any accuracy. It is the hardest aspect of trading to learn, but also the most rewarding. Humans do not have the ability to recognize every time window, however the ability to define market inflection points in terms of time is the single most powerful trading edge. Regardless, price should not be abandoned for time alone. Time structure analysis It is inherently flawed, as such the markets have a fail-safe, which is Price Structure. Even though Time is much more powerful, Price Structure should never be completely ignored. Time is the qualifier for Price and vice versa. Time can fail by tricking traders into counter-trend trading. Time is a predestined trade quantifier, a filter to slow trades down, as it allows a trader to specifically focus on specific time windows and rest at others. It allows for quantitative measurements to reach deterministic values and is the primary qualifier for trends. Time structure should be utilized before price structure, and it is the primary trade criterion which requires support from price. We can see price structure on a chart, as areas of mathematical support or resistance, but we cannot see time structure. Time may be used to tell us an exact point in the future where the market will inflect, after Price Theory has been fulfilled. In the present, price objectives based on price theory added to possible future times for market inflection points give us the exact time of market inflection points and price. Time Structure is repetitions of time or inherent cycles of time, occurring in a methodical way to provide time windows which may be utilized for inflection points. They are not easily recognized and not easily defined by a price chart as measuring and observing time is very exact. Time structure is not a science, yet it does require precise measurements. Nothing is certain or definite. The critical question must be if a particular approach to time structure is currently lucrative or not. We will measure it in intervals of 180 bars. Our goal is to determine time windows, when the market will react and when we should pay the most attention. By using time repetitions, the fact that market inflection points occurred at some point in the past and should, therefore, reoccur at some point in the future, we should obtain confidence as to when SPY will reach a market inflection point. Time repetitions are essentially the market’s memory. However, simply measuring the time between two points then trying to extrapolate into the future does not work. Measuring time is not the same as defining time repetitions. We will evaluate past sessions for market inflection points, whether discretes, qualified swings, or intra-range. Then records the times that the market has made highs or lows in a comparable time period to the future one seeks to trade in. What follows is a time Histogram – A grouping of times which appear close together, then segregated based on that closeness. Time is aligned into combined histogram of repetitions and cycles, however cycles are irrelevant on a daily basis. If trading on an hourly basis, do not use hours.
Daily Lows Mode for those Months: 1, 1, 2, 4, 12, 17, 18, 24, 25, 28, 29, 30
Hourly Lows Mode for those Months (Military time): 0100, 0200, 0200, 0400, 0700, 0700, 0800, 1200, 1200, 1700, 2000, 2200
Minute Lows Mode for those Months: 00, 00, 00, 00, 00, 00, 09, 09, 59, 59, 59, 59
Day of the Week Lows (last twenty-six weeks):
Weighted Times are repetitions which appears multiple times within the same list, observed and accentuated once divided into relevant sections of the histogram. They are important in the presently defined trading time period and are similar to a mathematical mode with respect to a series. Phased times are essentially periodical patterns in histograms, though they do not guarantee inflection points Evaluating the yearly lows, we see that BTC tends to have its lows primarily at the beginning of every year, with a possibility of it being at the end of the year. Following the same methodology, we get the middle of the month as the likeliest day. However, evaluating the monthly lows for the past year, the beginning and end of the month are more likely for lows. Therefore, we have two primary dates from our histogram. 1/1/21, 1/15/21, and 1/29/21 2:00am, 8:00am, 12:00pm, or 10:00pm In fact, the high for this year was February the 14th, only thirty days off from our histogram calculations. The 8.6-Year Armstrong-Princeton Global Economic Confidence model states that 2.15 year intervals occur between corrections, relevant highs and lows. 2.15 years from the all-time peak discrete is February 9, 2020 – a reasonably accurate depiction of the low for this year (which was on 3/12/20). (Taking only the Armstrong model into account, the next high should be Saturday, April 23, 2022). Therefore, the Armstrong model indicates that we have actually bottomed out for the year! Bear markets cannot exist in perpetuity whereas bull markets can. Bear markets will eventually have price objectives of zero, whereas bull markets can increase to infinity. It can occur for individual market instruments, but not markets as a whole. Since bull markets are defined by low volatility, they also last longer. Once a bull market is indicated, the trader can remain in a long position until a new high is reached, then switch to shorts. The average bear market is eighteen months long, giving us a date of August 19th, 2021 for the end of this bear market – roughly speaking. They cannot be shorter than fifteen months for a central-bank controlled market, which does not apply to Bitcoin. (Otherwise, it would continue until Sunday, September 12, 2021.) However, we should expect Bitcoin to experience its’ exponential growth after the stock market re-enters a bull market. Terry Laundy’s T-Theory implemented by measuring the time of an indicator from peak to trough, then using that to define a future time window. It is similar to an head-and-shoulders pattern in that it is the process of forming the right side from a synthetic technical indicator. If the indicator is making continued lows, then time is recalculated for defining the right side of the T. The date of the market inflection point may be a price or indicator inflection date, so it is not always exactly useful. It is better to make us aware of possible market inflection points, clustered with other data. It gives us an RSI low of May, 9th 2020. The Bradley Cycle is coupled with volatility allows start dates for campaigns or put options as insurance in portfolios for stocks. However, it is also useful for predicting market moves instead of terminal dates for discretes. Using dates which correspond to discretes, we can see how those dates correspond with changes in VIX. Therefore, our timeline looks like:
2/14/20 – yearly high ($10372 USD)
3/12/20 – yearly low thus far ($3858 USD)
5/9/20 – T-Theory true yearly low (BTC between 4863 and 3569)
