# Mining Bitcoin With Pencil and Paper - Gizmodo

• Mining Bitcoin With Pencil and Paper - Gizmodo
• Bitcoin Crypto Currency Diagram Stock Photo (Edit Now ...
• What is Bitcoin Mining and How Does it Work? (2020 Updated)
• Mining - Bitcoin Wiki
• A Guide to Building Your Own Crypto Mining Rig - Bitcoin News

##### JDE Project Rating (A)-Convergent Decentralized Financial Agreement

2020 is the year of the outbreak of the DeFi market. As products of the DeFi 1.0 era, Maker, AAVE, and Compound have become the infrastructure of DeFI. Innovative projects of DeFi 2.0 represented by Uniswap and YFI have gradually attracted the attention of the market. Currently, DeFI 3.0 has emerged, technology innovation + business model innovation has become the theme of 3.0, and innovative projects represented by JDE have gradually occupied the market. This article focuses on the analysis of the JDE project and comprehensively evaluates the JDE project.
Project Positioning——A-
JDE is called Just for Decentralization. The project is positioned as a decentralized DeFi aggregator protocol. In the current DeFi market, each product is an independent agreement, providing users with independent products. For the user side, every DeFi project operation has a certain threshold. If a user selects multiple DeFi products at the same time, the complexity of the operation will be much higher. JDE's centralized decentralized protocol can better satisfy users' multi-faceted and full-ecological services. You can enjoy DeFi financial services with only one key operation.
Aggregation services are the most urgent needs of users in the current market. For example, similar to loan product AAVE, wealth management product Maker, insurance product NXM, etc., users must perform separate operations on each platform if they want to achieve their needs. The high threshold of DeFI will also prevent some users from entering this decentralized world.
JDE provides a complete protocol suite to allow users to perform fool-like one-key operations. On JDE's platform, it includes loan agreement, payment agreement, insurance agreement, decentralized transaction agreement and Game ecological agreement. Users can operate a variety of decentralized financial products on the protocol cluster. This positioning is very in line with the needs of current DeFi market users, and can serve millions of DeFi industry users to provide accurate services.
Project Technology-A
The DeFi project has high technical requirements. Each agreement is an independent individual, so a complete financial agreement aggregator has higher technical requirements. The technology of JDE has been developed for many years. JDE has created an on-chain and off-chain two-layer solution, which allows each protocol to be completed quickly in a short time, and the protocol cluster can also complete the interaction more quickly. Compared with other platforms, JDE's contract interaction time can be reduced by 60%. JDE's Layer 2 solution transfers transactions and transfers on the chain to off-chain, completes a Transaction off-chain, and then performs backup packaging on the chain. At the same time, JDE has added Aztec, a completely anonymous privacy protocol, which can provide more secure and anonymous services than Bitcoin. The following is the technical architecture diagram of JDE
JDE implements Full Stake DeFI on the technical side. As the basic ecological platform, JDE integrates mainstream products in the DeFi 1.0 and 2.0 eras, such as Maker, AAVE, BZX, Uniswap, Curve, YFI and other projects. It also provides projects based on ETH Full Stake DeFI, an independent solution, builds mainstream DeFi application components. Realize one end to meet all DeFi requirements.
JDE's protocol cluster will choose the most suitable product for users from mainstream products and products built by itself, make intelligent judgments between profitability and security, and then launch products that are most suitable for users. According to the needs of users, it will intelligently choose the products that best meet the users.
Each parameter in the JDE aggregation protocol will go through dozens of demonstrations to ensure that each parameter is in the safest state. JDE's technical teams are all from well-known companies around the world, and have a very deep technical foundation in the blockchain field. Compared with the technology of many DeFi projects on the market, the technical requirements of JDE are more complex. The technical aspect scored A.
Product solution——A+
JDE provides the safest guarantee for products at the bottom of the technology. Provides the most comprehensive and complete ecological services on the product side. JDE Ecology provides DeFI financial product solutions including asset pools, loan products, payment wallets, trading products DEX, insurance protection products, game products, etc.
Throughout the current DeFi financial products on the market, they can only provide a single product and service. But on the JDE platform, users can enjoy all aspects and the entire ecosystem of financial services. From the most basic asset pool for mining, lending to payment, to decentralized DEX platform transactions, insurance services, and game product services. Covers the various needs of mainstream users.
The product solution combines the various needs of the market. Focus on the asset pool JDE DAO Pool-V1. This is a more popular mining product today. In this product of JDE, users provide liquidity by depositing mainstream assets ETH, wBTC, USDT, etc., and can perform lending and DEX liquid pool transactions on the platform. Here the user's mortgage loan is a full mortgage, so the platform transplantation can be guaranteed to be in a safe state. When the user's mortgaged assets cannot cover the user's loaned assets, the platform will automatically liquidate. At this time, the platform will charge a 5% liquidation fee.
JDE Ecological DEX trading products are also the main source of revenue for the platform. The platform will charge a transaction fee of 0.2%, which is the lowest in the entire network. The handling fees of other platforms are above 0.3%. Users can inject liquidity into the DEX platform to become a market maker. The platform is very friendly to the project party, can list currency without review, and provide automated market services. The DEX trading platform can help the platform earn hundreds of thousands of dollars in handling fees (compared to the trading fee of the Uniswap platform).
JDE Eco provides a complete and multi-faceted product solution, and users can enjoy one-stop service. The product angle is rated A.
Economic Model-A
JDE is the first ecosystem in the entire network to successfully implement DAO governance. If you want to make product-related proposals in the JDE ecosystem, you must get the approval of the autonomous committee, which is composed of all currency holders. Each coin-holding user realizes a complete process of autonomy by voting on proposals. JDE's token, JDE, not only has appreciation rights, but also has very large autonomy rights.
Let's take a look at the JDE sub-token economy. The total amount of JDE is 10 million and will never be issued. Among them, 70% is used for community liquidity mining; 5% is owned by the technical team and locked for one year; 1% is for community private placement (20% is issued online, and 10% is released every week); 5% is an insurance pool; 10 % Is the DAO Autonomous Community Ecological Fund.
In the JDE economic model, almost 80% of the tokens are allocated to liquid mining, which is a very high proportion. Early rewards can be given to users who participate in the JDE community early. Users can get liquidity rewards for asset deposits, loans, DEX transactions, etc. in the JDE ecosystem. Only the technical section is allocated to the team, and the position is locked for long enough. 10% is the DAO autonomous community ecological fund, which participates in the DAO autonomous ecology. 5% is the insurance pool, which provides liquidity of funds. 1% is given to community welfare and allocated to users who participated in the early stage.
The profit of the products and services of JDE ecology will be repurchased in the JDE secondary market, which is always in a state of deflation. This economic model provides a long-term development guarantee for the JDE ecology. The economic model community surpasses most projects in the industry. The economic model is scored as A.
Comprehensive analysis, JDE ecology has a layout in the Defi field for many years, and at the same time has a very complete design in project positioning, product solutions, technological development, economic models and other sectors. The products in JDE's product solution will be gradually launched to provide users with the most complete ecological services. The prospects of the JDE project are good. It is currently in the early stages of project development. I look forward to the launch of JDE products to provide users with DeFi ecosystem services!

##### Bull market is back… Another wave of hacker attacks starts again?

 ​ The picture from COINDESK related reports On Aug. 2, Ethereum Classic Labs (ETC Labs) made an important announcement on ETC blockchain. ETC Labs said due to network attack, Ethereum Classic suffered a reorganization on August 1st. This has been the second attack on the Ethereum Classic Network this year. Did renting-power cause the problem again? In this ETC incident, one of the miners mined a large number of blocks offline. When the miner went online, due to its high computing power, and some versions of mining software did not support large-scale blockchain mergers, the consensus failed. Therefore, the entire network was out of sync, which produced an effect similar to a 51% attack. Finally, it caused the reorganization of 3693 blocks, starting at 10904147. The deposit and withdrawal between the exchanges and mining pools had to be suspended for troubleshooting during this period. Media report shows that the blockchain reorganization may be caused by a miner (or a mining pool) disconnected during mining. Although it has been restored to normal after 15 hours of repair, it does reflect the vulnerability of the Proof of Work (PoW) network: once the computing power of the network is insufficient, the performance of one single mining pool can affect the entire network, which is neither distributed nor secure for the blockchain. Neither does it have efficiency. At present, most consensus algorithms of blockchains are using PoW, which has been adopted over 10 years. In PoW, each miner solves a hashing problem. The probability to solve the problem successfully is proportional to the ratio of the miner’s hash power to the total hash power of mainnet. Although PoW has been running for a long time, the attack model against PoW is very straightforward to understand, and has attracted people’s attention for a long time: such an attack, also known as double-spending attack, may happen when an attacker possesses 51% of the overall network hash power. The attacker can roll back any blocks in the blockchain by creating a longer and more difficult chain and as a result, modify the transaction information. Since hash power can be rented to launch attacks, some top 30 projects have suffered from such attacks. In addition to this interference, the main attack method is through the computing power market such as Nice Hash. Hackers can rent hashpower to facilitate their attacks, which allows the computing power to rise rapidly in a short time and rewrite information. In January of this year, the Ethereum Classic was attacked once, and it was also the case that hackers can migrate computing power from the fiercely competitive Bitcoin and Ethereum, and use it to attack smaller projects, such as ETH Classic. ​ The picture shows the cost of attacking ETH Classic. It can be seen that it costs only $6,634 to attack ETH Classic for one hour. The security of one network is no longer limited by whether miners within the main net take more than 51% of the total hash power, rather it is determined by whether the benevolent (non-hackers) miners take more than 51% of the total hash power from the pool of projects that use similar consensus algorithm. For example, the hash power of Ethereum is 176 TH/s and that of Ethereum Classic is 9 TH/s. In this way, if one diverts some hash power from Ethereum (176 TH/s) to Ethereum Classic, then one can easily launch a double-spending attack to Ethereum Classic. The hash power ratio for this attack between the two projects is 9/176 = 5.2%, which is a tiny number. ​ https://preview.redd.it/qj57vgmgb9f51.png?width=699&format=png&auto=webp&s=39c1efc3645f268dbf1c73e1b373d532d5461006 As one of the top 30 blockchain projects, Ethereum Classic has been attacked several times. Therefore, those small and medium-sized projects with low hash power and up-and-coming future projects are facing great potential risks. This is the reason that many emerging public chain projects abandon PoW and adopt PoS. Proof of Stake (PoS) can prevent 51% attack but has problems of its own In addition to PoW consensus, another well-adopted consensus algorithm is Proof of Stake (PoS). The fundamental concept is that the one who holds more tokens has the right to create the blocks. This is similar to shareholders in the stock market. The token holders also have the opportunities to get rewards. The advantages of PoS are: (i) the algorithm avoids wasting energy like that in PoW calculation; and (ii) its design determines that the PoS will not be subjected to 51% hash power attack since the algorithm requires the miner to possess tokens in order to modify the ledger. In this way, 51% attack becomes costly and meaningless. ​ https://preview.redd.it/rf65o1vhb9f51.png?width=685&format=png&auto=webp&s=9d7a9f9dab6ce823a224e91afa9d116310cf27e1 In terms of disadvantages, nodes face the problem of accessibility. PoS requires a permission to enter the network and nodes cannot enter and exit freely and thus lacks openness. It can easily be forked. In the long run, the algorithm is short of decentralization, and leads to the Matthew effect of accumulated advantages whereby miners with more tokens will receive more rewards and perpetuate the cycle. More importantly, the current PoS consensus has not been verified for long-term reliability. Whether it can be as stable as the PoW system is yet to be verified. For some of the PoW public chains that are already launched, if they want to switch consensus, they need to do hard fork, which divides communities and carries out a long consensus upgrade and through which Ethereum is undergoing. Is there a safer and better solution? QuarkChain Provide THE Solution: High TPS Protection + PoSW Consensus For new-born projects, and some small or medium-sized projects, they all are facing the problem of power attack. For PoW-based chains, there are always some chains with lower hash power than others (ETC vs. ETH, BCH vs BTC), and thus the risk of attack is increased. In addition, the interoperability among the chains, such as cross-chain operation, is also a problem. In response, QuarkChain has designed a series of mechanisms to solve this problem. This can be summed up as a two-layer structure with a calculation power allocation and Proof of Staked Work (PoSW) consensus. First of all, there is a layer of sharding, which can be considered as some parallel chains. Each sharding chain handles the transactions relatively independently. Such design forms the basis to ensure the performance of the entire system. To avoid security issues caused by the dilution of the hash power, we also have a root chain. The blocks of the root chain do not contain transactions, but are responsible for verifying the transactions of each shard. Relying on the hash power distribution algorithm, the hash power of the root chain will always account for 51% of the net. Each shard, on the other hand, packages their transactions according to their own consensus and transaction models. Moreover, QuarkChain relies on flexibility that allows each shard to have different consensus and transaction models. Someone who wants to launch a double-spending attack on a shard that is already contained in the root chain must attack the block on the root chain, which requires calling the 51% hash power of the root chain. That is, if there are vertical field projects that open new shards on QuarkChain, even with insufficient hash power, an attacker must first attack the root chain if he or she wants to attack a new shard. The root chain has maintained more than 51% of the network’s hash power, which makes the attack very difficult. ​ https://preview.redd.it/rxpohs7jb9f51.png?width=674&format=png&auto=webp&s=e2df1307a1753542472f2b6da88e7a4022b30884 ​ As illustrated in the diagram, if the attacker wants to attack the QuarkChain network, one would need to attack the shard and the root chain simultaneously. PoW has achieved a high level of decentralization and has been verified for its stability for a long time. Combining PoW with the staking capability for PoS would make use of the advantages of both consensus mechanisms. That is what QuarkChain’s PoSW achieves exactly. PoSW, which is Proof of Staked Work, is exclusively developed by QuarkChain and runs on shards. PoSW allows miners to enjoy the benefits of lower mining difficulty by staking original tokens (currently it’s 20 times lower). Conversely, if someone malicious with a high hash power and does not stake tokens on QuarkChain, he will be punishable by receiving 20 times the difficulty of the hash power, which increases the cost of attack. If the attacker stakes tokens in order to reduce the cost of attack, he/she needs to stake the corresponding amount of tokens, which may cost even more. Thus, the whole network is more secure. Taking Ethereum Classics (ETC) as an example, if ETC uses the PoSW consensus, if there was another double-spending attack similar to the one in January, the attacker will need at least 110Th/s hash power or 650320 ETC (worth$3.2 million, and 8 TH/s hash power) to create this attack, which is far greater than the cost of the current attack on the network (8Th/s hash power) and revenue (219500 ETC). Relying on multiple sets of security mechanisms, QuarkChain ensures its own security, while providing security for new shards and small and medium-sized projects. Its high level of flexibility also allows the projects to support different types of ledger models, transaction models, virtual machines, and token economics. Such great degrees of security and flexibility will facilitate the blockchain ecosystem to accelerate growth of innovative blockchain applications. Learn more about QuarkChain Website https://www.quarkchain.io Telegram https://t.me/quarkchainio Twitter https://twitter.com/Quark_Chain Medium https://medium.com/quarkchain-official Reddit https://www.reddit.com/quarkchainio/ Community https://community.quarkchain.io/ submitted by QuarkChain to quarkchainio [link] [comments]

