quantum mechanics - Is (energetic) degeneracy a physical

Technical: Taproot: Why Activate?

This is a follow-up on https://old.reddit.com/Bitcoin/comments/hqzp14/technical_the_path_to_taproot_activation/
Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners?
And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess.
First, let's consider some principles of Bitcoin.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so).
So, how does Taproot affect those principles?

Taproot and Your /Coins

Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash).
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input).
However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits!
Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh?
With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save!
And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well!
(P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1)
Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service!
So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win!
(even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot)
And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!

Taproot and Your Contracts

No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade.
So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust.
Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade.
However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade.
In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address.
Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants).
But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer).
Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos).
(technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).

Taproot and Your Contracts, Part 2: Cryptographic Boogaloo

Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code.
This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded.
And you can do that, with HTLCs, today.
Of course, HTLCs do have problems:
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar".
Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given public key to you.
Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige).
(Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key).
So:
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script.
(technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)

Quantum Quibbles!

Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable??
Well, in theory yes. In practice, they probably are not.
It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash.
When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key.
So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key.
(public keys should be public, that's why they're called public keys, LOL)
And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions.
So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort.
Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers.
For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
So:
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).

Summary

I Wanna Be The Taprooter!

So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!

But I Hate Taproot!!

That's fine!

Discussions About Taproot Activation

submitted by almkglor to Bitcoin [link] [comments]

[ Bitcoin ] Technical: Taproot: Why Activate?

Topic originally posted in Bitcoin by almkglor [link]
This is a follow-up on https://old.reddit.com/Bitcoin/comments/hqzp14/technical_the_path_to_taproot_activation/
Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners?
And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess.
First, let's consider some principles of Bitcoin.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so).
So, how does Taproot affect those principles?

Taproot and Your /Coins

Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash).
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input).
However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits!
Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh?
With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save!
And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well!
(P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1)
Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service!
So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win!
(even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot)
And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!

Taproot and Your Contracts

No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade.
So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust.
Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade.
However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade.
In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address.
Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants).
But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer).
Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos).
(technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).

Taproot and Your Contracts, Part 2: Cryptographic Boogaloo

Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code.
This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded.
And you can do that, with HTLCs, today.
Of course, HTLCs do have problems:
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar".
Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given private key to you.
Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige).
(Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key).
So:
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script.
(technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)

Quantum Quibbles!

Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable??
Well, in theory yes. In practice, they probably are not.
It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash.
When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key.
So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key.
(public keys should be public, that's why they're called public keys, LOL)
And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions.
So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort.
Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers.
For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
So:
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).

Summary

I Wanna Be The Taprooter!

So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!

But I Hate Taproot!!

That's fine!

Discussions About Taproot Activation

almkglor your post has been copied because one or more comments in this topic have been removed. This copy will preserve unmoderated topic. If you would like to opt-out, please send a message using [this link].
[deleted comment]
[deleted comment]
[deleted comment]
submitted by anticensor_bot to u/anticensor_bot [link] [comments]

Some very important points that most people do not understand about Bitcoin

Point 1)
Most people do not understand that you can't send money over internet, but only information. Bitcoin is the first digital settlement layer.
When I send a picture to someone on Facebook messenger, I don't actually send a picture. I send information about the pictures structure, and the picture gets restructured on the client side (the cellphone) of the user I send it to. Copy of the information is being sent, not the picture itself. So you can't send money over internet, it is not possible, only information.
If I have a bank account at some bank, and I send $50 dollars to another person in the same bank by using the banks website, then a transaction happens between two people within the same infrastructure, which is the banks back-end system and database. So the banks system just subtracts $50 dollars from one person and adds $50 dollars to another person. But no money has moved, only information has been edited. But if I send money to someone that uses another Bank, then this bank has its own infrastructure which is independent of the first. So Bank1 tells Bank2 that they have a user that wants to send money to a user of the other bank. So Bank1 subtracts $50 from User1, and Bank2 adds $50 to User2, but now Bank1 owes Bank2 $50, why? Because you can't send money over internet. So they have to settle the difference between them with some kind of a settlement system, (cash, gold or a third party like a central bank). This difference can be the result of many transactions between many users and can be millions of dollars of worth, the settlement can be done periodically for example every 6 months.
With Bitcoin, because of how the system works, it is almost as if you can send value over internet for the first time, even though you don't really send value, you still send information, but since the infrastructure is global, it is like the first example, it is as if the world has (one large bank infrastructure), that is fully automated and which no one controls.
This alone makes Bitcoin extremely valuable, because it is a trust less digital settlement layer which is extremely secure and not dependent on one particular nation or organisation.
Point 2)
There can never be more than 21 million Bitcoin. This is very hard for people to grasp. Because what do you mean there can never be more than 21 million bitcoin? It sounds like a game, such a scam... People do not understand that Bitcoin is not normal software. In normal software the developers can change the code as they want and publish the code when they want. They do not understand that Bitcoin is a software that is not like a normal software. You can't actually change the number even if the number is programmed in. Which of-course most people will deny, because it makes no sense for most people. They do not understand that even though it is theoretically possible to change it, it is practically almost impossible. It is theoretically possible for me to convince half of Sweden to burn half of their money, but practically impossible. Just because something is theoretically possible, doesn't mean that it will happen within a time frame, or even in your lifetime. In order for the 21 million supply to change, most people in the Bitcoin community needs to agree on it, which is practically impossible. Miners have to change to the new protocol and so on. Not going to happen.
When gold treasures were lost in the past, someone else could find them. Gold practically never completely disappears, it is a chemical element. With Bitcoin, once it is lost it is practically lost forever (put aside quantum computing for now and other theoretical unforeseeable events). 21 million is only the upper theoretical limit. Bitcoin will be more and more scarce as time goes by. Gold is not like this. Gold has an inflation rate of 1,5% every year. The reason it is constant is because even if the stock gets bigger, the flow into the stock also gets bigger because of better mining capabilities, so you can look at it as constant inflation of 1.5% every year. With Bitcoin, not only do the stock to flow ratio go up every halvening, and the flow into bitcoin not only decreases with time, but almost goes into negative because of lost coins every year. This is completely insane and people do not understand this. If you combine this almost deflationary nature of Bitcoin with extreme bullish market sentiment then you will realize that no one knows what is going to happen in the future because wrapping your head around all this and to come to a conclusion about the Bitcoin price will make you sound absolutely delusional to most people.
Point 3)
People think that $100,000 bitcoin is wishful thinking and that there is not enough money in the world for Bitcoin to be worth millions of dollars. Which I can assure you is false. Bitcoin can even be worth $50 million dollars per coin, which would make 2 satoshi 1 dollar. Even if one Bitcoin transaction would cost 10 000 Satoshi. You might say, that's not possible, whats the point if one transaction is so expensive. Again, you don't need to actually do a transfer of money, as in the first example of point 1, virtual transactions on bank level can happen, or on Coinbase. You can send 100 satoshi to someone and pay 1 satoshi in fee "on the bank level", not on chain, banks or exchanges then will settle the difference as they want. At least with Bitcoin you have the option to be you own bank, even if that will cost you more, you still have the option. This is already happening in front of your eyes. Banks like Dutch ING, Deutsche bank, are already working on custody services for cryptocurrencies. And even exchanges want to operate as banks and exchanges like Coinbase are working to get license for this. This is already happening and it is the correct move forwards, a mix between the legacy banking system and cryptocurrencies. You can already spend your Bitcoin with Coinbase Visa Card or similar services. Most people are too lazy and stupid to operate like us with their own wallets, it is a fact well known.
In terms of the price, money inflow is not the same as market cap. Take for instance the following simple scenario. I own 100% of the shares of my own company and I decide to sell 10% of the company for 1 million USD, which will value my whole company at 10 million USD, so 1 million flow into my company leads to 10x market cap of 10 million USD. For Bitcoin to have 21 trillion market cap, Bitcoin does not need 21 trillion of money inflow. Bitcoin price is dependent on market sentiment, if the market sentiment is such that very few people want to sell their coins because the price keeps going up then you might have 100x market cap of the money inflow. So 1 billion USD in money inflow translates to 100 billion USD in market cap. The multiplier can be 10x, 2x or 50x, all depends on market sentiment and time period. So an inflow of 10 trillion USD in 10 years might lead to 100 trillion USD market cap of BTC and 5 million USD per Bitcoin.
Bitcoin value have no roof, the price might actually just keep going up and up and up and up and up. We have never had something that is absolutely scarce, and global, and seen as an alternative form of money, when the rest of the world keeps bubbling up. There is no limit on the BTC price because the whole world works with a bubbly system, and the way Bitcoin is price discovered, is a guaranteed insane BTC price in the future. Even $100 million USD per Bitcoin in 50 years before I am dead is possible.
Point 4)
Fiat does not need to die, and Bitcoin does not need to take over in order for Bitcoin to have "ridiculous price". No financial crisis is needed. Actually what you want is things to just continue as they have done in the last 10 years. No too extreme events. Just "small events" here and there. You can't change human nature, it is inevitable. Bitcoin is so ingrained into our world that there is no way back. There will be people with whole Bitcoin, and people without. Just like people with gold and stock investments and real estate, and people without those things. No insane events, this is all normal.
Point 5)
Bitcoin has won as the financial cryptocurrency. No flippening will happen. The only flippening will be with gold and fiat currencies. If I wanted to, I could have developed a system like PayPal in 1 month time, and it would be able to do 5000 transactions per second because I would use MySQL and SSD, but no one would use my service because they would not trust me because they have no idea who I am and what my service is, and there is no one to send money too, so the network is not there. Bitcoin has won because security and network effect is way more important than transactions per second. Transactions per second will be dealt with on bank level, exchange level, or layer 2 solutions. This is already clear to me. Bitcoin has won.
Point 6)
In order to understand Bitcoin and what will happen in the future, you have to be able to see things that are not in front of you. You can't compare Bitcoin to Tulip mania, or even Gold. Because something like Bitcoin has never existed before and you have to think about it's properties and try to understand it with human nature and with how the world works and how everything keeps increasing, and Bitcoin is the thing that does not increase in supply. You will eventually accept the unnatural thought of Bitcoin never stopping going up in value, which is something that is hard to come to terms with, because it feels unnatural, "and it could not possibly be so".
Point 7)
The Gini coefficient of Bitcoin is not a big deal. I used to think that it was unfair that some people had 1,000 BTC, 10,000 BTC, or even 50,000 BTC. And I was afraid that they might dump their coins into the market and crash it. I have now realised that these people are smart people and they think like me, and they won't just dump their whole BTC holding on the market as that might be a very bad move for them. It is like when a majority holder of a company, like Jeff Bezos and Amazon, understands that he can't sell all of his shares in one go as that would effect Amazon stock value too much and would not be smart. It is best to sell when the price goes up, but then when they sell the BTC will just be eaten up by other people, and they will be at a loss in the longer term. And the other thing is that perhaps there is no other smart place to put that fiat money, Bitcoin might just be the best place to keep those amounts of money. Someone with a very large holding has two options. He can either sell his BTC, in which case the price would go down but the Bitcoin would be spread out between potentially thousands of new users, or he might decide to never sell. If he decides to never sell, it is as if those Bitcoins are lost forever and that is good for the Bitcoin price and Bitcoin in general. If he decides to sell then Bitcoin will be divided more equally among many users which is also a good thing for Bitcoin because that increases the network effect, and after he sells he no longer has the power to drive the price down, but now he sits on a very large fiat holding, he might even buy back at a higher price and drive the price higher. I know that if I had 10,000 BTC, I would sell 1,000 BTC and buy a house and a car and whatever I wanted, and sell another 1,000 BTC to diversify into some other assets. And keep 8,000 BTC because I don't know of anywhere else to put that kind of money into good work. I believe in Bitcoin so as an investor it makes sense to keep it here. I probably would never sell because I would never need anything else after the initial 1,000 BTC sell.
Bitcoin is like a black hole that sucks in the Earths monetary resources over time. Most people that bought really early and were smart enough to hold all the way to these prices will only sell what they need to sell and keep the rest in BTC. Some of them might want to speculate and try to time the ATH, only to buy back in with most of the fiat they sold. Which means that even if money goes out of the market, it only goes out of the market temporarily, only to get back in at hopefully lower prices. And so the market grows, and grows and grows over time.
Point 8)
Bitcoin has intrinsic value. When people like Peter Schiff say that gold has intrinsic value because gold can be used in electronics and aviation and therefore gold has value but Bitcoin has no value because it has no intrinsic value, you have to take a pause and do some critical thinking. Can you imagine 16th century pirates looking to find a gold treasure worth an insane amount because they knew gold had value because of electronics and aviation? This is clearly absurd. Gold has been used as money for thousands of years and electronics and aviation was not even a thing 150 years ago. Gold has value because it is globally scarce. Bitcoin is absolutely verifiable scarce. Bitcoin has intrinsic value because of it's monetary policy and because you can carry millions of dollars of value by remembering only 24 words in your head, and carry that value wherever you want and no one can stop you, that is intrinsic value.
People had a hard time understanding that a website like Facebook could be worth billions of dollars, because it was not physical, it was "just a website". Even a website like Google search is not physical and still it has immense value. It is valuable information and it provides a good service, and that has value, it does not have to be physical and tangible.
submitted by 21btc to Bitcoin [link] [comments]