From the beginning, the creator(s) of bitcoin intended it to be a privacy coin to keep user information protected. But because of the open ledger technology used in cryptocurrencies, tracking transactional data could and still can be relatively easy. For example, when someone wants to spy and track transactions, they may set up spy nodes that attempt to triangulate data. https://preview.redd.it/m0d71wc2jxu41.jpg?width=740&format=pjpg&auto=webp&s=24f6266299c0f09e88042bdb30e2d84048979a77 Despite identifying wallets via alphanumeric (consisting of or using both letters and numerals) codes rather than real names, bitcoin isn’t anonymous. Because the blockchain keeps an immutable record of every single fraction of bitcoin moved in and out of these wallets, it’s surprisingly easy to trace the flow of bitcoin from one wallet to another. Transactional data on ledgers like the Bitcoin Blockchain is open and public. It means they show the date, amount, and receiving and sending wallet addresses. Anyone using the network can see this information. If a crypto user wants additional layers of privacy, they can go to extra lengths to get them. Adding privacy is possible in a variety of ways, including the use of a Privacy Coin. A recent report from the Massachusetts Institute of Technology (MIT) confirms the need for privacy for a digital monetary system. It’s precisely for this reason that a new breed of cryptocurrencies — privacy coins — have been emerging since 2014. As the name implies, these aim to offer greater anonymity than the likes of bitcoin and ethereum. It’s becoming apparent that privacy-coin features will be vital if cryptocurrencies are to be widely adopted in the future. There are at least 30 privacy coins, with most of them aiming for privacy through a variety of different measures. https://preview.redd.it/wrut0gb6jxu41.jpg?width=1600&format=pjpg&auto=webp&s=0a07a945d6cccde6f112bb531b5a6c97f3001353
Monero(XMR): Two methods to conceal identities
The most well known is Monero (XMR), which was launched in April 2014 and which uses two methods to conceal identities: confidential ring transactions (RingCTs) and stealth addresses. Simply put, the use of RingCTs allows the Monero blockchain to verify transactions without revealing how much was transacted and who transacting parties are. As for stealth addresses, these involve a recipient of an XMR payment receiving her new funds at a one-time, randomly generated ‘stealth’ address, which isn’t linked to her usual account. However, Monero’s privacy algorithm has a potential vulnerability that makes it possible for researchers to be able to trace around 80% of Monero transactions, recent paper states. https://preview.redd.it/4mvghtw8jxu41.png?width=1920&format=png&auto=webp&s=46a11f249028492d45fa64822c097b0cff865a5c
Celare: First full-asset cross-chain and anonymous solution
Such features of privacy coins will be of paramount importance if any cryptocurrencies are to be used as currency on a mass scale. Even though some of the above coins have certain weak spots, they’re continuously improved, while newer privacy coins (e.g., Celare) are emerging all the time. And far from being an attempt by developers to make crypto even ‘shadier’ than it’s sometimes perceived to be, privacy coins are, on the contrary, another critical step in bringing crypto a bit closer to the mainstream. Fungibility is something that other privacy coins strive for, but with mixed results. Celare achieves privacy via a process known as “zk-SNARK” (zero-knowledge, Succinct Non-Interactive Argument of Knowledge). Similar to RingCTs, this proves that a transaction is valid without recording any other information about it (such as amounts and addresses). Celare, a parallel chain of smart privacy contracts in the Polkadot ecosystem, is developed based on Substrate. By selecting the BLS12–381 curve to achieve zero-knowledge proof, Celare indeed implements the blockchain system with the privacy protection of Turing-complete smart contracts. It bridges the connectivity between different projects and ensures the privacy of the project and assets safety, better to create ecological consensus. Compared with the existing Blockchain privacy protection technology, Celare not only realizes the privacy protection of account information and transaction but also recognizes the cross-chain ecosystem. It is a secure, anonymous channel that breaks the Internet blockade and does not require a VPN, to protect user privacy and security for the entire Celare ecosystem. The so-called anonymity is not only the authentication without personal identity information, but also the hidden high-anonymity Celare of the communication channel uses distributed nodes to support the entire network operation. Not only that, in the process of using covert chat, but no third party stores the message content, and the chat content will also be stored in the local file. The master node is only responsible for providing network transmission and content delivery. Based on anonymous peer-to-peer chat, Celare users and groups in the community can independently launch OTC (over-the-counter transaction). Celare will be evolved and absorbed in the Celare development process, to realize plenty of the stack ecology applications, such as Parity Substrate, Wasm, DAO, Treasury. https://preview.redd.it/fd02yiidjxu41.jpg?width=1000&format=pjpg&auto=webp&s=2de0ba384f7a4d3f38f9d6da5ade8000ef979e4b Brian Armstrong, the CEO of Coinbase, has stated in a recent blog post that there will be a need for privacy features on blockchains in this decade. According to him, this is besides scalability the most crucial aspect for the coming years to achieve widespread acceptance. Armstrong predicts that blockchains “will reach about 1 billion users by the end of the decade”. The Bitcoin Network is continuously developing and implementing additional privacy layers to deal with the challenges of open ledgers. The only sure thing is that in the next few years, the privacy coin realm will be fascinating. Join Us at Celare Community today to stay up to date with all the latest crypto happenings and news. Contact Us: Twitter: @CelareCommunity Telegram：t.me/celarecommunity_en Reddit：u/Celarecommunity GitHub：Celaregithub
Celare: “Safe deposit box” for data and assets, protecting privacy and security
https://preview.redd.it/dlbc4vuw3vn41.jpg?width=960&format=pjpg&auto=webp&s=9553b6c323d285750eab6161ead41d5ab4292125 Privacy security is a growing problem. On March 19, the sale of 538 million users’ data from Weibo in the form of bitcoin on the Deep Web has raised the issue of privacy security again. The 36kr analyzed the process for the leak of personal information on Weibo. Hackers upload fake mobile phone address books in batches through the relevant interface of Weibo to match the friend’s account information，then he can match the identity information of the user account successfully. In fact, with the development of technology, the problem of personal information leakage tends to be more and more dangerous. Even if you take precautions, personal information can become part of the thousands of messages that hackers sell. With the arrival of the information era, data has become a resource that many businesses compete for, which has given rise to a series of privacy security problems and also spawned a series of gray industrial chains. The privacy of users has gradually become a commodity with a precise price tag. Facebook, Microsoft, Apple, and other global giants have all been exposed for collecting users’ privacy, which still happens. Data networks can help people to a better life. Still, a series of data privacy problem is to violate the rights and interests of users, such as data leakage by people they know and privacy exposure. The protection of privacy and security has become an urgent issue, but in the centralized system, how to use the data depends on the controller’s preference, and the user never has the dominant right. Decentralized blockchain is now becoming a better solution to privacy and security problems. Celare anonymous technology solutions created by blockchain will effectively guarantee the privacy security of users. https://preview.redd.it/y7mlz6e04vn41.jpg?width=4840&format=pjpg&auto=webp&s=ae3e6ea8e50344d2ffc878010901d59407639ca3
Anonymity is safety
