Should Bitcoin target a "split" node/wallet architecture? i.e. (1) An online full-node in a remote datacenter, with DDoS protection, high bandwidth, and 24/7 availability... and (2) An offline wallet locally (in my home), with just my private keys - used for signing, like with cold storage or SPV.
I remember over a decade ago when some hobbyists still managed to run webservers (for websites) from their homes. (I believe this involved working around DHCP in order to get a "static" IP address.) Nowadays of course, almost nobody runs a webserver (for websites) from their homes. They spin up a VPS someplace like Amazon EC2, DigitalOcean, etc. However, there seems to be this massive "phobia" against running Bitcoin full-nodes in datacenters. But on the other hand, we have already heard many people saying that:
Bitcoin full-nodes in a datacenter can be better "hardened" against DDoS (which seems to be a major unresolved issue, as we are seeing this week with the attacks on Classic, and previously with the attacks on XT - plus the stress tests on Core as well, a while back);
Bitcoin full-nodes in a datacenter can have greater bandwidth / throughput (thus supporting bigger blocks, which seem to be an immediate necessity due to network congestion at the current 1 MB "max blocksize");
Bitcoin full-nodes in a datacenter can be always on-line (you don't have to be fighting with your family over the wi-fi).
In addition, there is the concept of "SPV" wallets (simplified payment verification), where a user holds their private keys locally but checks the corresponding (public) addresses online (not on their own local machine) to see their balances. Similarly, cold-storage or an "air-gapped system" (such as the approach used with Armory, or other wallets which implement BIP 32) (both of which require HD - hierarchical deterministic wallets - in order to keep the online wallet and the offline wallet in-sync) are in some sense similar to SPV wallets - in that the private keys are kept on one (permanently offline) machine, while the (public) addresses are kept on another (online) machine (at the user's location in the case of Armory and other "cold storage" or "air gapped" solutions - or on a remote server in the case of SPV). OK, so summarizing, this is the background:
online nodes need 3 things (DDoS protection, high bandwidth, 24/7), so they should preferably be run in datacenters
offline nodes are good for privacy (air-gapped / cold storage), and need little or no connectivity, so they should preferably be run in people's homes
I know the following are probably in some sense really old and obvious questions - but I want to ask them here again, because I do not feel certain that the community has gotten a fair chance to fully answer them, due to the notorious distortions in the recent debate about "max blocksize": (1) Given that webservers are pretty much all in datacenters, shouldn't we also expect (and embrace) the inevitability that Bitcoin full-nodes will also pretty much all be in datacenters? (2) Given that the only thing I need in order to verify receipt of funds is:
my private key
some access to an online machine which can verify the corresponding (public) address
...then shouldn't I be indifferent (neutral) as to whether I do this (the online part - just verifying the funds at an address) on a local machine in my home, versus on a remote machine in a datacenter? Indeed, for security, I don't even want my private keys to be on an online machine anyways - I want to always use a "cold storage" or "air-gapped" approach as provided by Armory (and some other wallets which implement BIP 32), on an offline machine. So this would seem to suggest a specialization of Bitcoin software, into the following different programs: (1) online full-node software (for relaying blocks and transactions, and for checking the balances at addresses). This is the software which needs:
lots of bandwidth
The above program should be running online in a remote datacenter. (2) offline wallet software (for generating private keys, and signing transactions). The above program should be running locally, in my home - possibly even offline, for greater security. Note that a fundamental requirement for this architecture is HD - hierarchical deterministic wallets: an easy-to-implement feature (but one which Core/Blockstream has neglected including in their wallet). This is needed because if the system is "split" between an online part and an offline part, then HD is needed in order generate identical sequences of private keys, public keys, and (public) addresses on both machines. Summary: From the point of view of:
online throughput (of full nodes)
online DDoS protection (of full nodes)
online 24/7 availability (of full nodes)
offline cold storage (of private keys)
We really want a two-part system, consisting of:
an online full-node, which could be in a remote datacenter (and which multiple users could probably share)
a (possibly permanently offline) local wallet (which is mine alone).
Since this kind of "split" architecture is actually the one which would best would satisfy all our needs (throughput, DDoS protection, 24/7 availability of the online part - and low resource usage, and total air-gapped / cold-storage security for the offline part) - then why aren't we simply accepting this, and designing our full-node and wallet software as two separate programs, each specialized for their respective tasks and environment?
Should Bitcoin target a "split" node/wallet architecture? i.e. (1) An online full-node in a remote datacenter, with DDoS protection, high bandwidth, and 24/7 availability... and (2) An offline wallet locally (in my home), with just my private keys - used for signing, like with cold storage o /r/btc
Ultimate glossary of crypto currency terms, acronyms and abbreviations
You've probably been hearing a lot about Bitcoin recently and are wondering what's the big deal? Most of your questions should be answered by the resources below but if you have additional questions feel free to ask them in the comments. It all started with the release of the release of Satoshi Nakamoto's whitepaper however that will probably go over the head of most readers so we recommend the following videos for a good starting point for understanding how bitcoin works and a little about its long term potential:
Limited Supply - There will only ever be 21,000,000 bitcoins created and they are issued in a predictable fashion, you can view the inflation schedule here. Once they are all issued Bitcoin will be truly deflationary. The halving countdown can be found here.
Open source - Bitcoin code is fully auditable. You can read the source code yourself here.
Accountable - The public ledger is transparent, all transactions are seen by everyone.
Decentralized - Bitcoin is globally distributed across thousands of nodes with no single point of failure and as such can't be shut down similar to how Bittorrent works. You can even run a node on a Raspberry Pi.
Censorship resistant - No one can prevent you from interacting with the bitcoin network and no one can censor, alter or block transactions that they disagree with, see Operation Chokepoint.
Push system - There are no chargebacks in bitcoin because only the person who owns the address where the bitcoins reside has the authority to move them.
Low fee scaling - On chain transaction fees depend on network demand and how much priority you wish to assign to the transaction. Most wallets calculate on chain fees automatically but you can view current fees here and mempool activity here. On chain fees may rise occasionally due to network demand, however instant micropayments that do not require confirmations are happening via the Lightning Network, a second layer scaling solution currently rolling out on the Bitcoin mainnet.
Borderless - No country can stop it from going in/out, even in areas currently unserved by traditional banking as the ledger is globally distributed.
Portable - Bitcoins are digital so they are easier to move than cash or gold. They can even be transported by simply memorizing a string of words for wallet recovery (while cool this method is generally not recommended due to potential for insecure key generation by inexperienced users. Hardware wallets are the preferred method for new users due to ease of use and additional security).
Bitcoin.org and BuyBitcoinWorldwide.com are helpful sites for beginners. You can buy or sell any amount of bitcoin (even just a few dollars worth) and there are several easy methods to purchase bitcoin with cash, credit card or bank transfer. Some of the more popular resources are below, also check out the bitcoinity exchange resources for a larger list of options for purchases.
Here is a listing of local ATMs. If you would like your paycheck automatically converted to bitcoin use Bitwage. Note: Bitcoins are valued at whatever market price people are willing to pay for them in balancing act of supply vs demand. Unlike traditional markets, bitcoin markets operate 24 hours per day, 365 days per year. Preev is a useful site that that shows how much various denominations of bitcoin are worth in different currencies. Alternatively you can just Google "1 bitcoin in (your local currency)".
Securing your bitcoins
With bitcoin you can "Be your own bank" and personally secure your bitcoins OR you can use third party companies aka "Bitcoin banks" which will hold the bitcoins for you.
If you prefer to "Be your own bank" and have direct control over your coins without having to use a trusted third party, then you will need to create your own wallet and keep it secure. If you want easy and secure storage without having to learn computer security best practices, then a hardware wallet such as the Trezor, Ledger or ColdCard is recommended. Alternatively there are many software wallet options to choose from here depending on your use case.
If you prefer to let third party "Bitcoin banks" manage your coins, try Gemini but be aware you may not be in control of your private keys in which case you would have to ask permission to access your funds and be exposed to third party risk.
Note: For increased security, use Two Factor Authentication (2FA) everywhere it is offered, including email! 2FA requires a second confirmation code to access your account making it much harder for thieves to gain access. Google Authenticator and Authy are the two most popular 2FA services, download links are below. Make sure you create backups of your 2FA codes.
As mentioned above, Bitcoin is decentralized, which by definition means there is no official website or Twitter handle or spokesperson or CEO. However, all money attracts thieves. This combination unfortunately results in scammers running official sounding names or pretending to be an authority on YouTube or social media. Many scammers throughout the years have claimed to be the inventor of Bitcoin. Websites like bitcoin(dot)com and the btc subreddit are active scams. Almost all altcoins (shitcoins) are marketed heavily with big promises but are really just designed to separate you from your bitcoin. So be careful: any resource, including all linked in this document, may in the future turn evil. Don't trust, verify. Also as they say in our community "Not your keys, not your coins".
Where can I spend bitcoins?
Check out spendabit or bitcoin directory for millions of merchant options. Also you can spend bitcoin anywhere visa is accepted with bitcoin debit cards such as the CashApp card. Some other useful site are listed below.
Mining bitcoins can be a fun learning experience, but be aware that you will most likely operate at a loss. Newcomers are often advised to stay away from mining unless they are only interested in it as a hobby similar to folding at home. If you want to learn more about mining you can read more here. Still have mining questions? The crew at /BitcoinMining would be happy to help you out. If you want to contribute to the bitcoin network by hosting the blockchain and propagating transactions you can run a full node using this setup guide. If you would prefer to keep it simple there are several good options. You can view the global node distribution here.
Just like any other form of money, you can also earn bitcoins by being paid to do a job.
You can also earn bitcoins by participating as a market maker on JoinMarket by allowing users to perform CoinJoin transactions with your bitcoins for a small fee (requires you to already have some bitcoins.
The following is a short list of ongoing projects that might be worth taking a look at if you are interested in current development in the bitcoin space.
One Bitcoin is quite large (hundreds of £/$/€) so people often deal in smaller units. The most common subunits are listed below:
one bitcoin is equal to 100 million satoshis
1,000 per bitcoin
used as default unit in recent Electrum wallet releases
1,000,000 per bitcoin
colloquial "slang" term for microbitcoin (μBTC)
100,000,000 per bitcoin
smallest unit in bitcoin, named after the inventor
For example, assuming an arbitrary exchange rate of $10000 for one Bitcoin, a $10 meal would equal:
For more information check out the Bitcoin units wiki. Still have questions? Feel free to ask in the comments below or stick around for our weekly Mentor Monday thread. If you decide to post a question in /Bitcoin, please use the search bar to see if it has been answered before, and remember to follow the community rules outlined on the sidebar to receive a better response. The mods are busy helping manage our community so please do not message them unless you notice problems with the functionality of the subreddit. Note: This is a community created FAQ. If you notice anything missing from the FAQ or that requires clarification you can edit it here and it will be included in the next revision pending approval. Welcome to the Bitcoin community and the new decentralized economy!