##### Dive Into Tendermint Consensus Protocol (I)

This article is written by the CoinEx Chain lab. CoinEx Chain is the world’s first public chain exclusively designed for DEX, and will also include a Smart Chain supporting smart contracts and a Privacy Chain protecting users’ privacy.
longcpp @ 20200618
This is Part 1 of the serialized articles aimed to explain the Tendermint consensus protocol in detail.
Part 1. Preliminary of the consensus protocol: security model and PBFT protocol
Part 2. Tendermint consensus protocol illustrated: two-phase voting protocol and the locking and unlocking mechanism
Part 3. Weighted round-robin proposer selection algorithm used in Tendermint project
Any consensus agreement that is ultimately reached is the General Agreement, that is, the majority opinion. The consensus protocol on which the blockchain system operates is no exception. As a distributed system, the blockchain system aims to maintain the validity of the system. Intuitively, the validity of the blockchain system has two meanings: firstly, there is no ambiguity, and secondly, it can process requests to update its status. The former corresponds to the safety requirements of distributed systems, while the latter to the requirements of liveness. The validity of distributed systems is mainly maintained by consensus protocols, considering the multiple nodes and network communication involved in such systems may be unstable, which has brought huge challenges to the design of consensus protocols.

## The semi-synchronous network model and Byzantine fault tolerance

Researchers of distributed systems characterize these problems that may occur in nodes and network communications using node failure models and network models. The fail-stop failure in node failure models refers to the situation where the node itself stops running due to configuration errors or other reasons, thus unable to go on with the consensus protocol. This type of failure will not cause side effects on other parts of the distributed system except that the node itself stops running. However, for such distributed systems as the public blockchain, when designing a consensus protocol, we still need to consider the evildoing intended by nodes besides their failure. These incidents are all included in the Byzantine Failure model, which covers all unexpected situations that may occur on the node, for example, passive downtime failures and any deviation intended by the nodes from the consensus protocol. For a better explanation, downtime failures refer to nodes’ passive running halt, and the Byzantine failure to any arbitrary deviation of nodes from the consensus protocol.
Compared with the node failure model which can be roughly divided into the passive and active models, the modeling of network communication is more difficult. The network itself suffers problems of instability and communication delay. Moreover, since all network communication is ultimately completed by the node which may have a downtime failure or a Byzantine failure in itself, it is usually difficult to define whether such failure arises from the node or the network itself when a node does not receive another node's network message. Although the network communication may be affected by many factors, the researchers found that the network model can be classified by the communication delay. For example, the node may fail to send data packages due to the fail-stop failure, and as a result, the corresponding communication delay is unknown and can be any value. According to the concept of communication delay, the network communication model can be divided into the following three categories:
• The synchronous network model: There is a fixed, known upper bound of delay $\Delta$ in network communication. Under this model, the maximum delay of network communication between two nodes in the network is $\Delta$. Even if there is a malicious node, the communication delay arising therefrom does not exceed $\Delta$.
• The asynchronous network model: There is an unknown delay in network communication, with the upper bound of the delay known, but the message can still be successfully delivered in the end. Under this model, the network communication delay between two nodes in the network can be any possible value, that is, a malicious node, if any, can arbitrarily extend the communication delay.
• The semi-synchronous network model: Assume that there is a Global Stabilization Time (GST), before which it is an asynchronous network model and after which, a synchronous network model. In other words, there is a fixed, known upper bound of delay in network communication $\Delta$. A malicious node can delay the GST arbitrarily, and there will be no notification when no GST occurs. Under this model, the delay in the delivery of the message at the time $T$ is $\Delta + max(T, GST)$.
The synchronous network model is the most ideal network environment. Every message sent through the network can be received within a predictable time, but this model cannot reflect the real network communication situation. As in a real network, network failures are inevitable from time to time, causing the failure in the assumption of the synchronous network model. Yet the asynchronous network model goes to the other extreme and cannot reflect the real network situation either. Moreover, according to the FLP (Fischer-Lynch-Paterson) theorem, under this model if there is one node fails, no consensus protocol will reach consensus in a limited time. In contrast, the semi-synchronous network model can better describe the real-world network communication situation: network communication is usually synchronous or may return to normal after a short time. Such an experience must be no stranger to everyone: the web page, which usually gets loaded quite fast, opens slowly every now and then, and you need to try before you know the network is back to normal since there is usually no notification. The peer-to-peer (P2P) network communication, which is widely used in blockchain projects, also makes it possible for a node to send and receive information from multiple network channels. It is unrealistic to keep blocking the network information transmission of a node for a long time. Therefore, all the discussion below is under the semi-synchronous network model.
The design and selection of consensus protocols for public chain networks that allow nodes to dynamically join and leave need to consider possible Byzantine failures. Therefore, the consensus protocol of a public chain network is designed to guarantee the security and liveness of the network under the semi-synchronous network model on the premise of possible Byzantine failure. Researchers of distributed systems point out that to ensure the security and liveness of the system, the consensus protocol itself needs to meet three requirements:
• Validity: The value reached by honest nodes must be the value proposed by one of them
• Agreement: All honest nodes must reach consensus on the same value
• Termination: The honest nodes must eventually reach consensus on a certain value
Validity and agreement can guarantee the security of the distributed system, that is, the honest nodes will never reach a consensus on a random value, and once the consensus is reached, all honest nodes agree on this value. Termination guarantees the liveness of distributed systems. A distributed system unable to reach consensus is useless.

## The CAP theorem and Byzantine Generals Problem

In a semi-synchronous network, is it possible to design a Byzantine fault-tolerant consensus protocol that satisfies validity, agreement, and termination? How many Byzantine nodes can a system tolerance? The CAP theorem and Byzantine Generals Problem provide an answer for these two questions and have thus become the basic guidelines for the design of Byzantine fault-tolerant consensus protocols.
Lamport, Shostak, and Pease abstracted the design of the consensus mechanism in the distributed system in 1982 as the Byzantine Generals Problem, which refers to such a situation as described below: several generals each lead the army to fight in the war, and their troops are stationed in different places. The generals must formulate a unified action plan for the victory. However, since the camps are far away from each other, they can only communicate with each other through the communication soldiers, or, in other words, they cannot appear on the same occasion at the same time to reach a consensus. Unfortunately, among the generals, there is a traitor or two who intend to undermine the unified actions of the loyal generals by sending the wrong information, and the communication soldiers cannot send the message to the destination by themselves. It is assumed that each communication soldier can prove the information he has brought comes from a certain general, just as in the case of a real BFT consensus protocol, each node has its public and private keys to establish an encrypted communication channel for each other to ensure that its messages will not be tampered with in the network communication, and the message receiver can also verify the sender of the message based thereon. As already mentioned, any consensus agreement ultimately reached represents the consensus of the majority. In the process of generals communicating with each other for an offensive or retreat, a general also makes decisions based on the majority opinion from the information collected by himself.
According to the research of Lamport et al, if there are 1/3 or more traitors in the node, the generals cannot reach a unified decision. For example, in the following figure, assume there are 3 generals and only 1 traitor. In the figure on the left, suppose that General C is the traitor, and A and B are loyal. If A wants to launch an attack and informs B and C of such intention, yet the traitor C sends a message to B, suggesting what he has received from A is a retreat. In this case, B can't decide as he doesn't know who the traitor is, and the information received is insufficient for him to decide. If A is a traitor, he can send different messages to B and C. Then C faithfully reports to B the information he received. At this moment as B receives conflicting information, he cannot make any decisions. In both cases, even if B had received consistent information, it would be impossible for him to spot the traitor between A and C. Therefore, it is obvious that in both situations shown in the figure below, the honest General B cannot make a choice.
According to this conclusion, when there are $n$ generals with at most $f$ traitors (n≤3f), the generals cannot reach a consensus if $n \leq 3f$; and with $n > 3f$, a consensus can be reached. This conclusion also suggests that when the number of Byzantine failures $f$ exceeds 1/3 of the total number of nodes $n$ in the system $f \ge n/3$ , no consensus will be reached on any consensus protocol among all honest nodes. Only when $f < n/3$, such condition is likely to happen, without loss of generality, and for the subsequent discussion on the consensus protocol, $n \ge 3f + 1$ by default.
The conclusion reached by Lamport et al. on the Byzantine Generals Problem draws a line between the possible and the impossible in the design of the Byzantine fault tolerance consensus protocol. Within the possible range, how will the consensus protocol be designed? Can both the security and liveness of distributed systems be fully guaranteed? Brewer provided the answer in his CAP theorem in 2000. It indicated that a distributed system requires the following three basic attributes, but any distributed system can only meet two of the three at the same time.
1. Consistency: When any node responds to the request, it must either provide the latest status information or provide no status information
2. Availability: Any node in the system must be able to continue reading and writing
3. Partition Tolerance: The system can tolerate the loss of any number of messages between two nodes and still function normally

https://preview.redd.it/1ozfwk7u7m851.png?width=1400&format=png&auto=webp&s=fdee6318de2cf1c021e636654766a7a0fe7b38b4
A distributed system aims to provide consistent services. Therefore, the consistency attribute requires that the two nodes in the system cannot provide conflicting status information or expired information, which can ensure the security of the distributed system. The availability attribute is to ensure that the system can continuously update its status and guarantee the availability of distributed systems. The partition tolerance attribute is related to the network communication delay, and, under the semi-synchronous network model, it can be the status before GST when the network is in an asynchronous status with an unknown delay in the network communication. In this condition, communicating nodes may not receive information from each other, and the network is thus considered to be in a partitioned status. Partition tolerance requires the distributed system to function normally even in network partitions.
The proof of the CAP theorem can be demonstrated with the following diagram. The curve represents the network partition, and each network has four nodes, distinguished by the numbers 1, 2, 3, and 4. The distributed system stores color information, and all the status information stored by all nodes is blue at first.
1. Partition tolerance and availability mean the loss of consistency: When node 1 receives a new request in the leftmost image, the status changes to red, the status transition information of node 1 is passed to node 3, and node 3 also updates the status information to red. However, since node 3 and node 4 did not receive the corresponding information due to the network partition, the status information is still blue. At this moment, if the status information is queried through node 2, the blue returned by node 2 is not the latest status of the system, thus losing consistency.
2. Partition tolerance and consistency mean the loss of availability: In the middle figure, the initial status information of all nodes is blue. When node 1 and node 3 update the status information to red, node 2 and node 4 maintain the outdated information as blue due to network partition. Also when querying status information through node 2, you need to first ask other nodes to make sure you’re in the latest status before returning status information as node 2 needs to follow consistency, but because of the network partition, node 2 cannot receive any information from node 1 or node 3. Then node 2 cannot determine whether it is in the latest status, so it chooses not to return any information, thus depriving the system of availability.
3. Consistency and availability mean the loss of the partition tolerance: In the right-most figure, the system does not have a network partition at first, and both status updates and queries can go smoothly. However, once a network partition occurs, it degenerates into one of the previous two conditions. It is thus proved that any distributed system cannot have consistency, availability, and partition tolerance all at the same time.