How to ensure the privacy of users? The answer is anonymity. There are many projects with anonymous technology in the blockchain. Whether it is the Zero-Knowledge proof mechanism of ZCash, the CoinJoin Scheme of Dash, or the Ring confidential transaction mechanism of XMR, it can ensure the anonymity of transactions to a certain extent and guarantee the users privacy and security. Celare also uses anonymity to protect users’ privacy. It is the first cross-chain anonymous privacy solution of all digital assets on Polkadot ecology, which is based on blockchain decentralization. Celare has designed a new anonymous mechanism，Non-interactive Zero Knowledge Proof，based on the existing technology. Compared with zero-knowledge proof, the non-interactive system has a more reliable anonymous function, which can completely solve the problem of transaction tracking and protect user privacy. https://preview.redd.it/2j2lqza44vn41.png?width=1738&format=png&auto=webp&s=84284e2d1d1059790318a61c75da7d4d82973f81 When choosing the zk-SNARK Zero-Knowledge proof curve, Celare chose BLS12–381 curve with a higher security coefficient, which is higher than that of BN128, to guarantee Celare’s top privacy and anonymity. The method of zero-knowledge proof in practical application is as follows: When the user registers, the identity information is stored on the server in the form of digital commitment. In the process of identity authentication, the user authenticates himself to the server as a member of the registered user by using the member proof scheme, to avoid the user presenting his identity information to the server every time he logs in. It is just one fundamental part of Celare’s efforts to protect users’ privacy. Celare also adds a fully homomorphic encryption scheme in the chain, which can perform arbitrary calculations on the ciphertext without decryption. It is just one of the basics of Celare’s efforts to protect users’ privacy. Full homomorphic encryption can perform arbitrary calculations on the ciphertext without decryption. So the problem of data privacy security can be solved quickly without losing computability. The comprehensive security technology system is one aspect of Celare protection of user privacy. Besides, Celare uses authorization technology to truly realize that the user is the master of the data, allowing users to control their data freely. https://preview.redd.it/z7o9ips64vn41.jpg?width=900&format=pjpg&auto=webp&s=ad1cef93b7007b8a55931cc29ff3c986bd33a5f4
Safe and efficient
Safety is only the first step. What Celare seeks is safety and efficiency. As is known to all, the three anonymous tokens, Dash, XMR, ZEC, are still used in the field of payment and cannot be further expanded. The reason is that the system does not support smart contracts. And scalability is too low for large-scale commercial use, especially at the data interaction level. To avoid the limits of anonymous cryptocurrency and better promote the anonymous technology into a broader field, Celare innovative introduced intelligent contracts into its system, which significantly improved Celare efficiency and laid a good foundation for its large-scale commercial use. Since Celare is a public chain developed based on Polkadot Substrate, it follows Polkadot’s PoS consensus algorithm and contract technology. To maintain the speed and efficiency of data transmission on the chain, Celare will establish a large-scale PoS node network capable of supporting nearly a thousand consensus nodes, infinitely reducing the block out time and ultimately determining the delay time of it. The high TPS brought by large-scale nodes will provide a technical guarantee for Celare’s widespread application. It also means each transaction of users can be conducted at high speed under the anonymous environment, which not only ensures users’ privacy security but also enables them to enjoy the free experience and indeed promotes the implementation of blockchain technology. https://preview.redd.it/ds5oqkmc4vn41.jpg?width=800&format=pjpg&auto=webp&s=bbde16cee5e55393984853258240d878d7de3f63
Break the information isolated island, link multiple public chains
Security and efficiency are only part of the Celare blockchain infrastructure. Also, Celare has built a cross-chain technology to interconnect multiple public chains. For a long time, information cannot be transferred, and digital assets cannot be traded between each public chain, which significantly limits the application space of blockchain. Cross-chain technology came into being, among which Polkadot is the outstanding one. Celare cross-chain technology also relies on Polkadot. Its internal logic is that the user locks the assets on the original chain and then issues the mapped assets on the target chain. At the same time, the user can apply for a withdrawal on the target chain and unlock the original one. https://preview.redd.it/hvhnjkqg4vn41.png?width=1406&format=png&auto=webp&s=4d7073000da580b1f897128b4d21f71d49dc4a62 Celare cross-chain technology will further protect users’ privacy and security, which means users can quickly transfer their data and digital assets from other chains to the Celare chain. It helps users consolidate all the data on different chains into a Celare account for easy management. With the help of Celare privacy protection technology, the security of users’ private data is truly guaranteed. Since the establishment of the project, Celare’s mission has always been to protect users’ privacy and security. Therefore, Celare makes various development and further expansion to better service and privacy and ensure users’ privacy and security. In the future, Celare will break the barrier of cross-chain assets and truly protect user privacy and anonymity. Contact Us: Twitter: @CelareCommunity Telegram: Celare Community
Celare|The world’s first cross-chain and anonymous solutions for all assets
Celare, anonymize people’s digital assets From the internet era to the birth of blockchain, it means that all data information, including assets, has realized the phased leap from the entire network sharing to anonymous communication. Bitcoin was once considered as a secure cryptocurrency. However, the mainstream cryptocurrencies on the market always have the risk of privacy leakage, including bitcoin. That is to say, and bitcoin is not private. But based on the greatness and geeks of human intelligence, blockchain networks with complete anonymity have been developed, such as Zcash, Dash, and XMR. So is this the end of the story? Of course not. https://preview.redd.it/79vgf5bsggn41.jpg?width=1580&format=pjpg&auto=webp&s=395e2f68e266dae435b0d348d1df94762386a4cb People are surprised to find that these anonymous digital assets can genuinely realize the privacy protection of identity and transaction. And they want to share with more relatives and friends around so that this great discovery can be extended to the entire blockchain application. They faced multiple barriers across the asset chain. If you need a Blockchain system with a privacy protection mechanism and smart contracts at the same time, the traditional blockchain solution is to make significant changes to the underlying protocol, which inevitably consumes more computing resources, thus affecting the efficiency of the chain. The privacy protection of data information and assets is like the layer of wall tiles built between you and me, which breaks up the whole blockchain world and turns the global village back into the city-state tribe of the primitive society. Celare, who proposes the world’s first full-asset cross-chain and anonymous solution, which not only realizes the value transfer between different blockchain networks but also guarantees the privacy security of users.
