|submitted by polylunar_ to Bitcoin [link] [comments]|
submitted by QuarkChain to quarkchainio [link] [comments]
The picture from COINDESK related reports
On Aug. 2, Ethereum Classic Labs (ETC Labs) made an important announcement on ETC blockchain. ETC Labs said due to network attack, Ethereum Classic suffered a reorganization on August 1st. This has been the second attack on the Ethereum Classic Network this year.
Did renting-power cause the problem again?
In this ETC incident, one of the miners mined a large number of blocks offline. When the miner went online, due to its high computing power, and some versions of mining software did not support large-scale blockchain mergers, the consensus failed. Therefore, the entire network was out of sync, which produced an effect similar to a 51% attack. Finally, it caused the reorganization of 3693 blocks, starting at 10904147. The deposit and withdrawal between the exchanges and mining pools had to be suspended for troubleshooting during this period.
Media report shows that the blockchain reorganization may be caused by a miner (or a mining pool) disconnected during mining. Although it has been restored to normal after 15 hours of repair, it does reflect the vulnerability of the Proof of Work (PoW) network: once the computing power of the network is insufficient, the performance of one single mining pool can affect the entire network, which is neither distributed nor secure for the blockchain. Neither does it have efficiency.
At present, most consensus algorithms of blockchains are using PoW, which has been adopted over 10 years. In PoW, each miner solves a hashing problem. The probability to solve the problem successfully is proportional to the ratio of the miner’s hash power to the total hash power of mainnet.
Although PoW has been running for a long time, the attack model against PoW is very straightforward to understand, and has attracted people’s attention for a long time: such an attack, also known as double-spending attack, may happen when an attacker possesses 51% of the overall network hash power. The attacker can roll back any blocks in the blockchain by creating a longer and more difficult chain and as a result, modify the transaction information.
Since hash power can be rented to launch attacks, some top 30 projects have suffered from such attacks. In addition to this interference, the main attack method is through the computing power market such as Nice Hash. Hackers can rent hashpower to facilitate their attacks, which allows the computing power to rise rapidly in a short time and rewrite information. In January of this year, the Ethereum Classic was attacked once, and it was also the case that hackers can migrate computing power from the fiercely competitive Bitcoin and Ethereum, and use it to attack smaller projects, such as ETH Classic.
The picture shows the cost of attacking ETH Classic. It can be seen that it costs only $6,634 to attack ETH Classic for one hour.
The security of one network is no longer limited by whether miners within the main net take more than 51% of the total hash power, rather it is determined by whether the benevolent (non-hackers) miners take more than 51% of the total hash power from the pool of projects that use similar consensus algorithm. For example, the hash power of Ethereum is 176 TH/s and that of Ethereum Classic is 9 TH/s. In this way, if one diverts some hash power from Ethereum (176 TH/s) to Ethereum Classic, then one can easily launch a double-spending attack to Ethereum Classic. The hash power ratio for this attack between the two projects is 9/176 = 5.2%, which is a tiny number.
As one of the top 30 blockchain projects, Ethereum Classic has been attacked several times. Therefore, those small and medium-sized projects with low hash power and up-and-coming future projects are facing great potential risks. This is the reason that many emerging public chain projects abandon PoW and adopt PoS.
Proof of Stake (PoS) can prevent 51% attack but has problems of its own
In addition to PoW consensus, another well-adopted consensus algorithm is Proof of Stake (PoS). The fundamental concept is that the one who holds more tokens has the right to create the blocks. This is similar to shareholders in the stock market. The token holders also have the opportunities to get rewards. The advantages of PoS are: (i) the algorithm avoids wasting energy like that in PoW calculation; and (ii) its design determines that the PoS will not be subjected to 51% hash power attack since the algorithm requires the miner to possess tokens in order to modify the ledger. In this way, 51% attack becomes costly and meaningless.
In terms of disadvantages, nodes face the problem of accessibility. PoS requires a permission to enter the network and nodes cannot enter and exit freely and thus lacks openness. It can easily be forked. In the long run, the algorithm is short of decentralization, and leads to the Matthew effect of accumulated advantages whereby miners with more tokens will receive more rewards and perpetuate the cycle.
More importantly, the current PoS consensus has not been verified for long-term reliability. Whether it can be as stable as the PoW system is yet to be verified. For some of the PoW public chains that are already launched, if they want to switch consensus, they need to do hard fork, which divides communities and carries out a long consensus upgrade and through which Ethereum is undergoing. Is there a safer and better solution?
QuarkChain Provide THE Solution: High TPS Protection + PoSW Consensus
For new-born projects, and some small or medium-sized projects, they all are facing the problem of power attack. For PoW-based chains, there are always some chains with lower hash power than others (ETC vs. ETH, BCH vs BTC), and thus the risk of attack is increased. In addition, the interoperability among the chains, such as cross-chain operation, is also a problem. In response, QuarkChain has designed a series of mechanisms to solve this problem. This can be summed up as a two-layer structure with a calculation power allocation and Proof of Staked Work (PoSW) consensus.
First of all, there is a layer of sharding, which can be considered as some parallel chains. Each sharding chain handles the transactions relatively independently. Such design forms the basis to ensure the performance of the entire system. To avoid security issues caused by the dilution of the hash power, we also have a root chain. The blocks of the root chain do not contain transactions, but are responsible for verifying the transactions of each shard. Relying on the hash power distribution algorithm, the hash power of the root chain will always account for 51% of the net. Each shard, on the other hand, packages their transactions according to their own consensus and transaction models.
Moreover, QuarkChain relies on flexibility that allows each shard to have different consensus and transaction models. Someone who wants to launch a double-spending attack on a shard that is already contained in the root chain must attack the block on the root chain, which requires calling the 51% hash power of the root chain. That is, if there are vertical field projects that open new shards on QuarkChain, even with insufficient hash power, an attacker must first attack the root chain if he or she wants to attack a new shard. The root chain has maintained more than 51% of the network’s hash power, which makes the attack very difficult.
As illustrated in the diagram, if the attacker wants to attack the QuarkChain network, one would need to attack the shard and the root chain simultaneously.
PoW has achieved a high level of decentralization and has been verified for its stability for a long time. Combining PoW with the staking capability for PoS would make use of the advantages of both consensus mechanisms. That is what QuarkChain’s PoSW achieves exactly.
PoSW, which is Proof of Staked Work, is exclusively developed by QuarkChain and runs on shards. PoSW allows miners to enjoy the benefits of lower mining difficulty by staking original tokens (currently it’s 20 times lower). Conversely, if someone malicious with a high hash power and does not stake tokens on QuarkChain, he will be punishable by receiving 20 times the difficulty of the hash power, which increases the cost of attack. If the attacker stakes tokens in order to reduce the cost of attack, he/she needs to stake the corresponding amount of tokens, which may cost even more. Thus, the whole network is more secure.
Taking Ethereum Classics (ETC) as an example, if ETC uses the PoSW consensus, if there was another double-spending attack similar to the one in January, the attacker will need at least 110Th/s hash power or 650320 ETC (worth $3.2 million, and 8 TH/s hash power) to create this attack, which is far greater than the cost of the current attack on the network (8Th/s hash power) and revenue (219500 ETC).
Relying on multiple sets of security mechanisms, QuarkChain ensures its own security, while providing security for new shards and small and medium-sized projects. Its high level of flexibility also allows the projects to support different types of ledger models, transaction models, virtual machines, and token economics. Such great degrees of security and flexibility will facilitate the blockchain ecosystem to accelerate growth of innovative blockchain applications.
Learn more about QuarkChain
submitted by CelesOS to u/CelesOS [link] [comments]
Table 1 Classification of consensus system
Source: Yuan Yong, Ni Xiaochun, Zeng Shuai, Wang Feiyue, "Development Status and Prospect of Blockchain Consensus Algorithm"
Figure 4 Evolution of consensus algorithm
Figure 4 Evolution of consensus algorithm
Source: Network data
The consensus mechanism is one of the important elements of the blockchain and the core rule of the normal operation of the distributed ledger. It is mainly used to solve the trust problem between people and determine who is responsible for generating new blocks and maintaining the effective unification of the system in the blockchain system. Thus, it has become an everlasting research hot topic in blockchain.
This article starts with the concept and role of the consensus mechanism. First, it enables the reader to have a preliminary understanding of the consensus mechanism as a whole; then starting with the two armies and the Byzantine general problem, the evolution of the consensus mechanism is introduced in the order of the time when the consensus mechanism is proposed; Then, it briefly introduces the current mainstream consensus mechanism from three aspects of concept, working principle and representative project, and compares the advantages and disadvantages of the mainstream consensus mechanism; finally, it gives suggestions on how to choose a consensus mechanism for blockchain projects and pointed out the possibility of the future development of the consensus mechanism.
First, concept and function of the consensus mechanism
1.1 Concept: The core rules for the normal operation of distributed ledgers
1.2 Role: Solve the trust problem and decide the generation and maintenance of new blocks
1.2.1 Used to solve the trust problem between people
1.2.2 Used to decide who is responsible for generating new blocks and maintaining effective unity in the blockchain system
1.3 Mainstream model of consensus algorithm
Second, the origin of the consensus mechanism
2.1 The two armies and the Byzantine generals
2.1.1 The two armies problem
2.1.2 The Byzantine generals problem
2.2 Development history of consensus mechanism
2.2.1 Classification of consensus mechanism
2.2.2 Development frontier of consensus mechanism
Third, Common Consensus System
Fourth, Selection of consensus mechanism and summary of current situation
4.1 How to choose a consensus mechanism that suits you
4.1.1 Determine whether the final result is important
4.1.2 Determine how fast the application process needs to be
4.1.2 Determining the degree to which the application requires for decentralization
4.1.3 Determine whether the system can be terminated
4.1.4 Select a suitable consensus algorithm after weighing the advantages and disadvantages
4.2 Future development of consensus mechanism
Chapter 1 Concept and Function of Consensus Mechanism
1.1 Concept: The core rules for the normal operation of distributed ledgers
Since most cryptocurrencies use decentralized blockchain design, nodes are scattered and parallel everywhere, so a system must be designed to maintain the order and fairness of the system's operation, unify the version of the blockchain, and reward users maintaining the blockchain and punish malicious harmers. Such a system must rely on some way to prove that who has obtained the packaging rights (or accounting rights) of a blockchain and can obtain the reward for packaging this block; or who intends to harm , and will receive certain penalty. Such system is consensus mechanism.