Hey Guys, Im new to Monero and Im really fascinated by it so far. I used Bitcoin in the past but want to switch to Monero. This change has privacy reasons, thats why I want to make sure that how I use Monero is really safe, otherwise my change would not be worth it. I have some questions: - Can I use Monero on my Computer without Tails? Will it still be private? I dont have enough storage for the blockchain on my Tails USB - If I use Monero over the Cake wallet on my phone (connected to local node on my PC) is it also safe? And if I want to make a transaction with my cake wallet, does my PC with the local node need to be running or can it be offline? thank you
Hey There, beginner here! I want to invest in bitcoins, right now I have created a coinbase account and brought bitcoins for 100 EUR. Can I use coinbase like a portfolio where I can keep my bitcoins and sell them again in maybe 2-5 years? or should I use another platform for longterm investment? About me: I'm 20, and I live in Denmark (Europe)
How EpiK Protocol “Saved the Miners” from Filecoin with the E2P Storage Model?
https://preview.redd.it/n5jzxozn27v51.png?width=2222&format=png&auto=webp&s=6cd6bd726582bbe2c595e1e467aeb3fc8aabe36f On October 20, Eric Yao, Head of EpiK China, and Leo, Co-Founder & CTO of EpiK, visited Deep Chain Online Salon, and discussed “How EpiK saved the miners eliminated by Filecoin by launching E2P storage model”. ‘?” The following is a transcript of the sharing. Sharing Session Eric: Hello, everyone, I’m Eric, graduated from School of Information Science, Tsinghua University. My Master’s research was on data storage and big data computing, and I published a number of industry top conference papers. Since 2013, I have invested in Bitcoin, Ethereum, Ripple, Dogcoin, EOS and other well-known blockchain projects, and have been settling in the chain circle as an early technology-based investor and industry observer with 2 years of blockchain experience. I am also a blockchain community initiator and technology evangelist Leo: Hi, I’m Leo, I’m the CTO of EpiK. Before I got involved in founding EpiK, I spent 3 to 4 years working on blockchain, public chain, wallets, browsers, decentralized exchanges, task distribution platforms, smart contracts, etc., and I’ve made some great products. EpiK is an answer to the question we’ve been asking for years about how blockchain should be landed, and we hope that EpiK is fortunate enough to be an answer for you as well. Q & A Deep Chain Finance: First of all, let me ask Eric, on October 15, Filecoin’s main website launched, which aroused everyone’s attention, but at the same time, the calls for fork within Filecoin never stopped. The EpiK protocol is one of them. What I want to know is, what kind of project is EpiK Protocol? For what reason did you choose to fork in the first place? What are the differences between the forked project and Filecoin itself? Eric: First of all, let me answer the first question, what kind of project is EpiK Protocol. With the Fourth Industrial Revolution already upon us, comprehensive intelligence is one of the core goals of this stage, and the key to comprehensive intelligence is how to make machines understand what humans know and learn new knowledge based on what they already know. And the knowledge graph scale is a key step towards full intelligence. In order to solve the many challenges of building large-scale knowledge graphs, the EpiK Protocol was born. EpiK Protocol is a decentralized, hyper-scale knowledge graph that organizes and incentivizes knowledge through decentralized storage technology, decentralized autonomous organizations, and generalized economic models. Members of the global community will expand the horizons of artificial intelligence into a smarter future by organizing all areas of human knowledge into a knowledge map that will be shared and continuously updated for the eternal knowledge vault of humanity And then, for what reason was the fork chosen in the first place? EpiK’s project founders are all senior blockchain industry practitioners and have been closely following the industry development and application scenarios, among which decentralized storage is a very fresh application scenario. However, in the development process of Filecoin, the team found that due to some design mechanisms and historical reasons, the team found that Filecoin had some deviations from the original intention of the project at that time, such as the overly harsh penalty mechanism triggered by the threat to weaken security, and the emergence of the computing power competition leading to the emergence of computing power monopoly by large miners, thus monopolizing the packaging rights, which can be brushed with computing power by uploading useless data themselves. The emergence of these problems will cause the data environment on Filecoin to get worse and worse, which will lead to the lack of real value of the data in the chain, high data redundancy, and the difficulty of commercializing the project to land. After paying attention to the above problems, the project owner proposes to introduce multi-party roles and a decentralized collaboration platform DAO to ensure the high value of the data on the chain through a reasonable economic model and incentive mechanism, and store the high-value data: knowledge graph on the blockchain through decentralized storage, so that the lack of value of the data on the chain and the monopoly of large miners’ computing power can be solved to a large extent. Finally, what differences exist between the forked project and Filecoin itself? On the basis of the above-mentioned issues, EpiK’s design is very different from Filecoin, first of all, EpiK is more focused in terms of business model, and it faces a different market and track from the cloud storage market where Filecoin is located because decentralized storage has no advantage over professional centralized cloud storage in terms of storage cost and user experience. EpiK focuses on building a decentralized knowledge graph, which reduces data redundancy and safeguards the value of data in the distributed storage chain while preventing the knowledge graph from being tampered with by a few people, thus making the commercialization of the entire project reasonable and feasible. From the perspective of ecological construction, EpiK treats miners more friendly and solves the pain point of Filecoin to a large extent, firstly, it changes the storage collateral and commitment collateral of Filecoin to one-time collateral. Miners participating in EpiK Protocol are only required to pledge 1000 EPK per miner, and only once before mining, not in each sector. What is the concept of 1000 EPKs, you only need to participate in pre-mining for about 50 days to get this portion of the tokens used for pledging. The EPK pre-mining campaign is currently underway, and it runs from early September to December, with a daily release of 50,000 ERC-20 standard EPKs, and the pre-mining nodes whose applications are approved will divide these tokens according to the mining ratio of the day, and these tokens can be exchanged 1:1 directly after they are launched on the main network. This move will continue to expand the number of miners eligible to participate in EPK mining. Secondly, EpiK has a more lenient penalty mechanism, which is different from Filecoin’s official consensus, storage and contract penalties, because the protocol can only be uploaded by field experts, which is the “Expert to Person” mode. Every miner needs to be backed up, which means that if one or more miners are offline in the network, it will not have much impact on the network, and the miner who fails to upload the proof of time and space in time due to being offline will only be forfeited by the authorities for the effective computing power of this sector, not forfeiting the pledged coins. If the miner can re-submit the proof of time and space within 28 days, he will regain the power. Unlike Filecoin’s 32GB sectors, EpiK’s encapsulated sectors are smaller, only 8M each, which will solve Filecoin’s sector space wastage problem to a great extent, and all miners have the opportunity to complete the fast encapsulation, which is very friendly to miners with small computing power. The data and quality constraints will also ensure that the effective computing power gap between large and small miners will not be closed. Finally, unlike Filecoin’s P2P data uploading model, EpiK changes the data uploading and maintenance to E2P uploading, that is, field experts upload and ensure the quality and value of the data on the chain, and at the same time introduce the game relationship between data storage roles and data generation roles through a rational economic model to ensure the stability of the whole system and the continuous high-quality output of the data on the chain. Deep Chain Finance: Eric, on the eve of Filecoin’s mainline launch, issues such as Filecoin’s pre-collateral have aroused a lot of controversy among the miners. In your opinion, what kind of impact will Filecoin bring to itself and the whole distributed storage ecosystem after it launches? Do you think that the current confusing FIL prices are reasonable and what should be the normal price of FIL? Eric: Filecoin mainnet has launched and many potential problems have been exposed, such as the aforementioned high pre-security problem, the storage resource waste and computing power monopoly caused by unreasonable sector encapsulation, and the harsh penalty mechanism, etc. These problems are quite serious, and will greatly affect the development of Filecoin ecology. These problems are relatively serious, and will greatly affect the development of Filecoin ecology, here are two examples to illustrate. For example, the problem of big miners computing power monopoly, now after the big miners have monopolized computing power, there will be a very delicate state — — the miners save a file data with ordinary users. There is no way to verify this matter in the chain, whether what he saved is uploaded by himself or someone else. And after the big miners have monopolized computing power, there will be a very delicate state — — the miners will save a file data with ordinary users, there is no way to verify this matter in the chain, whether what he saved is uploaded by himself or someone else. Because I can fake another identity to upload data for myself, but that leads to the fact that for any miner I go to choose which data to save. I have only one goal, and that is to brush my computing power and how fast I can brush my computing power. There is no difference between saving other people’s data and saving my own data in the matter of computing power. When I save someone else’s data, I don’t know that data. Somewhere in the world, the bandwidth quality between me and him may not be good enough. The best option is to store my own local data, which makes sense, and that results in no one being able to store data on the chain at all. They only store their own data, because it’s the most economical for them, and the network has essentially no storage utility, no one is providing storage for the masses of retail users. The harsh penalty mechanism will also severely deplete the miner’s profits, because DDOS attacks are actually a very common attack technique for the attacker, and for a big miner, he can get a very high profit in a short period of time if he attacks other customers, and this thing is a profitable thing for all big miners. Now as far as the status quo is concerned, the vast majority of miners are actually not very well maintained, so they are not very well protected against these low-DDOS attacks. So the penalty regime is grim for them. The contradiction between the unreasonable system and the demand will inevitably lead to the evolution of the system in a more reasonable direction, so there will be many forked projects that are more reasonable in terms of mechanism, thus attracting Filecoin miners and a diversion of storage power. Since each project is in the field of decentralized storage track, the demand for miners is similar or even compatible with each other, so miners will tend to fork the projects with better economic benefits and business scenarios, so as to filter out the projects with real value on the ground. For the chaotic FIL price, because FIL is also a project that has gone through several years, carrying too many expectations, so it can only be said that the current situation has its own reasons for existence. As for the reasonable price of FIL there is no way to make a prediction because in the long run, it is necessary to consider the commercialization of the project to land and the value of the actual chain of data. In other words, we need to keep observing whether Filecoin will become a game of computing power or a real value carrier. Deep Chain Finance: Leo, we just mentioned that the pre-collateral issue of Filecoin caused the dissatisfaction of miners, and after Filecoin launches on the main website, the second round of space race test coins were directly turned into real coins, and the official selling of FIL hit the market phenomenon, so many miners said they were betrayed. What I want to know is, EpiK’s main motto is “save the miners eliminated by Filecoin”, how to deal with the various problems of Filecoin, and how will EpiK achieve “save”? Leo: Originally Filecoin’s tacit approval of the computing power makeup behavior was to declare that the official directly chose to abandon the small miners. And this test coin turned real coin also hurt the interests of the loyal big miners in one cut, we do not know why these low-level problems, we can only regret. EpiK didn’t do it to fork Filecoin, but because EpiK to build a shared knowledge graph ecology, had to integrate decentralized storage in, so the most hardcore Filecoin’s PoRep and PoSt decentralized verification technology was chosen. In order to ensure the quality of knowledge graph data, EpiK only allows community-voted field experts to upload data, so EpiK naturally prevents miners from making up computing power, and there is no reason for the data that has no value to take up such an expensive decentralized storage resource. With the inability to make up computing power, the difference