I. What is Celare?
Before introducing Celare, it’s necessary to share Polkadot — — Polkadot is an exploration of cross-chain technology presented by the co-founder of Ethereum and funder of Parity Technologies, Gavin Wood, on November 14, 2016. Polkadot is a decentralized and scalable heterogeneous multi-chain framework that supports cross-chain communication between different chains, not only for asset exchange and transfer but also for data cross-chain discussion. The Polkadot network has three primary functions that address interoperability, scalability, and shared security issues in the Blockchain. Polkadot is similar to Vodafone, an infrastructure service provider that provides communication bandwidth services between networks. Developers can develop applications based on this infrastructure. Celare, a parallel chain of privacy smart contracts in the Polkadot ecosystem, is developed based on Substrate. By selecting the BLS12–381 curve to achieve zero-knowledge proof, Celare indeed implements the blockchain system with the privacy protection of Turing-complete smart contracts. https://preview.redd.it/2kcvnx9xggn41.png?width=2814&format=png&auto=webp&s=258d53a5787c93b618ab3d53295cc44a76535102 For example, it is like setting up a public tent in the middle of two mutually disjoint parallel roads. People who are tired of walking can enter the tent for a rest. For fear of the security of the money, each person who enters the tent is assigned another invisibility cloak. The public tent is the Polkadot, and Celare is the organizer and guardian of the ecology. It increases the diversity of “road,” bridges the connectivity between different projects, and ensures the privacy of the project and assets safety, better to create ecological consensus. Compared with the existing Blockchain privacy protection technology, Celare not only realizes the privacy protection of account information and transaction but also recognizes the cross-chain ecosystem. https://preview.redd.it/i43nf7qzggn41.png?width=1606&format=png&auto=webp&s=4266de4c99e5df48a3782e4425182b039c7b39ab
II. Celare’s Economic Model
Celare is the basic unit of circulation within the Celare ecosystem. It also represents users and participants in the system and is the only commercial and financial delivery medium within the system. At the beginning of the release, it is compatible with ERC20 and will be switched after the Celare network launch officially. Celare has a constant total of 200 million tokens, 50% of which obtains through Entangled Lockdrop; 40% for the incentive distribution of PoS Staking mechanism; 5% is the essential funding for the community development team and unlock flexibility during four years; The remaining 3% is the reward the community contributors and co-builders. For the early service promotion, 2% will be reserved as an incentive, which will be rewarded by the community decision making, to realize the shared benefits of the ecosystem. Celare Co-founders’ committee convinces that any project cannot be separated from ecological contributors. Everyone in the community enjoys a high degree of freedom, full value realization, and happiness. This is the goal that the Celare Co-Founders’ Committee will fight for. https://preview.redd.it/n50fncv2hgn41.jpg?width=700&format=pjpg&auto=webp&s=5c565df7cb159e2f2cfc7f61a8b822efb951665b
III. The Roadmap
2019.03 The Celare Co-Founders’ Committee was established and conduct a project feasibility report on the Polkadot parachain.
2019.05 Determine the project framework and carry out the underlying technology research.
2019.06 Finish the underlying logical and technical framework designing.
2019.08 Confirm the project concepts.
2019.Q4 Beta Network in Version 1 release;
Celare will recite the global community as a standalone chain Before Polkadot Launching
2020.Q1 Start Entangled Lockdrop
After Polkadot Launching
2020.Q2 Launch the Beta network in Version 1
Build the transfer bridges with the main-stream chains * Support for general transaction * Support for smart contract * Full asset anonymity
2020.Q3 Celare will add a new transfer bridge chain as a parallel chain of Polkadot to connect Polkadot assets.
2020.Q4 Celare will evolve into a multi-chain architecture and operate as the second-layer relay network of Polkadot.