Threshold Signature Explained— Bringing Exciting Applications with TSS

Threshold Signature Explained— Bringing Exciting Applications with TSS
— A deep dive into threshold signature without mathematics by ARPA’s cryptographer Dr. Alex Su

https://preview.redd.it/cp0wib2mk0q41.png?width=757&format=png&auto=webp&s=d42056f42fb16041bc512f10f10fed56a16dc279
Threshold signature is a distributed multi-party signature protocol that includes distributed key generation, signature, and verification algorithms.
In recent years, with the rapid development of blockchain technology, signature algorithms have gained widespread attention in both academic research and real-world applications. Its properties like security, practicability, scalability, and decentralization of signature are pored through.
Due to the fact that blockchain and signature are closely connected, the development of signature algorithms and the introduction of new signature paradigms will directly affect the characteristics and efficiency of blockchain networks.
In addition, institutional and personal account key management requirements stimulated by distributed ledgers have also spawned many wallet applications, and this change has also affected traditional enterprises. No matter in the blockchain or traditional financial institutions, the threshold signature scheme can bring security and privacy improvement in various scenarios. As an emerging technology, threshold signatures are still under academic research and discussions, among which there are unverified security risks and practical problems.
This article will start from the technical rationale and discuss about cryptography and blockchain. Then we will compare multi-party computation and threshold signature before discussing the pros and cons of different paradigms of signature. In the end, there will be a list of use cases of threshold signature. So that, the reader may quickly learn about the threshold signature.
I. Cryptography in Daily Life
Before introducing threshold signatures, let’s get a general understanding of cryptography. How does cryptography protect digital information? How to create an identity in the digital world? At the very beginning, people want secure storage and transmission. After one creates a key, he can use symmetric encryption to store secrets. If two people have the same key, they can achieve secure transmission between them. Like, the king encrypts a command and the general decrypts it with the corresponding key.
But when two people do not have a safe channel to use, how can they create a shared key? So, the key exchange protocol came into being. Analogously, if the king issues an order to all the people in the digital world, how can everyone proves that the sentence originated from the king? As such, the digital signature protocol was invented. Both protocols are based on public key cryptography, or asymmetric cryptographic algorithms.