The discovery of the CAP theorem seems to declare that the aforementioned goals of the consensus protocol is impossible. However, if you’re careful enough, you may find from the above that those are all extreme cases, such as network partitions that cause the failure of information transmission, which could be rare, especially in P2P network. In the second case, the system rarely returns the same information with node 2, and the general practice is to query other nodes and return the latest status as believed after a while, regardless of whether it has received the request information of other nodes. Therefore, although the CAP theorem points out that any distributed system cannot satisfy the three attributes at the same time, it is not a binary choice, as the designer of the consensus protocol can weigh up all the three attributes according to the needs of the distributed system. However, as the communication delay is always involved in the distributed system, one always needs to choose between availability and consistency while ensuring a certain degree of partition tolerance. Specifically, in the second case, it is about the value that node 2 returns: a probably outdated value or no value. Returning the possibly outdated value may violate consistency but guarantees availability; yet returning no value deprives the system of availability but guarantees its consistency. Tendermint consensus protocol to be introduced is consistent in this trade-off. In other words, it will lose availability in some cases.
The genius of Satoshi Nakamoto is that with constraints of the CAP theorem, he managed to reach a reliable Byzantine consensus in a distributed network by combining PoW mechanism, Satoshi Nakamoto consensus, and economic incentives with appropriate parameter configuration. Whether Bitcoin's mechanism design solves the Byzantine Generals Problem has remained a dispute among academicians. Garay, Kiayias, and Leonardos analyzed the link between Bitcoin mechanism design and the Byzantine consensus in detail in their paper The Bitcoin Backbone Protocol: Analysis and Applications. In simple terms, the Satoshi Consensus is a probabilistic Byzantine fault-tolerant consensus protocol that depends on such conditions as the network communication environment and the proportion of malicious nodes' hashrate. When the proportion of malicious nodes’ hashrate does not exceed 1/2 in a good network communication environment, the Satoshi Consensus can reliably solve the Byzantine consensus problem in a distributed environment. However, when the environment turns bad, even with the proportion within 1/2, the Satoshi Consensus may still fail to reach a reliable conclusion on the Byzantine consensus problem. It is worth noting that the quality of the network environment is relative to Bitcoin's block interval. The 10-minute block generation interval of the Bitcoin can ensure that the system is in a good network communication environment in most cases, given the fact that the broadcast time of a block in the distributed network is usually just several seconds. In addition, economic incentives can motivate most nodes to actively comply with the agreement. It is thus considered that with the current Bitcoin network parameter configuration and mechanism design, the Bitcoin mechanism design has reliably solved the Byzantine Consensus problem in the current network environment.

## Practical Byzantine Fault Tolerance, PBFT

It is not an easy task to design the Byzantine fault-tolerant consensus protocol in a semi-synchronous network. The first practically usable Byzantine fault-tolerant consensus protocol is the Practical Byzantine Fault Tolerance (PBFT) designed by Castro and Liskov in 1999, the first of its kind with polynomial complexity. For a distributed system with $n$ nodes, the communication complexity is $O(n2$.) Castro and Liskov showed in the paper that by transforming centralized file system into a distributed one using the PBFT protocol, the overwall performance was only slowed down by 3%. In this section we will briefly introduce the PBFT protocol, paving the way for further detailed explanations of the Tendermint protocol and the improvements of the Tendermint protocol.
The PBFT protocol that includes $n=3f+1$ nodes can tolerate up to $f$ Byzantine nodes. In the original paper of PBFT, full connection is required among all the $n$ nodes, that is, any two of the n nodes must be connected. All the nodes of the network jointly maintain the system status through network communication. In the Bitcoin network, a node can participate in or exit the consensus process through hashrate mining at any time, which is managed by the administrator, and the PFBT protocol needs to determine all the participating nodes before the protocol starts. All nodes in the PBFT protocol are divided into two categories, master nodes, and slave nodes. There is only one master node at any time, and all nodes take turns to be the master node. All nodes run in a rotation process called View, in each of which the master node will be reelected. The master node selection algorithm in PBFT is very simple: all nodes become the master node in turn by the index number. In each view, all nodes try to reach a consensus on the system status. It is worth mentioning that in the PBFT protocol, each node has its own digital signature key pair. All sent messages (including request messages from the client) need to be signed to ensure the integrity of the message in the network and the traceability of the message itself. (You can determine who sent a message based on the digital signature).
The following figure shows the basic flow of the PBFT consensus protocol. Assume that the current view’s master node is node 0. Client C initiates a request to the master node 0. After the master node receives the request, it broadcasts the request to all slave nodes that process the request of client C and return the result to the client. After the client receives f+1 identical results from different nodes (based on the signature value), the result can be taken as the final result of the entire operation. Since the system can have at most f Byzantine nodes, at least one of the f+1 results received by the client comes from an honest node, and the security of the consensus protocol guarantees that all honest nodes will reach consensus on the same status. So, the feedback from 1 honest node is enough to confirm that the corresponding request has been processed by the system.

https://preview.redd.it/sz8so5ly7m851.png?width=1400&format=png&auto=webp&s=d472810e76bbc202e91a25ef29a51e109a576554
For the status synchronization of all honest nodes, the PBFT protocol has two constraints on each node: on one hand, all nodes must start from the same status, and on the other, the status transition of all nodes must be definite, that is, given the same status and request, the results after the operation must be the same. Under these two constraints, as long as the entire system agrees on the processing order of all transactions, the status of all honest nodes will be consistent. This is also the main purpose of the PBFT protocol: to reach a consensus on the order of transactions between all nodes, thereby ensuring the security of the entire distributed system. In terms of availability, the PBFT consensus protocol relies on a timeout mechanism to find anomalies in the consensus process and start the View Change protocol in time to try to reach a consensus again.
The figure above shows a simplified workflow of the PBFT protocol. Where C is the client, 0, 1, 2, and 3 represent 4 nodes respectively. Specifically, 0 is the master node of the current view, 1, 2, 3 are slave nodes, and node 3 is faulty. Under normal circumstances, the PBFT consensus protocol reaches consensus on the order of transactions between nodes through a three-phase protocol. These three phases are respectively: Pre-Prepare, Prepare, and Commit:
• The master node of the pre-preparation node is responsible for assigning the sequence number to the received client request, and broadcasting the message to the slave node. The message contains the hash value of the client request d, the sequence number of the current viewv, the sequence number n assigned by the master node to the request, and the signature information of the master nodesig. The scheme design of the PBFT protocol separates the request transmission from the request sequencing process, and the request transmission is not to be discussed here. The slave node that receives the message accepts the message after confirming the message is legitimate and enter preparation phase. The message in this step checks the basic signature, hash value, current view, and, most importantly, whether the master node has given the same sequence number to other request from the client in the current view.
• In preparation, the slave node broadcasts the message to all nodes (including itself), indicating that it assigns the sequence number n to the client request with the hash value d under the current view v, with its signaturesig as proof. The node receiving the message will check the correctness of the signature, the matching of the view sequence number, etc., and accept the legitimate message. When the PRE-PREPARE message about a client request (from the main node) received by a node matches with the PREPARE from 2f slave nodes, the system has agreed on the sequence number requested by the client in the current view. This means that 2f+1 nodes in the current view agree with the request sequence number. Since it contains information from at most fmalicious nodes, there are a total of f+1 honest nodes that have agreed with the allocation of the request sequence number. With f malicious nodes, there are a total of 2f+1 honest nodes, so f+1represents the majority of the honest nodes, which is the consensus of the majority mentioned before.
• After the node (including the master node and the slave node) receives a PRE-PREPARE message requested by the client and 2f PREPARE messages, the message is broadcast across the network and enters the submission phase. This message is used to indicate that the node has observed that the whole network has reached a consensus on the sequence number allocation of the request message from the client. When the node receives 2f+1 COMMIT messages, there are at least f+1 honest nodes, that is, most of the honest nodes have observed that the entire network has reached consensus on the arrangement of sequence numbers of the request message from the client. The node can process the client request and return the execution result to the client at this moment.
Roughly speaking, in the pre-preparation phase, the master node assigns a sequence number to all new client requests. During preparation, all nodes reach consensus on the client request sequence number in this view, while in submission the consistency of the request sequence number of the client in different views is to be guaranteed. In addition, the design of the PBFT protocol itself does not require the request message to be submitted by the assigned sequence number, but out of order. That can improve the efficiency of the implementation of the consensus protocol. Yet, the messages are still processed by the sequence number assigned by the consensus protocol for the consistency of the distributed system.
In the three-phase protocol execution of the PBFT protocol, in addition to maintaining the status information of the distributed system, the node itself also needs to log all kinds of consensus information it receives. The gradual accumulation of logs will consume considerable system resources. Therefore, the PBFT protocol additionally defines checkpoints to help the node deal with garbage collection. You can set a checkpoint every 100 or 1000 sequence numbers according to the request sequence number. After the client request at the checkpoint is executed, the node broadcasts messages throughout the network, indicating that after the node executes the client request with sequence number n, the hash value of the system status is d, and it is vouched by its own signature sig. After 2f+1 matching CHECKPOINT messages (one of which can come from the node itself) are received, most of the honest nodes in the entire network have reached a consensus on the system status after the execution of the client request with the sequence numbern, and then you can clear all relevant log records of client requests with the sequence number less than n. The node needs to save these2f+1 CHECKPOINTmessages as proof of the legitimate status at this moment, and the corresponding checkpoint is called a stable checkpoint.
The three-phase protocol of the PBFT protocol can ensure the consistency of the processing order of the client request, and the checkpoint mechanism is set to help nodes perform garbage collection and further ensures the status consistency of the distributed system, both of which can guarantee the security of the distributed system aforementioned. How is the availability of the distributed system guaranteed? In the semi-synchronous network model, a timeout mechanism is usually introduced, which is related to delays in the network environment. It is assumed that the network delay has a known upper bound after GST. In such condition, an initial value is usually set according to the network condition of the system deployed. In case of a timeout event, besides the corresponding processing flow triggered, additional mechanisms will be activated to readjust the waiting time. For example, an algorithm like TCP's exponential back off can be adopted to adjust the waiting time after a timeout event.
To ensure the availability of the system in the PBFT protocol, a timeout mechanism is also introduced. In addition, due to the potential the Byzantine failure in the master node itself, the PBFT protocol also needs to ensure the security and availability of the system in this case. When the Byzantine failure occurs in the master node, for example, when the slave node does not receive the PRE-PREPARE message or the PRE-PREPARE message sent by the master node from the master node within the time window and is thus determined to be illegitimate, the slave node can broadcast to the entire network, indicating that the node requests to switch to the new view with sequence number v+1. n indicates the request sequence number corresponding to the latest stable checkpoint local to the node, and C is to prove the stable checkpoint 2f+1 legitimate CHECKPOINT messages as aforementioned. After the latest stable checkpoint and before initiating the VIEWCHANGE message, the system may have reached a consensus on the sequence numbers of some request messages in the previous view. To ensure the consistency of these request sequence numbers to be switched in the view, the VIEWCHANGE message needs to carry this kind of the information to the new view, which is also the meaning of the P field in the message. P contains all the client request messages collected at the node with a request sequence number greater than n and the proof that a consensus has been reached on the sequence number in the node: the legitimate PRE-PREPARE message of the request and 2f matching PREPARE messages. When the master node in view v+1 collects 2f+1 VIEWCHANGE messages, it can broadcast the NEW-VIEW message and take the entire system into a new view. For the security of the system in combination with the three-phase protocol of the PBFT protocol, the construction rules of the NEW-VIEW information are designed in a quite complicated way. You can refer to the original paper of PBFT for more details.

VIEWCHANGE contains a lot of information. For example, C contains 2f+1 signature information, P contains several signature sets, and each set has 2f+1 signature. At least 2f+1 nodes need to send a VIEWCHANGE message before prompting the system to enter the next new view, and that means, in addition to the complex logic of constructing the information of VIEWCHANGE and NEW-VIEW, the communication complexity of the view conversion protocol is $O(n2$.) Such complexity also limits the PBFT protocol to support only a few nodes, and when there are 100 nodes, it is usually too complex to practically deploy PBFT. It is worth noting that in some materials the communication complexity of the PBFT protocol is inappropriately attributed to the full connection between n nodes. By changing the fully connected network topology to the P2P network topology based on distributed hash tables commonly used in blockchain projects, high communication complexity caused by full connection can be conveniently solved, yet still, it is difficult to improve the communication complexity during the view conversion process. In recent years, researchers have proposed to reduce the amount of communication in this step by adopting aggregate signature scheme. With this technology, 2f+1 signature information can be compressed into one, thereby reducing the communication volume during view change.