2021.Q1 Celare will continue to support the community in developing various DApps. * Code open source, support smart contracts to issue anonymous assets * Publish client wallet * Multi-party secure computing and privacy protection mechanisms for data under the chain. *Anonymous Asset Exchange *Anonymous chat tool with OTC
When you look back at the development of the Blockchain for ten years, you will find that dreams, especially technical dreams, if realized, will be a good thing for the benefit of humanity. So there will be so many professional geeks going forward bravely to liberating all humans. And Celare’s technical vision is simple: security, privacy, and cross-chain. How to achieve that? Celare ecologically has designed the following ways: 1# All Assets Anonymity In Celare, the data in the ordinary transaction is encrypted, and the non-transaction parties cannot know the details such as source, destination, asset type, and amount. Regardless of the assets, Celare can fully guarantee the privacy and anonymity of assets, and truly realize the anonymity of all assets. 2# Anonymous asset exchange Different from the centralized exchanges with KYC, Celare is a veritable anonymous asset exchange through Polkadot relay cross-chain technology, which fully protects user privacy and asset anonymity. 3# Anonymous chat tool with OTC It is a secure, anonymous channel that breaks the Internet blockade and does not require a VPN, to protect user privacy and security for the entire Celare ecosystem. The so-called anonymity is not only the authentication without personal identity information, but also the hidden high-anonymity Celare of the communication channel uses distributed nodes to support the entire network operation. Not only that, in the process of using covert chat, but no third party stores the message content, and the chat content will also be stored in the local file. The master node is only responsible for providing network transmission and content delivery. Based on anonymous peer-to-peer chat, Celare users and groups in the community can independently launch OTC (over-the-counter transaction). And the transaction information and chat content are entirely secret, without worrying about being supervised or eavesdropped, to protect user privacy and security for the entire Celare ecosystem. https://preview.redd.it/h4un51omhgn41.png?width=2416&format=png&auto=webp&s=b2a0b62a5d309f605c2a724f0e5447397997c3ab 4# Stack extension Celare will be evolved and absorbed in the Celare development process, to realize plenty of the stack ecology applications, such as Parity Substrate, Wasm, DAO, Treasury. Celare will bring together all parachain developers and community to witness the first big fusion in the history of Blockchain. The blockchain is no longer an isolated island, no longer competing for users, and Celare will lead the world’s developers to witness the arrival of the cross-chain era. Contact Us: Twitter: @CelareCommunity Telegram: Celare Community
THE POST-CORONAVIRUS ECONOMY 02/04/2020 I like to approach looking at economics like a physicist. There are very few maybes in physics. They mention and value going back to first principles when things go wrong. So does architecture, if you find the central idea of your design is lost. That's my background. If you understand game theory, it's quite apparent that so much of social structure is based on the Prisoner's Dilemma. This mindset seems prevalent also in many philosophical discussions, ancient and modern, such as Nietzsche and Diogenes, framing the human condition / human nature (HN) as being a weakness to overcome. I presume this comes from a mindset to overcome scarcity through dominion and therefore, cultures that reinforce our familiarity with that. However, despite our capacity for creativity and imagination and the absolute evidence that we have been able to overcome nature itself, we still create artificial, synthetic systems that are based on this old framework. We have stepped beyond overcoming natural systems and now play the game of overcoming systems themselves. The trouble is those systems are inherently disempowering because they are still built on fear based game theory that waste the most resources: war, politics, and finance are the most wasteful of all. Ideas for solutions and the present day, magic bullet or not, are still built on those same fear-based frameworks: to overcome HN. Despite so many people wanting empowered change, we think this is the exception, not the hope of the norm. Such a framework is also familiar to us so it's easy to find solutions within a comfort zone that doesn't really change very much and we may be waiting for a personality to lead us to that change without losing that comfort. Experience from previous and even current political and religious leaders has not led to empowered change. But it is not just large-scale problems. It's also small-scale where businesses are in perpetual debt. These dichotomies make great stories to trickle down for people to tell and write books about, but that doesn't resolve the problems. Many don't want those problems to be solved because there's no money in it. If we are to be leaders for the world to be a better place, then we must look at practical empowered systems that all people can use with little need for hierarchical goverance or fear. One of the best engineering companies, Arup, are renowned for their 2-level company structure and are renowned for some of the greatest engineering feats globally. We need to find trust-based systems built on the abundance of our creativity and imagination that includes all things. If you listen to people discussing authenticity and trust, there is a strong dividing line between someone is being sponsored or the product was bought with their own money. This already shows how powerful exchange really is in driving trust between people, or not. Look at how many YouTubers with their promotions stipulate where the product was given by a company or they bought it from their own money to preempt whether they are being honest or not. It's interesting to find that in so many solutions put forward for empowered change, the design frameworks of currency are seldom looked into. People may offer new processes for currency and exchange but they are still built on the same usury frameworks that incentivizes people to quantify wealth in terms of money with little regard of what created that money. My objective here is to offer you a model that incentivises and empowers all people to look at profit and wealth on qualitative frameworks that build trust, in both competitive and collaborative relationships, to value sustainable synergy in creating experiences to empower the most people for all. During this time with the coronavirus, with this mass devolution of economic empowerment, timed or opportunistic, it's essential to find solutions that don't revolve around panics like this again and be left to still more messengers wanting your sacrifice, confinement and/or self immolation to support the rest. So, let's get back to first principles. Let's look at the physics of humanity's identity and its relationship with nature, and discover the exchange model framework that supports the sustainable synergy of that to the greatest empowerment possible. . . . . . THE FUNDAMENTALS The objective here is to present a logic and the framework which empowers all people and has no need to compromise. This must be on qualitative terms where there is a dynamic empowered synergy that is adaptable and diverse dependent on location and capacity. I would find it hard to argue that the most self-actualised empowered people measure their highest wealth is ultimately how we create to empower the most people in the most sustainable way possible, to redundancy. Anything we do, has to support this absolute. It must be structured on the strongest people that possess and act in distributing empowerment to the rest of their community. From this central idea, we must build a adaptive social framework that incentivises such empowerment in the most constructive way possible. Let's look at the basic fundamentals to work with: Human Nature (HN): Adapts to it's environment. This is the beginning of how we build culture. In scarcity or abundance, we are valued by the excellence of what we create. Highest