“Tiger Rune” is a troop deployment tool used by ancient emperor’s, made of bronze or gold tokens in the shape of a tiger, split in half, half of which is given to the general and the other half is saved by the emperor. Only when two tiger amulets are combined and used at the same time, will the amulet holder get the right to dispatch troops.
Symmetric and asymmetric encryption constitute the main components of modern cryptography. They both have three fixed parts: key generation, encryption, and decryption. Here, we focus on digital signature protocols. The key generation process generates a pair of associated keys: the public key and the private key. The public key is open to everyone, and the private key represents the identity and is only revealed to the owner. Whoever owns the private key has the identity represented by the key. The encryption algorithm, or signature algorithm, takes the private key as input and generate a signature on a piece of information. The decryption algorithm, or signature verification algorithm, uses public keys to verify the validity of the signature and the correctness of the information.
II. Signature in the Blockchain
Looking back on blockchain, it uses consensus algorithm to construct distributed books, and signature provides identity information for blockchain. All the transaction information on the blockchain is identified by the signature of the transaction initiator. The blockchain can verify the signature according to specific rules to check the transaction validity, all thanks to the immutability and verifiability of the signature.
For cryptography, the blockchain is more than using signature protocol, or that the consensus algorithm based on Proof-of-Work uses a hash function. Blockchain builds an infrastructure layer of consensus and transaction through. On top of that, the novel cryptographic protocols such as secure multi-party computation, zero-knowledge proof, homomorphic encryption thrives. For example, secure multi-party computation, which is naturally adapted to distributed networks, can build secure data transfer and machine learning platforms on the blockchain. The special nature of zero-knowledge proof provides feasibility for verifiable anonymous transactions. The combination of these cutting-edge cryptographic protocols and blockchain technology will drive the development of the digital world in the next decade, leading to secure data sharing, privacy protection, or more applications now unimaginable.
III. Secure Multi-party Computation and Threshold Signature
After introducing how digital signature protocol affects our lives, and how to help the blockchain build identities and record transactions, we will mention secure multi-party computation (MPC), from where we can see how threshold signatures achieve decentralization. For more about MPC, please refer to our previous posts which detailed the technical background and application scenarios.
MPC, by definition, is a secure computation that several participants jointly execute. Security here means that, in one computation, all participants provide their own private input, and can obtain results from the calculation. It is not possible to get any private information entered by other parties. In 1982, when Prof. Yao proposed the concept of MPC, he gave an example called the “Millionaires Problem” — two millionaires who want to know who is richer than the other without telling the true amount of assets. Specifically, the secure multiparty computation would care about the following properties:
  • Privacy: Any participant cannot obtain any private input of other participants, except for information that can be inferred from the computation results.
  • Correctness and verifiability: The computation should ensure correct execution, and the legitimacy and correctness of this process should be verifiable by participants or third parties.
  • Fairness or robustness: All parties involved in the calculation, if not agreed in advance, should be able to obtain the computation results at the same time or cannot obtain the results.
Supposing we use secure multi-party computation to make a digital signature in a general sense, we will proceed as follows:
  • Key generation phase: all future participants will be involved together to do two things: 1) each involved party generates a secret private key; 2) The public key is calculated according to the sequence of private keys.
  • Signature phase: Participants joining in a certain signature use their own private keys as private inputs, and the information to be signed as a public input to perform a joint signature operation to obtain a signature. In this process, the privacy of secure multi-party computing ensures the security of private keys. The correctness and robustness guarantee the unforgeability of the signature and everyone can all get signatures.
  • Verification phase: Use the public key corresponding to the transaction to verify the signature as traditional algorithm. There is no “secret input” during the verification, this means that the verification can be performed without multi-party computation, which will become an advantage of multi-party computation type distributed signature.
The signature protocol constructed on the idea of ​​secure multiparty computing is the threshold signature. It should be noted that we have omitted some details, because secure multiparty computing is actually a collective name for a type of cryptographic protocol. For different security assumptions and threshold settings, there are different construction methods. Therefore, the threshold signatures of different settings will also have distinctive properties, this article will not explain each setting, but the comparative result with other signature schemes will be introduced in the next section.
IV. Single Signature, Multi-Signature and Threshold Signature
Besides the threshold signature, what other methods can we choose?
Bitcoin at the beginning, uses single signature which allocates each account with one private key. The message signed by this key is considered legitimate. Later, in order to avoid single point of failure, or introduce account management by multiple people, Bitcoin provides a multi-signature function. Multi-signature can be simply understood as each account owner signs successively and post all signatures to the chain. Then signatures are verified in order on the chain. When certain conditions are met, the transaction is legitimate. This method achieves a multiple private keys control purpose.
So, what’s the difference between multi-signature and threshold signature?
Several constraints of multi-signature are:
  1. The access structure is not flexible. If an account’s access structure is given, that is, which private keys can complete a legal signature, this structure cannot be adjusted at a later stage. For example, a participant withdraws, or a new involved party needs to change the access structure. If you must change, you need to complete the initial setup process again, which will change the public key and account address as well.
  2. Less efficiency. The first is that the verification on chain consumes power of all nodes, and therefore requires a processing fee. The verification of multiple signatures is equivalent to multiple single signatures. The second is performance. The verification obviously takes more time.
  3. Requirements of smart contract support and algorithm adaptation that varies from chain to chain. Because multi-sig is not naturally supported. Due to the possible vulnerabilities in smart contracts, this support is considered risky.
  4. No anonymity, this is not able to be trivially called disadvantage or advantage, because anonymity is required for specific conditions. Anonymity here means that multi-signature directly exposes all participating signers of the transaction.
Correspondingly, the threshold signature has the following features:
  1. The access structure is flexible. Through an additional multi-party computation, the existing private key sequence can be expanded to assign private keys to new participants. This process will not expose the old and newly generated private key, nor will it change the public key and account address.
  2. It provides more efficiency. For the chain, the signature generated by the threshold signature is not different from a single signature, which means the following improvements : a) The verification is the same as the single signature, and needs no additional fee; b ) the information of the signer is invisible, because for other nodes, the information is decrypted with the same public key; c) No smart contract on chain is needed to provide additional support.
In addition to the above discussion, there is a distributed signature scheme supported by Shamir secret sharing. Secret sharing algorithm has a long history which is used to slice information storage and perform error correction information. From the underlying algorithm of secure computation to the error correction of the disc. This technology has always played an important role, but the main problem is that when used in a signature protocol, Shamir secret sharing needs to recover the master private key.
As for multiple signatures or threshold signature, the master private key has never been reconstructed, even if it is in memory or cache. this short-term reconstruction is not tolerable for vital accounts.
V. Limitations
Just like other secure multi-party computation protocols, the introduction of other participants makes security model different with traditional point-to-point encrypted transmission. The problem of conspiracy and malicious participants were not taken into account in algorithms before. The behavior of physical entities cannot be restricted, and perpetrators are introduced into participating groups.
Therefore, multi-party cryptographic protocols cannot obtain the security strength as before. Effort is needed to develop threshold signature applications, integrate existing infrastructure, and test the true strength of threshold signature scheme.
VI. Scenarios
1. Key Management
The use of threshold signature in key management system can achieve a more flexible administration, such as ARPA’s enterprise key management API. One can use the access structure to design authorization pattern for users with different priorities. In addition, for the entry of new entities, the threshold signature can quickly refresh the key. This operation can also be performed periodically to level up the difficulty of hacking multiple private keys at the same time. Finally, for the verifier, the threshold signature is not different from the traditional signature, so it is compatible with old equipments and reduces the update cost. ARPA enterprise key management modules already support Elliptic Curve Digital Signature Scheme secp256k1 and ed25519 parameters. In the future, it will be compatible with more parameters.

https://preview.redd.it/c27zuuhdl0q41.png?width=757&format=png&auto=webp&s=26d46e871dadbbd4e3bea74d840e0198dec8eb1c
2. Crypto Wallet
Wallets based on threshold signature are more secure because the private key doesn’t need to be rebuilt. Also, without all signatures posted publicly, anonymity can be achieved. Compared to the multi-signature, threshold signature needs less transaction fees. Similar to key management applications, the administration of digital asset accounts can also be more flexible. Furthermore, threshold signature wallet can support various blockchains that do not natively support multi-signature, which reduces the risk of smart contracts bugs.

Conclusion

This article describes why people need the threshold signature, and what inspiring properties it may bring. One can see that threshold signature has higher security, more flexible control, more efficient verification process. In fact, different signature technologies have different application scenarios, such as aggregate signatures not mentioned in the article, and BLS-based multi-signature. At the same time, readers are also welcomed to read more about secure multi-party computation. Secure computation is the holy grail of cryptographic protocols. It can accomplish much more than the application of threshold signatures. In the near future, secure computation will solve more specific application questions in the digital world.

About Author

Dr. Alex Su works for ARPA as the cryptography researcher. He got his Bachelor’s degree in Electronic Engineering and Ph.D. in Cryptography from Tsinghua University. Dr. Su’s research interests include multi-party computation and post-quantum cryptography implementation and acceleration.

About ARPA

ARPA is committed to providing secure data transfer solutions based on cryptographic operations for businesses and individuals.
The ARPA secure multi-party computing network can be used as a protocol layer to implement privacy computing capabilities for public chains, and it enables developers to build efficient, secure, and data-protected business applications on private smart contracts. Enterprise and personal data can, therefore, be analyzed securely on the ARPA computing network without fear of exposing the data to any third party.
ARPA’s multi-party computing technology supports secure data markets, precision marketing, credit score calculations, and even the safe realization of personal data.
ARPA’s core team is international, with PhDs in cryptography from Tsinghua University, experienced systems engineers from Google, Uber, Amazon, Huawei and Mitsubishi, blockchain experts from the University of Tokyo, AIG, and the World Bank. We also have hired data scientists from CircleUp, as well as financial and data professionals from Fosun and Fidelity Investments.
For more information about ARPA, or to join our team, please contact us at [email protected].
Learn about ARPA’s recent official news:
Telegram (English): https://t.me/arpa_community
Telegram (Việt Nam): https://t.me/ARPAVietnam
Telegram (Russian): https://t.me/arpa_community_ru
Telegram (Indonesian): https://t.me/Arpa_Indonesia
Telegram (Thai): https://t.me/Arpa_Thai
Telegram (Philippines):https://t.me/ARPA_Philippines
Telegram (Turkish): https://t.me/Arpa_Turkey
Korean Chats: https://open.kakao.com/o/giExbhmb (Kakao) & https://t.me/arpakoreanofficial (Telegram, new)
Medium: https://medium.com/@arpa
Twitter: u/arpaofficial
Reddit: https://www.reddit.com/arpachain/
Facebook: https://www.facebook.com/ARPA-317434982266680/54
submitted by arpaofficial to u/arpaofficial [link] [comments]

EDC Blockchain and ECRO System in the List of Major Blockchain Events 2019!