##### HEX Unique features

HEX is the principal endorsement of store on the blockchain! HEX pays Trustless Interest with no counterparty chance. Given programmable cash the principal program ought to be premium.
Pays holders rather than diggers. Staking HEX resembles getting free mining equipment and power. Bitcoin and HEX correlation
No Satoshi (on the off chance that he doesn't guarantee in 50 weeks) or Mt.Gox dumping on you. No swelling bug conceivable like bitcoin has had. Unit predisposition fixed. Progressively disseminated mining environment. Whale punishment which gives whales coins to stakers, and so forth.
Around 12 million or more of the 18 million all out BTC worth of HEX cases will be given to the stakers on day 353 by shares. What's more, It gets duplicated by the Viral and CriticalMass selection extra multipliers which can build it up to 3x. The offer cost just goes up.
Stakers that end stake early or late compensation faithful stakers. Longer stake submit pays 20% more every year, up to 3x shares, (halfway years are fine). Lower charges, lower swelling. Referral program. Organizer is a showcasing master with a crowd of people. Early adopters get paid amazingly well.
20% Speed reward tumbling to 0% during the fifty weeks. Unclaimed coins paid to stakers 2% every week for 50 weeks. Consistently you don't guarantee, another person gets your coins. Minimum amount and Virality rewards increment payouts to stakers so they make progressively HEX the more individuals that guarantee, than if less individuals asserted, despite the fact that they get unclaimed coins on day 353. Each pumpamental to bolt up supply, increment reception and cost.
Hex has a lower expansion rate than Bitcoin, much after the rate was sliced down the middle twice in its 10 years. The swelling is additionally deferred, in light of the fact that it's just paid on finished stakes, and stakes can most recent 10 years. Failure to exchange staked coins builds the estimation of unstaked coins, and chance that some will early endstake and take care of punishments to faithful stakers.
Trustless Interest.
Suppose you need to make more bitcoin on your bitcoin. What are your alternatives? You could loan your coins out and face the challenge they're not returned, or you could have a go at selling your coins for mining equipment and want to get more coins back later. Bunches of individuals have lost cash attempting either.
Counterparty hazard in Bitcoin ventures.
To acquire enthusiasm on their Bitcoin, most clients send them to a brought together outsider, for example, a trade. There, coins can be acquired to "short" the market. Merchants acquire the coins to sell, in the expectations that they can rebuy them less expensive before they need to return them, along these lines benefitting from value diminishes. These brought together gatherings are security openings that are frequently hacked, annihilate protection, or acquaint expenses on the off chance that you need with get your assets out. Billions of dollars in coins sent to trades or loan specialists have been taken. Not your keys, not your coins.
These concentrated outsiders and brokers are so essential to clients looking for yield (making interest) that the organizations themselves have made more benefit on Bitcoin than its originator. A huge number of dollars of significant worth has moved into the pockets of brokers. HEX fixes this.
This replaces these outsiders with a trustless distributed to framework. Rather than sending your HEX to a trade so they can loan it out for your sake to procure enthusiasm for you, you simply lock it in same brilliant agreement that stamped all the HEX in any case, and it credits you intrigue. In case you're given programmable cash, the principal thing you should program is premium.
HEX pays enthusiasm to stakers rather than excavators.
A few clients take a stab at mining to make more digital money. Rather than sending your cash to a remote super corp to purchase mining gear which appears late, utilized, or never by any stretch of the imagination, you can avoid the deteriorating resource and power bills and simply stake your coins.
HEX is the primary digital currency with a graph of future sellable stockpile (lapsing stakes after some time.) This makes sure about purchasers trust in future estimation of their speculation.
HEX has Speculative Stickiness.
Typical cryptographic forms of money have: Price, hash rate.
HEX has: HEX value, Share cost, Directly influences staker benefit per share: % of supply staking, Average stake length, Average stake size, stake termination diagram after some time, early and late end stake punishments.
Author information; Bitcointalk username: TridentHorn Bitcointalk profile: https://bitcointalk.org/index.php?topic=4523610.0

##### First time ever trading was a success - Advice and tips welcome

Hello everyone, would like to preface this wall of text by saying: Please dont be overly negative towards me. I know I'm extremely inexperienced and new to trading. What might be obvious or a stupid move to you is probably my inexperience showing. Any advice on where to find learning material, books, resources or good diagrams and explanations of certain patterns would be nice.
Since the UK has been in lockdown I haven't got a job to go to, a lot of extra time on my hands and a desire to learn something. I decided to have a look at trading which is something I looked at a few years ago when bitcoin started skyrocketing.
After doing as much research as possible over the first 2 weeks of being off work I decided I was going to put a little bit of my savings into Trading 212 (I know I know, probably one of the worst trading platforms I could use but it is very "noob" friendly and I enjoy the fact that it has £0 commission so as soon as I have profit; it's all mine.
So the day lockdown in the uk became official (24th march) was the day I actually decided to begin trading. I put my bit of savings in the account (£1000) and decided to check the cryptocurrencies. Now I have always been interested in bitcoin ever since I studied cryptography and cryptocurrencies at university.
And today after 19 trades I have grown £1000 to £7034. A lot of this was from shorting bitcoin and getting lucky when the prices tanked. I think I only made 2 bad trades where I lost a total of £159 but at that point I had already made ~£4000 so it wasnt a catastrophic loss.
Honestly I'm debating stopping now as I've made enough money to cover my rent and bill's for the next 3 months haha. As much as I feel like I identified patterns correctly, learnt from mistakes and managed my risk... I still feel like this exponential growth was beginners luck.
TL:DR: Started my first week of trading with £1000 and now have £7034
Please provide your success stories below, tips and learning resources I can use but please dont be TOO negative towards me. I am a beginner, I'm aware!

We as a whole realize what Bitcoin Billionaire Billionaire are, at any rate from a fundamental perspective, and most wise tech darlings have at any rate thought about buying some type of digital money. In case you're among the individuals who are really charmed by all types of cryptographic forms of money, at that point you additionally realize that the arrangement of code which they all sudden spike in demand for is known as a blockchain.
What Are Bitcoin Billionaire Block Explorers?
For Bitcoin Billionaire (and alt-coins, as well), the blockchain is a continuous record of each exchange that has each happened utilizing that cash. The chain is persistently getting longer as new squares are finished and get connected as far as possible as another arrangement of recorded information. Each new connection in the chain is included as it happens, giving it an unmistakable straight recipe.
The explanation the blockchain is so productive is on the grounds that it very well may be seen by anybody, yet it can't be duplicated. This permits genuinely open source coding and straightforwardness of information without giving up security.
Envision an information sheet that is copied on each PC that is associated with the web, and afterward envision that updates can be made to this sheet progressively from anyplace on the planet.
These updates will be appeared to everybody seeing it immediately. On the off chance that you can picture that, at that point you have a simple comprehension of how the blockchain functions.
The entirety of the information in a blockchain exists as an unendingly shared and continually refreshed database. The blockchain utilizes organizing that gives everybody a precise perspective on all records progressively. It isn't recorded in any single stockpiling gadget or housed on a specific remote server. Rather, it's records are kept really open and exist all over the place.
Since there is no focal stockpiling or ace duplicate of this information, it is highly unlikely for programmers to degenerate it. The blockchain is facilitated by a huge number of PCs at the same time and is lucid and evident by any individual who approaches the web.
As a result of the way the blockchain works, it gives another degree of unparalleled straightforwardness and receptiveness to the budgetary world. Since the data is all visible progressively, it is just normal that numerous individuals are interested and wish to look at it.
Tragically, not every person who is keen on review the blockchain for Bitcoin Billionaire Billionaire is really educated enough to peruse its code. Still more who really realize how to peruse and comprehend it would spare time if there were a simpler method to translate it.
There are the individuals who have perceived this need and have decided to answer the call by giving blockchain pilgrims. These blockchain voyagers show the information found inside the blockchain in an outwardly engaging manner to make it simpler to peruse.
Top Bitcoin Billionaire Block Explorers To Pay Attention To
Here is a rundown of the best 6 blockchain voyagers that merit investigating.
1. Blockcypher
Blockcypher is a Bitcoin Billionaire blockchain voyager that utilizations warm hues and is extremely simple on the eyes when seeing for significant stretches. Watchers can look into a Bitcoin Billionaire wallet's location and immediately observe the record for reserves sent and got through that wallet, just as its QR code.
Blockcypher is additionally ready to show any unspent sums in the wallet, which numerous blockchain travelers can't do or think about a propelled include. You can likewise utilize Blcokcypher to see the square chains of different cryptographic forms of money, for example, Dogecoin and Litecoin.
1. Bitcoin BillionaireChain
Some may consider Bitcoin BillionaireChain excessively a lot to deal with outwardly, while others will appreciate the capacity to see a great deal of data without a moment's delay. This is on the grounds that Bitcoin BillionaireChain figures out how to fit a huge amount of information onto a solitary screen. This information incorporates Bitcoin Billionaire pools, arrange hubs, and markets.
It ventures to show which individual square was mined by which mining pool on which organize. Bitcoin BillionaireChain offers a wallet administration too, which is a pleasant touch. With everything taken into account, this is a blockchain adventurer that has a ton to offer for the individuals who need to know the entirety of the subtleties when seeing a given blockchain.
1. Blockr
Any individual who has their hands in cryptographic money in any genuine way will have just heard the name Blockr. This blockchain pilgrim is one of indisputably the most mind boggling and comprehensive of all the blockchain pioneer alternatives accessible. It shows a huge amount of data, however has an advantageous and simple to peruse position that clients love.
Clients can choose a Bitcoin Billionaire trade and it will show a value file for Bitcoin Billionaire Billionaire on that trade. Blockr can aggregate the blockchain data utilizing a broad API which changes over the information into an assortment of diagrams containing the entirety of the data in a visual way that is anything but difficult to recognize and think about.
1. BTC.com
BTC.com is less broad than other blockchain adventurers, yet is ideal for following or watching out for explicit information. The first page of the site shows the hash pace of each mining pool progressively, and furthermore tracks other continuous system data. BTC.com likewise keeps tabs of system clog, which is acceptable to know for specific employments.
In case you're attempting to stay aware of one explicit Bitcoin Billionaire address, this is the spot to go. BTC.com can follow the entirety of the notices of that specific address and make a path of that tends to movement.
1. Blockchain.Info
Blockchain.info is one of the most well-known and intensely utilized blockchain wayfarers. This has brisk and simple go to alternatives for looking into a particular exchange or address without an excessive amount of complain.
Blockchain.info offers a decent measure of information as general graphs and insights about the Bitcoin Billionaire organize by and large. The site additionally has a wallet administration for both versatile and work area clients.
TradeBlock is somewhat not quite the same as most blockchain pioneers. While it peruses the equivalent blockchain and pulls a similar data for review, it presents that information in an alternate way. The entirety of the data is gathered and designed into outer connections, every one of which prompts hashes for singular exchanges.
It monitors the quantity of yields and information sources and shows them independently, which is a touch of a flighty insights that most fundamental clients aren't worried about, yet the more nerd clients will appreciate.
It advantageously tracks the specific number of exchange affirmations progressively and continues refreshing as new exchanges are finished. TradeBlock is maybe the most inside and out and subtleties blockchain pioneer on the rundown, and it shows the data in a way that is ideal for the more bad-to-the-bone Bitcoin Billionaire lovers.
Last Words On Bitcoin Billionaire Block Explorers
Regardless of whether you're searching for a speedy and simple look at an irregular blockchain to straighten something up or you're a profoundly learned Bitcoin Billionaire dealer looking to min-max returns, there is a blockchain traveler on this rundown that has all that you need.
https://www.cryptoerapro.com/bitcoin-billionaire/

##### List of moderately difficult skribbl words for your new friend group (1200+ words)

That is to say that this list contains words that this list contains words that:
1. Usually aren't instantly guess-able (like star, apple, or Nike).
2. Can be played with a group of acquaintances (I play with a group of interns at work to blow off time)
• It contains some proper nouns which I believe to be well-known enough (like Simpsons or Spiderman).
Created this list by modifying an existing difficult word list we found online and adding a bunch of new words. If you see a stupid difficult word, it was probably a word from the existing difficult word list that I forgot to remove. (amicable and reimbursement were the type of bs I removed lol).

# Background of Application-specific Blockchain

In-depth consideration of the problems encountered in the development of DAPP, in fact, has very simple reasons to explain; that is, the cost of use is high, and the benefits cannot completely offset the required learning costs. Each DAPP is architected on a corresponding blockchain. Users need to select one of the blockchains first. We have never seen a situation where someone uses an app first needs to choose the internet; because for us, there is only one Internet, and the underlying operating system shields all network differences.
For the development of Web 3.0 in the blockchain era, the most important thing is to get such an operating system first and screen the differences of various chains in front of users. Users don’t care what chain DAPP runs on, and they don’t have to worry about their Tokens being unusable under certain circumstances. This is the background of the application-specific blockchain.

https://preview.redd.it/our107tkpqt41.png?width=468&format=png&auto=webp&s=147510b20fe30c88176981828032a6e04e23eb7a
In fact, the application chain is relative to the Web 3.0 ecosystem. The highly anticipated project Polkadot is a cross-chain technology that connects all chains together. The Substrate framework created by its team can serve as such a blockchain operating system. Users do not need to care whether the interaction on the application-specific chain is universal. As long as the Polkadot ecosystem is connected, all operations of the application chain should be universal to the user. Even if the user holds Bitcoin, it can be completed in the application-specific blockchain. In the Web3.0 ecosystem, application-specific chains can not only seamlessly interoperate with chains built using Substrate, but also connect existing blockchains together, such as Bitcoin, Ethereum, and EOS, by building bridges. From the perspective of network effects, such connections will bring network traffic to the new application-specific blockchain. The cost of bringing users into the learning blockchain is greatly reduced, and a new wave of blockchain technology dividends will be ushered in.
The main functions of the application-specific blockchain:
1. The interoperable transaction layer. As can be seen from the architecture diagram of Polkadot, parachains can achieve interoperability through the verification nodes in the relay chain, which includes basic operations such as transactions.
2. The basic user data of the application-specific blockchain (user account, permissions, token ledger).
3. The application bearer of the application-specific blockchain (smart contract, virtual machine, running platform).