between big miners and small miners is minimal when the amount of knowledge graph data is small. We can’t say that we can save the big miners, but we are definitely the optimal choice for the small miners who are currently in the market to be eliminated by Filecoin. Deep Chain Finance: Let me ask Eric: According to EpiK protocol, EpiK adopts the E2P model, which allows only experts in the field who are voted to upload their data. This is very different from Filecoin’s P2P model, which allows individuals to upload data as they wish. In your opinion, what are the advantages of the E2P model? If only voted experts can upload data, does that mean that the EpiK protocol is not available to everyone? Eric: First, let me explain the advantages of the E2P model over the P2P model. There are five roles in the DAO ecosystem: miner, coin holder, field expert, bounty hunter and gateway. These five roles allocate the EPKs generated every day when the main network is launched. The miner owns 75% of the EPKs, the field expert owns 9% of the EPKs, and the voting user shares 1% of the EPKs. The other 15% of the EPK will fluctuate based on the daily traffic to the network, and the 15% is partly a game between the miner and the field expert. The first describes the relationship between the two roles. The first group of field experts are selected by the Foundation, who cover different areas of knowledge (a wide range of knowledge here, including not only serious subjects, but also home, food, travel, etc.) This group of field experts can recommend the next group of field experts, and the recommended experts only need to get 100,000 EPK votes to become field experts. The field expert’s role is to submit high-quality data to the miner, who is responsible for encapsulating this data into blocks. Network activity is judged by the amount of EPKs pledged by the entire network for daily traffic (1 EPK = 10 MB/day), with a higher percentage indicating higher data demand, which requires the miner to increase bandwidth quality. If the data demand decreases, this requires field experts to provide higher quality data. This is similar to a library with more visitors needing more seats, i.e., paying the miner to upgrade the bandwidth. When there are fewer visitors, more money is needed to buy better quality books to attract visitors, i.e., money for bounty hunters and field experts to generate more quality knowledge graph data. The game between miners and field experts is the most important game in the ecosystem, unlike the game between the authorities and big miners in the Filecoin ecosystem. The game relationship between data producers and data storers and a more rational economic model will inevitably lead to an E2P model that generates stored on-chain data of much higher quality than the P2P model, and the quality of bandwidth for data access will be better than the P2P model, resulting in greater business value and better landing scenarios. I will then answer the question of whether this means that the EpiK protocol will not be universally accessible to all. The E2P model only qualifies the quality of the data generated and stored, not the roles in the ecosystem; on the contrary, with the introduction of the DAO model, the variety of roles introduced in the EpiK ecosystem (which includes the roles of ordinary people) is not limited. (Bounty hunters who can be competent in their tasks) gives roles and possibilities for how everyone can participate in the system in a more logical way. For example, a miner with computing power can provide storage, a person with a certain domain knowledge can apply to become an expert (this includes history, technology, travel, comics, food, etc.), and a person willing to mark and correct data can become a bounty hunter. The presence of various efficient support tools from the project owner will lower the barriers to entry for various roles, thus allowing different people to do their part in the system and together contribute to the ongoing generation of a high-quality decentralized knowledge graph. Deep Chain Finance: Leo, some time ago, EpiK released a white paper and an economy whitepaper, explaining the EpiK concept from the perspective of technology and economy model respectively. What I would like to ask is, what are the shortcomings of the current distributed storage projects, and how will EpiK protocol be improved? Leo: Distributed storage can easily be misunderstood as those of Ali’s OceanDB, but in the field of blockchain, we should focus on decentralized storage first. There is a big problem with the decentralized storage on the market now, which is “why not eat meat porridge”. How to understand it? Decentralized storage is cheaper than centralized storage because of its technical principle, and if it is, the centralized storage is too rubbish for comparison. What incentive does the average user have to spend more money on decentralized storage to store data? Is it safer? Existence miners can shut down at any time on decentralized storage by no means save a share of security in Ariadne and Amazon each. More private? There’s no difference between encrypted presence on decentralized storage and encrypted presence on Amazon. Faster? The 10,000 gigabytes of bandwidth in decentralized storage simply doesn’t compare to the fiber in a centralized server room. This is the root problem of the business model, no one is using it, no one is buying it, so what’s the big vision. The goal of EpiK is to guide all community participants in the co-construction and sharing of field knowledge graph data, which is the best way for robots to understand human knowledge, and the more knowledge graph data there is, the more knowledge a robot has, the more intelligent it is exponentially, i.e., EpiK uses decentralized storage technology. The value of exponentially growing data is captured with linearly growing hardware costs, and that’s where the buy-in for EPK comes in. Organized data is worth a lot more than organized hard drives, and there is a demand for EPK when robots have the need for intelligence. Deep Chain Finance: Let me ask Leo, how many forked projects does Filecoin have so far, roughly? Do you think there will be more or less waves of fork after the mainnet launches? Have the requirements of the miners at large changed when it comes to participation? Leo: We don’t have specific statistics, now that the main network launches, we feel that forking projects will increase, there are so many restricted miners in the market that they need to be organized efficiently. However, we currently see that most forked projects are simply modifying the parameters of Filecoin’s economy model, which is undesirable, and this level of modification can’t change the status quo of miners making up computing power, and the change to the market is just to make some of the big miners feel more comfortable digging up, which won’t help to promote the decentralized storage ecology to land. We need more reasonable landing scenarios so that idle mining resources can be turned into effective productivity, pitching a 100x coin instead of committing to one Fomo sentiment after another. Deep Chain Finance: How far along is the EpiK Protocol project, Eric? What other big moves are coming in the near future? Eric: The development of the EpiK Protocol is divided into 5 major phases. (a) Phase I testing of the network “Obelisk”. Phase II Main Network 1.0 “Rosetta”. Phase III Main Network 2.0 “Hammurabi”. (a) The Phase IV Enrichment Knowledge Mapping Toolkit. The fifth stage is to enrich the knowledge graph application ecology. Currently in the first phase of testing network “Obelisk”, anyone can sign up to participate in the test network pre-mining test to obtain ERC20 EPK tokens, after the mainnet exchange on a one-to-one basis. We have recently launched ERC20 EPK on Uniswap, you can buy and sell it freely on Uniswap or download our EpiK mobile wallet. In addition, we will soon launch the EpiK Bounty platform, and welcome all community members to do tasks together to build the EpiK community. At the same time, we are also pushing forward the centralized exchange for token listing. Users’ Questions User 1: Some KOLs said, Filecoin consumed its value in the next few years, so it will plunge, what do you think? Eric: First of all, the judgment of the market is to correspond to the cycle, not optimistic about the FIL first judgment to do is not optimistic about the economic model of the project, or not optimistic about the distributed storage track. First of all, we are very confident in the distributed storage track and will certainly face a process of growth and decline, so as to make a choice for a better project. Since the existing group of miners and the computing power already produced is fixed, and since EpiK miners and FIL miners are compatible, anytime miners will also make a choice for more promising and economically viable projects. Filecoin consumes the value of the next few years this time, so it will plunge. Regarding the market issues, the plunge is not a prediction, in the industry or to keep learning iteration and value judgment. Because up and down market sentiment is one aspect, there will be more very important factors. For example, the big washout in March this year, so it can only be said that it will slow down the development of the FIL community. But prices are indeed unpredictable. User2: Actually, in the end, if there are no applications and no one really uploads data, the market value will drop, so what are the landing applications of EpiK? Leo: The best and most direct application of EpiK’s knowledge graph is the question and answer system, which can be an intelligent legal advisor, an intelligent medical advisor, an intelligent chef, an intelligent tour guide, an intelligent game strategy, and so on.
Bitcoin (or BTC) is a decentralized virtual currency which is traded in the same way as currencies or bonds, except that for the storage of Bitcoins it is necessary to download an “electronic wallet”. According to Bitcoin there is no person, company or government that controls Bitcoin, so it requires users for its operation and the greater the demand, the greater its value. One of the main attractions of Bitcoin is its possible anonymity which allows the user to buy, pay and sell products and services without the intervention of any bank or financial institution. Best Online Casinos to Play Bitcoin Poker of October 2020 In its beginnings, in 2008, Bitcoin did not obtain great popularity, but little by little it began to be adopted by more users and companies. It was in 2011 that the newspapers began to read about Bitcoin, since then companies of great international impact have begun to open their doors to transactions with Bitcoin, some of these companies are: Dell, Overstock and Microsoft. The increasing adoption of Bitcoin by multinational companies spurred a reaction from government entities, with each country taking very different actions. In August 2013, the German Finance Minister declared Bitcoin as a "unit of account" which can be used for private transactions, which allowed Germany to control this virtual currency. In December 2013, the Chinese government prohibited banks and financial institutions from transacting with Bitcoins due to security and transparency issues. This government action caused a considerable drop in the value of Bitcoin since users in this country could not change their Bitcoins to the local currency. The United Kingdom and the European Union have also recognized Bitcoin as a type of currency and every day this cryptocurrency is accepted by more countries. However, each specific case must be analyzed, for example: in the case of the United States; Bitcoin is not considered a digital currency but rather a taxable product. Buying Bitcoins for the first time can seem a lot more difficult than it actually is. There are many methods to acquire Bitcoins, the most practical is to acquire them directly from an exchange house or Bitcoins exchange houses. Their names denote their difference, in exchange houses you will go to a provider who will sell you Bitcoins for your local currency, while in exchange houses you interact with other users to exchange Bitcoins for real money. Bitcoins transactions can last from 10 minutes to several hours and are made through a Bitcoin address (similar to mail methods, only the address in this case is a series of numbers and characters), once you receive the transfer you must move your Bitcoins to your electronic wallet before you can use them. In short, that's how easy it is to use Bitcoins: · Bitcoin is a virtual currency that is stored in an electronic wallet. · The value of Bitcoin is decentralized so it fluctuates depending on its demand. · You can make a Bitcoins transfer in seconds and its verification takes about an hour. · Once a Bitcoins transfer has been made, it cannot be reversed · For the most part, Bitcoins transactions are not subject to fees or commissions. For more detailed information, you can consult the Wikipedia site on Bitcoin here Sites to play online poker with Bitcoins Online poker sites have become more popular every day and since the use of Bitcoin is anonymous, decentralized and more or less instant transfers, online casinos have recognized in this cryptocurrency an excellent potential to attract new customers. The way Bitcoins are used to gamble online divides casinos into two categories: exclusive Bitcoin poker sites and online casinos that accept Bitcoin. So, what is the distinguish between using an online casino that accepts Bitcoins and using a Bitcoin casino to play poker? https://preview.redd.it/wo0is3x12wu51.png?width=621&format=png&auto=webp&s=b733c7964f58ba0441de2f060fed7aaf1dbfe4ed Differences between Bitcoin poker and poker sites that accept Bitcoins There are several differences between using an online casino that accepts Bitcoins and a Bitcoincasino, here are the most important ones: The great differentiation between these types of online casinos will be the total offer of payment methods to enter or withdraw funds from your casino account, Bitcoin casinos do not accept other payment methods other than Bitcoin transfer, while traditional online casinos They will offer you other payment options such