excellence empowers the most people to survive. Loves something to strive for. Is the only species that has overcome natures limitations. Thrives on creative capacity and imagination. Wants to be remembered. We want to trust more than fear others. Children are an excellent example of presenting this. Even as adults, we want to trust if we can, particularly government and authority. It's easier. Wants to be as lazy as it can possibly be to achieve the greatest gain. we always pick the easiest path to get something if it is possible. Whether that is through taking advantage of people, taking the past of least resistance, or being able to create something to make things easier for others, is dependent on the framework that creates the most status and wealth. When we govern such capacity with frameworks of disempowerment, it divides creative capacity, regardless of whether resources are scarce or abundant. This dissuades logic to empower cohesively and devolved to weakness being prioritised in decision making. We have built a model of exchange and social structures that promote weakness. Fundamentally, however, all people want to achieve excellence. How we design the framework defines whether that's against other people or with other people. If you define something about human nature on a negative framework, then it is more important to look at yourself and ask what is lacking in yourself to think such a thing. Environment (E): Resources are always scarce, but our creative capacity is limitless. Resources only those that are useful to the central idea. For resources to be their most plentiful, natural symbioses between them must be maintained and regenerative. Any adaptive social framework must support this. Social Frameworks (SF) How we value wealth define status. How we govern defines status. It doesn't matter whether it's from a disempowered or empowered framework, all that matters is how well we do that to achieve status with our greatest self-security in mind. If a framework is built around scarcity, then mainstream status will always be based on the success of overcoming this. If it is based on abundance, then mainstream status will be based on the best to cultivate that. Fear drives separation. Joy drives integration. We are also more likely to trust someone who offers an opportunity to overcome fear. This is most apparent in times of desperation. This usually doesn't end well. if social frameworks are built around fear, then it only establishes the fear. It does not overcome it. Money/Currency/Exchange (M) Money doesn't exist unless we create something and somebody wants it. If there is nothing to buy, money is meaningless. People's capacity to create is the real money. If we do nothing, there is no economy. Therefore, money must be directly based on the work people do. Basing money on something outside of that disconnects that basic fundamental. Wealth is not money if there is nothing to buy. Therefore, money is always servant to peoples' capacities to create. There are only three money structures to define and work with: usury (positive cost), demarrage (negative cost) and neutral (no cost). What defines which are empowering or not are dependent on how much is available, how it's distributed, I know if it is based on the work of people or something else. Usury does not mean exorbitant cost. If this was the case, then there is an undefined band of money which is little cost. This seems to be conveniently swept under the carpet. It also implies that it cost on currency is fundamental. It isn't. Anyone that promotes such a definition of exorbitant cost and/or interest is not interested in sustainable synergy solutions. Basing currency on something outside of work incentivises using it as a commodity of its own value. Basing it on work makes this impossible with the right parameters. Cryptocurrencies are not different to any other mainstream currency if it follows the same frameworks as usury currency. it is just the same thing delivered a different way. Bitcoin is quite different to every other alternate currency due to specific parameters that made it difficult to continue as an exchange mechanism versus a store of value that many people have tried to overcome. This brought on ICO commodity boom that was purely fictitious, totally missing the larger picture that Bitcoin wanted to present. That again shows how powerful changing currency can be for sustainable empowered change. Here are the parameters to scrutinise: What is it based on? Is the volume infinite or finite? How is that volume distributed? Is there a cost? There are also only three frameworks of currency cost: Usury (any interest or fee) Demurrage No cost (neutral). Unfortunately, we have been dealing with usury currency as a commodity for as long as humanity can remember and built our understanding of human nature from that. It is built on the framework of disempowering social structures that Prisoner's Dilemma game theory succinctly presents. It defines HN as a prisoner by default. Why? Money has almost always been created from violence and disempowerment to gain dominion to combat scarcity. David Graeber's book Debt: The First 5000 Years, establishes this. Usury currency has always been connected to political power disempowering people, regardless of whether it's capitalist or communist or anything in between. The only difference has been from the people who choose to have status to empower or disempower. As most democracies separate currency from governance, politics will not change anything unless you change fundamental frameworks to incentivize leadership to support people by default. What usury currency and the Prisoner's Dilemma really demonstrate is that we trust what people tell us to overcome our fears and we try and trust what they say because we're told we cannot trust ourselves. So we choose to accept fighting disempowerment rather than leveraging empowerment because we are led to believe it's easier to follow then be an independent peer competing and collaborating for the greater good. It seems the human condition is that a gravitates to fear and not trust itself instead of the opposite. That's quite different to defining human nature that objectifies humanity to be perpetually bad and need to be saved from itself. This is beyond ethics and virtue to be prevalent in creating empowering frameworks. It is more relevant to incentivise the ethics of excellence in empowering frameworks. It seems some people mistake the word excellence to mean self against others. No one achieves excellence without the help of others and so in-kind excellence supports excellence. That is the highest ethic. . . . . . BUXB It is here that I will present the parameters of the buxbi model and how it languages and incentivises people to want to be sustainable in the creativity regardless of their personality. It takes out the argument of whether humanity needs to be saved or not. It takes out objectifying people being good or bad, true or not. What they create and why will define whether they are worth your time. If they're not doing their best to create experience is to empower the most people, including yourself, in the most sustainable way possible to redundancy, then they are not going to be efficient with your time to warrant it. BUXB means Be yoU eXchange Bank. The denomination of currency is 'bux'. The parameters of bux are as such: It is created by the exchange of work between at least two people. If nothing is done there are no bux. As a result, no money is created independently of work done. BUXB is not able to be bought by other currencies. Total exchanges balance to zero, except in regards to education. In such a case, all people participating in an education platform are paid by the bank. The bank's deficit is the positive of education that is happening in the community. The volume and type of transactions recorded by the bank, irrespective of the amount, will show what interests the community or communities involved. This is transparent for everyone to see to know where to best use their energy, to the individual's greatest interest. No one is forced to exchange with another person if they choose not to. What people choose to create to exchange is transparent to everyone else in the community. again, this is to inform not just the community what