1.2 Role: Solve the trust problem and decide the generation and maintenance of new blocks
1.2.1 Used to solve the trust problem between people
The reason why the consensus mechanism can be at the core of the blockchain technology is that it has formulated a set of rules from the perspective of cryptographic technologies such as asymmetric encryption and time stamping. All participants must comply with this rules. And theese rules are transparent, and cannot be modified artificially. Therefore, without the endorsement of a third-party authority, it can also mobilize nodes across the network to jointly monitor, record all transactions, and publish them in the form of codes, effectively achieving valuable information transfer, solving or more precisely, greatly improving the trust problem between two unrelated strangers who do not trust each other. After all, trusting the objective technology is less risky than trusting a subjective individual.
1.2.2 Used to decide who is responsible for generating new blocks and maintaining effective unity in the blockchain system
On the other hand, in the blockchain system, due to the high network latency of the peer-to-peer network, the sequence of transactions observed by each node is different. To solve this, the consensus mechanism can be used to reach consensus on transactions order within a short period of time to decide who is responsible for generating new blocks in the blockchain system, and to maintain the effective unity of the blockchain.
1.3 The mainstream model of consensus algorithm
The blockchain system is built on the P2P network, and the set of all nodes can be recorded as PP, generally divided into ordinary nodes that produce data or transactions, and"miner" nodes (denoted as M) responsible for mining operations, like verifying, packaging, and updating the data generated by ordinary nodes or transactions. The functions of the two types of nodes may be overlapped; miner nodes usually participate in the consensus competition process in general, and will select certain representative nodes and replace them to participant in the consensus process and compete for accounting rights in specific algorithms. The collection of these representative nodes is recorded as DD; the accounting nodes selected through the consensus process are recorded as AA. The consensus process is repeated in accordance with the round, and each round of the consensus process generally reselects the accounting node for the round . The core of the consensus process is the "select leader" and "accounting" two parts. In the specific operation process, each round can be divided into four stages: Leader election, Block generation, Data validation and Chain updating namely accounting). As shown in Figure 1, the input of the consensus process is the transaction or data generated and verified by the data node, and the output is the encapsulated data block and updated blockchain. The four stages are executed repeatedly, and each execution round will generate a new block.
Stage 1: Leader election
The election is the core of the consensus process, that is, the process of selecting the accounting node AA from all the miner node sets MM: we can use the formula f(M)→f(M)→AA to represent the election process, where the function ff represents the specific implementation of the consensus algorithm. Generally speaking, |A|=1,|A|=1, that is, the only miner node is finally selected to keep accounts.
Stage 2: Block generation
The accounting node selected in the first stage packages the transactions or data generated by all nodes PP in the current time period into a block according to a specific strategy, and broadcasts the generated new block to all miner nodes MM or their representative nodes DD. These transactions or data are usually sorted according to various factors such as block capacity, transaction fees, transaction waiting time, etc., and then packaged into new blocks in sequence. The block generation strategy is a key factor in the performance of the blockchain system, and it also exposes the strategic behavior of miners such as greedy transactions packaging and selfish mining.
Stage 3: Verification
After receiving the broadcasted new block, the miner node MM or the representative node DD will verify the correctness and rationality of the transactions or data encapsulated in the block. If the new block is approved by most verification/representative nodes, the block will be updated to the blockchain as the next block.
Stage 4: On-Chain
The accounting node adds new blocks to the main chain to form a complete and longer chain from the genesis block to the latest block. If there are multiple fork chains on the main chain, the main chain needs to be based on the consensus algorithm judging criteria to choose one of the appropriate fork chain as the main chain.
Chapter 2 The Origin of Consensus Mechanism
2.1 The two armies problems and the Byzantium generals problem
2.1.1 The two armies
Figure 2 Schematic diagram of the two armed forces
Selected from Yuan Yong, Ni Xiaochun, Zeng Shuai, Wang Feiyue, "Development Status and Prospect of Blockchain Consensus Algorithm", Journal of Automation, 2018, 44(11): 2011-2022
As shown in the figure, the 1st and 2nd units of the Blue Army are stationed on two sides of the slope, and cannot communicate remotely between each other. While the White Army is just stationed in the middle of the two Blue Army units. Suppose that the White Army is stronger than either of the two Blue Army units, but it is not as strong as the two Blue Army units combined. If the two units of the Blue Army want to jointly attack the White Army at the same time, they need to communicate with each other, but the White Army is stationed in the middle of them. It is impossible to confirm whether the messengers of two Blue Army units have sent the attack signal to each other, let alone the tampering of the messages. In this case, due to the inability to fully confirm with each other, ultimately no effective consensus can be reached between the two Blue Army units, rendering the "paradox of the two armies".
2.1.2 The Byzantine generals problem
Figure 3 Diagram of the Byzantine generals' problem
Due to the vast territory of the Byzantine roman empire at that time, in order to better achieve the purpose of defense, troops were scattered around the empire, and each army was far apart, and only messengers could deliver messages. During the war, all generals must reach an agreement, or decide whether to attack the enemy based on the majority principle. However, since it is completely dependent on people, if there is a situation where the general rebels or the messenger delivers the wrong message, how can it ensure that the loyal generals can reach agreement without being influenced by the rebels is a problem which was called the Byzantine problem.
The two armies problems and the Byzantine generals problem are all elaborating the same problem: in the case of unreliable information exchange, it is very difficult to reach consensus and coordinate action. The Byzantine general problem is more like a generalization of the "paradox of the two armies".
From the perspective of the computer network, the two armies problem and the Byzantine problem are common contents of computer network courses: the direct communication between two nodes on the network may fail, so the TCP protocol cannot completely guarantee the consistence between the two terminal networks. However, the consensus mechanism can use economic incentives and other methods to reduce this uncertainty to a level acceptable to most people.
It is precisely because of the two armies problem and the Byzantine problem that the consensus mechanism has begun to show its value.
2.2 Development history of consensus mechanism
2.2.1 Classification of consensus mechanism
Because different types of blockchain projects have different requirements for information recording and block generation, and as the consensus mechanism improves due to the development of blockchain technology, there are currently more than 30 consensus mechanisms. These consensus mechanisms can be divided into two categories according to their Byzantine fault tolerance performance: Byzantine fault tolerance system and non-Byzantine fault tolerance system.
Table 1 Classification of consensus mechanism
Source: Yuan Yong, Ni Xiaochun, Zeng Shuai, Wang Feiyue, "Development Status and Prospect of Blockchain Consensus Algorithm"
2.2.2 Development frontier of consensus mechanism
-Development of consensus algorithm
According to the proposed time of the consensus algorithm, we can see relatively clearly the development of the consensus algorithm.
Source: Network data
Figure 4 Development frontier of consensus algorithm
Figure 5 Historical evolution of blockchain consensus algorithm
Source: Yuan Yong, Ni Xiaochun, Zeng Shuai, Wang Feiyue, "Development Status and Prospect of Blockchain Consensus Algorithm"
The consensus algorithm has laid the foundation for the blockchain consensus mechanism. Initially, the research of consensus algorithms was mainly used by computer scientists and computer professors to improve the spam problem or conduct academic discussions.
For example, in 1993, American computer scientist and Harvard professor Cynthia Dwork first proposed the idea of proof of work in order to solve the spam problem; in 1997, the British cryptographer Adam Back also independently proposed to solve the spam problem by use of the mechanism of proof of work for hashing cash and published officially in 2002; in 1999, Markus Jakobsson officially proposed the concept of "proof of work", which laid the foundation for the subsequent design of Satoshi Nakamoto's Bitcoin consensus mechanism.
Next lecture: Chapter 3 Detailed Explanation of Consensus Mechanism Technology
As the first DPOW financial blockchain operating system, CelesOS adopts consensus mechanism 3.0 to break through the "impossible triangle". It provides both high TPS and decentralization. Committed to creating a financial blockchain operating system that embraces regulation, providing services for financial institutions and the development of applications on the regulation chain, and developing a role and consensus eco-system regulation level agreement for regulation.
The CelesOS team is committed to building a bridge between blockchain and regulatory agencies / finance industry. We believe that only blockchain technology that cooperates with regulators will have a bright future and strive to achieve this goal.
This article is written by the CoinEx Chain lab. CoinEx Chain is the world’s first public chain exclusively designed for DEX, and will also include a Smart Chain supporting smart contracts and a Privacy Chain protecting users’ privacy.submitted by coinexchain to u/coinexchain [link] [comments]
longcpp @ 20200618
This is Part 1 of the serialized articles aimed to explain the Tendermint consensus protocol in detail.
Part 1. Preliminary of the consensus protocol: security model and PBFT protocol
Part 2. Tendermint consensus protocol illustrated: two-phase voting protocol and the locking and unlocking mechanism
Part 3. Weighted round-robin proposer selection algorithm used in Tendermint project
Any consensus agreement that is ultimately reached is the General Agreement, that is, the majority opinion. The consensus protocol on which the blockchain system operates is no exception. As a distributed system, the blockchain system aims to maintain the validity of the system. Intuitively, the validity of the blockchain system has two meanings: firstly, there is no ambiguity, and secondly, it can process requests to update its status. The former corresponds to the safety requirements of distributed systems, while the latter to the requirements of liveness. The validity of distributed systems is mainly maintained by consensus protocols, considering the multiple nodes and network communication involved in such systems may be unstable, which has brought huge challenges to the design of consensus protocols.
The semi-synchronous network model and Byzantine fault toleranceResearchers of distributed systems characterize these problems that may occur in nodes and network communications using node failure models and network models. The fail-stop failure in node failure models refers to the situation where the node itself stops running due to configuration errors or other reasons, thus unable to go on with the consensus protocol. This type of failure will not cause side effects on other parts of the distributed system except that the node itself stops running. However, for such distributed systems as the public blockchain, when designing a consensus protocol, we still need to consider the evildoing intended by nodes besides their failure. These incidents are all included in the Byzantine Failure model, which covers all unexpected situations that may occur on the node, for example, passive downtime failures and any deviation intended by the nodes from the consensus protocol. For a better explanation, downtime failures refer to nodes’ passive running halt, and the Byzantine failure to any arbitrary deviation of nodes from the consensus protocol.