as a bank account or PayPal. The expenses for using exclusive Bitcoins casinos are minimal and normally there are no fees for withdrawal of funds, contrary to the case of online casinos that accept Bitcoins as one of their payment methods since they most likely will charge you some commission. Another great advantage of choosing Bitcoin casinos over online casinos is anonymity since you will not need to link your email or personal data to create an account. In addition to the convenience that this anonymity provides, it also streamlines the transfer process in relation to online casinos that require documentation. You should consider that this anonymity also makes Bitcoin casinos vulnerable to security problems with other users. The game offer does not vary much between a Bitcoin casino and a traditional online casino, the most popular are: poker, roulette, slots and dice. Some small Bitcoin casinos do not turn to typical gaming providers like Playtech and Bets off as they tend to look for smaller providers that you may not have seen before. Some of the most relevant Bitcoin casinos are: PokerStars, SWC Poker, Bitcoin Casino and Bit casino. Pros of using Bitcoins when playing online poker Transfer money to and from your online casino account The requirements are basically the same as those of any traditional form of payment, of course you must have the electronic wallet software to use Bitcoins, but remember that withdrawals with this cryptocurrency they are usually much faster. User anonymity This advantage applies or not depending on the online casino you use, if when you sign up they only ask for information about your Bitcoin account then you will enjoy complete anonymity, however if you need to fill in personal or banking information to register at the casino then this benefit will not apply on that platform. American users can use Bitcoin Since Bitcoin is not recognized in the United States as a currency, it can be used as a means to enter and withdraw funds from an online casino account, remember that in the United States the laws vary a lot from one state to another so if you are an American user make sure you know the laws of your state in relation to online gambling before registering on a platform. The double bet with Bitcoin Many players opt for Bitcoin to place their bets since there is the possibility of winning some money depending on the exchange rate of Bitcoin when it comes to changing it to their local currency. This is why when used as a payment method for an online casino account, it is considered a double bet. Best Rake backs It is normal for Bitcoin casinos to offer better rake backs to their users since their expenses when using Bitcoin as the only payment method are lower, however this applies only to exclusive Bitcoin online casinos. Cons of using Bitcoins when playing online poker Where there are advantages, there are also disadvantages, here are the main cons you should consider when betting with Bitcoins. Bitcoin-exclusive online casinos are sites without regulation or oversight In the absence of a regulatory entity, it is hard to believe the promise of these casinos to use random platforms and take care of your funds. You must be much more careful when choosing an exclusive Bitcoins casino than a traditional online casino, the reputation and opinion of other players will be very important when choosing a Bitcoin Casino. Another factor that you should take into account is that the lack of regulation of gambling with Bitcoin does not mean that you are exempt from following the gambling regulations of the place where you live, especially in the case of the United States, where the government has previously intervened in activities of bets regardless of the means of deposit or withdrawal of funds from the companies. The fluctuating value of Bitcoin The value of Bitcoin can vary both upward and downward. Its value can change in a matter of hours, and the behavior of its value is not so similar to that of currencies such as euros, dollars, pounds or pesos, but is more similar to the behavior of products such as oil, gold or wheat, Relative anonymity of Bitcoin While it is possible to register to exclusive Bitcoin poker sites without giving personal information, the use of Bitcoins can be traced through the blockchains to a personal account. Lack of support from financial institutions Being a decentralized currency, Bitcoin is not backed by financial institutions or government, which gives you less support as a user. If there were to be a problem with the Bitcoins system, there would be no government intervention as would happen in the case of a bank. Of course, you should consider that it is thanks to this lack of intervention that transfers with Bitcoins do not charge fees or commissions. Being a virtual currency it is susceptible to cyberattacks. While the programming behind the Bitcoins System is sophisticated, so are the hackers' systems. In 2013, the UK Crime Agency reported that several users of this cryptocurrency had been victims of cyber extortion, after receiving an email their computer was infected with a virus and later they were sued for some bitcoins to repair the virus on their computers. Unfortunately there are more cases like this, in Europe a payment provider lost more than a million dollars after a cyberattack. All transactions are final Remembering that there is no intervention by financial institutions, it becomes evident that it will be difficult to file a dispute in the event of a transfer error, so you will have to be much more careful. conclusion Playing poker online is a game of both chance and strategy. For some bettors it is exceptionally alluring to utilize Bitcoins since they have the chance of expanding their benefits as indicated by the Bitcoin swapping scale. For many, traditional online casinos play poker with bitcoin will continue to be the best option due to the reliability and regulation of their transactions. What cannot be denied is that the use of Bitcoins grows day by day and in the world of online poker as in any cyber activity you must consider the most innovative and practical solutions that there is for you.
How to purchase and exchange your litecoin! (longer read)
This post will show you the best ways to buy litecoins using many different payment methods and exchanges for each method. Before you start, make sure you have a good litecoin wallet to store your LTC. NEVER store your litecoins on a crypto exchange.
Start trading fast; high limits
Easy way for newcomers to get bitcoins
Your capital is at risk.
High liquidity and buying limits
Easy way for newcomers to get bitcoins
“Instant Buy” option available with debit card
Works in almost all countries
Highest limits for buying bitcoins with a credit card
Reliable and trusted broker
Buy Litecoin with Credit Card or Debit Card
Let’s dive into some of the exchanges supporting Litecoin credit card purchases. These exchanges are our favorite ways to buy.
Coinbase is the easiest way to buy litecoins with a credit card. Coinbase is available in the United States, Canada, Europe, UK, Singapore, and Australia. The fees will come out to 3.99% per purchase. Here is a good video that can help walk you through the process of buying on Coinbase, although it’s fairly easy.
Coinmama recently added the ability to buy litecoin directly on the platform. Users from nearly any country in the world can use Coinmama to buy litecoins. Coinmama has some of the highest limits among credit card exchanges.
BitPanda is based in Austria and is a crypto brokerage service. You can buy using a credit card from most European countries.
CEX.io is based in the UK and is one of the oldest crypto exchanges online. CEX.io supports litecoin and its users from nearly anywhere in the world can buy litecoin with credit card on the platform.
Buy Litecoin with Bank Account or Bank Transfer
Coinbase is the easiest way to buy litecoins with a bank account or transfer. Coinbase, like is is for credit cards, is available in the United States, Canada, Europe, UK, Singapore, and Australia. Coinbase is one of primary exchanges used to buy Litecoins. Americans can use ACH transfer (5–7 days wait), and Europeans can use SEPA transfer (1–3 days wait). The fees will come out to 1.49% per purchase.
BitPanda is based in Austria and is a crypto brokerage service. You can buy using SEPA transfer from most European countries. You can also use SOFORT, NETELLER, or GiroPay.
CEX.io also supports litecoin buys via bank account. This is via wire transfer for US citizens, SEPA for Europe, and SWIFT for the rest of the globe.
Binance is now one of the largest if not the largest cryptocurrency exchange in the world. It supports bank and card purchases of Litecoin as well as Litecoin trading pairs with Bitcoin and Etehreum.
Get a Litecoin Wallet
Before we move onto other options: Never store your litecoins on an exchange! Always withdrawal your litecoin to an offline cryptocurrency wallet like the Ledger Nano S or any other wallet that you control. The Ledger Nano S and TREZOR are the best options for secure storage.
Other Methods to Buy Litecoin
If you don’t have a card or want to avoid the high fees, you can use the following methods to buy Litecoin as well. Find out which one works best for you.
Buy Litecoin with PayPal
Unfortunately, there is no easy way to buy Litecoin with PayPal. Other sites will tell you that cex allows for this, but that is no longer the case. You can, however, now use eToro to buy Litecoin, unless you live in the United States. If you live in the US, the only way to buy Litecoin with Paypal is to buy Bitcoin using paypal, and then use the Bitcoins to buy Litecoin. You can easily buy Bitcoin using Paypal on Local Bitcoins. Once you have Bitcoin, you can use an exchange like Coinbase Pro to swap the Bitcoin for Litecoin.
Buy Litecoin with Cash
There is no good way to buy litecoins with cash. LocalBitcoins is the most popular way to buy bitcoins with cash, and it does not have Litecoin support. Other popular cash to Bitcoin exchanges like BitQuick and Wall of Coins also do not support LTC. So you will have to first buy bitcoins with cash then exchange them for LTC using the method described below. The same goes for Bitcoin ATMs. Most do not support Litecoin. So if you want to buy litecoins at a Bitcoin ATM you first have to buy bitcoins and then trade the BTC for litecoins.
Buy Litecoin with Bitcoin
If you already have Bitcoins then it is VERY simple to convert some of your BTC to litecoins. You just need to find an exchange with the LTC/BTC pair, which is most exchanges since LTC/BTC is a very popular pair to trade.
Buy Litecoin with Skrill
BitPanda, mentioned above, also accepts Skrill payments for LTC. The fees will vary and are simply included in your buy price.
Cryptmixer is probably the fastest way to convert BTC to Litecoin. You just enter the amount of LTC you want to buy, and give them a LTC address. Then they will tell you how much BTC to send to their address. Once your BTC is sent, you will have LTC delivered to your wallet very shortly after.
Buy Litecoin with Ethereum
Ethereum has experienced a massive price rise. Nearly a year ago it was $10, and now at over $500, many want to move some of their ETH gains into other coins like Litecoin. Litecoin has very good liquidity, and is very popular among traders especially in China. So this guide is going to show you how to buy litecoins with Ethereum. We will show some of the best exchanges you can use, and the pros and cons of using different types of exchanges over the other.
Cryptmixer is one of the most unique exchanges, and also one of the fastest ways to convert your ETH to LTC. With Cryptmixer you do not even need to store your money with the exchange, meaning you are at very little risk of getting your funds stolen. With Cryptmixer you simply specify the amount of LTC you want to buy, and specific the address to where your litecoins should be sent and within 30 minutes you will have LTC delivered to your wallet.
Poloniex is the world’s largest altcoin exchange. However, there is a huge downside to using Poloniex to convert your ETH to LTC: Poloniex does not have a LTC/ETH market, meaning you have to first trade your ETH to BTC, and then trade your BTC for LTC. While this method works, you will have to make multiple trades and also pay fees twice.
Shapeshift is basically the same as Cryptmixer, and was actually the first company to come up with the concept of an exchange that does not hold your own funds.
Frequently Asked Questions About Buying Litecoin
Many of you may still have lots of questions about how to buy Litecoin. Odds are we have answered almost any question you could think of below. We will aim to answer many of the most common questions relating to buying Litecoin.
Why are there limited options to buying Litecoin using other altcoins?
The issue in all crypto markets is liquidity. As the space gets bigger, the liquidity also gets better. But as of now, the only VERY liquid cryptocurrency is Bitcoin. So exchanging two altcoins between each other is often harder than if BTC was involved on one side of the trade.
How much is a Litecoin worth?
Like all currencies, the value of Litecoin changes every second. The value of Litecoin also depends on the country you are in and the exchange you are trading on. You can find the most up to date price on Coinbase.
How do I buy Ripple (XRP) with Litecoin?
The best way to buy Ripple using Litecoin is to either use a non KYC exchange like Cryptmixer or start an account on Binance or Coinbase Pro and sell your Litecoin for Ripple. Look for LTC/XRP trading pairs, and make your trade.
How long does Litecoin take to confirm?
Litecoin blocks are added ever 2 and a half minutes. That means you should get one confirmation every two and a half minutes. This can vary if it takes miners longer to discover a block, but the difficulty of the finding a block should change proportionate to the hashing power on the network so that a block gets added approximately every 2.5 minutes. If you are trying to send money to a merchant, they may require more than one confirmation before they send you products. If you are depositing on an exchange, they may also require three or more confirmations before they credit your account.