EDC Blockchain and ECRO System in the List of Major Blockchain Events 2019!
https://preview.redd.it/1n0i4hayx4a41.jpg?width=1307&format=pjpg&auto=webp&s=a1ddf95e43b81cacc10b29824c162c2d19bc2fc0
2019 showed that the Blockchain industry justifies the status of a technological revolution. Bitcoin's capitalization exceeded that of countries such as Turkey, Pakistan and South Africa. And China, India, and Nigeria have already bought cars, real estate and various services for an EDC coin!
Let's think about these and other events of last year, which had the greatest resonance.
Adoption of the cryptography law in China
Speculation and fiction are officially over! China at the state level said "yes" to Blockchain technology! The Chinese Communist Party now directly manages the Central Cryptography Agency. The agency will promote and support cryptography research, protect intellectual property rights and promote the development of public/private key technology, according to Primitive Foundation partner Dovey Wan.
Against this background, the Central Bank of China started talking about creating its own stablecoin, and Chinese President Xi Jinping said that the blockchain will be the main technology for important innovation breakthroughs! The Crypto market reacted instantly: bitcoin rose by more than $2000 in one week of October (from $7500 to $9500), while EDC quotations reached 1 US cents. The optimism then decreased again when it became clear that the Chinese are still fundamentally distinguishing between the notions of "Blockchain" and "Cryptocurrencies".
Bitcoin futures launch
On September 23, 2019, ICE Corporation (International Exchange) started trading daily and month bitcoin futures on the Bakkt platform.
The platform was officially approved by the U.S. Futures Trading Commission (CFTC), and bitcoin deposits of users are insured for $125 million.
The appearance of this platform was associated with certain expectations: the growth of bitcoin to $ 20,000, and the accession of institutional investors. As we already know, these forecasts did not come true, and the peak daily trading volume did not exceed $43 million. Nevertheless, the expectations from this news remain high: both the prestige and liquidity of the market can only improve.
Project Libra's failure
On June 18, the release of Facebook's own cryptographic currency called Libra was to be launched. By all primary signs, the coin could become a market favorite, and the project participants included Visa, Mastercard, eBay, and other major online platforms.
However, it did not work out: problems with regulators reached the hearings in the U.S. Congress, where Mark Zuckerberg himself had to personally promise that Libra will not be launched until all regulators approve of it, and Facebook may even leave the founders.
Project stoppage TON
GRAM Token from Telegram is another "loser" in the big games of life. The developers managed to make the initial offer (ICO) for 1.7 billion dollars and even presented a compiled test wallet. But the U.S. Securities and Exchange Commission (SEC) expressed confidence that GRAM at the token trading stage was sold illegally, falling under the definition of a security.
Now Pavel Durov is facing long legal proceedings, and the project is frozen for an indefinite period. This "triumph" of U.S. market regulators once again underscores the fact that big money at the stage of the birth of new players on the crypto market plays a much smaller role than the real value of coins and technology.
EDC Blockchain Coin constructor for entrepreneurs
Producers of goods and services and businessmen in various niches can now create their own bonus token or a full-fledged cryptographic currency using PoS mining without having at their disposal a team of IT professionals, ICO access opportunities or huge investments. Specialists of the EDC Blockchain platform offered the market a technological coin constructor and ready-made package solutions for the development of small and medium businesses.
It has never been easier to token and scale any project or startup. The constructor is available to all users of the EDC platform, which offers customers a number of bonuses (for example, an automatic listing of new coins on partner exchanges, marketing support and advertising at the level of its international community). A real step forward in business tokenization.
Start of a self-contained blockchain ecosystem ECRO System
Specialists of ECRO Chain Holding, under whose leadership ECRO System projects function, were able to create a "bridge" between the crypto industry and real business.
ECRO System provides an environment for cooperation between manufacturers, sellers and consumers anywhere in the world, including global marketplace, exchange, trading platform, a launching platform for startups, additional services and even an academy for educational purposes. In a global eco-system using a blockchain, a variety of goods and services are safely sold and purchased, any coins are exchanged conveniently and quickly, and new technology projects are made possible. And the ecosystem is expanding geographically by training its own marketers. Application of blockchain, technologies of an artificial intellect, a crypto-merchant allow ECRO System to create conditions for the reliable digital economy.
Crypto trading authorization for German banks
The Bundesrat passed a law allowing German banking institutions to officially sell and buy cryptocurrencies. Discussions in financial circles are still ongoing, as confidential transfers open up space for illegal transactions and money laundering. But the fact is that Vice-Chancellor of Germany Olaf Scholz advocated the creation of a national digital currency, and Sven Hildebrandt, head of the consulting company DLC, is confident that Germany will become a "cryptocurrency paradise".
Official cooperation of Ukraine with Binance Crypto Exchange
Binance International exchange has signed an official memorandum on cooperation with the Ministry of Digital Transformation of Ukraine. Popularization and legalization of the cryptographic industry in Ukraine led to a sharp increase in the interest of global exchange and trading services to start working in one of the largest European countries.
On November 6, the Verkhovna Rada adopted a draft law on the implementation of FATF rules, which regulates all basic concepts and legal aspects of virtual assets that can be considered as property or can be used for payment and investment purposes.
The draft law on asset tokenization, which will allow private and public companies to conduct commercial transactions with their assets in the form of tokens or crypto-stocks, is under development.
We are living at the peak of historical technology development when the speed of real technical changes outpaces even the speed of human imagination. The year 2020 could be a "quantum leap" in cryptographic technology around the world.
The world economy, as well as small and medium businesses, seems to be best prepared for the wide range of opportunities offered by the Blockchain. The EDC Blockchain and ECRO System project teams will continue to develop their products and services in order to maximize the quality of life of modern people through blockchain innovations. We wish you a successful 2020 year filled with new technologies!
via https://blockchain.mn
#edcblockchain #cryptocurrency #global_platform #graphene #lpos #coin_constructor #masternode #leasing #edc #edccoin #edcmining
submitted by EDC-Blockchain to u/EDC-Blockchain [link] [comments]

Beginners Introduction Guide for Pundi X

Beginners Introduction Guide for Pundi X
https://pundix.com


https://i.redd.it/ad9tfd3rjpi21.jpg

Executive Summary;


Pundi X’s mission is to make buying crypto currency as easy as buying bottled water. As the Walmart and 7-Eleven of crypto currency, we want users to buy and use crypto currency anytime anywhere.
Pundi X a leading Singaporean-based blockchain company recently ranked by KPMG as one of the world’s “Emerging 50” firms that are at the forefront of innovative technologies and practices in its 2018 Fintech100 report of Leading Global Fintech Innovators.
We have a product poised for mass adoption infrastructure, where consumers can buy and sell crypto at any participating retailer and spend their crypto.
For every transaction, through the XPOS (which is a point of sales) machine, there will be a token burn coming. Token burns mean reduced supply over time. The more machines in outlets and more people using crypto means supply will decrease, therefore the demand will increase. Pundi X will not be an erc20 token for long, Pundi X is creating its own blockchain called the f(x) blockchain.


https://i.redd.it/z3mp6tfp1qi21.jpg
- Instant transactions worldwide 24/7.
- No monthly charges or any hidden fees.
- Merchants will receive revenue back, a whopping 65% from the total transaction fee, on every single Crypto related transactions.
- Consumers can readily buy/sell Crypto currencies straight from the actual XPOS device.
- No Banks needed, hence serving the un-banked and the under-banked population.
- Merchants can receive payment in their local fiat to avoid Crypto fluctuations.
- Supports Mobile payments, NFC, QR Code and all current traditional payments.
- The POS can setup your inventory, loyalty programs, ads, and print smart receipts.
- Avoid high Visa/MasterCard/Credit Card fees using XPOS solutions.

Statistics;


- 5,500 XPOS Dispatched already to 25 countries.
- Tested over a two day period in the Historical first ever crypto mass event with "Ultra Taiwan Music Festival" with 30,000 + attendees, went flawlessly, (see videos on Pundix Official YouTube Channel).
- 7,000 More XPOS going out soon.
- 300,000 XPASS dispatched.
- 60,000 + Transactions over the XPOS.
- 20 + Top Crypto Exchanges.
- 45 + Events attended.
- 150 + Team members.
- 7 Head Offices globally.

Function X Blockchain – A game Changer:



https://i.redd.it/5ibzoexntpi21.jpg

The f(x) (short for Function X) blockchain under current test environments, each XPOS is an f(x) node; all data from the XPOS will be fully encrypted and stored in f(x) low level IPFS. Our IPFS is one that is specially designed for XPOS, f(x) and other smart devices. The f(x) public ledger will record all transactions, and the chain deploys sharding and PBFT.
At Pundi X, we believe that open source is the way to go and to strengthen the blockchain community. We will gradually enable all of our operating system and f(x) chain’s code to be open source. It will be free for all Dapp software and hardware manufacturers to develop products for the f(x) ecosystem, hence achieving true decentralization. Let’s all work together and re-engineer a decentralized world.

10x for Speed;
Visa can run 7,000–20,000 transactions-per-second (“TPS”). Any blockchain that offers small multiples of speed improvement is unlikely to displaced a tried-and-tested system like Visa. A 10X increase means 200,000K TPS has to be achieved.
Our upcoming blockchain called Function X (fx for short), we have to make sure we are comparable if not faster, at 10X it is at least 200,000 TPS, not just on paper, but in real application.
Sharding depends heavily on the availability of nodes. Confirmation processes increase by an order of magnitude when you increase node counts, we are already deploying the XPOS which will act as nodes.

10x for Scaling;
Scalability in a restaurant means how fast can you serve your meals, the faster you can scale, the more business you can have. Therefore, companies like McDonald’s spend a lot of effort shortening the time between ordering and checkout to serve its customers.
Scalability in blockchain is similar: it depends on the code (how fast can the burgers be flipped) and also nodes (how many cashiers can confirm the order). So whose code is the best? We will only know when proven. And what about nodes? The blockchain with the largest nodes will prevail. Currently Ethereum has the most nodes, but maybe not for long.

10x for Consensus;
And what about nodes? The blockchain with the largest nodes will prevail. Currently Ethereum has the most nodes, but maybe not for long.
With our minimum plan to roll out 100,000 XPOS in three years, we will be able to scale up transaction numbers significantly as the number of XPOS devices increases.
Can we do much more than 200,000 TPS? Let’s analyze: Sharding is a process of dividing a global network into pieces of a local network.
Each local network would then take charge of two-thirds consensus so that a particular transaction is verified in the local network and then broadcast to the global network.

Five Pillars of Function X Blockchain;

  1. Fx Operation System - (ROM) Android-modified blockchain-enabled operating system. Users can switch seamlessly between fx blockchain and regular everyday android mode.
  2. FXTP - (Web Protocol). Decentralized transmission protocol (P2P) and similar to https.
  3. Docker - Open Source platform for developers to build, ship, and run distributed applications (DApps).
  4. IPFS - Storage of various contents.
  5. Public Blockchain - A High performance and secure public blockchain.