Compared with the node failure model which can be roughly divided into the passive and active models, the modeling of network communication is more difficult. The network itself suffers problems of instability and communication delay. Moreover, since all network communication is ultimately completed by the node which may have a downtime failure or a Byzantine failure in itself, it is usually difficult to define whether such failure arises from the node or the network itself when a node does not receive another node's network message. Although the network communication may be affected by many factors, the researchers found that the network model can be classified by the communication delay. For example, the node may fail to send data packages due to the fail-stop failure, and as a result, the corresponding communication delay is unknown and can be any value. According to the concept of communication delay, the network communication model can be divided into the following three categories:
The design and selection of consensus protocols for public chain networks that allow nodes to dynamically join and leave need to consider possible Byzantine failures. Therefore, the consensus protocol of a public chain network is designed to guarantee the security and liveness of the network under the semi-synchronous network model on the premise of possible Byzantine failure. Researchers of distributed systems point out that to ensure the security and liveness of the system, the consensus protocol itself needs to meet three requirements:
The CAP theorem and Byzantine Generals ProblemIn a semi-synchronous network, is it possible to design a Byzantine fault-tolerant consensus protocol that satisfies validity, agreement, and termination? How many Byzantine nodes can a system tolerance? The CAP theorem and Byzantine Generals Problem provide an answer for these two questions and have thus become the basic guidelines for the design of Byzantine fault-tolerant consensus protocols.
Lamport, Shostak, and Pease abstracted the design of the consensus mechanism in the distributed system in 1982 as the Byzantine Generals Problem, which refers to such a situation as described below: several generals each lead the army to fight in the war, and their troops are stationed in different places. The generals must formulate a unified action plan for the victory. However, since the camps are far away from each other, they can only communicate with each other through the communication soldiers, or, in other words, they cannot appear on the same occasion at the same time to reach a consensus. Unfortunately, among the generals, there is a traitor or two who intend to undermine the unified actions of the loyal generals by sending the wrong information, and the communication soldiers cannot send the message to the destination by themselves. It is assumed that each communication soldier can prove the information he has brought comes from a certain general, just as in the case of a real BFT consensus protocol, each node has its public and private keys to establish an encrypted communication channel for each other to ensure that its messages will not be tampered with in the network communication, and the message receiver can also verify the sender of the message based thereon. As already mentioned, any consensus agreement ultimately reached represents the consensus of the majority. In the process of generals communicating with each other for an offensive or retreat, a general also makes decisions based on the majority opinion from the information collected by himself.
According to the research of Lamport et al, if there are 1/3 or more traitors in the node, the generals cannot reach a unified decision. For example, in the following figure, assume there are 3 generals and only 1 traitor. In the figure on the left, suppose that General C is the traitor, and A and B are loyal. If A wants to launch an attack and informs B and C of such intention, yet the traitor C sends a message to B, suggesting what he has received from A is a retreat. In this case, B can't decide as he doesn't know who the traitor is, and the information received is insufficient for him to decide. If A is a traitor, he can send different messages to B and C. Then C faithfully reports to B the information he received. At this moment as B receives conflicting information, he cannot make any decisions. In both cases, even if B had received consistent information, it would be impossible for him to spot the traitor between A and C. Therefore, it is obvious that in both situations shown in the figure below, the honest General B cannot make a choice.
According to this conclusion, when there are $n$ generals with at most $f$ traitors (n≤3f), the generals cannot reach a consensus if $n \leq 3f$; and with $n > 3f$, a consensus can be reached. This conclusion also suggests that when the number of Byzantine failures $f$ exceeds 1/3 of the total number of nodes $n$ in the system $f \ge n/3$ , no consensus will be reached on any consensus protocol among all honest nodes. Only when $f < n/3$, such condition is likely to happen, without loss of generality, and for the subsequent discussion on the consensus protocol, $ n \ge 3f + 1$ by default.
The conclusion reached by Lamport et al. on the Byzantine Generals Problem draws a line between the possible and the impossible in the design of the Byzantine fault tolerance consensus protocol. Within the possible range, how will the consensus protocol be designed? Can both the security and liveness of distributed systems be fully guaranteed? Brewer provided the answer in his CAP theorem in 2000. It indicated that a distributed system requires the following three basic attributes, but any distributed system can only meet two of the three at the same time.
A distributed system aims to provide consistent services. Therefore, the consistency attribute requires that the two nodes in the system cannot provide conflicting status information or expired information, which can ensure the security of the distributed system. The availability attribute is to ensure that the system can continuously update its status and guarantee the availability of distributed systems. The partition tolerance attribute is related to the network communication delay, and, under the semi-synchronous network model, it can be the status before GST when the network is in an asynchronous status with an unknown delay in the network communication. In this condition, communicating nodes may not receive information from each other, and the network is thus considered to be in a partitioned status. Partition tolerance requires the distributed system to function normally even in network partitions.
The proof of the CAP theorem can be demonstrated with the following diagram. The curve represents the network partition, and each network has four nodes, distinguished by the numbers 1, 2, 3, and 4. The distributed system stores color information, and all the status information stored by all nodes is blue at first.
The discovery of the CAP theorem seems to declare that the aforementioned goals of the consensus protocol is impossible. However, if you’re careful enough, you may find from the above that those are all extreme cases, such as network partitions that cause the failure of information transmission, which could be rare, especially in P2P network. In the second case, the system rarely returns the same information with node 2, and the general practice is to query other nodes and return the latest status as believed after a while, regardless of whether it has received the request information of other nodes. Therefore, although the CAP theorem points out that any distributed system cannot satisfy the three attributes at the same time, it is not a binary choice, as the designer of the consensus protocol can weigh up all the three attributes according to the needs of the distributed system. However, as the communication delay is always involved in the distributed system, one always needs to choose between availability and consistency while ensuring a certain degree of partition tolerance. Specifically, in the second case, it is about the value that node 2 returns: a probably outdated value or no value. Returning the possibly outdated value may violate consistency but guarantees availability; yet returning no value deprives the system of availability but guarantees its consistency. Tendermint consensus protocol to be introduced is consistent in this trade-off. In other words, it will lose availability in some cases.
The genius of Satoshi Nakamoto is that with constraints of the CAP theorem, he managed to reach a reliable Byzantine consensus in a distributed network by combining PoW mechanism, Satoshi Nakamoto consensus, and economic incentives with appropriate parameter configuration. Whether Bitcoin's mechanism design solves the Byzantine Generals Problem has remained a dispute among academicians. Garay, Kiayias, and Leonardos analyzed the link between Bitcoin mechanism design and the Byzantine consensus in detail in their paper The Bitcoin Backbone Protocol: Analysis and Applications. In simple terms, the Satoshi Consensus is a probabilistic Byzantine fault-tolerant consensus protocol that depends on such conditions as the network communication environment and the proportion of malicious nodes' hashrate. When the proportion of malicious nodes’ hashrate does not exceed 1/2 in a good network communication environment, the Satoshi Consensus can reliably solve the Byzantine consensus problem in a distributed environment. However, when the environment turns bad, even with the proportion within 1/2, the Satoshi Consensus may still fail to reach a reliable conclusion on the Byzantine consensus problem. It is worth noting that the quality of the network environment is relative to Bitcoin's block interval. The 10-minute block generation interval of the Bitcoin can ensure that the system is in a good network communication environment in most cases, given the fact that the broadcast time of a block in the distributed network is usually just several seconds. In addition, economic incentives can motivate most nodes to actively comply with the agreement. It is thus considered that with the current Bitcoin network parameter configuration and mechanism design, the Bitcoin mechanism design has reliably solved the Byzantine Consensus problem in the current network environment.
Practical Byzantine Fault Tolerance, PBFTIt is not an easy task to design the Byzantine fault-tolerant consensus protocol in a semi-synchronous network. The first practically usable Byzantine fault-tolerant consensus protocol is the Practical Byzantine Fault Tolerance (PBFT) designed by Castro and Liskov in 1999, the first of its kind with polynomial complexity. For a distributed system with $n$ nodes, the communication complexity is $O(n2$.) Castro and Liskov showed in the paper that by transforming centralized file system into a distributed one using the PBFT protocol, the overwall performance was only slowed down by 3%. In this section we will briefly introduce the PBFT protocol, paving the way for further detailed explanations of the Tendermint protocol and the improvements of the Tendermint protocol.
The PBFT protocol that includes $n=3f+1$ nodes can tolerate up to $f$ Byzantine nodes. In the original paper of PBFT, full connection is required among all the $n$ nodes, that is, any two of the n nodes must be connected. All the nodes of the network jointly maintain the system status through network communication. In the Bitcoin network, a node can participate in or exit the consensus process through hashrate mining at any time, which is managed by the administrator, and the PFBT protocol needs to determine all the participating nodes before the protocol starts. All nodes in the PBFT protocol are divided into two categories, master nodes, and slave nodes. There is only one master node at any time, and all nodes take turns to be the master node. All nodes run in a rotation process called View, in each of which the master node will be reelected. The master node selection algorithm in PBFT is very simple: all nodes become the master node in turn by the index number. In each view, all nodes try to reach a consensus on the system status. It is worth mentioning that in the PBFT protocol, each node has its own digital signature key pair. All sent messages (including request messages from the client) need to be signed to ensure the integrity of the message in the network and the traceability of the message itself. (You can determine who sent a message based on the digital signature).
The following figure shows the basic flow of the PBFT consensus protocol. Assume that the current view’s master node is node 0. Client C initiates a request to the master node 0. After the master node receives the request, it broadcasts the request to all slave nodes that process the request of client C and return the result to the client. After the client receives f+1 identical results from different nodes (based on the signature value), the result can be taken as the final result of the entire operation. Since the system can have at most f Byzantine nodes, at least one of the f+1 results received by the client comes from an honest node, and the security of the consensus protocol guarantees that all honest nodes will reach consensus on the same status. So, the feedback from 1 honest node is enough to confirm that the corresponding request has been processed by the system.
For the status synchronization of all honest nodes, the PBFT protocol has two constraints on each node: on one hand, all nodes must start from the same status, and on the other, the status transition of all nodes must be definite, that is, given the same status and request, the results after the operation must be the same. Under these two constraints, as long as the entire system agrees on the processing order of all transactions, the status of all honest nodes will be consistent. This is also the main purpose of the PBFT protocol: to reach a consensus on the order of transactions between all nodes, thereby ensuring the security of the entire distributed system. In terms of availability, the PBFT consensus protocol relies on a timeout mechanism to find anomalies in the consensus process and start the View Change protocol in time to try to reach a consensus again.