# The IPSE Design to Application-specific Blockchain

After the emergence of Bitcoin, it provided enough distributed nodes and power barriers, but its congestion issues and high latency caused it to fail to achieve a commercial landing, while Ethereum had the function of Smart Contracts, but it also had congestion issues. The root cause is that the entire problem set is not considered from the perspective of layering at the beginning of the blockchain design.
(1) Application data and transaction data do not need to be stacked on a blockchain. The IPSE puts most of the application data on the application-specific blockchain.
(2) A variety of application data does not need to be mixed and coexist in a blockchain. All Smart Contracts are on a virtual machine in the main chain, and the same security is obtained at a reasonable cost. The IPSE will have multiple application-specific blockchains and efficient separation of multiple application data.
(3) The node size of the application-specific blockchain is matched with its implementation business. The importance of the data is matched with the data chain security of the blockchain application-specific blockchain. The IPSE will not be completely decentralized but pays attention to making a reasonable match.
(4) Application-specific operations do not require equal commission. If there is only one main chain like Ethereum, then its price estimate for all operations in smart contracts is homogeneous, and its price lacks hierarchical planning. IPSE will design different charges in different virtual machines, and the smart contract calculates the price in the layered design.
(5) Trading operations do not require equal mining costs. Different transactions have different values. IPSE will use application-specific blockchain technology to put most of the transaction storage in the application-specific blockchain, while mining uses the main chain to jointly mine. This means the powerful consensus mechanism is used on the main chain to allow the application-specific blockchain to ride smoothly. For example, there are hundreds of nodes on the main chain to achieve a strong consensus, and only 10 nodes in the application-specific blockchain are responsible for storing application-specific blockchain data. The data volume stored by 10 nodes is 99% of the network. Anyway, verifying transactions and other behaviors on the mining node are very fast, just when the block being created, the data is pushed to the application-specific blockchain for preservation, and the 10 nodes of application-specific blockchain do not need to be mined, they are completely compliant with the 10,000 nodes on the main chain.
(6) Is a unified computing virtual machine on the main chain is unnecessary or not? For different Smart Contracts, the difference in importance is self-evident, and the importance of the data that needs to be saved is the same. If a main chain is implemented vertically, there will be serious performance expansion problems like Ethereum, and that excessive amount of synchronization can also cause security problems. The IPSE application-specific blockchain can be relied upon for these two parts. The calculation of virtual machine splitting solves the problem of insufficient performance of the main chain, and the data storage split solves the scalability problem of data management.

##### Who is paying for the rewards of the incentivized testnet?

I understand staking rewards earned in the incentivized testnet will be transferred to the mainnet.
E.g., is it funded by the Cardano Foundation, or is ADA being created from nothing?
Thanks!
EDIT 1: I think I understand my confusion - here's my current best guess as to how it works:
ADA inflation is designed such that the total ADA supply never exceeds 45 billion, and it will begin when Shelly goes live. This implies that currently, all ADA in the network has existed since the beginning of the network; in other words, Shelly will be the first time since genesis that sees the creation of ADA. More specifically, the Shelly testnet marks the beginning of inflation.
One detail: The staking rewards for an epoch are the sum of the ADA generated for the inflation of that epoch, plus the sum of the transaction fees paid in the epoch. Since the transaction fees are paid with testnet ADA (not real), the rewards finally transferred from the testnet to the mainnet will consist of ADA awarded through inflation but not testnet ADA paid in transaction fees. Otherwise, if transaction fee ADA were also transferred, it would be easy to double your mainnet ADA by paying yourself huge transaction fees in the testnet.
Here's how I think it works:
1. Created from nothing: As Ninjanoel surmised, staking rewards in Testnet-ADA will be transformed to Mainnet-ADA. These rewards do not include transaction fees (I think tradefeedz is mistaken here).
2. Legitimate process: Cardano started with 31 billion ADA premined and it promises that the remaining 14 billion will be created as staking rewards. These 14 billion will be created from nothing, as in Bitcoin mining. The launch of the incentivized testnet is essentially the start of real ADA staking - ADA are mirrored one-for-one from Mainnet to Testnet, so staking rewards are actually based on Mainnet ADA. This diagram may help:
Mainnet ADA staking rewards ---(are mirrored from)- Testnet ADA staking rewards ---(are based on)- Testnet ADA account balances ---(are mirrored from)- Mainnet ADA account balances