More details here;
The Road ahead: https://medium.com/pundix/f-x-%EC%95%9E%EC%9C%BC%EB%A1%9C-%EA%B0%80%EC%95%BC%ED%95%A0-%EA%B8%B8-cb258f0e397c

The XPhone;


The XPhone, and the first true blockchain phone call, we demonstrated to thousands that we had a new protocol for communication that could take blockchain beyond the world of financial transfers. The X phone is powered by Function X OS which is based off the Android OS 9.0, so there is a backward compatibility with any Android apps.
Blockchain-based calling and messaging can be toggled on and off on the phone operating system, which builds upon Android 9.0.
On the blockchain mode, the services in the XPhone can operate completely independently of centralized carriers. Users can route phone calls, messages, and data via blockchain nodes without the need for centralized service providers.
The XPhone is in fact the first mobile phone that can run completely on a decentralized ecosystem powering telephony, messaging, and data transmission. The XPhone itself significantly expands the use of blockchain technology beyond financial transfers.
Every XPhone is also a node on the network to contribute to the operation of the blockchain ecosystem. Content and connectivity are organized in a distributed, node-to-node manner.
https://i.redd.it/ne3iufycqqi21.png

- Every device in the Function X ecosystem will be a node and each will have its own address and private key, uniquely linked to their node names, not unlike traditional URL and IP addresses.

- The OS can be overlayed to any existing Android devices without any compromises and compliment as a node to the function X blockchain.

- Using a new DApp published on Function X, Zac hailed a New York City cabbie from midtown Manhattan to Central Park via a smart contract executed on Function X. The taxi order was both conducted and recorded on-chain and by-passing any ride-hailing service via XPhone.

- In the browser, you may browse the traditional Internet via HTTP or use the blockchain Internet via FXTP.

- In f(x) OS, users are able to switch seamlessly between two modes. The blockchain mode allows a user to be connected to the blockchain - everything which you do in this mode like texting, calling, taking photos, browsing, etc. will be transmitted via the blockchain. In the traditional mode, it is like any other Android phone.

- You can develop DApps for X Play Store and regular apps for Google Play Store.
Note: Final design and specs are subject to change.

The FX blockchain: Giving data control back to users and creators.
“What this all means is that data control can and must be given back to users,” said Pundi X Founder and CEO Zac Cheah.

“Telecommunications and Internet companies have derived tremendous value from controlling data. By decentralizing apps, we can put this data onto a smart contract, effectively giving control back to creators and to users”.

“Much of what we call peer-to-peer or ‘decentralized’ services continue to be built upon centralized networks. We are changing that,” added Cheah.

Mobile devices as nodes;

“Scalability in blockchain is derived from the number and geographic spread of nodes. It is clear how achieving a critical mass in terms of scale will require something with a high utility for people. The XPhone thus has the potential to establish a large global pool of nodes,” said Pitt Huang, co-founder and CTO of Pundi X.

“And with Function X offering people the choice to be independent of a centralized communications network we’ve created a new use, a high and universal utility for blockchain. In turn, this will give life to a network large enough to support better scale, throughput, and new potential applications, plus true decentralization that has so far eluded blockchain.”

YouTube in-depth close up videos;
  1. Introduction to XPhone - Part 1 of 6
  2. Bringing Function X to life with the XPhone - Part 2 of 6
  3. Setting XPhone up as a Node - Part 3 of 6
  4. Using the XPhone to manage your files and browse the web - Part 4 of 6
  5. Blockchain-based text messaging on the XPhone - Part 5 of 6
  6. Blockchain Call on the XPhone - Part 6 of 6

More details here;
Website; https://functionx.io
https://medium.com/functionx/xphone-mwc19-new-design-and-specifications-including-the-x-button-announced-1c720b04f660

All Partnerships (so far):


Major Partners:
-American Chamber of Commerce Korea, AMCHAM is the largest foreign chamber in Korea with around 1,800 individual members from almost 900 member companies with diverse interests and substantial participation in the Korean economy.
Their partners includes, MacDonald’s, Star Bucks, Hyundai, United Airlines, Citi, Hawaiian Airlines, MetLife, Ford, Honeywell, Johnson & Johnson, Bayer, Cisco, HUB, Nike, Oracle, Kelly, Philip Morris, Hyosung, Cigna, Kim & Change, Pfizer Korea, and many more, see link below;
http://www.amchamkorea.org/?ckattempt=3

-Ebooc (Government UEA) Ebooc and Pundi X will provide several other applications for consumers such as making retail payments; paying for government services, fees and fines; utilities and bills; telecommunication bills and school fees on POS devices running a stable, digital equivalent of traditional fiat currencies in the region.
The move brings our world-leading, blockchain-based XPOS technology, XPASS card and e-wallet to the Gulf, Middle East and North Africa region for the first time with Ebooc as the official partner under the terms of a strategic partnership agreement as executed.
Additional Back information about the Founder of Ebooc: Entrepreneur & Senior UAE Government Official with deep Government experience of over 20 years. From his current role as Assistant Undersecretary, Industrial Development Sector at Ministry of Economy, UAE, Abdalla has been able
to participate in policy-making and planning strategy for ministry of Economy and oversee the operations and major projects within the industrial sector.
Developing action plans and programs for the industrial sector, overall supervision of the industrial licenses issued by the ministry, General supervision of Institutions Support Department, which specializes in conducting necessary studies for the development of industrial exports.
Regulations and specifications of Foreign Affairs in coordination with stakeholders Prior to this was the CEO strategic planning & affairs at Emirates Post Group was on the Board of Directors of Wall Street Exchange Chairman of the Executive Committee ; Vice Chairman of the Emirates Marketing & Promotion Corp. Board Member of the Emirates Courier Services – Empost.
https://medium.com/pundix/ann-pundi-x-technology-to-debut-in-the-gulf-and-middle-east-5b7651b4bd14

-NEM, (Deal to deploy additional 20k XPOS units) A commitment to use NEM's blockchain technology to produce 20,000 of the world's first NEM-based POS terminals, called NEM XPOS.
To foster this project, we completed a private allocation totalling US $ 17 million (USD) on April 5, 2018. The fund will be used for technical integration and production of at least 20,000 XPOS NEMs over a three-year period.
https://medium.com/pundix/aloca%C3%A7%C3%A3o-privada-de-17m-usd-%C3%A9-conclu%C3%ADda-para-o-nem-xpos-5a7074b39b5c

-Ubivelox, they have become an international innovator in the development of smart cards, mobile communications and blockchain (ranked 6th largest in the world). The two companies will work together on XPOS and XPASS technology development, security and market deployment, which will not only facilitate the promotion of Pundi X in Korea, but also help accelerate the layout in the global market.
https://medium.com/pundix/%E9%9F%A9%E5%9B%BD%E4%B8%8A%E5%B8%82%E5%85%AC%E5%8F%B8ubivelox%E4%B8%8Epundi-x%E5%BB%BA%E7%AB%8B%E6%88%98%E7%95%A5%E5%90%88%E4%BD%9C%E4%BC%99%E4%BC%B4%E5%85%B3%E7%B3%BB-91f3665f0ae9

-QEX Fund SP; At Consensus: Invest 2018 in New York, we introduced the QEX fund in partnership with Quantum Energy Asset Management (QEAM). QEAM & R.E. Lee International Capital unveil $100 million fintech-focused hybrid fund, QEX Fund SP.
Vic has over three decades of experience in banking and securities, including as the former Chief Operating Officer, Asia Pacific, for Global Transaction Services at Bank of America Merrill Lynch, and as the former Chief Risk Officer at Hong Kong Exchanges and Clearing.
“The combined expertise of QEAM, R.E. Lee International Capital and Pundi X provides a differentiated offering and a strong edge, amplifying the unique proposition of traditional finance and technological expertise in fintech and emerging innovative technologies such as blockchain,” said Mr. Tham. “It is rare to bring together a team that has decades of experience in fund management, securities, banking and also emerging fintech and blockchain technology all under one roof.”
R.E. Lee International Capital Pte. Ltd. QEX Fund SP is targeting a USD $100 million fund size with a minimum subscription of USD $300,000 and is available to non-US accredited investors from today. For further information, please email to;
[[email protected]](mailto:[email protected])

https://medium.com/pundix/pundi-x-announces-qex-fund-in-partnership-with-quantum-energy-asset-management-to-grow-the-247b473d96a5

The F(x) Coin;


The f(x) ecosystem is fully decentralized. It’s designed and built to run autonomously in perpetuity without the reliance or supervision of any individual or organization.
To support this autonomous structure, f(x) Coin which is the underlying ‘currency’ within the f(x) ecosystem has to be decentralized in terms of its distribution, allocation, control, circulation and the way it’s being generated.

https://i.redd.it/scikiwyj7qj21.jpg

Broadly, there are four main participants in the f(x) ecosystem, as shown above:
  • Consumer: Users enjoy the decentralized service provided by the f(x) ecosystem.

  • Infrastructure Service Provider: Providing infrastructure service like the ones provided by mobile carrier, Amazon AWS but in a decentralized way.

  • Developer: Building DApp upon f(x) network like Uber, AirBnb, Alibaba.

  • Financial Service Provider: Providing liquidity of f(x) coin like NASDAQ, Morgan Stanley.