The figure above shows a simplified workflow of the PBFT protocol. Where C is the client, 0, 1, 2, and 3 represent 4 nodes respectively. Specifically, 0 is the master node of the current view, 1, 2, 3 are slave nodes, and node 3 is faulty. Under normal circumstances, the PBFT consensus protocol reaches consensus on the order of transactions between nodes through a three-phase protocol. These three phases are respectively: Pre-Prepare, Prepare, and Commit:
In the three-phase protocol execution of the PBFT protocol, in addition to maintaining the status information of the distributed system, the node itself also needs to log all kinds of consensus information it receives. The gradual accumulation of logs will consume considerable system resources. Therefore, the PBFT protocol additionally defines checkpoints to help the node deal with garbage collection. You can set a checkpoint every 100 or 1000 sequence numbers according to the request sequence number. After the client request at the checkpoint is executed, the node broadcasts
The three-phase protocol of the PBFT protocol can ensure the consistency of the processing order of the client request, and the checkpoint mechanism is set to help nodes perform garbage collection and further ensures the status consistency of the distributed system, both of which can guarantee the security of the distributed system aforementioned. How is the availability of the distributed system guaranteed? In the semi-synchronous network model, a timeout mechanism is usually introduced, which is related to delays in the network environment. It is assumed that the network delay has a known upper bound after GST. In such condition, an initial value is usually set according to the network condition of the system deployed. In case of a timeout event, besides the corresponding processing flow triggered, additional mechanisms will be activated to readjust the waiting time. For example, an algorithm like TCP's exponential back off can be adopted to adjust the waiting time after a timeout event.
To ensure the availability of the system in the PBFT protocol, a timeout mechanism is also introduced. In addition, due to the potential the Byzantine failure in the master node itself, the PBFT protocol also needs to ensure the security and availability of the system in this case. When the Byzantine failure occurs in the master node, for example, when the slave node does not receive the PRE-PREPARE message or the PRE-PREPARE message sent by the master node from the master node within the time window and is thus determined to be illegitimate, the slave node can broadcast
VIEWCHANGE contains a lot of information. For example, C contains 2f+1 signature information, P contains several signature sets, and each set has 2f+1 signature. At least 2f+1 nodes need to send a VIEWCHANGE message before prompting the system to enter the next new view, and that means, in addition to the complex logic of constructing the information of VIEWCHANGE and NEW-VIEW, the communication complexity of the view conversion protocol is $O(n2$.) Such complexity also limits the PBFT protocol to support only a few nodes, and when there are 100 nodes, it is usually too complex to practically deploy PBFT. It is worth noting that in some materials the communication complexity of the PBFT protocol is inappropriately attributed to the full connection between n nodes. By changing the fully connected network topology to the P2P network topology based on distributed hash tables commonly used in blockchain projects, high communication complexity caused by full connection can be conveniently solved, yet still, it is difficult to improve the communication complexity during the view conversion process. In recent years, researchers have proposed to reduce the amount of communication in this step by adopting aggregate signature scheme. With this technology, 2f+1 signature information can be compressed into one, thereby reducing the communication volume during view change.
submitted by ipse_io to ipse [link] [comments]
Background of Application-specific BlockchainIn-depth consideration of the problems encountered in the development of DAPP, in fact, has very simple reasons to explain; that is, the cost of use is high, and the benefits cannot completely offset the required learning costs. Each DAPP is architected on a corresponding blockchain. Users need to select one of the blockchains first. We have never seen a situation where someone uses an app first needs to choose the internet; because for us, there is only one Internet, and the underlying operating system shields all network differences.
For the development of Web 3.0 in the blockchain era, the most important thing is to get such an operating system first and screen the differences of various chains in front of users. Users don’t care what chain DAPP runs on, and they don’t have to worry about their Tokens being unusable under certain circumstances. This is the background of the application-specific blockchain.
In fact, the application chain is relative to the Web 3.0 ecosystem. The highly anticipated project Polkadot is a cross-chain technology that connects all chains together. The Substrate framework created by its team can serve as such a blockchain operating system. Users do not need to care whether the interaction on the application-specific chain is universal. As long as the Polkadot ecosystem is connected, all operations of the application chain should be universal to the user. Even if the user holds Bitcoin, it can be completed in the application-specific blockchain. In the Web3.0 ecosystem, application-specific chains can not only seamlessly interoperate with chains built using Substrate, but also connect existing blockchains together, such as Bitcoin, Ethereum, and EOS, by building bridges. From the perspective of network effects, such connections will bring network traffic to the new application-specific blockchain. The cost of bringing users into the learning blockchain is greatly reduced, and a new wave of blockchain technology dividends will be ushered in.
The main functions of the application-specific blockchain:
The IPSE Design to Application-specific BlockchainAfter the emergence of Bitcoin, it provided enough distributed nodes and power barriers, but its congestion issues and high latency caused it to fail to achieve a commercial landing, while Ethereum had the function of Smart Contracts, but it also had congestion issues. The root cause is that the entire problem set is not considered from the perspective of layering at the beginning of the blockchain design.
(1) Application data and transaction data do not need to be stacked on a blockchain. The IPSE puts most of the application data on the application-specific blockchain.
(2) A variety of application data does not need to be mixed and coexist in a blockchain. All Smart Contracts are on a virtual machine in the main chain, and the same security is obtained at a reasonable cost. The IPSE will have multiple application-specific blockchains and efficient separation of multiple application data.
(3) The node size of the application-specific blockchain is matched with its implementation business. The importance of the data is matched with the data chain security of the blockchain application-specific blockchain. The IPSE will not be completely decentralized but pays attention to making a reasonable match.
(4) Application-specific operations do not require equal commission. If there is only one main chain like Ethereum, then its price estimate for all operations in smart contracts is homogeneous, and its price lacks hierarchical planning. IPSE will design different charges in different virtual machines, and the smart contract calculates the price in the layered design.
(5) Trading operations do not require equal mining costs. Different transactions have different values. IPSE will use application-specific blockchain technology to put most of the transaction storage in the application-specific blockchain, while mining uses the main chain to jointly mine. This means the powerful consensus mechanism is used on the main chain to allow the application-specific blockchain to ride smoothly. For example, there are hundreds of nodes on the main chain to achieve a strong consensus, and only 10 nodes in the application-specific blockchain are responsible for storing application-specific blockchain data. The data volume stored by 10 nodes is 99% of the network. Anyway, verifying transactions and other behaviors on the mining node are very fast, just when the block being created, the data is pushed to the application-specific blockchain for preservation, and the 10 nodes of application-specific blockchain do not need to be mined, they are completely compliant with the 10,000 nodes on the main chain.
(6) Is a unified computing virtual machine on the main chain is unnecessary or not? For different Smart Contracts, the difference in importance is self-evident, and the importance of the data that needs to be saved is the same. If a main chain is implemented vertically, there will be serious performance expansion problems like Ethereum, and that excessive amount of synchronization can also cause security problems. The IPSE application-specific blockchain can be relied upon for these two parts. The calculation of virtual machine splitting solves the problem of insufficient performance of the main chain, and the data storage split solves the scalability problem of data management.
If you are planning to place assets into cryptographic types of cash like Bitcoin or Ether, in any case, you do not understand where to start, this Gemini exchange review will help you with choosing.submitted by cryptoerapro to u/cryptoerapro [link] [comments]
Gemini Bitcoin Exchange Review 2020
You need yourself to be a productive advanced cash intermediary. By what technique will you become? To help you here's an exchange review, which will give every one of you the low down information required for a powerful enthusiasm for one of the most trusted in stages the Gemini Exchange.
We should find all the more right currently review
Gemini Review :
About Gemini Exchange
Twin kin developed Gemini Winklevoss in the year 2014. The Gemini exchange is arranged in New York. The Gemini crypto exchange is open in essentially all US states, similarly as UK, Canada, Puerto Rico, Singapore, South Korea, and Hong Kong. In 2016, Gemini transformed into the world's recently approved Ether exchange.
It positions 82th greatest exchange on earth as showed by 24-hour volume on Coinmarketcap. While Gemini Bitcoin and Gemini Ethereum trading volumes are high, the exchange is endeavoring with all undertakings to fight with those stages offering a predominant piece of the cryptographic types of cash, for instance, Binance.
Gemini offers crypto to fiat portions and a BTC/ETH grandstand, which makes it a quick contender to any similarity to Coinbase, Bitstamp, and Kraken. At present, it is one of the most respected and ensure about exchanges open. This is in light of the fact that it has more features to help secure customers against developers. Also, it is one exchange for the CBOE Bitcoin future settlement. Gemini Mobile application is directly available, which is amazingly basic and versatile to use.
How to use Gemini?
1) Go to the official site and snap the "Register" tab on the upper right corner.
Enter your name, email address, and mystery word for your own record. While affirming your email address, it is critical to :
Affirm your email address and enter both your region and phone number, by then you can set up 2-Factor Authentication (2FA) which will be an additional layer of security to your record.
Incorporate your monetary equalization. Starting at now, Gemini recognizes simply bank moves and wires, as a methodology for putting away holds.
To check your record, move your organization ID proof. This will help you with executing and trade US Dollars. Moreover, it will help Gemini with as per the Bank Secrecy Act (BSA) and Anti Money Laundering (AML) rules. The affirmation time may run from a couple to a couple of days.
Subsequent to completing of all the above strategies, you can use your record for financing.
gemini crypto exchange
2) Deposit Currency
In the Menu, click Transfer Funds, by then find a good pace Bank Transfer and Exchange. Enter the whole you have to store here. Moreover, note $500 consistently is the most extraordinary most extreme for Bank moves.
3) Trading Bitcoin and Ethereum
As you store by methods for bank move, they are quickly available for trading. you can purchase by encountering the menu and picking your supported trading pair. For example, for Bitcoin BTC/USD similarly as Ethereum ETH/USD.
In the wake of embeddings the expense and sum it will process your buy demand. There is another choice to trade by methods for the business community which has exhibit orders gave by various customers.
After the fulfillment of your purchase, your record will be acknowledged with your Ethereum just as Bitcoin purchases. You can sell your computerized cash on the Gemini crypto exchange. Regardless of the way that you can't make a withdrawal until your bank move has been completely arranged.
gemini sponsor organization
By and by, For most trade strategies, there are no limitations on trades. In any case, Automated Clearing House (ACH) moves have the greatest store most remote purpose of $500 day and $15,000 consistently for singular record holders. Associations have a state of restriction for making ACH stores of $10,000 consistently or $300,000 consistently.
There is a Gemini business focus that runs 24*7. Here, you can have indistinguishable number of solicitations from you wish to have, with a variety of trading choices. These include:
Market Orders – With the present best open worth, the solicitations here starting dealing with quickly against resting orders.