has the greatest benefit to create but also the interest of the person in wanting to create it. It will also establish how good day are at it which only promotes them more. People are free to give what they wish and record it in the bank if they want to. If someone chooses to keep a transaction a secret, for whatever reason, they are welcome. the bank exists simply as a ledger of exchange and amount of what people choose to create. It cannot create any currency whatsoever. Anyone working for the bank is paid by the bank. There are no taxes taxes from the community to run it. Community projects are mandated by direct democracy which people at BUXB manage. The only advantage 4 people both at the bank and the community Ark pick the projects that best support empowering the most people in the most sustainable way possible to redundancy. Since this is the case, there is no compromise between self interest and the community. On a project being decided on, the best people who can do that most efficiently will be the people that will be paid. Such civil or community costs will be covered by the bank. the bank is not a separate entity or corporation or business that requires profit. It is simply a quantitative record of exchange between people in the community and communities that use the same currency. To overcome any misconceptions that charging more would mean more wealth, no one can be paid more than 60bux an hour. As prices of products are based on the amount of work that people do, there is a natural incentive of the price mechanism to fall for everything while quality increases. This establishes that products and services of higher quality cost less. There is no loss of a free-market. The natural consequence of presenting ideas to the community to use their time in the most efficient way possible to effectively empower others in the most sustainable possible to no longer at needing to be required is the incentive for people to give their time to such ideas. Competing ideas will be based on those parameters. If there is a conflict of which idea is better, the natural consequence of this is either consensus to follow one project or for both projects to work concurrently to find out which is best. This is still the most efficient means of using resources instead of conflict in resolving who is better without actually have any experience to know and learn from doing what the idea of say they were going to. Resources that people own using BUXB are not taking away from them. they only become available as they see fit while they become more comfortable and empowered using a model that has more options. It will become plain to realise that trying to find ways to look after properties you own when people are more independent is more difficult but you gain more connecting with people with what they make and don't lose your comfort for your security a,d experience; you gain it a different way Any business built by many people will have a part of the business in some way to attain part of that future profit. But as the price mechanism is quite different in BUXB, participants would game or by selling products at the price that it took to make it. Ask the price will be quite different to what it would be in usery currency, the real value is that quality increases ice prices fall. The true currency really is people's status in creating quality. The price is simply a transition mechanism as people become more comfortable to qualitative framework to value status. Controversially, an example of how BUXB would work in the community is the intentional community mentioned and discussed in the end of Ayn Rand's book Atlas Shrugged. Entrepreneurs in her book get a bad rap but, as usual, we trust the messenger that delivers fear instead of logic. To say that entrepreneurs are bad because they are self-interested egoists is saying to love and improve yourself is bad.there should be no difference between an entrepreneur and a person. I must stipulate that saying an entrepreneur is an opportunist is incorrect. Whether we are people alone or together creating, the objectives of creating experience it's to empower the most people in the most stainboy possible to redundancy is the absolute objective to warrant any idea, and the work to do it, to be valued in its highest esteem. It is plainly clear that her hero entrepreneurs create the best for the least price. all value the quality of their work, and the people that do it not just for but with them. They are not just the entrepreneurs but the politicians we would like to see. They respect everyone who respects themselves in being their best. This is priceless. It is only in that intentional community where they can negate the disempowerment of compromised social structures and usury currency for the greater good. In this intentional community, we can focus purely on what her hero entrepreneur is a truly like. They are mindful empowered selfish creators self aware enough to create their best for the greater good. Any bastardisation of that interpretation has been made rampant by the wannabes. Alan Greenspan, a frequent guest at Ayn Rand's social events, is the epitome of the second-handers she despises. All her heroes are interested in education first, to offer the opportunity for everyone to be their best at what interests them. Hank Reardon makes the best alloy at the cheapest price than his competitors. Dagny runs the best railroad. Hiring a vehicle for $0.05 for the day. Who has the car is not important. All her hero entrepreneurs value creating the highest quality for the best price they can. All got their hands dirty being on the ground to experience the knowledge to be their best for those that will know better. In a commodity-driven world of wealth, there will always be the compromise between what to pay oneself vs the people under you doing the work. And the absolute genius to present how different this is in Ayn Rand's intentional community is the bank. Midas turned everything into gold. In business, everyone he backed succeeded. When he leaves to join the intentional community, he balanced his books to zero. Rand's subjective in pointing this out is Midas left without owing or being owed anything. That in itself is an extraordinary feat in a usury world. Arguably, if that were truly possible, this could only happen in a currency with no cost. It would be interesting to analyse that. But in the microcosm of the intentional community, Midas is picking the best in a barrel. They're all good. They all want to be better. Interestingly, the means of exchange is in gold. This can bring up whether people a mining for gold for currency or as a resource. What's more important is that the main purpose of Midas in the intentional community is simply being the creator of the means of exchange. There is no possible need or means or requirement to add any cost to the currency in such a community. It would be absolutely pointless. His objective is to create enough velocity of exchange as required. It is just he would, but he can only, only, give money to those who are the best at perpetuating empowerment. No one else is living there. Further, it is not required to compete with whom may have a car to lend or not as there is no need to create more cars if none are really required. There will be enough business for everyone until more cars required; then the best most sustainable people will make it, customised on demand. No one in the community would be bothered to make them if they are not needed. The ultimate empowerment in such an intentional community is no one is owned by anybody else and doesn't do anything for anybody unless they want to. Consequently they all do their very best for self and all because there's no better option. That is what selfish really means. Many say these ideas of economies will not work at scale but understand we are in economic models that create so much for nothing. There is so much waste that is not sold. That's not efficient or useful or sustainable or empowering for anybody. So what is created is dependent on the creativity also of the means of production but not for the sake of the economy, but the community. It is easy to create a Tesla production line that can be powered on demand if another vehicle is required and then turn it off again. Cars need not be bought