Infrastructure service provider, Developer and Financial service provider contribute the seamless operation and service shall generate the positive circulation, innovation and value flow to the f(x) ecosystem.

The value flow of the Function X ecosystem;
  • Infrastructure service provider can offer the service, such as Blockchain, FXTP, DDocker and IPFS to earn f(x) Coin.

  • Developer can build applications upon f(x) OS to earn f(x) Coin and at the same time they need to pay for the infrastructure service.

  • Consumer enjoys the service and pays for the service in f(x) Coin.

  • Developer and infrastructure service provider shall earn f(x) Coin in return by providing their service and they can liquidate it through the financial service provider to earn some profit.

Together, these four participants will create a positive value flow. More service providers will enhance the quality of service and attract more consumers. More consumers will bring more value to the ecosystem by attracting more service providers,and creating f(x) Coin liquidity.
Deep liquidity of f(x) Coin will attract more financial service providers to enhance the stability and quality of liquidity. This will attract more service providers to the ecosystem.

Utility of f(x) Coin;


f(x) Coin is the native ‘currency’ of the Function X blockchain and ecosystem. Services rendered in the ecosystem will be transacted with the f(x) Coin. Possible scenarios include:
  • For service providers: To get paid by developers, companies and consumers for providing storage nodes, DDocker and speeding up of network connections. The role of service providers will described in other sections.

  • For consumers: To pay service fees for using DApps, nodes, network resources, storage solutions and other services within the f(x) ecosystem.

  • For developers: To pay for services and resources rendered in the ecosystem such as smart contract creation, file storage (paid to IPFS service provider), code hosting (paid to DDocker service provider), advertisements (paid to other developers) and others. To get paid by the enterprises or organizations which require the developer’s service.

  • For enterprises or organizations: To pay for service fees, developer fees and advertisements. Services provided to consumers will be charged and denominated in f(x) Coin.

  • For phone and hardware manufacturers: To pay for the Function X Operating System customization. Note: we plan to only build a few thousands of the XPhone flagship handsets and leave the rest to third-party manufacturers to build more using our operating system.

  • For financial institutions: to receive payment for financial services rendered for the ecosystem.

  • Many more future scenarios.

https://i.redd.it/r7626yle8qi21.png
Hence f(x) Coin can be used as ‘currency’ for the below services,
  • In-app purchases
  • Blockchain calls
  • Smart contract creations
  • Transaction fees
  • Advertisements
  • Hosting fees

Updated fx article:
https://medium.com/functionx/f-x-ecosystem-and-tokenomics-explained-ee026ce6815

Payment solutions;


Visa, MasterCard, Apple Pay, Samsung, American Express, BNB, LTC, XVG, NPXS, E2Pay.co.Id, Alipay, M-bayar, Go Pay, WeChat, Xpos Consortium, Ubivelox, XPOT and many more.
Distributors;
Manticora Capital, Bit Captial, Ubivelox, BlockPay and more to follow.
Blockchain;
NEM, UTrust, GGOX, Verime, Wanchain, Stella, Genaro Network. More to follow.

Why Pundi XPOS;


Pundi XPOS not only facilitates cryptocurrency payment or transactions but also accepts transactions through mobile wallets and traditional bank cards.
Our POS solution can support retail intelligence, inventory management, order management, marketing and loyalty programs. Pundi XPOS device is an all-in-one solution for retailers.
https://i.redd.it/qj6sbsfaeqi21.jpg
· Accept cryptocurrency as payment
· Intelligence clearing system to increase the value of the store properties
· Selling and buying crypto currencies
· Support BTC, ETH, NPXS, BNB, XEM, QTUM, XVG, ACT, LTC, DGD, XLM and more crypto currencies.
· Support cryptocurrency payment card, such as Pundi XPASS card.
· Support mobile payment apps, such as Alipay, Visa, Mastercard, ApplePay, E2Pay, Go-Pay, Pundi-Pundi, and WeChat Pay.
· Support cryptocurrency wallet payment, such as Qbao, X Wallet, Nem Wallet and more.
· Establish credit history and reduce financial risks
· Provide a gateway for financial service providers
· Support loyalty / membership management system
· Support promotional and NPXS reward system
· Support 3rd party delivery and logistic service providers

Additional factors;
- Instant Transactions - XPOS transactions happen instantly at less than 0.5 seconds. No delays. Just pay and go.

- Fiat Settlement without Volatility - To avoid any volatility risk, merchants will receive their settlement in fiat money.

- Work Easily With XPASS & XWallet - The XPASS card is an easy-to-use tap card for crypto beginners. Top it up with your preferred cryptocurrency and pay with ease. You can also pair your XPASS card onto the XWallet mobile app and use it with the XPOS.

- Support Multiple Cryptocurrencies - The XPOS is cryptocurrency-neutral, so you can transact with your favorite coins or tokens like BTC, ETH, BNB, NPXS, etc.

- Buy Cryptocurrency With Ease - In addition to making payment, customers can purchase cryptocurrency like Bitcoin from the XPOS with ease. The experience is as easy as buying a cup of coffee.

- Merchants get back 0.65% of the total fee for every crypto transactions.

Please see the Medium reports for more details on all developments to date: https://medium.com/@PundiXLabs

XPOS Order Form;
https://goo.gl/forms/yxSRHlK99h3xHF3N2
XPASS Card Order Form;
https://forms.monday.com/forms/088c80c8f7e4f1ba13816312097ddcd3


XWallet;


The XWallet mobile app connects regular digital asset wallets with the Pundi X payment ecosystem. It allows users to easily make payments in physical stores via the XPOS & e-commerce using our "Collect" feature of the app.

https://i.redd.it/j5kcce6vtqi21.jpg

The XWallet can also be paired with the XPASS, making it a digital payment app that can be used anytime, anywhere. To download App for Android or ISO see below and to see a built-in guide for merchants and users guide are within the actual XWallet App or here:
https://xwallet.pundix.com/

Merchants Collect Feature (e-commerce);


1. Submit an XWallet Merchant application via the app and once the application gets approved, then your “Collect” page would be marked with “Pundi X verified merchant”.
2. You can open the XWallet app, then show the QR code on “Collect” page for customers to scan and pay;
3. You can also tap “Save” on “Collect” page to download your QR code as a picture, print it out, and place it by the checkstand for customers to scan and pay. This would be a more convenient way to collect payments.
4. Collected cryptocurrency assets would go directly to the XWallet Merchant’s Virtual Card account.

My actual QR code, scan to see UI on XWallet.

This is a powerful tool for e-commerce's to upload their QR Code on websites payout section. Sending any supported currencies on the X Wallet is accepted by one single QR Code, such as the above.

XPass Cards;


You can easily manage your digital assets, check your current balance, or top-up in the XWallet. By default, each user will have a virtual XPASS card in the app. You can also pair your XWallet with your Pundi XPASS card to make payments directly from the app when needed.
If you lose the XPASS card, you can transfer all your tokens from the XPASS card to the XWallet app or to another XPASS card.

https://i.redd.it/g0fcksz3oqi21.jpg

Instant Payments Online or Offline;


Transactions via an internet-connected XWallet or XPASS can be processed immediately, while offline transactions can be made by scanning the QR code, which will later be uploaded onto the blockchain. The XWallet, in short, keeps up with your busy lifestyle.

How to top up your XWallet from other wallets;
  • Select the ‘Card’ icon and choose the virtual card.
  • Select the type of currency you want to top up.
  • Tap on the ‘Receive’ icon and choose ‘View address’.
  • Copy the top-up address or scan the QR code.
  • On your other wallet, choose the correct type of cryptocurrency and insert the XWallet top-up address to make the transfer.
(Note: The speed of transferring tokens from other wallets to the XWallet app varies, depending on their relevant blockchain network conditions. To make instant payment transaction at any XPOS merchant, we recommend users top up their XWallet account from other wallets at least 6 hours before using the app.).

XPASS Card Order;
https://forms.monday.com/forms/088c80c8f7e4f1ba13816312097ddcd3

Burning of NPXS;


A quick summary of Pundi X token’s utility on each and every transaction:
  1. A bit of it is burnt for every crypto related transaction that happens in through our XPOS.
  2. The token is used to list other tokens in our XPOS, for example, QTUM paid us a sum of NPXS to be listed later in our XPOS, and this will include future coins that will be listed in our XPOS.
  3. Loyalty programs are made & paid with NPXS.
  4. Ads that run through our XPOS are also paid in NPXS.
  5. Future products will be paid with NPXS.
  6. Claim goods and services from merchants.

The XPOS is comprised of two parts, the consumer and merchant.

The Point of Sale device (XPOS);


For the merchants;
  1. You get 1% extra as a fee. You can set it up from 0-3%, but we recommend 1% fee.
  2. You can sell crypto again with that 1% fee.
  3. You can sell the XPASS cards.
  4. The POS can setup your inventory, loyalty programs, ads, and print smart receipts.
  5. You can accept crypto, again the 1% fee.
  6. You will be one of the first to change how the world uses crypto.

For the XPASS holders;
  1. They can liquidate their crypto assets through our merchants, hassle free.
  2. They get a special discount.
  3. If you lose the XPASS black card, we are able to recover it (as long as you have the security card).

Unlocked tokens;


To better comply with ever-changing regulatory requirements, our legal team has advised the company to release the remaining unlocked tokens, starting from April 1, 2019, and to complete the program early by the end of June, 2019. Given the shortened period, we will increase the unlocked-token rate over the next three months. Please note that the total distributed amount of the tokens will remain the same as stated in the whitepaper.