Purpose of repression Orders – The sum is filled at or better than a given expense. The sum which isn't dispatched lays on the solicitation book diligently until it is filled or dropped.
Brief or Cancel (IOC) Limit Orders – The sum is filled at or better than a given expense. The sum which isn't filled rapidly is dropped and doesn't lay on the perpetual solicitation book.
Maker or Cancel (MOC) Limit Orders – The sum lays on the solicitation book continually at a foreordained expense. Furthermore, the entire solicitation is dropped if there is any sum that can be filled immediately.
All solicitations made on this stage are totally sponsored and fill in as a full hold exchange. In any case, there is no edge trading Gemini. Despite that, reliably the customer's record equality should have more balance than the exceptional excitement on demand books. Also, all open solicitations decline your available leveling until they are fulfilled or dropped
In the event that there ought to be an event of moves, Gemini crypto exchange has a low cost technique and stage customers can store Bitcoin, Ether, at freed from charges for both bank and wire moves. In any case, banks will charge a cost for the customers to wire money to their Gemini account. Withdrawals on the stage are free and all customers will have 30 free withdrawals for each calendar month.
Any withdrawals more than this total will pull in costs comparable to the mining charges payable on either sort out. The costs are around 0.001 BTC or 100,000 Satoshi per trade on the Bitcoin Network and 0 GWei or 0 ETH per trade on the Ethereum Network.
0.25% is the trading costs for both sellers(makers) and buyers(takers). If it shows up at certain trade volumes, charges will be reduced. The maker charge is 0% for 30-day trading volumes that outperform 5,000 Bitcoin or 100,000 Ether. For a comparable trading entirety, the taker run after will bubble to 0.10%.
Gemini uses dynamic maker and taker charge or reimbursement timetable, and sellers can get reimbursement on liquidity-creation trades. The particular entireties depend upon net trading volumes and the buy and sell extent over a multi day time allotment. The data are adjusted as expected and more information on charges can be found here.
Concerning purchases, the base purchase whole for Bitcoin is 0.00001 BTC, or 1000 satoshis, for Ether, the base sum is 0 .001 ETH
Bitcoin Gemini Reviews, is a strong exchange that has a better than average reputation in everyone. The exchange goes about as a way into the universe of cryptographic cash trading. This may be in light of the fact that various customers first quit concerning purchasing Bitcoin and Ethereum. In comprehension to Coinbase, Gemini has a near space. Wherein it allows its customers to make trade clearly to and from their records.
Gemini is a not too bad choice, for people looking to securely trade either Bitcoin or Ethereum. The exchange is a potential decision for new competitors to the market similarly as logically settled sellers who like to make trades by methods for their monetary adjusts.
Dec 17, 2019: Well realized cash related pro association State Street picked Gemini exchange for the new propelled asset pilot adventure.
Nov 19, 2019: Gemini exchange wanders into NFT's and acquired Nifty Gateway Solution, a phase to buy Non-Fungible Tokens.
Nov 14, 2019: The exchange added Stop-Limit to the solicitations being executed on the stage.
Sep 11, 2019: Gemini dispatches Gemini Custody with 18 cryptographic types of cash
Sep 5, 2019: Gemini Clearing™, a totally electronic clearing and settlement answer for off-exchange exhibited by the stage
Aud 27, 2019: Gemini Joins the Silvergate Exchange Network
Aug 22, 2019: Gemini loosens up and reaches to Australia
April 15, 2019: Gemini wallet support Segwit
Gemini Bitcoin Exchange Review
Rundown: How to Buy Bitcoins by means of Gemini
Register a record at Gemini and check email code sent to you.
Set up two-factor validation (2FA).
Give checked ID as a major aspect of the confirmation procedure.
Store cash by clicking "Move Funds", "Store into Exchange" and afterward picking the sort of bank move.
Snap "Purchase" catch and round out the buy structure to get BTC.
Is Gemini Safe?
Gemini is extremely worried about its clients' wellbeing, in this manner it utilize three arrangements of security...
Gemini Comparison with Other Exchanget
To exchange bitcoins you have to initially peruse and think about various BTC trades...
In Which Countries Is Gemini Available?
You can arrange bitcoins through Gemini nearly in any nation, yet discover where you can't...
Guide: Buying BTCs at Gemini
It is anything but difficult to purchase bitcoins on Gemini trade, knowing the essential standards and prerequisites...
Discover to what extent the exchange takes, how to pull back BTCs and what strategies for...
Practically equivalent to Bitcoin Exchanges
We have arranged a rundown of trades, notwithstanding Gemini, that can assist you with requesting bitcoins...
With developing worth and system, bitcoin is ready to turn into the main online resource in the realm of ventures.
Gemini bitcoin trade survey
This article is worried about one of the most well known trades with regards to BTC exchange, Gemini.
What Is Gemini?
Gemini is one of the realized digital money trades that offer an assortment of exchange apparatuses for speculators that have some involvement with the business. The organization that claims the stage is enrolled as LLC in New York State, USA, offering USD to BTC and USD to ETH exchange trade.
Purchase BTC at Gemini
Propelled in 2015, Gemini offers two unmistakable commercial centers, them being:
customary trade administrations;
Upon its appearance, the stage offered its administrations in the US just, bit by bit including different nations all the while. The organization is possessed by the Winklevoss twins, who guarantee that they are have about 1% of the complete BTC volume.
Winklevoss siblings are Gemini's proprietors
With regards to the wellbeing of your assets, Gemini applies three arrangements of safety efforts that should be referenced. To start with, the stage applies advanced money safety efforts by offering hot and cold stockpiling wallets, where cold wallets have multisig capacities to forestall hacking endeavors at your equalizations.
The subsequent measure is identified with the exchange where the entirety of the exchanges at Gemini are led through pre-financed accounts, implying that merchants and purchasers can't post orders on the off chance that they don't have adequate BTC or fiat monetary forms in their parities. Finally, the site security comprises of two-factor verification (2FA) and HTTP encryption of all data in regards to merchants and stage's exchanges from outsiders.
Accessible Payment Methods
As of now, Gemini acknowledges stores communicated distinctly in ACH (for US dealers) and wire moves (for every other person) communicated in USD. Credit or check cards, money stores, PayPal and numerous different alternatives are wanted to be remembered for the future however are not accessible at the present time.
Buy bitcoin by means of wire move
You ought to buy in to the Gemini news source since the organization will promote the new store strategy through that channel of correspondence.
Shouldn't something be said about Fees?
While saving or pulling back your assets communicated in fiat or computerized monetary forms, dealers would find that the administrations are done totally free. Then again, Gemini charges exchange expenses are charged dependent on a month to month net exchange volume. Taker charges can extend from 0.15% to 0.25% while creator expenses from 0% to 0.25%.
Expenses at the trade
Does Gemini Have Limits?
Cryptographic money and wire stores and withdrawals don't have any constraints forced on dealers, implying that in the event that you utilize the said administrations, you can buy, sell and pull back bitcoins with no deterrents. Singular American financial specialists utilizing ACH move, then again, have $500 every day and $15.000 month to month while institutional individuals have $10.000 day by day and $300.000 month to month store limits.
No restrictions for purchasing bitcoin
When thinking about exchanging at any trade, you should hope to analyze the administrations, expenses and impediments with other comparative stages. In this manner, we have assembled an examination investigation where we benchmarked Gemini against two other well known decisions with regards to BTC buy: Kraken and Coinbase.
Gemini versus Kraken
Kraken, much the same as Gemini, acknowledges bank moves just, with the significant contrast being that Kraken permits 5 fiat cash stores. Notwithstanding bitcoin, there are 14 more altcoins that you can exchange with at Kraken while the two trades force check on their customers as they are both controlled organizations.
Gemini versus Kraken
Kraken is fundamentally the same as Gemini as far as expenses, as creatotaker charges go somewhere in the range of 0% and 0.26%. Bank moves do accompany little expenses at Kraken while Gemini acknowledges stores for nothing. In conclusion, while Gemini exchanges two or three nations in particular, Kraken is all around accessible.
Coinbase versus Gemini
Coinbase is viewed as one of the biggest bitcoin suppliers on the planet, offering its administrations in 32 nations, USA notwithstanding. The installment strategies at Coinbase are PayPal, bank moves and credit/check cards, two more than Gemini.
Request bitcoins by means of Coinbase trade
Confirmation is an absolute necessity have at Coinbase, much like in Gemini while expenses are a ton lower at Gemini, as you pay between 1.49% to 3.49% from exchange's an incentive at Coinbase. The two trades offer BTC vaults and wallet administrations while Coinbase additionally exchanges with Litecoin which are inaccessible at Gemini.
Gemini BTC Exchange in Different Countries
Gemini's administrations are accessible in a bunch of nations around the globe, them being the US (5 states not upheld), Canada, Japan, South Korea, Hong Kong, Singapore and the United Kingdom. The five US expresses that are not bolstered are Alaska, Arizona, Hawaii, Oregon and Wisconsin.
Gemini trade in various nations
Is It Legal?
Gemini is an American LLC that adheres to New York Banking Law guidelines, actualizing BSA (Bank Secrecy Act) and AML (Anti-Money Laundry Compliance Program) arrangements, implying that customary reviews of the BSA/AML programs are being executed. Moreover, the firm requires all merchants to have reserves pre-saved before the exchange.
Bitcoin Gemini Price, is legitimate
Another significant factor of the stage's lawfulness is the way that since its beginning, Gemini has promptly accessible money related report dating 7 years back.
Does Gemini Support Its Customers?
Concerning the client service, Gemini has a thorough FAQ page where a large portion of the exchanging questions have been replied. Notwithstanding the FAQ, you can likewise top off a shape and present a solicitation to the Gemini group with respect to any issue that you may look on the stage.
Gemini client service
Because of the regular upkeep of the site's administrations, Gemini has a "Status" page where financial specialists can see which administrations and API instruments are working right now and which are definitely not.
Manual for Buy Bitcoins from Gemini
When you have gotten the cash at your Gemini account, click "Purchase" button on the dashboard page.
Buy page for bitcoins at Gemini
Presently, round out the structure on the right, giving request type, volume or estimation of BTC you wish to get and click "Purchase" to get bitcoins in your record immediately. Try to check the BTC cost at the upper left piece of the "Purchase" page to ensure it has not changed at the time you have begun the buy procedure.