but rented as needed. Any alternative to sharing resources is far more efficient than the waste usury currency economies create. People will assume and say that such ideas can only work in small communities. but the whole global market is a series of small communities connected together. What matters more are how sustainably they connect for the greatest benefit of all that lived there. I'm not just talking about humanity. Any human would know that if they want to at least survive, they must respect the environment. When a person says human nature or the human condition is inherently bad; when they say it cannot work at scale, they are only presenting the weakness in themselves. And this brings up the alignment of ethics and excellence. If we go back to first principles, this sphere of .ethics is very much built around the game theory of the prisoner's dilemma: people are not to be trusted and there will always be compromise. There will always be compromise if solution is not possible but to mitigate that is not built on rights or privilege or social standing in themselves. It is built on excellence. That is the highest ethic. What do we create to empower people and the environment without compromise for the greater good without self-immolation? You do want to live, right? The idea of self immolation as many religions value as a way to relinquish the weakness of human capacity is the largest most init oxymoron of human identity I could possibly imagine. The final book to establish the ultimate empowerment of excellence is Zen and the Art of Motorcycle Maintenance. This is, incredibly, a seriously underrated book. it overcomes the duality and weakness we are presented with over and over again in being human and presents a simple monoism without making it a religion or a deity to follow. What Robert Pirsig makes abundantly clear with his first hand experience teaching his classes in Bozeman, Montana, is quantifying results disempowers people to create excellence and leverage empowerment. It is only when he conceals the marks that he must give because of the system he lives in that the students do their best independent work. Quality may be compared but it has no price. When quality is based on creating empowerment, there is no price-to-value such status. There is no greater wealth. We tell stories about people who have overcome the system. But why do we enforce a disempowering system to overcome? Do you think we will have no story to tell past the point of fear? Look at the work you are doing an ask yourself if it can attain the absolute of empowering the most people in the most sustainable way possible to redundancy. Ask yourself if you are attached to the object of the work you were doing as the status in itself, or it is truly a trajectory to reach that ultimate goal of self and community empowerment. If your work is based on the mindset of believes that the bigger picture is full of bad people to overcome, if it is based on absolute scarcity, if it is based on the character for people to follow and not the idea itself that can be given freely to empower, then you're not being honest and it won't work and it isn't worth doing. Who is it that said doing the same thing the same way leads the same results? While you argue for empowerment and freedom on frameworks of weakness, this reinforces itself. If you really want to do something different, you must change the way you value yourself. It's got nothing to do with commodity currencies. BUXB itself would become redundant in the same way that currency almost is in Ayn Rand's intentional community (ARIC?). Other pioneers believe completely moving forward past quantified exchange would be impossible. But it is certainly achievable. Look at Trekonomics. No one buys the Replicator. It replicates for free, on demand. Wealth is in the discovery of empowering all people to do the same. We are not all heroes, but in BUXB, you are fully supported to be the creator you want to explore. A master does not hide his evolution of being. He welcomes your interest, but what you do with it is your opportunity to be your own master. Not in ritual, not in obedience, but in creating to empower the most people the best way you can. And if you prefer to follow the master, that's fine, too. However, the fear of fearing people for their objective in connecting with you is allayed in every transaction. There is no need to swindle anyone participating in the BUXB. that would be the equivalent of shooting yourself in the foot. Instead that could alienate you. more likely, he would would look at you strangely saying 'You can be paid to be educated. What on earth are you thinking?' If you are absolutely dogmatic to want resolution to the object of renewable eenegy, climate change, overpopulation, modern monetary theory, steady state economies, degrowth, sustainability/regeneration, environmental/ecological/resource-based economics, discrimination, crime, slavery, famine, without looking at revaluing wealth on qualitative frameworks, then you are playing the object of being a changemaker, an activist, an icon for something better without actually changing anything. There's a long list of that. Another story to tell doing the same thing the same way and not getting any results. If you feel I have an attachment to 'BUXB', then you're looking at me, not the model. Wrong target. It is a tool for you, not against you. And it's free. It has the means to achieve whatever empowered endgame you want. All I have done is change the currency model framework and revalue wealth for what it really is. Not that complicated. In this short time during the coronavirus, it's clear we can act fast globally if we want to. Let's try to do it with something empowering instead of disempowering as a means towards identity. Frederick Malouf
Zero-Knowledge Proof-of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies A Schnorr zero knowledge proof allows you to prove your knowledge of x to anyone that that wonders whether you really know the secret x value behind A, as follows: You the prover pick a random number r and send R = rG to the verifier. The verifier chooses a challenge c and sends it to you. You compute z = r – x*c and send it to the verifier ... The scalable, one-time set up zero knowledge proof framework we’ve developed is the first step in this direction. We are on a path, and are looking forward to creating, a comprehensive set of privacy-preserving techniques geared for an even wider spectrum of blockchain collaboration. Stay tuned for a technical announcement of this framework, and its planned applications in ... Zero Knowledge Protocol (or Zero Knowledge Password Proof, ZKP) is a way of doing authentication where no passwords are exchanged, which means they cannot be stolen. This is cool because it makes your communication so secure and protected that nobody else can find out what you’re communicating about or what files you are sharing with each other. Alice has zero-knowledge of the ball colour, ... Used in Blockchain like Bitcoin or Ethereum transactions, which keeps the transactions transparent while abstracting the sender/recipient details 3) In 2016, the Princeton Plasma laboratory demonstrated a technique for nuclear disagreement talks, without revealing information about its working. 4) Used in Authentication systems where one party ...
What is Bitcoin? Bitcoin Explained Simply for Dummies ...
How do you prove something without giving away all your data? Zero Knowledge Proofs could hold the answer. Alberto Sonnino, Research Student at UCL explains.... Boaz Barak Microsoft Research New England February 23, 2012 I'll describe a physical implementation of zero knowledge proofs whose goal is to verify that two physical objects are identical ... As opposed to this, we figured out some practical zero-knowledge algorithms that are simpler and practical to use on Hyperledger and they solve many problems of corporates and government. Rajan Behal, Managing Director, KPMG Karla Clarke, Manager, KPMG Come and learn how “zero-knowledge (ZK) proofs” breakthrough in cryptography is enabling privacy-preserving authentication. MIT Bitcoin Expo 2019 - Zero Knowledge Proofs and Smart Contracts with Bulletproofs - Duration: 27:11. MIT Bitcoin Club Recommended for you. 27:11. NAS vs The Cloud – Which one is better ...