You need to hold your NPXS or NPXSXEM on supported exchanges or wallets such as XWallet, Binance, Imtoken or in any ERC20 wallets that you control your private key.
Snapshots will be done on a daily basis and at random times for the next 3 months.
The unlocked tokens are calculated on your total tokens held, which are then distributed. Program schedule below;

Starts: 00:00:00 GMT+8 on March 1, 2019
Ends: 23:59:59 GMT+8 on May 31, 2019
Unlocked token rate per month: 11.063%

You need to hold the whole month to receive the full %. If you hold less days, you will receive less %.
We recommend you to use an ERC20 wallet that you control your private key, because Binance for example uses their own system, so if they do their calculations wrong, it wont be Pundi X's fault. Supported wallets and exchanges below:

Exchanges;
BinanceOkcoinkrBittrex InternationalHotbit - npxsxem tokens supportedWazirXUpbit
Wallets;
Xwallet - npxsxem tokens supportedCoinmiEthosImtokenTrust walletEnjinEidooExodus
Web Wallets;
MyEtherWalletMetaMaskMistParityGeth LedgerXwallet Web - npxsxem tokens supported
Hardware Wallets;
Ledger Nano S
Trezor

Formula;

The formula to calculate the base of your NPXS/NPXSXEM monthly holdings is the same as previous months but the rate is adjusted:
[(The average of the daily lowest NPXS amount of the month X 10%) + (the daily average NPXS amount of the month X 90%)] X 11.063%

Decentralized Staking;


This will be a new option in addition to transferring NPXS / NPXSXEM into the XWallet.
The Team is working hard to enable the private wallet option before March 10, the day of this "OPTIONAL" staking process kicking off.

We will do this by having holders “register” their own ERC20 or NEM wallet public address, in XWallet so that we can properly track the holdings of NPXS / NPXSXEM in those wallets to enable decentralized staking", allowing you to get the fx coins in the Xwallet, whilst getting your normal unlocks where you're getting them now. Nano S will be supported as well.

Case study of fees;


▪ 100% of Pundi X’s revenue that is generated through transactions on the XPOS will be removed permanently from our NPXS token circulation (and that's called token burn). This means that if Pundi X makes $1 of revenue from a transaction, they will take $1 worth of NPXS out of circulation permanently. NPXS tokens taken out of circulation will never be able to re-enter the circulation in any way as they will no longer exist.

▪ if the transaction is made in Pundi X tokens, we will take the tokens immediately out of the total supply. If the transaction is made in other tokens or fiat, we will use the proceeds to buyback NPXS, after which we will permanently remove the NPXS tokens from circulation and ensure they can never re-enter circulation.

▪ In case of a fiat to crypto transaction (including a payment with mastercard/visa) NPXS will be also burned.

▪ Case study 1: a user buys $1,000 worth of crypto from a merchant in a store using Pundi XPASS card. The total charge a user has to pay is $1,010; $1,000 for the crypto and $10 for the service fees. Of the $10 received, $6.50 is paid to the shop merchant for rendering this service. $3.50 is paid to Pundi X for providing XPOS (switch) and XPASS (Issuer) service.

Ecosystem;



https://i.redd.it/0ay0t1a4eqi21.png

Contact Us;

Please also read the white paper which can be found on the official webpage: https://pundix.com/
A detailed simple guide for Pundi X in Spanish language;
https://www.reddit.com/PundiX/comments/a7gdt4/a_detailed_simple_guide_for_pundi_x_in_spanish/

Twitter: https://twitter.com/PundiXLabs
Telegram: https://t.me/Pundix
Facebook: https://www.facebook.com/pundixlabs/?_rdc=1&_rdr
LinkedIn: https://www.linkedin.com/company/pundipundi/


Thanks.
submitted by Superbit123 to PundiX [link] [comments]

Information and FAQ

Welcome to the official IOTA subreddit.
If you are new you can find lots of information here, in the sidebar and please use the search button to see if your questions have been asked before. Please focus discussion on IOTA technology, ecosystem announcements, project development, apps, etc. Please direct help questions to /IOTASupport, and price discussions and market talk to /IOTAmarkets.
Before getting started it is recommended to read the IOTA_Whitepaper.pdf. I also suggest watching these videos first to gain a better understanding.
IOTA BREAKDOWN: The Tangle Vs. Blockchain Explained
IOTA tutorial 1: What is IOTA and some terminology explained

Information

Firstly, what is IOTA?

IOTA is an open-source distributed ledger protocol launched in 2015 that goes 'beyond blockchain' through its core invention of the blockless ‘Tangle’. The IOTA Tangle is a quantum-resistant Directed Acyclic Graph (DAG), whose digital currency 'iota' has a fixed money supply with zero inflationary cost.
IOTA uniquely offers zero-fee transactions & no fixed limit on how many transactions can be confirmed per second. Scaling limitations have been removed, since throughput grows in conjunction with activity; the more activity, the more transactions can be processed & the faster the network. Further, unlike blockchain architecture, IOTA has no separation between users and validators (miners / stakers); rather, validation is an intrinsic property of using the ledger, thus avoiding centralization.
IOTA is focused on being useful for the emerging machine-to-machine (m2m) economy of the Internet-of-Things (IoT), data integrity, micro-/nano- payments, and other applications where a scalable decentralized system is warranted.
More information can be found here.

Seeds

A seed is a unique identifier that can be described as a combined username and password that grants you access to your IOTA.
Your seed is used to generate the addresses and private keys you will use to store and send IOTA, so this should be kept private and not shared with anyone. If anyone obtains your seed, they can generate the private keys associated with your addresses and access your IOTA.

Non reusable addresses

Contrary to traditional blockchain based systems such as Bitcoin, where your wallet addresses can be reused, IOTA's addresses should only be used once (for outgoing transfers). That means there is no limit to the number of transactions an address can receive, but as soon as you've used funds from that address to make a transaction, this address should not be used anymore.
Why?
When an address is used to make an outgoing transaction, a random 50% of the private key of that particular address is revealed in the transaction signature, which effectively reduces the security of the key. A typical IOTA private key of 81-trits has 2781 possible combinations ( 8.7 x 10115 ) but after a single use, this number drops to around 2754 ( 2 x 1077 ), which coincidentally is close to the number of combinations of a 256-bit Bitcoin private key. Hence, after a single use an IOTA private key has about the same level of security as that of Bitcoin and is basically impractical to brute-force using modern technology. However, after a second use, another random 50% of the private key is revealed and the number of combinations that an attacker has to guess decreases very sharply to approximately 1.554 (~3 billion) which makes brute-forcing trivial even with an average computer.
Note: your seed is never revealed at at time; only private keys specific to each address.
The current light wallet prevents address reuse automatically for you by doing 2 things:
  1. Whenever you make an outgoing transaction from an address that does not consume its entire balance (e.g. address holds 10 Mi but you send only 5 Mi), the wallet automatically creates a new address and sends the change (5 Mi) to the new address.
  2. The wallet prevents you from performing a second outgoing transaction using the same address (it will display a “Private key reuse detected!” error).
This piggy bank diagram can help visualize non reusable addresses. imgur link
[Insert new Safe analogy].

Address Index

When a new address is generated it is calculated from the combination of a seed + Address Index, where the Address Index can be any positive Integer (including "0"). The wallet usually starts from Address Index 0, but it will skip any Address Index where it sees that the corresponding address has already been attached to the tangle.

Private Keys

Private keys are derived from a seeds key index. From that private key you then generate an address. The key index starting at 0, can be incremented to get a new private key, and thus address.
It is important to keep in mind that all security-sensitive functions are implemented client side. What this means is that you can generate private keys and addresses securely in the browser, or on an offline computer. All libraries provide this functionality.
IOTA uses winternitz one-time signatures, as such you should ensure that you know which private key (and which address) has already been used in order to not reuse it. Subsequently reusing private keys can lead to the loss of funds (an attacker is able to forge the signature after continuous reuse).
Exchanges are advised to store seeds, not private keys.

FAQ

Buying IOTA

How do I to buy IOTA?

Currently not all exchanges support IOTA and those that do may not support the option to buy with fiat currencies.
Visit this website for a Guide: How to buy IOTA
or Click Here for a detailed guide made by 450LbsGorilla

Cheapest way to buy IOTA?

You can track the current cheapest way to buy IOTA at IOTA Prices.
It tells you where & how to get the most IOTA for your money right now. There's an overview of the exchanges available to you and a buying guide to help you along.
IOTAPrices.com monitors all major fiat exchanges for their BTC & ETH rates and combines them with current IOTA rates from IOTA exchanges for easy comparison. Rates are taken directly from each exchange's official websocket. For fiat exchanges or exchanges that don't offer websockets, rates are refreshed every 60 seconds.

What is MIOTA?

MIOTA is a unit of IOTA, 1 Mega IOTA or 1 Mi. It is equivalent to 1,000,000 IOTA and is the unit which is currently exchanged.
We can use the metric prefixes when describing IOTA e.g 2,500,000,000 i is equivalent to 2.5 Gi.
Note: some exchanges will display IOTA when they mean MIOTA.

Can I mine IOTA?

No you can not mine IOTA, all the supply of IOTA exist now and no more can be made.
If you want to send IOTA, your 'fee' is you have to verify 2 other transactions, thereby acting like a minenode.