It is totally allowed to enroll a record at Gemini bitcoin trade and the procedure begins once you click "Register" button at the upper right corner of the site. Give your complete name, email address and secret key in subsequent stage and snap "Make My Account".
Make account at Gemini
You will get an email code which you should duplicate glue into the Gemini's check page.
Contribution of enactment code on Bitcoin Gemini Registration
The accompanying advances will open up for you to finish, in this way you have to arrangement your 2FA security apparatus, include a financial balance and give checked ID to finish the enrollment methodology.
To what extent Should I Wait for Verification?
Check stage can take between an hour and a day, contingent upon various enlistment applications Gemini has right now you have begun the procedure. You ought to set up every single essential report before you start and arm yourself with persistence as a stage would set aside effort to process your data.
Confirmation process at Gemini
Would you be able to Get Bitcoins Without Verification?
At the enlistment page, you are required to check your personality and frog your financial balance. When you have presented the records, you can't enter the stage's exchange page until the help affirms your subtleties. In this way, it is unimaginable to expect to buy supply of bitcoins without confirmation.
Obligatory confirmation before purchasing BTCs at Gemini
How to Add Money to Account?
When you have finished the enrollment and confirmation of your record, click button "Move Funds", situated in the top segment of your dashboard page. In following stage, click "Store Into Exchange" and pick either USD or Wire alternative, contingent upon what financial balance you have included at enrollment stage.
Add assets to Gemini account
You can likewise store bitcoins in your Gemini wallet too.
Store BTCs in the Gemini wallet
At the last phase of wire move subsidizing process, you have to give bank's wiring data, for example, your record number and other significant data that can be found by clicking "Bank Settings".
Give bank's wiring data
When data has been given, basically click "Store" button which will show up at the base of the page.
Secure Your Account
Keep the entirety of your record and wallet passwords out of the programmer's compass by continually evolving them. Monitor the new secret key by keeping in touch with them down on a bit of paper as to not overlook them meanwhile.
Record with 2FA on trade
You as of now have 2FA from the enlistment stage and don't give your private data to some other dealer on the stage.
To what extent Does It Take to Make Transaction?
It takes 4 to 5 days to store assets in your Gemini account while exchanges themselves are done following you the exchange started. Diverse request types have distinctive length, contingent upon what dealer wishes to accomplish.
Sitting tight for exchanges on the trade
Would i be able to Buy Bitcoin with PayPal at Gemini?
Now, brokers can't utilize PayPal as store technique at Gemini. You ought to buy in to the trade's news channel as to get warnings if the strategy opens up to store alternative later on.
Does Gemini Have a BTC Wallet?
The stage offers two kinds of wallet administrations, one being "hot" wallet and another being vault stockpiling. Both are based just, with the principle contrast being that vault stockpiling gives extra security keys that are utilized while moving bitcoins all through the wallet. Along these lines, vault administrations are esteemed as more secure than the standard BTC wallet.
Pulling back Your Bitcoins from Gemini
At the dashboard page, click "Move Funds" and afterward "Pull back From Exchange" to begin the procedure. Pick bitcoins to continue towards the withdrawal structure. Determine the measure of BTC you with to escape the trade and give your wallet address. Snap "Survey Withdrawal" and check the data. When you are fulfilled, click "Affirm" to end the procedure. Your coins will show up inside 24 hours to your ideal area.
Pull back BTC from Gemini
Instructions to Order BTC with Credit/Debit Card at Gemini
As with PayPal, it is preposterous to expect to buy bitcoins with the assistance of credit or charge cards at Gemini, since the choice isn't accessible right now. Stay aware of trade's news and declarations as the CC/DC choice may open up later on.
Gemini Mobile App
Portable stages are yet to be created by Gemini, implying that exchange is accessible on perusing stage as it were. Watch out for the declaration, as the organization may make the push towards telephone exchange not so distant future.
Purchase BTC just on Gemini perusing stage
Aside from Gemini, we at BitcoinBestBuy have checked on numerous different stages that can assist you with getting bitcoins effectively and securely. They all change regarding local accessibility, expenses, buy strategies and confirmation necessities, so make a point to check different articles also.
Get BTC at digital money stages
Coinbase Exchange Review
Being one of the biggest BTC exchanging stages the world, we made a survey of their charges, store choices and other important data with respect to the trade. We have likewise given bit by bit controls on the best way to buy and pull back assets and coins from Coinbase.
Full Review Coinbase Bitcoin Gemini Exchange
Find out About Kraken
Kraken is another trade that offers bitcoins through bank moves and its administrations are all inclusive accessible. We made a survey of Kraken's advantages and disadvantages, giving our customers a diagram of the trade as far as expenses the organization charges, check prerequisites and buy procedures of the stage.
|submitted by bittopia to Bitcoin [link] [comments]|
|submitted by n9jd34x04l151ho4 to btc [link] [comments]|
submitted by crypt0hodl1 to PundiX [link] [comments]
PrologueThis is a Concept Paper written to introduce the Function X Ecosystem, which includes the XPhone. It also addresses the relationship between the XPOS and Function X.
Pundi X has always been a community-driven project. We have lived by the mission of making sure the community comes first and we are constantly learning from discussions and interactions on social media and in real-life meetings.
As with all discussions, there is always background noise but we have found gems in these community discussions. One such example is a question which we found constantly lingering at the back of our mind, “Has blockchain changed the world as the Internet did in the ’90s, and the automobile in the ‘20s?”. Many might argue that it has, given the rise of so many blockchain projects with vast potential in different dimensions (like ours, if we may add). But the question remains, “can blockchain ever become what the Internet, as we know it today, has to the world?”
Function X, a universal decentralized internet which is powered by blockchain technology and smart devices.
Over the past few months, in the process of implementing and deploying the XPOS solution, we believe we found the answer to the question. A nimble development team was set up to bring the answer to life. We discovered that it is indeed possible to bring blockchain to the world of telephony, data transmission, storage and other industries; a world far beyond financial transactions and transfers.
This is supported by end-user smart devices functioning as blockchain nodes. These devices include the XPOS and XPhone developed by Pundi X and will also include many other hardware devices manufactured by other original equipment manufacturers.
The vision we want to achieve for f(x) is to create a fully autonomous and decentralized network that does not rely on any individual, organization or structure.
Due to the nature of the many new concepts introduced within this Concept Paper, we have included a Q&A after each segment to facilitate your understanding. We will continuously update this paper to reflect the progress we’re making.
Function X: The Internet was just the beginningThe advent of the Internet has revolutionized the world. It created a communications layer so robust that it has resulted in TCP/IP becoming the network standard.
The Internet also created a wealth of information so disruptive that a company like Amazon threatened to wipe out all the traditional brick-and-mortar bookstores. These bookstores were forced to either adapt or perish. The same applies to the news publishing sector: the offerings of Google and Facebook have caused the near extinction of traditional newspapers.
The digitalization of the world with the Internet has enabled tech behemoths like Apple, Amazon, Google and Facebook to dominate and rule over traditional companies. The grip of these tech giants is so extensive that it makes you wonder if the choices you make are truly your own or influenced by the data they have on you as a user.
We see the blockchain revolution happening in three phases. The first was how Bitcoin showed the world what digital currency is. The second refers to how Ethereum has provided a platform to build decentralized assets easily. The clearest use case of that has come in the form of the thousands of altcoins seen today that we all are familiar with. The third phase is what many blockchain companies are trying to do now: 1) to bring the performance of blockchain to a whole new level (transaction speed, throughput, sharding, etc.) and 2) to change the course of traditional industries and platforms—including the Internet and user dynamics.
Public blockchains allow trustless transactions. If everything can be transacted on the blockchain in a decentralized manner, the information will flow more efficiently than traditional offerings, without the interception of intermediators. It will level the playing field and prevent data monopolization thus allowing small innovators to develop and flourish by leveraging the resources and data shared on the blockchain.
The Blockchain revolution will be the biggest digital revolutionIn order to displace an incumbent technology with something new, we believe the change and improvement which the new technology has to bring will have to be at least a tenfold improvement on all aspects including speed, transparency, scalability and governance (consensus). We are excited to say that the time for this 10-times change is here. It’s time to take it up 10x with Function X.
Function X or f(x) is an ecosystem built entirely on and for the blockchain. Everything in f(x) (including the application source code, transmission protocol and hardware) is completely decentralized and secure. Every bit and byte in f(x) is part of the blockchain.
What we have developed is not just a public chain. It is a total decentralized solution. It consists of five core components: Function X Operating System (OS); Function X distributed ledger (Blockchain); Function X IPFS; FXTP Protocol and Function X Decentralized Docker. All five components serve a single purpose which is to decentralize all services, apps, websites, communications and, most importantly, data.
The purpose of Function X OS is to allow smart hardware and IoTs to harness the upside and potential utility of the decentralization approach. We have built an in-house solution for how mobile phones can leverage Function X OS in the form of the XPhone. Other companies can also employ the Function X OS and further customize it for their own smart devices. Every smart device in the Function X ecosystem can be a node and each will have its own address and private key, uniquely linked to their node names. The OS is based on the Android OS 9.0, therefore benefiting from backward compatibility with Android apps. The Function X OS supports Android apps and Google services (referred to as the traditional mode), as well as the newly developed decentralized services (referred to as the blockchain mode). Other XPhone features powered by the Function X OS will be elaborated on in the following sections.
Using the Function X Ecosystem (namely Function X FXTP), the transmission of data runs on a complex exchange of public and private key data and encryption but never through a centralized intermediary. Hence it guarantees communication without interception and gives users direct access to the data shared by others. Any information that is sent or transacted over the Function X Blockchain will also be recorded on the chain and fully protected by encryption so the ownesender has control over data sharing. And that is how a decentralized system for communications works.
For developers and users transitioning to the Function X platform, it will be a relatively seamless process. We have intentionally designed the process of creating and publishing new decentralized applications (DApps) on Function X to be easy, such that the knowledge and experience from developing and using Android will be transferable. With that in mind, a single line of code in most traditional apps can be modified, and developers can have their transmission protocol moved from the traditional HTTP mode (centralized) to a decentralized mode, thus making the transmission “ownerless” because data can transmit through the network of nodes without being blocked by third parties. How services can be ported easily or built from scratch as DApps will also be explained in the following sections, employing technologies in the Function X ecosystem (namely Function X IPFS, FXTP Protocol and Decentralized Docker).
f(x) Chainf(x) chain is a set of consensus algorithms in the form of a distributed ledger, as part of the Function X ecosystem. The blockchain is the building block of our distributed ledger that stores and verifies transactions including financials, payments, communications (phone calls, file transfers, storage), services (DApps) and more.