 If you are planning to place assets into cryptographic types of cash like Bitcoin or Ether, in any case, you do not understand where to start, this Gemini exchange review will help you with choosing. Gemini Bitcoin Exchange Review 2020 You need yourself to be a productive advanced cash intermediary. By what technique will you become? To help you here's an exchange review, which will give every one of you the low down information required for a powerful enthusiasm for one of the most trusted in stages the Gemini Exchange. We should find all the more right currently review Gemini Review : About Gemini Exchange Twin kin developed Gemini Winklevoss in the year 2014. The Gemini exchange is arranged in New York. The Gemini crypto exchange is open in essentially all US states, similarly as UK, Canada, Puerto Rico, Singapore, South Korea, and Hong Kong. In 2016, Gemini transformed into the world's recently approved Ether exchange. It positions 82th greatest exchange on earth as showed by 24-hour volume on Coinmarketcap. While Gemini Bitcoin and Gemini Ethereum trading volumes are high, the exchange is endeavoring with all undertakings to fight with those stages offering a predominant piece of the cryptographic types of cash, for instance, Binance. Reinforced Currencies Gemini offers crypto to fiat portions and a BTC/ETH grandstand, which makes it a quick contender to any similarity to Coinbase, Bitstamp, and Kraken. At present, it is one of the most respected and ensure about exchanges open. This is in light of the fact that it has more features to help secure customers against developers. Also, it is one exchange for the CBOE Bitcoin future settlement. Gemini Mobile application is directly available, which is amazingly basic and versatile to use. How to use Gemini? ​ https://preview.redd.it/qnowl19fwaj41.jpg?width=720&format=pjpg&auto=webp&s=1819eeac9d4c44681c0afe616d387b60a78f7c8e 1) Go to the official site and snap the "Register" tab on the upper right corner. Enter your name, email address, and mystery word for your own record. While affirming your email address, it is critical to : Affirm your email address and enter both your region and phone number, by then you can set up 2-Factor Authentication (2FA) which will be an additional layer of security to your record. Incorporate your monetary equalization. Starting at now, Gemini recognizes simply bank moves and wires, as a methodology for putting away holds. To check your record, move your organization ID proof. This will help you with executing and trade US Dollars. Moreover, it will help Gemini with as per the Bank Secrecy Act (BSA) and Anti Money Laundering (AML) rules. The affirmation time may run from a couple to a couple of days. Subsequent to completing of all the above strategies, you can use your record for financing. gemini crypto exchange 2) Deposit Currency In the Menu, click Transfer Funds, by then find a good pace Bank Transfer and Exchange. Enter the whole you have to store here. Moreover, note $500 consistently is the most extraordinary most extreme for Bank moves. 3) Trading Bitcoin and Ethereum As you store by methods for bank move, they are quickly available for trading. you can purchase by encountering the menu and picking your supported trading pair. For example, for Bitcoin BTC/USD similarly as Ethereum ETH/USD. In the wake of embeddings the expense and sum it will process your buy demand. There is another choice to trade by methods for the business community which has exhibit orders gave by various customers. After the fulfillment of your purchase, your record will be acknowledged with your Ethereum just as Bitcoin purchases. You can sell your computerized cash on the Gemini crypto exchange. Regardless of the way that you can't make a withdrawal until your bank move has been completely arranged. gemini sponsor organization 4)Trading Limits By and by, For most trade strategies, there are no limitations on trades. In any case, Automated Clearing House (ACH) moves have the greatest store most remote purpose of$500 day and $15,000 consistently for singular record holders. Associations have a state of restriction for making ACH stores of$10,000 consistently or $300,000 consistently. Gemini Marketplace There is a Gemini business focus that runs 24*7. Here, you can have indistinguishable number of solicitations from you wish to have, with a variety of trading choices. These include: Market Orders – With the present best open worth, the solicitations here starting dealing with quickly against resting orders. Purpose of repression Orders – The sum is filled at or better than a given expense. The sum which isn't dispatched lays on the solicitation book diligently until it is filled or dropped. Brief or Cancel (IOC) Limit Orders – The sum is filled at or better than a given expense. The sum which isn't filled rapidly is dropped and doesn't lay on the perpetual solicitation book. Maker or Cancel (MOC) Limit Orders – The sum lays on the solicitation book continually at a foreordained expense. Furthermore, the entire solicitation is dropped if there is any sum that can be filled immediately. All solicitations made on this stage are totally sponsored and fill in as a full hold exchange. In any case, there is no edge trading Gemini. Despite that, reliably the customer's record equality should have more balance than the exceptional excitement on demand books. Also, all open solicitations decline your available leveling until they are fulfilled or dropped Gemini Fees In the event that there ought to be an event of moves, Gemini crypto exchange has a low cost technique and stage customers can store Bitcoin, Ether, at freed from charges for both bank and wire moves. In any case, banks will charge a cost for the customers to wire money to their Gemini account. Withdrawals on the stage are free and all customers will have 30 free withdrawals for each calendar month. Any withdrawals more than this total will pull in costs comparable to the mining charges payable on either sort out. The costs are around 0.001 BTC or 100,000 Satoshi per trade on the Bitcoin Network and 0 GWei or 0 ETH per trade on the Ethereum Network. MakeTaker charges 0.25% is the trading costs for both sellers(makers) and buyers(takers). If it shows up at certain trade volumes, charges will be reduced. The maker charge is 0% for 30-day trading volumes that outperform 5,000 Bitcoin or 100,000 Ether. For a comparable trading entirety, the taker run after will bubble to 0.10%. Gemini uses dynamic maker and taker charge or reimbursement timetable, and sellers can get reimbursement on liquidity-creation trades. The particular entireties depend upon net trading volumes and the buy and sell extent over a multi day time allotment. The data are adjusted as expected and more information on charges can be found here. ​ https://preview.redd.it/exgucn9gwaj41.png?width=225&format=png&auto=webp&s=34fc66d46df40444abcc9ac61308106b2e3f57c0 charges Concerning purchases, the base purchase whole for Bitcoin is 0.00001 BTC, or 1000 satoshis, for Ether, the base sum is 0 .001 ETH Security-at-Gemini Bitcoin Gemini Reviews, is a strong exchange that has a better than average reputation in everyone. The exchange goes about as a way into the universe of cryptographic cash trading. This may be in light of the fact that various customers first quit concerning purchasing Bitcoin and Ethereum. In comprehension to Coinbase, Gemini has a near space. Wherein it allows its customers to make trade clearly to and from their records. Gemini is a not too bad choice, for people looking to securely trade either Bitcoin or Ethereum. The exchange is a potential decision for new competitors to the market similarly as logically settled sellers who like to make trades by methods for their monetary adjusts. Latest News Dec 17, 2019: Well realized cash related pro association State Street picked Gemini exchange for the new propelled asset pilot adventure. Nov 19, 2019: Gemini exchange wanders into NFT's and acquired Nifty Gateway Solution, a phase to buy Non-Fungible Tokens. Nov 14, 2019: The exchange added Stop-Limit to the solicitations being executed on the stage. Sep 11, 2019: Gemini dispatches Gemini Custody with 18 cryptographic types of cash Sep 5, 2019: Gemini Clearing™, a totally electronic clearing and settlement answer for off-exchange exhibited by the stage Aud 27, 2019: Gemini Joins the Silvergate Exchange Network Aug 22, 2019: Gemini loosens up and reaches to Australia April 15, 2019: Gemini wallet support Segwit Gemini Bitcoin Exchange Review Rundown: How to Buy Bitcoins by means of Gemini Register a record at Gemini and check email code sent to you. Set up two-factor validation (2FA). Give checked ID as a major aspect of the confirmation procedure. Include ledger. Store cash by clicking "Move Funds", "Store into Exchange" and afterward picking the sort of bank move. Snap "Purchase" catch and round out the buy structure to get BTC. Is Gemini Safe? Gemini is extremely worried about its clients' wellbeing, in this manner it utilize three arrangements of security... MORE Gemini Comparison with Other Exchanget To exchange bitcoins you have to initially peruse and think about various BTC trades... MORE In Which Countries Is Gemini Available? You can arrange bitcoins through Gemini nearly in any nation, yet discover where you can't... MORE Guide: Buying BTCs at Gemini It is anything but difficult to purchase bitcoins on Gemini trade, knowing the essential standards and prerequisites... MORE FAQ Discover to what extent the exchange takes, how to pull back BTCs and what strategies for... MORE Practically equivalent to Bitcoin Exchanges We have arranged a rundown of trades, notwithstanding Gemini, that can assist you with requesting bitcoins... MORE With developing worth and system, bitcoin is ready to turn into the main online resource in the realm of ventures. Gemini bitcoin trade survey This article is worried about one of the most well known trades with regards to BTC exchange, Gemini. What Is Gemini? Gemini is one of the realized digital money trades that offer an assortment of exchange apparatuses for speculators that have some involvement with the business. The organization that claims the stage is enrolled as LLC in New York State, USA, offering USD to BTC and USD to ETH exchange trade. Purchase BTC at Gemini Propelled in 2015, Gemini offers two unmistakable commercial centers, them being: customary trade administrations; bitcoin barters. Upon its appearance, the stage offered its administrations in the US just, bit by bit including different nations all the while. The organization is possessed by the Winklevoss twins, who guarantee that they are have about 1% of the complete BTC volume. Winklevoss siblings are Gemini's proprietors Gemini Security With regards to the wellbeing of your assets, Gemini applies three arrangements of safety efforts that should be referenced. To start with, the stage applies advanced money safety efforts by offering hot and cold stockpiling wallets, where cold wallets have multisig capacities to forestall hacking endeavors at your equalizations. Gemini security The subsequent measure is identified with the exchange where the entirety of the exchanges at Gemini are led through pre-financed accounts, implying that merchants and purchasers can't post orders on the off chance that they don't have adequate BTC or fiat monetary forms in their parities. Finally, the site security comprises of two-factor verification (2FA) and HTTP encryption of all data in regards to merchants and stage's exchanges from outsiders. Accessible Payment Methods As of now, Gemini acknowledges stores communicated distinctly in ACH (for US dealers) and wire moves (for every other person) communicated in USD. Credit or check cards, money stores, PayPal and numerous different alternatives are wanted to be remembered for the future however are not accessible at the present time. Buy bitcoin by means of wire move You ought to buy in to the Gemini news source since the organization will promote the new store strategy through that channel of correspondence. Shouldn't something be said about Fees? While saving or pulling back your assets communicated in fiat or computerized monetary forms, dealers would find that the administrations are done totally free. Then again, Gemini charges exchange expenses are charged dependent on a month to month net exchange volume. Taker charges can extend from 0.15% to 0.25% while creator expenses from 0% to 0.25%. Expenses at the trade Does Gemini Have Limits? Cryptographic money and wire stores and withdrawals don't have any constraints forced on dealers, implying that in the event that you utilize the said administrations, you can buy, sell and pull back bitcoins with no deterrents. Singular American financial specialists utilizing ACH move, then again, have$500 every day and $15.000 month to month while institutional individuals have$10.000 day by day and $300.000 month to month store limits. No restrictions for purchasing bitcoin Gemini Comparison When thinking about exchanging at any trade, you should hope to analyze the administrations, expenses and impediments with other comparative stages. In this manner, we have assembled an examination investigation where we benchmarked Gemini against two other well known decisions with regards to BTC buy: Kraken and Coinbase. Gemini versus Kraken Kraken, much the same as Gemini, acknowledges bank moves just, with the significant contrast being that Kraken permits 5 fiat cash stores. Notwithstanding bitcoin, there are 14 more altcoins that you can exchange with at Kraken while the two trades force check on their customers as they are both controlled organizations. Gemini versus Kraken Kraken is fundamentally the same as Gemini as far as expenses, as creatotaker charges go somewhere in the range of 0% and 0.26%. Bank moves do accompany little expenses at Kraken while Gemini acknowledges stores for nothing. In conclusion, while Gemini exchanges two or three nations in particular, Kraken is all around accessible. Coinbase versus Gemini Coinbase is viewed as one of the biggest bitcoin suppliers on the planet, offering its administrations in 32 nations, USA notwithstanding. The installment strategies at Coinbase are PayPal, bank moves and credit/check cards, two more than Gemini. Request bitcoins by means of Coinbase trade Confirmation is an absolute necessity have at Coinbase, much like in Gemini while expenses are a ton lower at Gemini, as you pay between 1.49% to 3.49% from exchange's an incentive at Coinbase. The two trades offer BTC vaults and wallet administrations while Coinbase additionally exchanges with Litecoin which are inaccessible at Gemini. Gemini BTC Exchange in Different Countries Gemini's administrations are accessible in a bunch of nations around the globe, them being the US (5 states not upheld), Canada, Japan, South Korea, Hong Kong, Singapore and the United Kingdom. The five US expresses that are not bolstered are Alaska, Arizona, Hawaii, Oregon and Wisconsin. Gemini trade in various nations Is It Legal? Gemini is an American LLC that adheres to New York Banking Law guidelines, actualizing BSA (Bank Secrecy Act) and AML (Anti-Money Laundry Compliance Program) arrangements, implying that customary reviews of the BSA/AML programs are being executed. Moreover, the firm requires all merchants to have reserves pre-saved before the exchange. Bitcoin Gemini Price, is legitimate Another significant factor of the stage's lawfulness is the way that since its beginning, Gemini has promptly accessible money related report dating 7 years back. Does Gemini Support Its Customers? Concerning the client service, Gemini has a thorough FAQ page where a large portion of the exchanging questions have been replied. Notwithstanding the FAQ, you can likewise top off a shape and present a solicitation to the Gemini group with respect to any issue that you may look on the stage. Gemini client service Because of the regular upkeep of the site's administrations, Gemini has a "Status" page where financial specialists can see which administrations and API instruments are working right now and which are definitely not. Manual for Buy Bitcoins from Gemini When you have gotten the cash at your Gemini account, click "Purchase" button on the dashboard page. Buy page for bitcoins at Gemini Presently, round out the structure on the right, giving request type, volume or estimation of BTC you wish to get and click "Purchase" to get bitcoins in your record immediately. Try to check the BTC cost at the upper left piece of the "Purchase" page to ensure it has not changed at the time you have begun the buy procedure. Enrollment It is totally allowed to enroll a record at Gemini bitcoin trade and the procedure begins once you click "Register" button at the upper right corner of the site. Give your complete name, email address and secret key in subsequent stage and snap "Make My Account". Make account at Gemini You will get an email code which you should duplicate glue into the Gemini's check page. Contribution of enactment code on Bitcoin Gemini Registration The accompanying advances will open up for you to finish, in this way you have to arrangement your 2FA security apparatus, include a financial balance and give checked ID to finish the enrollment methodology. To what extent Should I Wait for Verification? Check stage can take between an hour and a day, contingent upon various enlistment applications Gemini has right now you have begun the procedure. You ought to set up every single essential report before you start and arm yourself with persistence as a stage would set aside effort to process your data. Confirmation process at Gemini Would you be able to Get Bitcoins Without Verification? At the enlistment page, you are required to check your personality and frog your financial balance. When you have presented the records, you can't enter the stage's exchange page until the help affirms your subtleties. In this way, it is unimaginable to expect to buy supply of bitcoins without confirmation. Obligatory confirmation before purchasing BTCs at Gemini How to Add Money to Account? When you have finished the enrollment and confirmation of your record, click button "Move Funds", situated in the top segment of your dashboard page. In following stage, click "Store Into Exchange" and pick either USD or Wire alternative, contingent upon what financial balance you have included at enrollment stage. Add assets to Gemini account You can likewise store bitcoins in your Gemini wallet too. Store BTCs in the Gemini wallet At the last phase of wire move subsidizing process, you have to give bank's wiring data, for example, your record number and other significant data that can be found by clicking "Bank Settings". Give bank's wiring data When data has been given, basically click "Store" button which will show up at the base of the page. Secure Your Account Keep the entirety of your record and wallet passwords out of the programmer's compass by continually evolving them. Monitor the new secret key by keeping in touch with them down on a bit of paper as to not overlook them meanwhile. Record with 2FA on trade You as of now have 2FA from the enlistment stage and don't give your private data to some other dealer on the stage. FAQ To what extent Does It Take to Make Transaction? It takes 4 to 5 days to store assets in your Gemini account while exchanges themselves are done following you the exchange started. Diverse request types have distinctive length, contingent upon what dealer wishes to accomplish. Sitting tight for exchanges on the trade Would i be able to Buy Bitcoin with PayPal at Gemini? Now, brokers can't utilize PayPal as store technique at Gemini. You ought to buy in to the trade's news channel as to get warnings if the strategy opens up to store alternative later on. Does Gemini Have a BTC Wallet? The stage offers two kinds of wallet administrations, one being "hot" wallet and another being vault stockpiling. Both are based just, with the principle contrast being that vault stockpiling gives extra security keys that are utilized while moving bitcoins all through the wallet. Along these lines, vault administrations are esteemed as more secure than the standard BTC wallet. Gemini wallet Pulling back Your Bitcoins from Gemini At the dashboard page, click "Move Funds" and afterward "Pull back From Exchange" to begin the procedure. Pick bitcoins to continue towards the withdrawal structure. Determine the measure of BTC you with to escape the trade and give your wallet address. Snap "Survey Withdrawal" and check the data. When you are fulfilled, click "Affirm" to end the procedure. Your coins will show up inside 24 hours to your ideal area. Pull back BTC from Gemini Instructions to Order BTC with Credit/Debit Card at Gemini As with PayPal, it is preposterous to expect to buy bitcoins with the assistance of credit or charge cards at Gemini, since the choice isn't accessible right now. Stay aware of trade's news and declarations as the CC/DC choice may open up later on. Gemini Mobile App Portable stages are yet to be created by Gemini, implying that exchange is accessible on perusing stage as it were. Watch out for the declaration, as the organization may make the push towards telephone exchange not so distant future. Purchase BTC just on Gemini perusing stage Gemini Analogs Aside from Gemini, we at BitcoinBestBuy have checked on numerous different stages that can assist you with getting bitcoins effectively and securely. They all change regarding local accessibility, expenses, buy strategies and confirmation necessities, so make a point to check different articles also. Get BTC at digital money stages Coinbase Exchange Review Being one of the biggest BTC exchanging stages the world, we made a survey of their charges, store choices and other important data with respect to the trade. We have likewise given bit by bit controls on the best way to buy and pull back assets and coins from Coinbase. Coinbase survey Full Review Coinbase Bitcoin Gemini Exchange Find out About Kraken Kraken is another trade that offers bitcoins through bank moves and its administrations are all inclusive accessible. We made a survey of Kraken's advantages and disadvantages, giving our customers a diagram of the trade as far as expenses the organization charges, check prerequisites and buy procedures of the stage. https://www.cryptoerapro.com/bitcoin-gemini/ http://www.cryptoerapro.com/ https://twitter.com/cryptoerapro https://www.instagram.com/cryptoerapro/ https://www.pinterest.co.uk/cryptoerapro/ https://www.facebook.com/cryptoerapro https://www.facebook.com/pg/bitcoingeminibot https://www.facebook.com/events/282310836080639/ submitted by cryptoerapro to u/cryptoerapro [link] [comments] ##### I use diagrams like this to wake up friends and family. So far it works. Are there ones like this but look better?  