How many Litoshis make one Litecoin?
one hundred million (100,000,000) Litoshis make one (1) Litecoin.
Where do I store Litecoin?
The best place to store litecoin is on a hardware wallet. You can find the best one for you on our page dedicated to hardware wallets.
When is the Litecoin halving?
The expected date of the next Litecoin block reward halving is August 7th, 2023.
Why can litecoin take so long to buy?
Litecoin can take long to buy because the legacy banking system is very slow. If you are buying with another cryptocurrency, you will see how fast it is to buy! Bank transfer in the USA, for example, take about 5 days to complete. So any purchase of Litecoin made with a US bank transfer will take a minimum of 5 days.
How do I buy Litecoin with Paypal?
Unfortunately, there is no easy way to buy Litcoin with PayPal. Other sites will tell you that cex allows for this, but that is no longer the case. You can, however, now use eToro to buy Litcoineum, unless you live in the United States. If you live in the US, the only way to buy Litcoin with Paypal is to buy Bitcoin using paypal, and then use the Bitcoins to buy Litcoin. You can easily buy Bitcoin using Paypal on Local Bitcoins. Once you have Bitcoin, you can use an exchange like Cryptmixer to swap the Bitcoin for Litcoin.
Can you buy partial litecoins?
Yes, litecoin, like Bitcoin, is divisible to many decimal places so you can buy 0.1 LTC, 0.001 LTC, etc.
Can you sell litecoin?
Yes, you can sell LTC on most of the exchanges mentioned above. The fees, speed, and privacy is the same in most cases.
Can anyone buy litecoins?
Anyone is free to buy litecoins, as long as you find an exchange that supports your country. Most cryptocurrency wallets do not require ID to sign up so you can always make a wallet and get paid in litecoin, too.
Which payment method is best to use?
For speed, credit card will likely be fastest. For larger amounts, bank transfer is best. For privacy, it’s best to buy bitcoins with cash and then trade for litecoins using Cryptmixer or Shapeshift.
Is it better to mine or buy litecoins?
If you have cheap electricity, it might be worth it to mine litecoins. If you have solar power or just want to mine for fun then it could be worth it. Otherwise, it’s probably better just to buy. Mining is constantly changing and small changes in Litecoin price or electricity can greatly affect your profitability.
What should I do with my litecoins once I buy?
You should immediately move your litecoins into a secure wallet. You should never leave your litecoins on an exchange. There have been countless hacks in cryptocurrency since Bitcoin was created in 2009. Hundreds of thousands of people have lost money. So buy your litecoins, and then instantly send them into a wallet you control so you are not at risk of losing money to a hack or scam.
The effects of the web by a number of companies have seduced a large number of users as these companies keep their data to prevent them from searching for alternatives. Likewise, these huge platforms have attracted applications to build their highest ecosystems before either severing access or actively opposing their interests when the applications became so successful. As a result, these walled gardens have effectively hindered innovation and monopolized large sections of the web. After the emergence of blockchain technology and decentralized cryptocurrencies, the need for applications to support decentralization has emerged. Several blockchain-based companies, applications and platforms have appeared in decentralization. In this research report, we will explain the approach adopted by the NEAR decentralization platform in designing and implementing the basic technology for its system. Near is a basic platform for cloud computing and decentralized storage managed by the community, designed to enable the open web for the future. On this web, everything can be created from new currencies to new applications to new industries, opening the door to an entirely new future.
The richness of the web is increasing day by day with the combined efforts of millions of people who have benefited from “innovation without permission” as content and applications are created without asking anyone. this lack of freedom of data has led to an environment hostile to the interests of its participants. And as we explained in the summary previously, web hosting companies have hindered innovation and greatly monopolized the web. In the future, we can fix this by using new technologies to re-enable the permissionless innovation of the past in a way, which creates a more open web where users are free and applications are supportive rather than adversarial to their interests. Decentralization emerged after the global financial crisis in 2008, which created fundamental problems of confidence in the heavily indebted banking system. Then the decentralized financial sector based on Blockchain technology has emerged since 2009. Decentralized Blockchain technology has made it easy for decentralized digital currencies like Bitcoin to exchange billions of dollars in peer-to-peer transfers for a fraction of the price of a traditional banking system. This technology allows participants in the over $ 50 billion virtual goods economy to track, own and trade in these commodities without permission. It allows real-world goods to cross into the digital domain, with verified ownership and tracking just like that of the digital. By default, the Internet where freedom of data enables innovation will lead to the development of a new form of software development. On this web, developers can quickly create applications from open state components and boost their efforts by using new business models that are enabled from within the program itself rather than relying on parasitic relationships with their users. This not only accelerates the creation of applications that have a more honest and cooperative relationship with its users, but also allows the emergence of completely new business built on them. To enable these new applications and the open web, it needs the appropriate infrastructure. The new web platform cannot be controlled by a single entity and its use is not limited due to insufficient scalability. It should be decentralized in design like the web itself and supported by a community of distributors widely so that the value they store cannot be monitored, modified or removed without permission from the users who store this value on their behalf. A new decentralization technology (Blockchain), which has facilitated decentralized digital currencies like Bitcoin, has made billions of dollars in peer-to-peer transfers at a fraction of the price of the traditional banking system. This technology allows participants in the $ 50 billion + virtual goods economy to track, own and trade in these goods without permission. It allows real-world goods to cross into the digital domain, with verified ownership and tracking just like that of the digital. Although the cost of storing data or performing a calculation on the Ethereum blockchain is thousands and millions of times higher than the cost of performing the same functionality on Amazon Web Services. A developer can always create a “central” app or even a central currency for a fraction of the cost of doing the same on a decentralized platform because a decentralized platform, by definition, will have many iterations in its operations and storage. Bitcoin can be thought of as the first, very basic, version of this global community-run cloud, though it is primarily used only to store and move the Bitcoin digital currency. Ethereum is the second and slightly more sophisticated version, which expanded the basic principles of Bitcoin to create a more general computing and storage platform, though it is a raw technology, which hasn’t achieved meaningful mainstream adoption.
1.1 WHY IS IT IMPORTANT TO PAY THE EXTRA COST TO SUPPORT DECENTRALIZATION?
Because some elements of value, for example bits representing digital currency ownership, personal identity, or asset notes, are very sensitive. While in the central system, the following players can change the value of any credits they come into direct contact with:
The developer who controls the release or update of the application’s code
The platform where the data is stored
The servers which run the application’s code
Even if none of these players intend to operate with bad faith, the actions of governments, police forces and hackers can easily turn their hands against their users and censor, modify or steal the balances they are supposed to protect. A typical user will trust a typical centralized application, despite its potential vulnerabilities, with everyday data and computation. Typically, only banks and governments are trusted sufficiently to maintain custody of the most sensitive information — balances of wealth and identity. But these entities are also subject to the very human forces of hubris, corruption and theft. Especially after the 2008 global financial crisis, which demonstrated the fundamental problems of confidence in a highly indebted banking system. And governments around the world apply significant capital controls to citizens during times of crisis. After these examples, it has become a truism that hackers now own most or all of your sensitive data. These decentralized applications operate on a more complex infrastructure than today’s web but they have access to an instantaneous and global pool of currency, value and information that today’s web, where data is stored in the silos of individual corporations, cannot provide.
1.2 THE CHALLENGES OF CREATING A DECENTRALIZED CLOUD
A community-run system like this has very different challenges from centralized “cloud” infrastructure, which is running by a single entity or group of known entities. For example:
It must be both inclusive to anyone and secure from manipulation or capture.
Participants must be fairly compensated for their work while avoiding creating incentives for negligent or malicious behavior.
It must be both game theoretically secure so good actors find the right equilibrium and resistant to manipulation so bad actors are actively prevented from negatively affecting the system.
NEAR is a global community-run computing and storage cloud which is organized to be permissionless and which is economically incentivized to create a strong and decentralized data layer for the new web. Essentially, it is a platform for running applications which have access to a shared — and secure — pool of money, identity and data which is owned by their users. More technically, it combines the features of partition-resistant networking, serverless compute and distributed storage into a new kind of platform. NEAR is a community-managed, decentralized cloud storage and computing platform, designed to enable the open web in the future. It uses the same core technology for Bitcoin and Blockchain. On this web, everything can be created from new currencies to new applications to new industries, opening the door to an entirely new future. NEAR is a decentralized community-run cloud computing and storage platform, which is designed to enable the open web of the future. On this web, everything from new currencies to new applications to new industries can be created, opening the door to a brand new future. NEAR is a scalable computing and storage platform with the potential to change how systems are designed, how applications are built and how the web itself works. It is a complex technology allow developers and entrepreneurs to easily and sustainably build applications which reap the benefits of decentralization and participate in the Open Web while minimizing the associated costs for end users. NEAR creates the only community-managed cloud that is strong enough to power the future of the open web, as NEAR is designed from the ground up to deliver intuitive experiences to end users, expand capacity across millions of devices, and provide developers with new and sustainable business models for their applications. The NEAR Platform uses a token — also called “NEAR”. This token allows the users of these cloud resources, regardless of where they are in the world, to fairly compensate the providers of the services and to ensure that these participants operate in good faith.
2.1 WHY NEAR?
Through focus, we find that Platforms based on blockchain technologies like Bitcoin and Ethereum have made great progress and enriched the world with thousands of innovative applications spanning from games to decentralized financing. However, these original networks and none of the networks that followed were not able to bridge the gap towards mainstream adoption of the applications created above them and do not provide this type of standard that fully supports the web. This is a result of two key factors:
System design is relevant because the technical architecture of other platforms creates substantial problems with both usability and scalability which have made adoption nearly impossible by any but the most technical innovators. End-users experience 97–99% dropoff rates when using applications and developers find the process of creating and maintaining their applications endlessly frustrating. Fixing these problems requires substantial and complex changes to current protocol architectures, something which existing organizations haven’t proven capable of implementing. Instead, they create multi-year backlogs of specification design and implementation, which result in their technology falling further and further behind. NEAR’s platform and organization are architected specifically to solve the above-mentioned problems. The technical design is fanatically focused on creating the world’s most usable and scalable decentralized platform so global-scale applications can achieve real adoption. The organization and governance structure are designed to rapidly ship and continuously evolve the protocol so it will never become obsolete.
2.1.1 Features, which address these problems:
1. USABILITY FIRST The most important problem that needs to be addressed is how to allow developers to create useful applications that users can use easily and that will capture the sustainable value of these developers. 2. End-User Usability Developers will only build applications, which their end users can actually use. NEAR’s “progressive security” model allows developers to create experiences for their users which more closely resemble familiar web experiences by delaying onboarding, removing the need for user to learn “blockchain” concepts and limiting the number of permission-asking interactions the user must have to use the application. 1. Simple Onboarding: NEAR allows developers to take actions on behalf of their users, which allows them to onboard users without requiring these users to provide a wallet or interact with tokens immediately upon reaching an application. Because accounts keep track of application-specific keys, user accounts can also be used for the kind of “Single Sign On” (SSO) functionality that users are familiar with from the traditional web (eg “Login with Facebook/Google/Github/etc”). 2. Easy Subscriptions: Contract-based accounts allow for easy creation of subscriptions and custom permissioning for particular applications. 3. Familiar Usage Styles: The NEAR economic model allows developers to pay for usage on behalf of their users in order to hide the costs of infrastructure in a way that is in line with familiar web usage paradigms. 4. Predictable Pricing: NEAR prices transactions on the platform in simple terms, which allow end-users to experience predictable pricing and less cognitive load when using the platform.