Will Function X launch a mainnet?Yes. The f(x) chain is a blockchain hence there will be a mainnet.
When will the testnet be launched?Q2 2019 (projected).
When will the mainnet be launched?Q3 2019 (projected).
How is the Function X blockchain designed?The f(x) chain is designed based on the philosophy that any blockchain should be able to address real-life market demand of a constantly growing peer-to-peer network. It is a blockchain with high throughput achieved with a combination of decentralized hardware support (XPOS, XPhone, etc.) and open-source software toolkit enhancements.
What are the physical devices that will be connected to the Function X blockchain?In due course, the XPOS OS will be replaced by the f(x) OS. On the other hand, the XPhone was designed with full f(x) OS integration in mind, from the ground up. After the f(x) OS onboarding, and with adequate stability testings and improvements, XPOS and XPhone will then be connected to the f(x) Chain.
What are the different elements of a block?Anything that is transmittable over the distributed network can be stored in the block, including but not limited to phone call records, websites, data packets, source code, etc. It is worth noting that throughout these processes, all data is encrypted and only the owner of the private key has the right to decide how the data should be shared, stored, decrypted or even destroyed.
Which consensus mechanism is used?
Practical Byzantine Fault Tolerance (PBFT).
What are the other implementations of Practical Byzantine Fault Tolerance (PBFT)?Flight systems that require very low latency. For example, SpaceX’s flight system, Dragon, uses PBFT design philosophy. [Appendix]
How do you create a much faster public chain?We believe in achieving higher speed, thus hardware and software configurations matter. If your hardware is limited in numbers or processing power, this will limit the transaction speed which may pose security risks. The Ethereum network consists of about 25,000 nodes spread across the globe now, just two years after it was launched. Meanwhile, the Bitcoin network currently has around 7,000 nodes verifying the network. As for Pundi X, with the deployment plan (by us and our partners) for XPOS, XPhone and potentially other smart devices, we anticipate that we will be able to surpass the number of Bitcoin and Ethereum nodes within 1 to 2 years. There are also plans for a very competitive software implementation of our public blockchain, the details for which we will be sharing in the near future.
f(x) OSThe f(x) OS is an Android-modified operating system that is also blockchain-compatible. You can switch seamlessly between the blockchain and the traditional mode. In the blockchain mode, every bit and byte is fully decentralized including your calls, messages, browsers and apps. When in traditional mode, the f(x) OS supports all Android features.
Android is the most open and advanced operating system for smart hardware with over 2 billion monthly active users. Using Android also fits into our philosophy of being an OS/software designer and letting third-party hardware makers produce the hardware for the Function X Ecosystem.
What kind of open source will it be?This has not been finalized, but the options we are currently considering are Apache or GNU GPLv3.
What kind of hardware will it work on?The f(x) OS works on ARM architecture, hence it works on most smartphones, tablet computers, smart TVs, Android Auto and smartwatches in the market.
Will you build a new browser?We are currently using a modified version of the Google Chrome browser. The browser supports both HTTP and FXTP, which means that apart from distributed FXTP contents, users can view traditional contents, such ashttps://www.google.com.
What is the Node Name System (NNS)?A NNS is a distributed version of the traditional Domain Name System. A NNS allows every piece of Function X hardware, including the XPhone, to have a unique identity. This identity will be the unique identifier and can be called anything with digits and numbers, such as ‘JohnDoe2018’ or ‘AliceBob’. More on NNS in the following sections.
Will a third-party device running the f(x) OS be automatically connected to the f(x) blockchain?
Yes, third-party devices will be connected to the f(x) blockchain automatically.
f(x) FXTPA transmission protocol defines the rules to allow information to be sent via a network. On the Internet, HTTP is a transmission protocol that governs how information such as website contents can be sent, received and displayed. FXTP is a transmission protocol for the decentralized network.
FXTP is different from HTTP because it is an end-to-end transmission whereby your data can be sent, received and displayed based on a consensus mechanism rather than a client-server based decision-making mechanism. In HTTP, the server (which is controlled by an entity) decides how and if the data is sent (or even monitored), whereas in FXTP, the data is sent out and propagates to the destination based on consensus.
HTTP functions as a request–response protocol in the client-server computing model. A web browser, for example, may be the client and an application running on a computer hosting a website may be the server. FXTP functions as a propagation protocol via a consensus model. A node that propagates the protocol and its packet content is both a “client” and a “server”, hence whether a packet reaches a destination is not determined by any intermediate party and this makes it more secure.
f(x) IPFSIPFS is a protocol and network designed to store data in a distributed system. A person who wants to retrieve a file will call an identifier (hash) of the file, IPFS then combs through the other nodes and supplies the person with the file.
The file is stored on the IPFS network. If you run your own node, your file would be stored only on your node and available for the world to download. If someone else downloads it and seeds it, then the file will be stored on both your node the node of the individual who downloaded it (similar to BitTorrent).
IPFS is decentralized and more secure, which allows faster file and data transfer.
f(x) DDockerDocker is computer program designed to make it easier to create, deploy, and run applications. Containers allow a developer to package up an application including libraries, and ship it all out as a package.
As the name suggests, Decentralized Docker is an open platform for developers to build, ship and run distributed applications. Developers will be able to store, deploy and run their codes remote in different locations and the codes are secure in a decentralized way.
Beyond crypto: First true blockchain phone that is secured and decentralized to the coreXPhone is the world’s first blockchain phone which is designed with innovative features that are not found on other smartphones.
Powered by Function X, an ecosystem built entirely on and for the blockchain, XPhone runs on a new transmission protocol for the blockchain age. The innovation significantly expands the use of blockchain technology beyond financial transfers.
Unlike traditional phones which require a centralized service provider, XPhone runs independently without the need for that. Users can route phone calls and messages via blockchain nodes without the need for phone numbers.
Once the XPhone is registered on the network, for e.g., by a user named Pitt, if someone wants to access Pitt’s publicly shared data or content, that user can just enter FXTP://xxx.Pitt. This is similar to what we do for the traditional https:// protocol.
Whether Pitt is sharing photos, data, files or a website, they can be accessed through this path. And if Pitt’s friends would like to contact him, they can call, text or email his XPhone simply by entering “call.pitt”, “message.pitt”, or “mail.pitt”.
The transmission of data runs on a complex exchange of public and private key data with encryption. It can guarantee communication without interception and gives users direct access to the data shared by others. Any information that is sent or transacted over the Function X Blockchain will also be recorded on the chain.
Toggle between now and the futureBlockchain-based calling and messaging can be toggled on and off on the phone operating system which is built on Android 9.0. XPhone users can enjoy all the blockchain has to offer, as well as the traditional functionalities of an Android smartphone.
We’ll be sharing more about the availability of the XPhone and further applications of Function X in the near future.
DApps for mass adoptionSo far the use of decentralized applications has been disappointing. But what if there was a straightforward way to bring popular, existing apps into a decentralized environment, without rebuilding everything? Until now, much of what we call peer-to-peer or ‘decentralized’ services continue to be built on centralized networks. We set out to change that with Function X; to disperse content now stored in the hands of the few, and to evolve services currently controlled by central parties.
Use Cases: Sharing economyAs seen from our ride-hailing DApp example that was demonstrated in New York back in November 2018, moving towards true decentralization empowers the providers of services and not the intermediaries. In the same way, the XPhone returns power to users over how their data is being shared and with whom. Function X will empower content creators to determine how their work is being displayed and used.
Use Cases: Free namingOne of the earliest alternative cryptocurrencies, Namecoin, wanted to use a blockchain to provide a name registration system, where users can register their names to create a unique identity. It is similar to the DNS system mapping to IP addresses. With the Node Name System (NNS) it is now possible to do this on the blockchain.
NNS is a distributed version of the traditional Domain Name System. A NNS allows every piece of Function X hardware, including the XPhone, to have a unique identifier that can be named anything with digits and numbers, such as ‘JohnDoe2018’ or ‘AliceBob’.
Use Cases: Mobile data currencyAccording to a study, mobile operator data revenues are estimated at over $600 billion USD by 2020, equivalent to $50 billion USD per month [appendix]. Assuming users are able to use services such as blockchain calls provided by XPhone (or other phones using Function X) the savings will be immense and the gain from profit can be passed on to providers such as DApp developers in Function X. In other words, instead of paying hefty bills to a mobile carrier for voice calls, users can pay less by making blockchain calls, and the fees paid are in f(x) coins. More importantly users will have complete privacy over their calls.
Use Cases: Decentralized file storage
Ethereum contracts claim to allow for the development of a decentralized file storage ecosystem, “where individual users can earn small quantities of money by renting out their own hard drives and unused space can be used to further drive down the costs of file storage.” However, they do not necessarily have the hardware to back this up. With the deployment of XPOS, smart hardware nodes and more, Function X is a natural fit for Decentralized File Storage. In fact, it is basically what f(x) IPFS is built for.
These are just four examples of the many use cases purported, and there can, will and should be more practical applications beyond these; we are right in the middle of uncharted territories.
Decentralized and autonomousThe f(x) ecosystem is fully decentralized. It’s designed and built to run autonomously in perpetuity without the reliance or supervision of any individual or organization. To support this autonomous structure, f(x) Coin which is the underlying ‘currency’ within the f(x) ecosystem has to be decentralized in terms of its distribution, allocation, control, circulation and the way it’s being generated.
To get the structure of f(x) properly set up, the founding team will initially act as ‘initiators’ and ‘guardians’ of the ecosystem. The role of the team will be similar to being a gatekeeper to prevent any bad actors or stakeholders playing foul. At the same time, the team will facilitate good players to grow within the ecosystem. Once the f(x) ecosystem is up and running, the role of the founding team will be irrelevant and phased out. The long term intention of the team is to step away, allowing the ecosystem to run and flourish by itself.
UtilityIn this section, we will explore the utility of the f(x) Coin. f(x) Coin is the native ‘currency’ of the Function X blockchain and ecosystem. All services rendered in the ecosystem will be processed, transacted with, or “fueled” by the f(x) Coin. Some of the proposed use cases include:
Example 1: A developer creates a ride-hailing DApp called DUber.
DUber developer first uploads the image and data to IPFS (storage) and code to DDocker, respectively. The developer then pays for a decentralized code hosting service provided by the DDocker, and a decentralized file hosting service provided by the IPFS. Please note the storage hosting and code hosting services can be provided by a company, or by a savvy home user with smart nodes connected to the Function X ecosystem. Subsequently, a DUber user pays the developer.