submitted by bittopia to Bitcoin [link] [comments] ##### According to the long standing definition of 'blockchain' on Wikipedia, Bitcoin Cash is the main chain and BlockStream's SegWit coin is an orphan chain which will most likely never be the main chain because it is 1236 blocks behind (and counting)  submitted by n9jd34x04l151ho4 to btc [link] [comments] ##### Function X: A Concept Paper introducing the f(x) ecosystem, a universal decentralized internet powered by blockchain technology and smart devices https://preview.redd.it/yylq6k0yqrv21.png?width=633&format=png&auto=webp&s=089ffe83e18baeceb87d465ca6fad184939490e4 # Prologue This is a Concept Paper written to introduce the Function X Ecosystem, which includes the XPhone. It also addresses the relationship between the XPOS and Function X. Pundi X has always been a community-driven project. We have lived by the mission of making sure the community comes first and we are constantly learning from discussions and interactions on social media and in real-life meetings. As with all discussions, there is always background noise but we have found gems in these community discussions. One such example is a question which we found constantly lingering at the back of our mind, “Has blockchain changed the world as the Internet did in the ’90s, and the automobile in the ‘20s?”. Many might argue that it has, given the rise of so many blockchain projects with vast potential in different dimensions (like ours, if we may add). But the question remains, “can blockchain ever become what the Internet, as we know it today, has to the world?” Function X, a universal decentralized internet which is powered by blockchain technology and smart devices. Over the past few months, in the process of implementing and deploying the XPOS solution, we believe we found the answer to the question. A nimble development team was set up to bring the answer to life. We discovered that it is indeed possible to bring blockchain to the world of telephony, data transmission, storage and other industries; a world far beyond financial transactions and transfers. This is supported by end-user smart devices functioning as blockchain nodes. These devices include the XPOS and XPhone developed by Pundi X and will also include many other hardware devices manufactured by other original equipment manufacturers. The vision we want to achieve for f(x) is to create a fully autonomous and decentralized network that does not rely on any individual, organization or structure. Due to the nature of the many new concepts introduced within this Concept Paper, we have included a Q&A after each segment to facilitate your understanding. We will continuously update this paper to reflect the progress we’re making. # Function X: The Internet was just the beginning The advent of the Internet has revolutionized the world. It created a communications layer so robust that it has resulted in TCP/IP becoming the network standard. The Internet also created a wealth of information so disruptive that a company like Amazon threatened to wipe out all the traditional brick-and-mortar bookstores. These bookstores were forced to either adapt or perish. The same applies to the news publishing sector: the offerings of Google and Facebook have caused the near extinction of traditional newspapers. The digitalization of the world with the Internet has enabled tech behemoths like Apple, Amazon, Google and Facebook to dominate and rule over traditional companies. The grip of these tech giants is so extensive that it makes you wonder if the choices you make are truly your own or influenced by the data they have on you as a user. We see the blockchain revolution happening in three phases. The first was how Bitcoin showed the world what digital currency is. The second refers to how Ethereum has provided a platform to build decentralized assets easily. The clearest use case of that has come in the form of the thousands of altcoins seen today that we all are familiar with. The third phase is what many blockchain companies are trying to do now: 1) to bring the performance of blockchain to a whole new level (transaction speed, throughput, sharding, etc.) and 2) to change the course of traditional industries and platforms—including the Internet and user dynamics. Public blockchains allow trustless transactions. If everything can be transacted on the blockchain in a decentralized manner, the information will flow more efficiently than traditional offerings, without the interception of intermediators. It will level the playing field and prevent data monopolization thus allowing small innovators to develop and flourish by leveraging the resources and data shared on the blockchain. # The Blockchain revolution will be the biggest digital revolution In order to displace an incumbent technology with something new, we believe the change and improvement which the new technology has to bring will have to be at least a tenfold improvement on all aspects including speed, transparency, scalability and governance (consensus). We are excited to say that the time for this 10-times change is here. It’s time to take it up 10x with Function X. Function X or f(x) is an ecosystem built entirely on and for the blockchain. Everything in f(x) (including the application source code, transmission protocol and hardware) is completely decentralized and secure. Every bit and byte in f(x) is part of the blockchain. What we have developed is not just a public chain. It is a total decentralized solution. It consists of five core components: Function X Operating System (OS); Function X distributed ledger (Blockchain); Function X IPFS; FXTP Protocol and Function X Decentralized Docker. All five components serve a single purpose which is to decentralize all services, apps, websites, communications and, most importantly, data. The purpose of Function X OS is to allow smart hardware and IoTs to harness the upside and potential utility of the decentralization approach. We have built an in-house solution for how mobile phones can leverage Function X OS in the form of the XPhone. Other companies can also employ the Function X OS and further customize it for their own smart devices. Every smart device in the Function X ecosystem can be a node and each will have its own address and private key, uniquely linked to their node names. The OS is based on the Android OS 9.0, therefore benefiting from backward compatibility with Android apps. The Function X OS supports Android apps and Google services (referred to as the traditional mode), as well as the newly developed decentralized services (referred to as the blockchain mode). Other XPhone features powered by the Function X OS will be elaborated on in the following sections. Using the Function X Ecosystem (namely Function X FXTP), the transmission of data runs on a complex exchange of public and private key data and encryption but never through a centralized intermediary. Hence it guarantees communication without interception and gives users direct access to the data shared by others. Any information that is sent or transacted over the Function X Blockchain will also be recorded on the chain and fully protected by encryption so the ownesender has control over data sharing. And that is how a decentralized system for communications works. For developers and users transitioning to the Function X platform, it will be a relatively seamless process. We have intentionally designed the process of creating and publishing new decentralized applications (DApps) on Function X to be easy, such that the knowledge and experience from developing and using Android will be transferable. With that in mind, a single line of code in most traditional apps can be modified, and developers can have their transmission protocol moved from the traditional HTTP mode (centralized) to a decentralized mode, thus making the transmission “ownerless” because data can transmit through the network of nodes without being blocked by third parties. How services can be ported easily or built from scratch as DApps will also be explained in the following sections, employing technologies in the Function X ecosystem (namely Function X IPFS, FXTP Protocol and Decentralized Docker). #### f(x) Chain f(x) chain is a set of consensus algorithms in the form of a distributed ledger, as part of the Function X ecosystem. The blockchain is the building block of our distributed ledger that stores and verifies transactions including financials, payments, communications (phone calls, file transfers, storage), services (DApps) and more. ##### Will Function X launch a mainnet? Yes. The f(x) chain is a blockchain hence there will be a mainnet. ##### When will the testnet be launched? Q2 2019 (projected). ##### When will the mainnet be launched? Q3 2019 (projected). ##### How is the Function X blockchain designed? The f(x) chain is designed based on the philosophy that any blockchain should be able to address real-life market demand of a constantly growing peer-to-peer network. It is a blockchain with high throughput achieved with a combination of decentralized hardware support (XPOS, XPhone, etc.) and open-source software toolkit enhancements. ##### What are the physical devices that will be connected to the Function X blockchain? In due course, the XPOS OS will be replaced by the f(x) OS. On the other hand, the XPhone was designed with full f(x) OS integration in mind, from the ground up. After the f(x) OS onboarding, and with adequate stability testings and improvements, XPOS and XPhone will then be connected to the f(x) Chain. ##### What are the different elements of a block? Anything that is transmittable over the distributed network can be stored in the block, including but not limited to phone call records, websites, data packets, source code, etc. It is worth noting that throughout these processes, all data is encrypted and only the owner of the private key has the right to decide how the data should be shared, stored, decrypted or even destroyed. Which consensus mechanism is used? Practical Byzantine Fault Tolerance (PBFT). ##### What are the other implementations of Practical Byzantine Fault Tolerance (PBFT)? Flight systems that require very low latency. For example, SpaceX’s flight system, Dragon, uses PBFT design philosophy. [Appendix] ##### How do you create a much faster public chain? We believe in achieving higher speed, thus hardware and software configurations matter. If your hardware is limited in numbers or processing power, this will limit the transaction speed which may pose security risks. The Ethereum network consists of about 25,000 nodes spread across the globe now, just two years after it was launched. Meanwhile, the Bitcoin network currently has around 7,000 nodes verifying the network. As for Pundi X, with the deployment plan (by us and our partners) for XPOS, XPhone and potentially other smart devices, we anticipate that we will be able to surpass the number of Bitcoin and Ethereum nodes within 1 to 2 years. There are also plans for a very competitive software implementation of our public blockchain, the details for which we will be sharing in the near future. #### f(x) OS The f(x) OS is an Android-modified operating system that is also blockchain-compatible. You can switch seamlessly between the blockchain and the traditional mode. In the blockchain mode, every bit and byte is fully decentralized including your calls, messages, browsers and apps. When in traditional mode, the f(x) OS supports all Android features. Android is the most open and advanced operating system for smart hardware with over 2 billion monthly active users. Using Android also fits into our philosophy of being an OS/software designer and letting third-party hardware makers produce the hardware for the Function X Ecosystem. ##### What kind of open source will it be? This has not been finalized, but the options we are currently considering are Apache or GNU GPLv3. ##### What kind of hardware will it work on? The f(x) OS works on ARM architecture, hence it works on most smartphones, tablet computers, smart TVs, Android Auto and smartwatches in the market. ##### Will you build a new browser? We are currently using a modified version of the Google Chrome browser. The browser supports both HTTP and FXTP, which means that apart from distributed FXTP contents, users can view traditional contents, such ashttps://www.google.com. ##### What is the Node Name System (NNS)? A NNS is a distributed version of the traditional Domain Name System. A NNS allows every piece of Function X hardware, including the XPhone, to have a unique identity. This identity will be the unique identifier and can be called anything with digits and numbers, such as ‘JohnDoe2018’ or ‘AliceBob’. More on NNS in the following sections. Will a third-party device running the f(x) OS be automatically connected to the f(x) blockchain? Yes, third-party devices will be connected to the f(x) blockchain automatically. #### f(x) FXTP A transmission protocol defines the rules to allow information to be sent via a network. On the Internet, HTTP is a transmission protocol that governs how information such as website contents can be sent, received and displayed. FXTP is a transmission protocol for the decentralized network. FXTP is different from HTTP because it is an end-to-end transmission whereby your data can be sent, received and displayed based on a consensus mechanism rather than a client-server based decision-making mechanism. In HTTP, the server (which is controlled by an entity) decides how and if the data is sent (or even monitored), whereas in FXTP, the data is sent out and propagates to the destination based on consensus. HTTP functions as a request–response protocol in the client-server computing model. A web browser, for example, may be the client and an application running on a computer hosting a website may be the server. FXTP functions as a propagation protocol via a consensus model. A node that propagates the protocol and its packet content is both a “client” and a “server”, hence whether a packet reaches a destination is not determined by any intermediate party and this makes it more secure. #### f(x) IPFS IPFS is a protocol and network designed to store data in a distributed system. A person who wants to retrieve a file will call an identifier (hash) of the file, IPFS then combs through the other nodes and supplies the person with the file. The file is stored on the IPFS network. If you run your own node, your file would be stored only on your node and available for the world to download. If someone else downloads it and seeds it, then the file will be stored on both your node the node of the individual who downloaded it (similar to BitTorrent). IPFS is decentralized and more secure, which allows faster file and data transfer. #### f(x) DDocker Docker is computer program designed to make it easier to create, deploy, and run applications. Containers allow a developer to package up an application including libraries, and ship it all out as a package. As the name suggests, Decentralized Docker is an open platform for developers to build, ship and run distributed applications. Developers will be able to store, deploy and run their codes remote in different locations and the codes are secure in a decentralized way. # XPhone ##### Beyond crypto: First true blockchain phone that is secured and decentralized to the core XPhone is the world’s first blockchain phone which is designed with innovative features that are not found on other smartphones. Powered by Function X, an ecosystem built entirely on and for the blockchain, XPhone runs on a new transmission protocol for the blockchain age. The innovation significantly expands the use of blockchain technology beyond financial transfers. Unlike traditional phones which require a centralized service provider, XPhone runs independently without the need for that. Users can route phone calls and messages via blockchain nodes without the need for phone numbers. Once the XPhone is registered on the network, for e.g., by a user named Pitt, if someone wants to access Pitt’s publicly shared data or content, that user can just enter FXTP://xxx.Pitt. This is similar to what we do for the traditional https:// protocol. Whether Pitt is sharing photos, data, files or a website, they can be accessed through this path. And if Pitt’s friends would like to contact him, they can call, text or email his XPhone simply by entering “call.pitt”, “message.pitt”, or “mail.pitt”. The transmission of data runs on a complex exchange of public and private key data with encryption. It can guarantee communication without interception and gives users direct access to the data shared by others. Any information that is sent or transacted over the Function X Blockchain will also be recorded on the chain. ##### Toggle between now and the future Blockchain-based calling and messaging can be toggled on and off on the phone operating system which is built on Android 9.0. XPhone