2.1.2 Design principles and development NEAR’s platform
1. Usability: Applications deployed to the platform should be seamless to use for end users and seamless to create for developers. Wherever possible, the underlying technology itself should fade to the background or be hidden completely from end users. Wherever possible, developers should use familiar languages and patterns during the development process. Basic applications should be intuitive and simple to create while applications that are more robust should still be secure. 2. Scalability: The platform should scale with no upper limit as long as there is economic justification for doing so in order to support enterprise-grade, globally used applications. 3. Sustainable Decentralization: The platform should encourage significant decentralization in both the short term and the long term in order to properly secure the value it hosts. The platform — and community — should be widely and permissionlessly inclusive and actively encourage decentralization and participation. To maintain sustainability, both technological and community governance mechanisms should allow for practical iteration while avoiding capture by any single parties in the end. 4. Simplicity: The design of each of the system’s components should be as simple as possible in order to achieve their primary purpose. Optimize for simplicity, pragmatism and ease of understanding above theoretical perfection.
2.2 HOW NEAR WORKS?
NEAR’s platform provides a community-operated cloud infrastructure for deploying and running decentralized applications. It combines the features of a decentralized database with others of a serverless compute platform. The token, which allows this platform to run also, enables applications built on top of it to interact with each other in new ways. Together, these features allow developers to create censorship resistant back-ends for applications that deal with high stakes data like money, identity, assets, and open-state components, which interact seamlessly with each other. These application back-ends and components are called “smart contracts,” though we will often refer to these all as simply “applications” here. The infrastructure, which makes up this cloud, is created from a potentially infinite number of “nodes” run by individuals around the world who offer portions of their CPU and hard drive space — whether on their laptops or more professionally deployed servers. Developers write smart contracts and deploy them to this cloud as if they were deploying to a single server, which is a process that feels very similar to how applications are deployed to existing centralized clouds. Once the developer has deployed an application, called a “smart contract”, and marked it unchangeable (“immutable”), the application will now run for as long as at least a handful of members of the NEAR community continue to exist. When end users interact with that deployed application, they will generally do so through a familiar web or mobile interface just like any one of a million apps today. In the central cloud hosted by some companies today like: Amazon or Google, developers pay for their apps every month based on the amount of usage needed, for example based on the number of requests created by users visiting their webpages. The NEAR platform similarly requires that either users or developers provide compensation for their usage to the community operators of this infrastructure. Like today’s cloud infrastructure, NEAR prices usage based on easy to understand metrics that aren’t heavily influenced by factors like system congestion. Such factors make it very complicated for developers on alternative blockchain-based systems today. In the centralized cloud, the controlling corporation makes decisions unilaterally. NEAR community-run cloud is decentralized so updates must ultimately be accepted by a sufficient quorum of the network participants. Updates about its future are generated from the community and subject to an inclusive governance process, which balances efficiency and security. In order to ensure that the operators of nodes — who are anonymous and potentially even malicious — run the code with good behavior, they participate in a staking process called “Proof of Stake”. In this process, they willingly put a portion of value at risk as a sort of deposit, which they will forfeit if it is proven that they have operated improperly.
2.2.1 Elements of the NEAR’s Platform
The NEAR platform is made up of many separate elements. Some of these are native to the platform itself while others are used in conjunction with or on top of it. 1. THE NEAR TOKEN NEAR token is the fundamental native asset of the NEAR ecosystem and its functionality is enabled for all accounts. Each token is a unique digital asset similar to Ether, which can be used to: a) Pay the system for processing transactions and storing data. b) Run a validating node as part of the network by participating in the staking process. c) Help determine how network resources are allocated and where its future technical direction will go by participating in governance processes. The NEAR token enables the economic coordination of all participants who operate the network plus it enables new behaviors among the applications which are built on top of that network. 2. OTHER DIGITAL ASSETS The platform is designed to easily store unique digital assets, which may include, but aren’t limited to:
Other Tokens: Tokens bridged from other chains (“wrapped”) or created atop the NEAR Platform can be easily stored and moved using the underlying platform. This allows many kinds of tokens to be used atop the platform to pay for goods and services. “Stablecoins,” specific kinds of token which are designed to match the price of another asset (like the US Dollar), are particularly useful for transacting on the network in this way.
Unique Digital Assets: Similar to tokens, digital assets (sometimes called “Non Fungible Tokens” (NFTs) ranging from in-game collectibles to representations of real-world asset ownership can be stored and moved using the platform.
3. THE NEAR PLATFORM The core platform, which is made up of the cloud of community-operated nodes, is the most basic piece of infrastructure provided. Developers can permissionlessly deploy smart contracts to this cloud and users can permissionlessly use the applications they power. Applications, which could range from consumer-facing games to digital currencies, can store their state (data) securely on the platform. This is conceptually similar to the Ethereum platform. Operations that require an account, network use, or storage at the top of the platform require payment to the platform in the form of transaction fees that the platform then distributes to its community from the authentication contract. These operations could include creating new accounts, publishing new contracts, implementing code by contract and storing or modifying data by contract. As long as the rules of the protocol are followed, any independent developer can write software, which interfaces with it (for example, by submitting transactions, creating accounts or even running a new node client) without asking for anyone’s permission first. 4. THE NEAR DEVELOPMENT SUITE Set of tools and reference implementations created to facilitate its use by those developers and end users who prefer them. These tools include:
NEAR SDKs: NEAR platform supports (Rust and AssemblyScript) languages to write smart contracts. To provide a great experience for developers, NEAR has a full SDK, which includes standard data structures, examples and testing tools for these two languages.
Gitpod for NEAR: NEAR uses existing technology Gitpod to create zero time onboarding experience for developers. Gitpod provides an online “Integrated Development Environment” (IDE), which NEAR customized to allow developers to easily write, test and deploy smart contracts from a web browser.
NEAR Wallet: A wallet is a basic place for developers and end users to store the assets they need to use the network. NEAR Wallet is a reference implementation that is intended to work seamlessly with the progressive security model that lets application developers design more effective user experiences. It will eventually include built-in functionality to easily enable participation by holders in staking and governance processes on the network.
NEAR Explorer: To aid with both debugging of contracts and the understanding of network performance, Explorer presents information from the blockchain in an easily digestible web-based format.
NEAR Command Line Tools: The NEAR team provides a set of straightforward command line tools to allow developers to easily create, test and deploy applications from their local environments.
All of these tools are being created in an open-source manner so they can be modified or deployed by anyone.
Primarily economic forces drive the ecosystem, which makes up the NEAR platform. This economy creates the incentives, which allow participants permissionlessly organize to drive the platform’s key functions while creating strong disincentives for undesirable, irresponsible or malicious behavior. In order for the platform to be effective, these incentives need to exist both in the short term and in the long term. The NEAR platform is a market among participants interested in two aspects:
On the supply side, certification contract operators and other core infrastructure must be motivated to provide these services that make up the community cloud.
On the demand side, platform developers and end-users who pay for their use need to be able to do so in a simple, clear and consistent way that helps them.
Further, economic forces can also be applied to support the ecosystem as a whole. They can be used at a micro level to create new business models by directly compensating the developers who create its most useful applications. They can also be used at a macro level by coordinating the efforts of a broader set of ecosystem participants who participate in everything from education to governance.
3.1 NEAR ECONOMY DESIGN PRINCIPLES
NEAR’s overall system design principles are used to inform its economic design according to the following interpretations: 1. Usability: End users and developers should have predictable and consistent pricing for their usage of the network. Users should never lose data forever. 2. Scalability: The platform should scale at economically justified thresholds. 3. Simplicity: The design of each of the system’s components should be as simple as possible in order to achieve their primary purpose. 4. Sustainable Decentralization: The barrier for participation in the platform as a validating node should be set as low as possible in order to bring a wide range of participants. Over time, their participation should not drive wealth and control into the hands of a small number. Individual transactions made far in the future must be at least as secure as those made today in order to safeguard the value they modify.
3.2 ECONOMIC OVERVIEW
The NEAR economy is optimized to provide developers and end users with the easiest possible experience while still providing proper incentives for network security and ecosystem development. Summary of the key ideas that drive the system:
Thresholded Proof of Stake: Validating node operators provide scarce and valuable compute resources to the network. In order to ensure that the computations they run are correct, they are required to “stake” NEAR tokens, which guarantee their results. If these results are found to be inaccurate, the staker loses their tokens. This is a fundamental mechanism for securing the network. The threshold for participating in the system is set algorithmically at the lowest level possible to allow for the broadest possible participation of validating nodes in a given “epoch” period (½ of a day).
Epoch Rewards: Node operators are paid for their service a fixed percentage of total supply as a “security” fee of roughly 4.5% annualized. This rate targets sufficient participation levels among stakers in order to secure the network while balancing with other usage of NEAR token in the ecosystem.
Protocol treasury: In addition to validators, protocol treasury received a 0.5% of total supply annually to continuously re-invest into ecosystem development.
Transaction Costs: Usage of the network consumes two separate kinds of resources — instantaneous and long term. Instantaneous costs are generated by every transaction because each transaction requires the usage of both the network itself and some of its computation resources. These are priced together as a mostly-predictable cost per transaction, which is paid in NEAR tokens.
Storage Costs: Storage is a long term cost because storing data represents an ongoing burden to the nodes of the network. Storage costs are covered by maintaining minimum balance of NEAR tokens on the account or contract. This provides indirect mechanism of payment via inflation to validators for maintaining contract and account state on their nodes.
Inflation: Inflation is determined as combination of payouts to validators and protocol treasury minus the collected transaction fees and few other NEAR burning mechanics (like name auction). Overall the maximum inflation is 5%, which can go down over time as network gets more usage and more transactions fees are burned. It’s possible that inflation becomes negative (total supply decreases) if there is enough fees burned.
Scaling Thresholds: In a network, which scales its capacity relative to the amount of usage it receives, the thresholds, which drive the network to bring on additional capacity are economic in nature.
Security Thresholds: Some thresholds, which provide for good behavior among participants are set using economic incentives. For example, “Fishermen” (described separately).
Hello visitors and subscribers of scams! Here you will find a master list of common (and uncommon) scams that you may encounter online or in real life. Thank you to the many contributors who helped create this thread!
If you know of a scam that is not covered here, write a comment and it will be added to the next edition.
Caller ID spoofing It is very easy for anyone to make a phone call while having any number show up on the caller ID of the person receiving the phone call. Receiving a phone call from a certain number does not mean that the person/company who owns that number has actually called you. Email spoofing The "from" field of an email can be set by the sender, meaning that you can receive scam emails that look like they are from legitimate addresses. It's important to never click links in emails unless absolutely necessary, for example a password reset link you requested or an account activation link for an account you created. SMS spoofing SMS messages can be spoofed, so be wary of messages that seem to be from your friends or other trusted people.