Example 2: User Alice sends an imaginary token called ABCToken to Bob.
ABCToken is created using Function X smart contract. Smart nodes hosted at the home of Charlie help confirms the transaction, Charlie is paid by Alice (or both Alice and Bob).
The flow of f(x) CoinFour main participants in f(x): Consumer (blue), Developer (blue), Infrastructure (blue), and Financial Service Provider (green)
Broadly speaking, there can be four main participants in the f(x) ecosystem, exhibited by the diagram above:
Figure: four main participants of the ecosystem The rationale behind f(x) Coin generation is the Proof of Service concept (PoS)Service providers are crucial in the whole f(x) Ecosystem, the problem of motivation/facilitation has become our priority. We have to align our interests with theirs. Hence, we have set up a Tipping Jar (similar to mining) to motivate and facilitate the existing miners shift to the f(x) Ecosystem and become part of the infrastructure service provider or attract new players into our ecosystem. Income for service provider = Service fee (from payer) + Tipping (from f(x) network generation)
The idea is that the f(x) blockchain will generate a certain amount of f(x) Coin (diminishing annually) per second to different segments of service provider, such as in the 1st year, the f(x) blockchain will generate 3.5 f(x) Coin per second and it will be distributed among the infrastructure service provider through the Proof of Service concept. Every service provider such as infrastructure service providers, developers and financial service providers will receive a ‘certificate’ of Proof of Service in the blockchain after providing the service and redeeming the f(x) Coin.
Example: There are 3 IPFS providers in the market, and the total Tipping Jar for that specific period is 1 million f(x) Coin. Party A contributes 1 TB; Party B contributes 3 TB and Party C contributes 6 TB. So, Party A will earn 1/10 * 1 million = 100k f(x) Coin; Party B will earn 3/10 * 1 million = 300k f(x) Coin. Party C will earn 6/10 * 1 million = 600k f(x) Coin.
Note: The computation method of the distribution of the Tipping Jar might vary due to the differences in the nature of the service, period and party.
Figure: Circulation flow of f(x) Coin
The theory behind the computation.Blockchain has integrated almost everything, such as storage, scripts, nodes and communication. This requires a large amount of bandwidth and computation resources which affects the transaction speed and concurrency metric.
In order to do achieve the goal of being scalable with high transaction speed, the f(x) blockchain has shifted out all the ‘bulky’ and ‘heavy duty’ functions onto other service providers, such as IPFS, FXTP, etc. We leave alone what blockchain technology does best: Calibration. Thus, the role of the Tipping Jar is to distribute the appropriate tokens to all participants.
Projected f(x) Coin distribution per second in the first year
According to Moore’s Law, the number of transistors in a densely integrated circuit doubles about every 18 -24 months. Thus, the performance of hardware doubles every 18-24 months. Taking into consideration Moore’s Law, Eric Schmidt said if you maintain the same hardware specs, the earnings will be cut in half after 18-24 months. Therefore, the normal Tipping Jar (reward) for an infrastructure service provider will decrease 50% every 18 months. In order to encourage infrastructure service providers to upgrade their hardware, we have set up another iteration and innovation contribution pool (which is worth of 50% of the normal Tipping Jar on the corresponding phase) to encourage the infrastructure service provider to embrace new technology.
According to the Andy-Bill’s law, “What Andy gives, Bill takes away”; software will always nibble away the extra performance of the hardware. The more performance a piece of hardware delivers, the more the software consumes. Thus, the developer will always follow the trend to maintain and provide high-quality service. The Tipping Jar will increase by 50% (based upon the previous quota) every 18 months.
Financial service providers will have to support the liquidation of the whole ecosystem along the journey, the Tipping Jar (FaaS) will increase by 50% by recognizing the contribution and encouraging innovation.
From the 13th year (9th phase), the Tipping Jar will reduce by 50% every 18 months. We are well aware that the “cliff drop” after the 12th year is significant. Hence, we have created a 3year (two-phase) diminishing transition period. The duration of each phase is 18 months. There are 10 phases in total which will last for a total of 15 years.
According to Gartner’s report, the blockchain industry is forecast to reach a market cap of
3.1 trillion USD in 2030. Hence, we believe a Tipping Jar of 15 years will allow the growth of Function X into the “mature life cycle” of the blockchain industry.
f(x) Coin / Token AllocationToken allocation We believe great blockchain projects attempt to equitably balance the interests of different segments of the community. We hope to motivate and incentivize token holders by allocating a total of 65% of tokens from the Token Generation Event (TGE). Another 20% is allocated to the Ecosystem Genesis Fund for developer partnerships, exchanges and other such related purposes. The remaining 15% will go to engineering, product development and marketing. There will be no public or private sales for f(x) tokens.
NPXS / NPXSXEM is used to make crypto payments as easy as buying bottled water, while f(x) is used for the operation of a decentralized ecosystem and blockchain, consisting of DApps and other services. NPXS / NPXSXEM will continue to have the same functionality and purpose after the migration to the Function X blockchain in the future. Therefore, each token will be expected to assume different fundamental roles and grant different rights to the holders.
65% of allocation for NPXS / NPXSXEM holders is broken down into the following: 15% is used for staking (see below) 45% is used for conversion to f(x) tokens. (see below) 5% is used for extra bonus tasks over 12 months (allocation TBD).
Remarks All NPXS / NPXSXEM tokens that are converted will be removed from the total supply of NPXS / NPXSXEM; Pundi X will not convert company's NPXS for f(x) Tokens. This allocation is designed for NPXS/NPXSXEM long term holders. NPXS / NPXSXEM tokens that are converted will also be entitled to the 15% f(x) Token distribution right after the conversion.
UsageManagement of the Ecosystem Genesis Fund (EGF)
The purpose of setting up the Ecosystem Initialization Fund, is to motivate, encourage and facilitate service providers to join and root into the f(x) Ecosystem and, at the same time, to attract seed consumers to enrich and enlarge the f(x) Ecosystem. EIF comes from funds raised and will be used as a bootstrap mechanism to encourage adoption before the Tipping Jar incentives fully kicks in.
The EGF is divided into 5 parts:
SummaryTime moves fast in the technology world and even faster in the blockchain space. Pundi X’s journey started in October 2017, slightly over a year ago, and we have been operating at a lightning pace ever since, making progress that can only be measured in leaps and bounds. We started as a blockchain payment solution provider and have evolved into a blockchain service provider to make blockchain technology more accessible to the general public, thereby improving your everyday life.
The creation of Function X was driven by the need to create a better suited platform for our blockchain point-of sale network and through that process, the capabilities of Function X have allowed us to extend blockchain usage beyond finance applications like payment solutions and cryptocurrency.
The complete decentralized ecosystem of Function X will change and benefit organizations, developers, governments and most importantly, society as a whole.
The XPhone prototype which we have created is just the start to give everyone a taste of the power of Function X on how you can benefit from a truly decentralized environment. We envision a future where the XPOS, XPhone and other Function X-enabled devices work hand-in-hand to make the decentralized autonomous ecosystem a reality.
You may wonder how are we able to create such an extensive ecosystem within a short span of time? We are fortunate that in today’s open source and sharing economy, we are able to tap onto the already established protocols (such as Consensus algorithm, FXTP, etc), software (like Android, IPFS, PBFT, Dockers, etc.) and hardware (design knowledge from existing experts) which were developed by selfless generous creators. Function X puts together, aggregates and streamlines all the benefits and good of these different elements and make them work better and seamlessly on the blockchain. And we will pay it forward by making Function X as open and as decentralized as possible so that others may also use Function X to create bigger and better projects.
To bring Function X to full fruition, we will continue to operate in a transparent and collaborative way. Our community will continue to be a key pillar for us and be even more vital as we get Function X up and running. As a community member, you will have an early access to the Function X ecosystem through the f(x) token conversion.
We hope you continue to show your support as we are working hard to disrupt the space and re-engineer this decentralized world.
ReferencePractical Byzantine Fault Tolerance
Byzantine General Problem technical paper
Global mobile data revenues to reach $630 billion by 2020
NPXSXEM token supply
NPXS circulating token supply and strategic purchaser
[total supply might differ from time to time due to token taken out of total supply aka “burn”]
ELC: SpaceX lessons learned (PBFT mentioned) https://lwn.net/Articles/540368/
Introduction. Mining is the process of adding transaction records to Bitcoin's public ledger of past transactions (and a "mining rig" is a colloquial metaphor for a single computer system that performs the necessary computations for "mining".This ledger of past transactions is called the block chain as it is a chain of blocks.The blockchain serves to confirm transactions to the rest of the ... Bitcoin mining is done by specialized computers. The role of miners is to secure the network and to process every Bitcoin transaction. Miners achieve this by solving a computational problem which allows them to chain together blocks of transactions (hence Bitcoin’s famous “blockchain”).. For this service, miners are rewarded with newly-created Bitcoins and transaction fees. The diagram is a simplified representation of bitcoin as a global network. In reality, the bitcoin network’s topology is not organized geographically. Rather, it forms a mesh network of interconnected nodes, which might be located very far from each other geographically. ... Bitcoin mining is an extremely competitive industry. The hashing ... Bitcoin mining software: The bitcoin mining software is at the heart of successful cryptocurrency mining because it tells the hardware to do the hard work, passing along transaction blocks to solve. Most of the time, you’ll need software for the ASIC miner as well, but manufacturers of some new models say they don’t require it. bitcoin crypto cryptocurrency coin bit chart trade concept gold money bank banking banknote bit-coin blockchain btc business cash cryptography currency diagram digital dollar e-business e-commerce economy electronic exchange finance financial golden internet investment keyboard market mining monetary net pay payment profit shining sign symbol ...
[index]          
Whether or not it's worth investing in, the math behind Bitcoin is an elegant solution to some complex problems. Hosted by: Michael Aranda Special Thanks: Da... A short introduction to how Bitcoin Works. Want more? Check out my new in-depth course on the latest in Bitcoin, Blockchain, and a survey of the most excitin... We are miners from 2013 looking to create community and help train and learn together as blockchain tech changes so quickly. Leave your thoughts in the comme... A brief and simple introduction to the hash function and how blockchain solutions use it for proof of work (mining) and data integrity (Merkle Trees). In this video we'll be creating our own blockchain in Python! We'll also be using SHA256 for our proof-of-work to mine our blockchain. Go to https://howcode....