Storing IOTA

Where should I store IOTA?

It is not recommended to store large amounts of IOTA on the exchange as you will not have access to the private keys of the addresses generated.

Wallets

GUI Desktop (Full Node + Light Node)
Version = 2.5.6
Download: GUI v2.5.6
Guide: Download/Login Guide
Nodes: Status
Headless IRI (Full Node)
Version = 1.4.1.4
Download: Mainnet v1.4.1.4
Guide:
Find Neighbours: /nodesharing
UCL Desktop/Android/iOS (Light Node)
Version = Private Alpha Testing
Website: iota-ucl (Medium)
Android (Light Node)
Version = Beta
Download: Google Play
iOS (Light Node)
Version = Beta Testing
Website: https://iota.tools/wallet
Paper Wallet
Version = v1.3.6
Repo: GitHub
Seed Vault
Version = v1.0.2
Repo: GitHub7

What is a seed?

A seed is a unique identifier that can be described as a combined username and password that grants you access to your wallet.
Your seed is used to generate the addresses linked to your account and so this should be kept private and not shared with anyone. If anyone obtains your seed, they can login and access your IOTA.

How do I generate a seed?

You must generate a random 81 character seed using only A-Z and the number 9.
It is recommended to use offline methods to generate a seed, and not recommended to use any non community verified techniques. To generate a seed you could:

On a Linux Terminal

use the following command:
 cat /dev/urandom |tr -dc A-Z9|head -c${1:-81} 

On a Mac Terminal

use the following command:
 cat /dev/urandom |LC_ALL=C tr -dc 'A-Z9' | fold -w 81 | head -n 1 

With KeePass on PC

A helpful guide for generating a secure seed on KeePass can be found here.

With a dice

Dice roll template

Is my seed secure?

  1. All seeds should be 81 characters in random order composed of A-Z and 9.
  2. Do not give your seed to anyone, and don’t keep it saved in a plain text document.
  3. Don’t input your seed into any websites that you don’t trust.
Is Someone Going To Guess My IOTA Seed?
What are the odds of someone guessing your seed?
  • IOTA seed = 81 characters long, and you can use A-Z, 9
  • Giving 2781 = 8.7x10115 possible combinations for IOTA seeds
  • Now let's say you have a "super computer" letting you generate and read every address associated with 1 trillion different seeds per second.
  • 8.7x10115 seeds / 1x1012 generated per second = 8.7x10103 seconds = 2.8x1096 years to process all IOTA seeds.

Why does balance appear to be 0 after a snapshot?

When a snapshot happens, all transactions are being deleted from the Tangle, leaving only the record of how many IOTA are owned by each address. However, the next time the wallet scans the Tangle to look for used addresses, the transactions will be gone because of the snapshot and the wallet will not know anymore that an address belongs to it. This is the reason for the need to regenerate addresses, so that the wallet can check the balance of each address. The more transactions were made before a snapshot, the further away the balance moves from address index 0 and the more addresses have to be (re-) generated after the snapshot.

What happens if you reuse an address?

It is important to understand that only outgoing transactions reveal the private key and incoming transactions do not. If you somehow manage to receive iotas using an address after having used it previously to send iotas—let's say your friend sends iotas to an old address of yours—these iotas may be at risk.
Recall that after a single use an iota address still has the equivalent of 256-bit security (like Bitcoin) so technically, the iotas will still be safe if you do not try to send them out. However, you would want to move these iotas out eventually and the moment you try to send them out, your private key will be revealed a second time and it now becomes feasible for an attacker to brute-force the private key. If someone is monitoring your address and spots a second use, they can easily crack the key and then use it to make a second transaction that will compete with yours. It then becomes a race to see whose transaction gets confirmed first.
Note: The current wallet prevents you from reusing an address to make a second transaction so any iotas you receive with a 'used' address will be stuck. This is a feature of wallet and has nothing to do with the fundamental workings of IOTA.

Sending IOTA

What does attach to the tangle mean?

The process of making an transaction can be divided into two main steps:
  1. The local signing of a transaction, for which your seed is required.
  2. Taking the prepared transaction data, choosing two transactions from the tangle and doing the POW. This step is also called “attaching”.
The following analogy makes it easier to understand:
Step one is like writing a letter. You take a piece of paper, write some information on it, sign it at the bottom with your signature to authenticate that it was indeed you who wrote it, put it in an envelope and then write the recipient's address on it.
Step two: In order to attach our “letter” (transaction), we go to the tangle, pick randomly two of the newest “letters” and tie a connection between our “letter” and each of the “letters” we choose to reference.
The “Attach address” function in the wallet is actually doing nothing else than making an 0 value transaction to the address that is being attached.

Why is my transaction pending?

IOTA's current Tangle implementation (IOTA is in constant development, so this may change in the future) has a confirmation rate that is ~66% at first attempt.
So, if a transaction does not confirm within 1 hour, it is necessary to "reattach" (also known as "replay") the transaction one time. Doing so one time increases probability of confirmation from ~66% to ~89%.
Repeating the process a second time increases the probability from ~89% to ~99.9%.

How do I reattach a transaction.

Reattaching a transaction is different depending on where you send your transaction from. To reattach using the GUI Desktop wallet follow these steps:
  1. Click 'History'.
  2. Click 'Show Bundle' on the 'pending' transaction.
  3. Click 'Reattach'.
  4. Click 'Rebroadcast'. (optional, usually not required)
  5. Wait 1 Hour.
  6. If still 'pending', repeat steps 1-5 once more.

Does the private key get revealed each time you reattach a transaction?

When you use the reattach function in the desktop wallet, a new transaction will be created but it will have the same signature as the original transaction and hence, your private key will not revealed a second time.

What happens to pending transactions after a snapshot?

IOTA Network and Nodes

What incentives are there for running a full node?

IOTA is made for m2m economy, once wide spread adoption by businesses and the IOT, there will be a lot of investment by these businesses to support the IOTA network. In the meantime if you would like to help the network and speed up p2p transactions at your own cost, you can support the IOTA network by setting up a Full Node.
Running a full node also means you don't have to trust a 3rd party light node provider. By running a full node you get to take advantage of new features that might not be installed on 3rd party nodes.

How to set up a full node?

To set up a full node you will need to follow these steps:
  1. Download the full node software: either GUI, or headless CLI for lower system requirements and better performance.
  2. Get a static IP for your node.
  3. Join the network by adding 7-9 neighbours.
  4. Keep your full node up and running as much as possible.
A detailed user guide on how to set up a VTS IOTA Full Node from scratch can be found here.

How do I get a static IP?

To learn how to setup a hostname (~static IP) so you can use the newest IOTA versions that have no automated peer discovery please follow this guide.

How do I find a neighbour?

Are you a single IOTA full node looking for a partner? You can look for partners in these place:

Resources

You can find a wiki I have been making here.
More to come...
If you have any contributions or spot a mistake or clarification, please PM me or leave a comment.
submitted by Boltzmanns_Constant to Iota [link] [comments]

Impatiens - For Impatience (Bach Flower Remedies) Capacitors Explained part I Conduction mechanism in metals and nanoparticles-P1 Bitcoin Crypto Currencies - Digital Currency, Learn how it Works Bitcoin Value

Quantum computers use the properties of quantum mechanics. It uses atoms and molecules to create systems to explore multiple possible solutions to a problem, rapidly producing answers. Purchase bitcoins at a Bitcoin exchange. Since Bitcoin offers many useful and unique features and properties, many users choose to use Bitcoin. With such solutions and incentives, it is possible that Bitcoin will mature and develop to a degree where price volatility will become limited. Is Bitcoin vulnerable to quantum computing? Yes Quantum computers have two properties that give them the ability to perform complex calculations at an efficient rate. The first is superpositioning. Traditional computers store information as a series of 0’s and 1’s. Quantum computers, on the other hand, store their data using a set of qubits – superpositions of 0 and 1. The qubits When quantum security exists, you can be sure it will be layered into the Bitcoin blockchain. There are already big brains thinking about it. The upshot here is that, as the ultimate form of hard money, Bitcoin’s ultimate use case is serving as a store of value even more reliable and immutable than the store of value represented by gold. Bitfinex is the longest-running and most liquid major cryptocurrency exchange. Founded in 2012, it has become the go-to platform for traders & institutional investors.

[index] [9800] [49874] [28487] [18939] [10623] [39290] [41972] [5637] [30300] [46032]

Impatiens - For Impatience (Bach Flower Remedies)

Intrinsic value is the exchange value of utilities resulting from intrinsic properties. Finally, Bitcoin has other properties than public-key privacy, like its ubiquity and security -- both ... Bitcoin (symbol: BitcoinSign.svg; code: BTC, XBT) 3 is a protocol, project open source, and network peer-to-peer is used as cryptocurrency, payment system 4 and merchandise. It was conceived in ... 12th Physics Broadcast - Waves (Properties of Stationary Waves) Lecture 5 RAM RAJ SCIENCE INSTITUTE LEARN ONLINE 111 watching Live now PIX se tornará Real Digital, Justiça exige relatório da Atlas Quantum e mais! Bitcoin News Brasil 2020, o resumo semanal das principais notícias no mundo das criptomoedas! Notícias: 00:27 ... This property is listed by McEnearney Associates, Inc. Luxury Portfolio International is proud to present this appealing home in Mclean, Virginia. This exclusive custom home is located in ...