The most common scams
The fake check scam (Credit to nimble2 for this part) The fake check scam arises from many different situations (for instance, you applied for a job, or you are selling something on a place like Craigslist, or someone wants to purchase goods or services from your business, or you were offered a job as a mystery shopper, you were asked to wrap your car with an advertisement, or you received a check in the mail for no reason), but the bottom line is always something like this:
The scammer sends you a very real looking, but fake, check. Sometimes they'll call it a "cashier's check", a "certified check", or a "verified check".
You deposit the check into your bank account, and within a couple of days your bank makes some or all of the funds available to you. This makes you think that the check is real and the funds have cleared. However, the money appearing in your account is not the same as the check actually clearing. The bank must make the funds available to you before they have cleared the check because that is the law.
For various and often complicated reasons, depending on the specific story line of the scam, the scammer will ask you to send someone some of the money, using services like MoneyGram, Western Union, and Walmart-2-Walmart. Sometimes the scammer will ask for you to purchase gift cards (iTunes, Amazon, Steam, etc) and give them the codes to redeem the gift cards. Some scammers may also give you instructions on how to buy and send them bitcoins.
Within a couple of weeks, though it can take as long as a month, your bank will realize that the check you deposited was fake, and your bank will remove the funds that you deposited into your account and charge you a bounced check fee. If you withdrew any of the money from the fake check, that money will be gone and you will owe that money to the bank. Some posters have even had their bank accounts closed and have been blocked from having another account for 5 years using ChexSystems.
General fraudulent funds scams If somebody is asking you to accept and send out money as a favour or as part of a job, it is a fraudulent funds scam. It does not matter how they pay you, any payment on any service can be fraudulent and will be reversed when it is discovered to be fraudulent. Phone verification code scams Someone will ask you to receive a verification text and then tell you to give them the code. Usually the code will come from Google Voice, or from Craigslist. In the Google version of the scam, your phone number will be used to verify a Google Voice account that the scammer will use to scam people with. In the Craigslist version of the scam, your phone number will be used to verify a Craigslist posting that the scammer will use to scam people. There is also an account takeover version of this scam that will involve the scammer sending a password reset token to your phone number and asking you for it. Bitcoin job scams Bitcoin job scams involve some sort of fraudulent funds transfer, usually a fake check although a fraudulent bank transfer can be used as well. The scammer will send you the fraudulent money and ask you to purchase bitcoins. This is a scam, and you will have zero recourse after you send the scammer bitcoins. Email flooding If you suddenly receive hundreds or thousands of spam emails, usually subscription confirmations, it's very likely that one of your online accounts has been taken over and is being used fraudulently. You should check any of your accounts that has a credit card linked to it, preferably from a computer other than the one you normally use. You should change all of your passwords to unique passwords and you should start using two factor authentication everywhere. Boss/CEO scam A scammer will impersonate your boss or someone who works at your company and will ask you to run an errand for them, which will usually be purchasing gift cards and sending them the code. Once the scammer has the code, you have no recourse. Employment certification scams You will receive a job offer that is dependent on you completing a course or receiving a certification from a company the scammer tells you about. The scammer operates both websites and the job does not exist. Craigslist fake payment scams Scammers will ask you about your item that you have listed for sale on a site like Craigslist, and will ask to pay you via Paypal. They are scamming you, and the payment in most cases does not actually exist, the email you received was sent by the scammers. In cases where you have received a payment, the scammer can dispute the payment or the payment may be entirely fraudulent. The scammer will then either try to get you to send money to them using the fake funds that they did not send to you, or will ask you to ship the item, usually to a re-shipping facility or a parcel mule. General fraudulent funds scams The fake check scam is not the only scam that involves accepting fraudulent/fake funds and purchasing items for scammers. If your job or opportunity involves accepting money and then using that money, it is almost certainly a frauduent funds scam. Even if the payment is through a bank transfer, Paypal, Venmo, Zelle, Interac e-Transfer, etc, it does not matter. Credit card debt scam Fraudsters will offer to pay off your bills, and will do so with fraudulent funds. Sometimes it will be your credit card bill, but it can be any bill that can be paid online. Once they pay it off, they will ask you to send them money or purchase items for them. The fraudulent transaction will be reversed in the future and you will never be able to keep the money. This scam happens on sites like Craigslist, Twitter, Instagram, and also some dating sites, including SeekingArrangement. The parcel mule scam A scammer will contact you with a job opportunity that involves accepting and reshipping packages. The packages are either stolen or fraudulently obtained items, and you will not be paid by the scammer. Here is a news article about a scam victim who fell for this scam and reshipped over 20 packages containing fraudulently acquired goods. The Skype sex scam You're on Facebook and you get a friend request from a cute girl you've never met. She wants to start sexting and trading nudes. She'll ask you to send pictures or videos or get on webcam where she can see you naked with your face in the picture. The scam: There's no girl. You've sent nudes to a guy pretending to be a girl. As soon as he has the pictures he'll demand money and threaten to send the pictures to your friends and family. Sometimes the scammer will upload the video to a porn site or Youtube to show that they are serious. What to do if you are a victim of this scam: You cannot buy silence, you can only rent it. Paying the blackmailer will show them that the information they have is valuable and they will come after you for more money. Let your friends and family know that you were scammed and tell them to ignore friend requests or messages from people they don't know. Also, make sure your privacy settings are locked down and consider deactivating your account. The underage girl scam You're on a dating site or app and you get contacted by a cute girl. She wants to start sexting and trading nudes. Eventually she stops communicating and you get a call from a pissed off guy claiming to be the girl's father, or a police officer, or a private investigator, or something else along those lines. Turns out the girl you were sexting is underage, and her parents want some money for various reasons, such as to pay for a new phone, to pay for therapy, etc. There is, of course, no girl. You were communicating with a scammer. What to do if you are a victim of this scam: Stop picking up the phone when the scammers call. Do not pay them, or they will be after you for more money. Phishing Phishing is when a scammer tries to trick you into giving information to them, such as your password or private financial information. Phishing messages will usually look very similar to official messages, and sometimes they are identical. If you are ever required to login to a different account in order to use a service, you should be incredibly cautious. The blackmail email scam The exact wording of the emails varies, but there are generally four main parts. They claim to have placed software/malware on a porn/adult video site, they claim to have a video of you masturbating or watching porn, they threaten to release the video to your friends/family/loved ones/boss/dog, and they demand that you pay them in order for them to delete the video. Rest assured that this is a very common spam campaign and there is no truth behind the email or the threats. Here are some news articles about this scam. The blackmail mail scam This is very similar to the blackmail email scam, but you will receive a letter in the mail. Rental scams Usually on local sites like Craigslist, scammers will steal photos from legitimate real estate listings and will list them for rent at or below market rate. They will generally be hesitant to tell you the address of the property for "safety reasons" and you will not be able to see the unit. They will then ask you to pay them a deposit and they claim they will ship you the keys. In reality, your money is gone and you will have no recourse. Craigslist vehicle scams A scammer will list a vehicle on Craigslist and will offer to ship you the car. In many cases they will also falsely claim to sell you the car through eBay or Amazon. If you are looking for a car on Craigslist and the seller says anything about shipping the car, having an agent, gives you a long story about why they are selling the car, or the listing price is far too low, you are talking to a scammer and you should ignore and move on. Advance-fee scam, also known as the 419 scam, or the Nigerian prince scam. You will receive a communication from someone who claims that you are entitled to a large sum of money, or you can help them obtain a large sum of money. However, they will need money from you before you receive the large sum. Man in the middle scams Man in the middle scams are very common and very hard to detect. The scammer will impersonate a company or person you are legitimately doing business with, and they will ask you to send the money to one of their own bank accounts or one controlled by a money mule. They have gained access to the legitimate persons email address, so there will be nothing suspicious about the email. To prevent this, make contact in a different way that lets you verify that the person you are talking to is the person you think you are talking to. Cam girl voting/viewer scam You will encounter a "cam girl" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to go to their site and sign up with your credit card. They may offer a free show, or ask you to vote for them, or any number of other fake stories. Amateur porn recruitment scam You will encounter a "pornstar" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to create an adult film with hehim, but first you need to do something. The story here is usually something to do with verifying your age, or you needing to take an STD test that involves sending money to a site operated by the scammer. Hot girl SMS spam You receive a text from a random number with a message along the lines of "Hey babe I'm here in town again if you wanted to meet up this time, are you around?" accompanied by a NSFW picture of a hot girl. It's spam, and they'll direct you to their scam website that requires a credit card. Identity verification scam You will encounter someone on a dating/messaging/social media/whatever site/app, and the scammer will ask that you verify your identity as they are worried about catfishing. The scammer operates the site, and you are not talking to whoever you think you are talking to. This type of scam teases you with something, then tries to make you sign up for something else that costs money. The company involved is often innocent, but they turn a blind eye to the practice as it helps their bottom line, even if they have to occasionally issue refunds. A common variation takes place on dating sites/dating apps, where you will match with someone who claims to be a camgirl who wants you to sign up for a site and vote for her. Another variation takes place on local sites like Craigslist, where the scammers setup fake rental scams and demand that you go through a specific service for a credit check. Once you go through with it, the scammer will stop talking to you. Another variation also takes place on local sites like Craigslist, where scammers will contact you while you are selling a car and will ask you to purchase a Carfax-like report from a specific website. Multi Level Marketing or Affiliate Marketing You apply for a vague job listing for 'sales' on craigslist. Or maybe an old friend from high school adds you on Facebook and says they have an amazing business opportunity for you. Or maybe the well dressed guy who's always interviewing people in the Starbucks that you work at asks if you really want to be slinging coffee the rest of your life. The scam: MLMs are little more than pyramid schemes. They involve buying some sort of product (usually snake oil health products like body wraps or supplements) and shilling them to your friends and family. They claim that the really money is recruiting people underneath you who give you a slice of whatever they sell. And if those people underneath you recruit more people, you get a piece of their sales. Ideally if you big enough pyramid underneath you the money will roll in without any work on your part. Failure to see any profit will be your fault for not "wanting it enough." The companies will claim that you need to buy their extra training modules or webinars to really start selling. But in reality, the vast majority of people who buy into a MLM won't see a cent. At the end of the day all you'll be doing is annoying your friends and family with your constant recruitment efforts. What to look out for: Recruiters love to be vague. They won't tell you the name of the company or what exactly the job will entail. They'll pump you up with promises of "self-generating income", "being your own boss", and "owning your own company." They might ask you to read books about success and entrepreneurs. They're hoping you buy into the dream first. If you get approached via social media, check their timelines. MLMs will often instruct their victims to pretend that they've already made it. They'll constantly post about how they're hustling and making the big bucks and linking to youtube videos about success. Again, all very vague about what their job actually entails. If you think you're being recruited: Ask them what exactly the job is. If they can't answer its probably a MLM. Just walk away.