users can enjoy all the blockchain has to offer, as well as the traditional functionalities of an Android smartphone. We’ll be sharing more about the availability of the XPhone and further applications of Function X in the near future. # DApps ##### DApps for mass adoption So far the use of decentralized applications has been disappointing. But what if there was a straightforward way to bring popular, existing apps into a decentralized environment, without rebuilding everything? Until now, much of what we call peer-to-peer or ‘decentralized’ services continue to be built on centralized networks. We set out to change that with Function X; to disperse content now stored in the hands of the few, and to evolve services currently controlled by central parties. ##### Use Cases: Sharing economy As seen from our ride-hailing DApp example that was demonstrated in New York back in November 2018, moving towards true decentralization empowers the providers of services and not the intermediaries. In the same way, the XPhone returns power to users over how their data is being shared and with whom. Function X will empower content creators to determine how their work is being displayed and used. ##### Use Cases: Free naming One of the earliest alternative cryptocurrencies, Namecoin, wanted to use a blockchain to provide a name registration system, where users can register their names to create a unique identity. It is similar to the DNS system mapping to IP addresses. With the Node Name System (NNS) it is now possible to do this on the blockchain. NNS is a distributed version of the traditional Domain Name System. A NNS allows every piece of Function X hardware, including the XPhone, to have a unique identifier that can be named anything with digits and numbers, such as ‘JohnDoe2018’ or ‘AliceBob’. ##### Use Cases: Mobile data currency According to a study, mobile operator data revenues are estimated at over$600 billion USD by 2020, equivalent to 50 billion USD per month [appendix]. Assuming users are able to use services such as blockchain calls provided by XPhone (or other phones using Function X) the savings will be immense and the gain from profit can be passed on to providers such as DApp developers in Function X. In other words, instead of paying hefty bills to a mobile carrier for voice calls, users can pay less by making blockchain calls, and the fees paid are in f(x) coins. More importantly users will have complete privacy over their calls. Use Cases: Decentralized file storage Ethereum contracts claim to allow for the development of a decentralized file storage ecosystem, “where individual users can earn small quantities of money by renting out their own hard drives and unused space can be used to further drive down the costs of file storage.” However, they do not necessarily have the hardware to back this up. With the deployment of XPOS, smart hardware nodes and more, Function X is a natural fit for Decentralized File Storage. In fact, it is basically what f(x) IPFS is built for. These are just four examples of the many use cases purported, and there can, will and should be more practical applications beyond these; we are right in the middle of uncharted territories. # Tokenomics ##### Decentralized and autonomous The f(x) ecosystem is fully decentralized. It’s designed and built to run autonomously in perpetuity without the reliance or supervision of any individual or organization. To support this autonomous structure, f(x) Coin which is the underlying ‘currency’ within the f(x) ecosystem has to be decentralized in terms of its distribution, allocation, control, circulation and the way it’s being generated. To get the structure of f(x) properly set up, the founding team will initially act as ‘initiators’ and ‘guardians’ of the ecosystem. The role of the team will be similar to being a gatekeeper to prevent any bad actors or stakeholders playing foul. At the same time, the team will facilitate good players to grow within the ecosystem. Once the f(x) ecosystem is up and running, the role of the founding team will be irrelevant and phased out. The long term intention of the team is to step away, allowing the ecosystem to run and flourish by itself. ## Utility In this section, we will explore the utility of the f(x) Coin. f(x) Coin is the native ‘currency’ of the Function X blockchain and ecosystem. All services rendered in the ecosystem will be processed, transacted with, or “fueled” by the f(x) Coin. Some of the proposed use cases include: • For service providers: Getting paid by developers, companies and consumers for providing storage nodes, DDocker and improvement of network connections. The role of service providers will be described in greater detail in the rest of the paper. • For consumers: Paying for service fees for the DApps, nodes, network resources, storage solutions and other services consumed within the f(x) ecosystem. • For developers: Paying for services and resources rendered in the ecosystem such as smart contract creation, file storage (paid to IPFS service provider), code hosting (paid to DDocker service provider), advertisements (paid to other developers) and design works. Developers can also get paid by enterprises or organizations that engaged in the developer’s services. • For enterprises or organizations: Paying for services provided by developers and advertisers. Services provided to consumers will be charged and denominated in f(x) Coin. • For phone and hardware manufacturers: Paying for further Function X OS customizations. It is worth noting that Pundi X Labs plan to only build a few thousand devices of the XPhone flagship handsets, and leave the subsequent market supply to be filled by third-party manufacturers using our operating system. • For financial institutions: receiving payments for financial services rendered in the ecosystem. • Applications requiring high throughput. Hence f(x) Coin can be used as ‘currency’ for the below services, • In-app purchases • Blockchain calls • Smart contract creations • Transaction fees • Advertisements • Hosting fees • Borderless/cross-border transactions We believe f(x) Coin utilization will be invariably higher than other coins in traditional chains due to the breadth of the f(x) ecosystem. This includes storage services and network resources on f(x) that will utilize the f(x) Coin as “fuel” for execution and validation of transactions. Example 1: A developer creates a ride-hailing DApp called DUber. DUber developer first uploads the image and data to IPFS (storage) and code to DDocker, respectively. The developer then pays for a decentralized code hosting service provided by the DDocker, and a decentralized file hosting service provided by the IPFS. Please note the storage hosting and code hosting services can be provided by a company, or by a savvy home user with smart nodes connected to the Function X ecosystem. Subsequently, a DUber user pays the developer. Example 2: User Alice sends an imaginary token called ABCToken to Bob. ABCToken is created using Function X smart contract. Smart nodes hosted at the home of Charlie help confirms the transaction, Charlie is paid by Alice (or both Alice and Bob). #### The flow of f(x) Coin Four main participants in f(x): Consumer (blue), Developer (blue), Infrastructure (blue), and Financial Service Provider (green) Broadly speaking, there can be four main participants in the f(x) ecosystem, exhibited by the diagram above: • Consumer: Users enjoy the decentralized services available in the f(x) ecosystem • Infrastructure Service Provider: Providing infrastructures that make up the f(x) ecosystem such as those provided by mobile carriers, decentralized clouds services. • Developer: Building DApp on the f(x) network such as decentralized IT, hospitality and financial services apps. • Financial Service Provider: Providing liquidity for the f(x) Coin acting as an exchange. The f(x) ecosystem’s value proposition: • Infrastructure service providers can offer similar services that they already are providing in other markets such as FXTP, DDocker and IPFS, to earn f(x) Coin. • Developers can modify their existing Android apps to be compatible with the f(x) OS environment effortlessly, and potentially earn f(x) Coin. • Developers, at the same time, also pay for the infrastructure services used for app creation. • Consumers immerse in the decentralized app environments and pay for services used in f(x) Coin. • Developer and infrastructure service providers can earn rewards in f(x) Coin by providing their services. They can also monetize it through a wide network of financial service providers to earn some profit, should they decide to do so. Together, the four participants in this ecosystem will create a positive value flow. As the number of service providers grow, the quality of service will be enhanced, subsequently leading to more adoption. Similarly, more consumers means more value is added to the ecosystem by attracting more service providers,and creating f(x) Coin liquidity. Deep liquidity of f(x) Coin will attract more financial service providers to enhance the stability and quality of liquidity. This will attract more service providers to the ecosystem. ##### Figure: four main participants of the ecosystem The rationale behind f(x) Coin generation is the Proof of Service concept (PoS) Service providers are crucial in the whole f(x) Ecosystem, the problem of motivation/facilitation has become our priority. We have to align our interests with theirs. Hence, we have set up a Tipping Jar (similar to mining) to motivate and facilitate the existing miners shift to the f(x) Ecosystem and become part of the infrastructure service provider or attract new players into our ecosystem. Income for service provider = Service fee (from payer) + Tipping (from f(x) network generation) The idea is that the f(x) blockchain will generate a certain amount of f(x) Coin (diminishing annually) per second to different segments of service provider, such as in the 1st year, the f(x) blockchain will generate 3.5 f(x) Coin per second and it will be distributed among the infrastructure service provider through the Proof of Service concept. Every service provider such as infrastructure service providers, developers and financial service providers will receive a ‘certificate’ of Proof of Service in the blockchain after providing the service and redeeming the f(x) Coin. Example: There are 3 IPFS providers in the market, and the total Tipping Jar for that specific period is 1 million f(x) Coin. Party A contributes 1 TB; Party B contributes 3 TB and Party C contributes 6 TB. So, Party A will earn 1/10 * 1 million = 100k f(x) Coin; Party B will earn 3/10 * 1 million = 300k f(x) Coin. Party C will earn 6/10 * 1 million = 600k f(x) Coin. Note: The computation method of the distribution of the Tipping Jar might vary due to the differences in the nature of the service, period and party. Figure: Circulation flow of f(x) Coin ##### The theory behind the computation. Blockchain has integrated almost everything, such as storage, scripts, nodes and communication. This requires a large amount of bandwidth and computation resources which affects the transaction speed and concurrency metric. In order to do achieve the goal of being scalable with high transaction speed, the f(x) blockchain has shifted out all the ‘bulky’ and ‘heavy duty’ functions onto other service providers, such as IPFS, FXTP, etc. We leave alone what blockchain technology does best: Calibration. Thus, the role of the Tipping Jar is to distribute the appropriate tokens to all participants. Projected f(x) Coin distribution per second in the first year According to Moore’s Law, the number of transistors in a densely integrated circuit doubles about every 18 -24 months. Thus, the performance of hardware doubles every 18-24 months. Taking into consideration Moore’s Law, Eric Schmidt said if you maintain the same hardware specs, the earnings will be cut in half after 18-24 months. Therefore, the normal Tipping Jar (reward) for an infrastructure service provider will decrease 50% every 18 months. In order to encourage infrastructure service providers to upgrade their hardware, we have set up another iteration and innovation contribution pool (which is worth of 50% of the normal Tipping Jar on the corresponding phase) to encourage the infrastructure service provider to embrace new technology. According to the Andy-Bill’s law, “What Andy gives, Bill takes away”; software will always nibble away the extra performance of the hardware. The more performance a piece of hardware delivers, the more the software consumes. Thus, the developer will always follow the trend to maintain and provide high-quality service. The Tipping Jar will increase by 50% (based upon the previous quota) every 18 months. Financial service providers will have to support the liquidation of the whole ecosystem along the journey, the Tipping Jar (FaaS) will increase by 50% by recognizing the contribution and encouraging innovation. From the 13th year (9th phase), the Tipping Jar will reduce by 50% every 18 months. We are well aware that the “cliff drop” after the 12th year is significant. Hence, we have created a 3year (two-phase) diminishing transition period. The duration of each phase is 18 months. There are 10 phases in total which will last for a total of 15 years. According to Gartner’s report, the blockchain industry is forecast to reach a market cap of 3.1 trillion USD in 2030. Hence, we believe a Tipping Jar of 15 years will allow the growth of Function X into the “mature life cycle” of the blockchain industry. ## f(x) Coin / Token Allocation Token allocation We believe great blockchain projects attempt to equitably balance the interests of different segments of the community. We hope to motivate and incentivize token holders by allocating a total of 65% of tokens from the Token Generation Event (TGE). Another 20% is allocated to the Ecosystem Genesis Fund for developer partnerships, exchanges and other such related purposes. The remaining 15% will go to engineering, product development and marketing. There will be no public or private sales for f(x) tokens. NPXS / NPXSXEM is used to make crypto payments as easy as buying bottled water, while f(x) is used for the operation of a decentralized ecosystem and blockchain, consisting of DApps and other services. NPXS / NPXSXEM will continue to have the same functionality and purpose after the migration to the Function X blockchain in the future. Therefore, each token will be expected to assume different fundamental roles and grant different rights to the holders. https://preview.redd.it/xohy6c6pprv21.png?width=509&format=png&auto=webp&s=a2c0bd0034805c5f055c3fea4bd3ba48eb59ff07 65% of allocation for NPXS / NPXSXEM holders is broken down into the following: 15% is used for staking (see below) 45% is used for conversion to f(x) tokens. (see below) 5% is used for extra bonus tasks over 12 months (allocation TBD). https://preview.redd.it/6jmpfhmxprv21.png?width=481&format=png&auto=webp&s=c9eb2c124e0181c0851b7495028a317b5c9cd6b7 https://preview.redd.it/1pjcycv0qrv21.png?width=478&format=png&auto=webp&s=c529d5d99d760281efd0c3229edac494d5ed7750 Remarks All NPXS / NPXSXEM tokens that are converted will be removed from the total supply of NPXS / NPXSXEM; Pundi X will not convert company's NPXS for f(x) Tokens. This allocation is designed for NPXS/NPXSXEM long term holders. NPXS / NPXSXEM tokens that are converted will also be entitled to the 15% f(x) Token distribution right after the conversion. ## Usage Management of the Ecosystem Genesis Fund (EGF) The purpose of setting up the Ecosystem Initialization Fund, is to motivate, encourage and facilitate service providers to join and root into the f(x) Ecosystem and, at the same time, to attract seed consumers to enrich and enlarge the f(x) Ecosystem. EIF comes from funds raised and will be used as a bootstrap mechanism to encourage adoption before the Tipping Jar incentives fully kicks in. The EGF is divided into 5 parts: 1. Consumer (10%): To attract consumers and enlarge the customer base; 2. Developer (20%): To encourage developers to create DApps on the f(x) blockchain; 3. Infrastructure Service Provider (20%): To set up or shift to the f(x) infrastructure; 4. Financial Service Provider (20%): To create a trading platform for f(x) Coin and increase liquidity; and 5. Emergency bridge reserve (30%): To facilitate or help the stakeholders in f(x) during extreme market condition To implement the spirit of decentralization and fairness, the EGF will be managed by a consensus-based committee, called the f(x) Open Market Committee (FOMC). # Summary Time moves fast in the technology world and even faster in the blockchain space. Pundi X’s journey started in October 2017, slightly over a year ago, and we have been operating at a lightning pace ever since, making progress that can only be measured in leaps and bounds. We started as a blockchain payment solution provider and have evolved into a blockchain service provider to make blockchain technology more accessible to the general public, thereby improving your everyday life. The creation of Function X was driven by the need to create a better suited platform for our blockchain point-of sale network and through that process, the capabilities of Function X have allowed us to extend blockchain usage beyond finance applications like payment solutions and cryptocurrency. The complete decentralized ecosystem of Function X will change and benefit organizations, developers, governments and most importantly, society as a whole. The XPhone prototype which we have created is just the start to give everyone a taste of the power of Function X on how you can benefit from a truly decentralized environment. We envision a future where the XPOS, XPhone and other Function X-enabled devices work hand-in-hand to make the decentralized autonomous ecosystem a reality. You may wonder how are we able to create such an extensive ecosystem within a short span of time? We are fortunate that in today’s open source and sharing economy, we are able to tap onto the already established protocols (such as Consensus algorithm, FXTP, etc), software (like Android, IPFS, PBFT, Dockers, etc.) and hardware (design knowledge from existing experts) which were developed by selfless generous creators. Function X puts together, aggregates and streamlines all the benefits and good of these different elements and make them work better and seamlessly on the blockchain. And we will pay it forward by making Function X as open and as decentralized as possible so that others may also use Function X to create bigger and better projects. To bring Function X to full fruition, we will continue to operate in a transparent and collaborative way. Our community will continue to be a key pillar for us and be even more vital as we get Function X up and running. As a community member, you will have an early access to the Function X ecosystem through the f(x) token conversion. We hope you continue to show your support as we are working hard to disrupt the space and re-engineer this decentralized world. ## Reference Practical Byzantine Fault Tolerance http://pmg.csail.mit.edu/papers/osdi99.pdf Byzantine General Problem technical paper https://web.archive.org/web/20170205142845/http://lamport.azurewebsites.net/pubs/byz.pdf Global mobile data revenues to reach630 billion by 2020
https://www.parksassociates.com/blog/article/pr-07112016
NPXSXEM token supply
https://medium.com/pundix/a-closer-look-at-npxsxem-token-supply-843598d0e7b6
NPXS circulating token supply and strategic purchaser
https://medium.com/pundix/total-token-supply-and-strategic-investors-b41717021583
[total supply might differ from time to time due to token taken out of total supply aka “burn”]
ELC: SpaceX lessons learned (PBFT mentioned) https://lwn.net/Articles/540368/

Full: https://functionx.io/assets/file/Function_X_Concept_Paper_v2.0.pdf