You should generally avoid answering or engaging with random phone calls. Picking up and engaging with a scam call tells the scammers that your phone number is active, and will usually lead to more calls. Tax Call You get a call from somebody claiming to be from your countries tax agency. They say you have unpaid taxes that need to be paid immediately, and you may be arrested or have other legal action taken against you if it is not paid. This scam has caused the American IRS, Canadian CRA, British HMRC, and Australian Tax Office to issue warnings. This scam happens in a wide variety of countries all over the world. Warrant Call Very similar to the tax call. You'll get a phone call from an "agent", "officer", "sheriff", or other law enforcement officer claiming that there is a warrant out for your arrest and you will be arrested very soon. They will then offer to settle everything for a fee, usually paid in giftcards. [Legal Documents/Process Server Calls] Very similar to the warrant call. You'll get a phone call from a scammer claiming that they are going to serve you legal documents, and they will threaten you with legal consequences if you refuse to comply. They may call themselves "investigators", and will sometimes give you a fake case number. Student Loan Forgiveness Scam Scammers will call you and tell you about a student loan forgiveness program, but they are interested in obtaining private information about you or demanding money in order to join the fake program. Tech Support Call You receive a call from someone with a heavy accent claiming to be a technician Microsoft or your ISP. They inform you that your PC has a virus and your online banking and other accounts may be compromised if the virus is not removed. They'll have you type in commands and view diagnostics on your PC which shows proof of the virus. Then they'll have you install remote support software so the technician can work on your PC, remove the virus, and install security software. The cost of the labor and software can be hundreds of dollars. The scam: There's no virus. The technician isn't a technician and does not work for Microsoft or your ISP. Scammers (primarily out of India) use autodialers to cold-call everyone in the US. Any file they point out to you or command they have you run is completely benign. The software they sell you is either freeware or ineffective. What to do you if you're involved with this scam: If the scammers are remotely on your computer as you read this, turn off your PC or laptop via the power button immediately, and then if possible unplug your internet connection. Some of the more vindictive tech scammers have been known to create boot passwords on your computer if they think you've become wise to them and aren't going to pay up. Hang up on the scammers, block the number, and ignore any threats about payment. Performing a system restore on your PC is usually all that is required to remove the scammer's common remote access software. Reports of identity theft from fake tech calls are uncommon, but it would still be a good idea to change your passwords for online banking and monitor your accounts for any possible fraud. How to avoid: Ignore any calls claiming that your PC has a virus. Microsoft will never contact you. If you're unsure if a call claiming to be from your ISP is legit, hang up, and then dial the customer support number listed on a recent bill. If you have elderly relatives or family that isn't tech savvy, take the time to fill them in on this scam. Chinese government scam This scam is aimed at Chinese people living in Europe and North America, and involves a voicemail from someone claiming to be associated with the Chinese government, usually through the Chinese consulate/embassy, who is threatening legal action or making general threats. Chinese shipping scam This scam is similar to the Chinese government scam, but involves a seized/suspicious package, and the scammers will connect the victim to other scammers posing as Chinese government investigators. Social security suspension scam You will receive a call from someone claiming to work for the government regarding suspicious activity, fraud, or serious crimes connected to your social security number. You'll be asked to speak to an operator and the operator will explain the steps you need to follow in order to fix the problems. It's all a scam, and will lead to you losing money and could lead to identity theft if you give them private financial information. Utilities cutoff You get a call from someone who claims that they are from your utility company, and they claim that your utilities will be shut off unless you immediately pay. The scammer will usually ask for payment via gift cards, although they may ask for payment in other ways, such as Western Union or bitcoin. Relative in custody Scammer claims to be the police, and they have your son/daughtenephew/estranged twin in custody. You need to post bail (for some reason in iTunes gift cards or MoneyGram) immediately or the consequences will never be the same. Mexican family scam This scam comes in many different flavours, but always involves someone in your family and Mexico. Sometimes the scammer will claim that your family member has been detained, sometimes the scammer will claim that your family member has been kidnapped, and sometimes the scammer will claim that your family member is injured and needs help. General family scams Scammers will gather a large amount of information about you and target your family members using different stories with the goal of gettimg them to send money. One ring scam Scammers will call you from an international number with the goal of getting you to return their call, causing you to incur expensive calling fees.
Online shopping scams
THE GOLDEN RULE OF ONLINE SHOPPING: If it sounds too good to be true, it probably is. Dropshipping An ad on reddit or social media sites like Facebook and Instagram offers items at huge discounts or even free (sometimes requiring you to reblog or like their page). They just ask you to pay shipping. The scam: The item will turn out to be very low quality and will take weeks or even months to arrive. Sometimes the item never arrives, and the store disappears or stops responding. The seller drop-ships the item from China. The item may only cost a few dollars, and the Chinese government actually pays for the shipping. You end up paying $10-$15 dollars for a $4 item, with the scammer keeping the profit. If you find one of these scams but really have your heart set on the item, you can find it on AliExpress or another Chinese retailer. Influencer scams A user will reach out to you on a social media platform, usually Instagram, and offer you the chance to partner with them and receive a free/discounted product, as long as you pay shipping. This is a different version of the dropshipping scam, and is just a marketing technique to get you to buy their products. Triangulation fraud Triangulation fraud occurs when you make a purchase on a site like Amazon or eBay for an item at a lower than market price, and receive an item that was clearly purchased new at full price. The scammer uses a stolen credit card to order your item, while the money from the listing is almost all profit for the scammer. Instagram influencer scams Someone will message you on Instagram asking you to promote their products, and offering you a discount code. The items are Chinese junk, and the offer is made to many people at a time. Cheap Items Many websites pop up and offer expensive products, including electronics, clothes, watches, sunglasses, and shoes at very low prices. The scam: Some sites are selling cheap knock-offs. Some will just take your money and run. What to do if you think you're involved with this scam: Contact your bank or credit card and dispute the charge. How to avoid: The sites often have every brand-name shoe or fashion item (Air Jordan, Yeezy, Gucci, etc) in stock and often at a discounted price. The site will claim to be an outlet for a major brand or even a specific line or item. The site will have images at the bottom claiming to be Secured by Norton or various official payment processors but not actual links. The site will have poor grammar and a mish-mash of categories. Recently, established websites will get hacked or their domain name jacked and turned into scam stores, meaning the domain name of the store will be completely unrelated to the items they're selling. If the deal sounds too good to be true it probably is. Nobody is offering brand new iPhones or Beats or Nintendo Switches for 75% off. Cheap Amazon 3rd Party Items You're on Amazon or maybe just Googling for an item and you see it for an unbelievable price from a third-party seller. You know Amazon has your back so you order it. The scam: One of three things usually happen: 1) The seller marks the items as shipped and sends a fake tracking number. Amazon releases the funds to the seller, and the seller disappears. Amazon ultimately refunds your money. 2) The seller immediately cancels the order and instructs you to re-order the item directly from their website, usually with the guarantee that the order is still protected by Amazon. The seller takes your money and runs. Amazon informs you that they do not offer protection on items sold outside of Amazon and cannot help you. 2) The seller immediately cancels the order and instructs you to instead send payment via an unused Amazon gift card by sending the code on the back via email. Once the seller uses the code, the money on the card is gone and cannot be refunded. How to avoid: These scammers can be identified by looking at their Amazon storefronts. They'll be brand new sellers offering a wide range of items at unbelievable prices. Usually their Amazon names will be gibberish, or a variation on FIRSTNAME.LASTNAME. Occasionally however, established storefronts will be hacked. If the deal is too good to be true its most likely a scam. Scams on eBay There are scams on eBay targeting both buyers and sellers. As a seller, you should look out for people who privately message you regarding the order, especially if they ask you to ship to a different address or ask to negotiate via text/email/a messaging service. As a buyer you should look out for new accounts selling in-demand items, established accounts selling in-demand items that they have no previous connection to (you can check their feedback history for a general idea of what they bought/sold in the past), and lookout for people who ask you to go off eBay and use another service to complete the transaction. In many cases you will receive a fake tracking number and your money will be help up for up to a month. Scams on Amazon There are scams on Amazon targeting both buyers and sellers. As a seller, you should look out for people who message you about a listing. As a buyer you should look out for listings that have an email address for you to contact the person to complete the transaction, and you should look out for cheap listings of in-demand items. Scams on Reddit Reddit accounts are frequently purchased and sold by fraudsters who wish to use the high karma count + the age of the account to scam people on buy/sell subreddits. You need to take precautions and be safe whenever you are making a transaction online. Computer scams Virus scam A popup or other ad will say that you have a virus and you need to follow their advice in order to remove it. They are lying, and either want you to install malware or pay for their software.
Chinese Brushing / direct shipping If you have ever received an unsolicited small package from China, your address was used to brush. Vendors place fake orders for their own products and send out the orders so that they can increase their ratings. Money flipping Scammer claims to be a banking insider who can double/triple/bazoople any amount of money you send them, with no consequences of any kind. Obviously, the money disappears into their wallet the moment you send it.
Door to door scams
As a general rule, you should not engage with door to door salesmen. If you are interested in the product they are selling, check online first. Selling Magazines Someone or a group will come to your door and offer to sell a magazine subscription. Often the subscriptions are not for the duration or price you were told, and the magazines will often have tough or impossible cancellation policies. Energy sales Somebody will come to your door claiming to be from an energy company. They will ask to see your current energy bill so that they can see how much you pay. They will then offer you a discount if you sign up with them, and promise to handle everything with your old provider. Some of these scammers will "slam" you, by using your account number that they saw on your bill to switch you to their service without authorization, and some will scam you by charging higher prices than the ones you agreed on. Security system scams Scammers will come to your door and ask about your security system, and offer to sell you a new one. These scammers are either selling you overpriced low quality products, or are casing your home for a future burglary. They ask to enter your home While trying to sell you whatever, they suddenly need to use your bathroom, or they've been writing against the wall and ask to use your table instead. Or maybe they just moved into the neighborhood and want to see how you decorate for ideas. They're scoping out you and your place. They want to see what valuables you have, how gullible you are, if you have a security system or dogs, etc.
Begging With a Purpose "I just need a few more dollars for the bus," at the bus station, or "I just need $5 to get some gas," at a gas station. There's also a variation where you will be presented with a reward: "I just need money for a cab to get uptown, but I'll give you sports tickets/money/a date/a priceless vase." Three Card Monte, Also Known As The Shell Game Unbeatable. The people you see winning are in on the scam. Drop and Break You bump into someone and they drop their phone/glasses/fancy bottle of wine/priceless vase and demand you pay them back. In reality, it's a $2 pair of reading glasses/bottle of three-buck-chuck/tasteful but affordable vase. CD Sales You're handed a free CD so you can check out the artist's music. They then ask for your name and immediately write it on the CD. Once they've signed your name, they ask you for money, saying they can't give it to someone else now. Often they use dry erase markers, or cheap CD sleeves. Never use any type of storage device given to you by a random person, as the device can contain malware. White Van Speaker Scam You're approached and offered speakers/leather jackets/other luxury goods at a discount. The scammer will have an excuse as to why the price is so low. After you buy them, you'll discover that they are worthless. iPhone Street Sale You're approached and shown an iPhone for sale, coming in the box, but it's open and you can see the phone. If you buy the phone, you'll get an iPhone box with no iPhone, just some stones or cheap metal in it to weigh it down. Buddhist Monk Pendant A monk in traditional garb approaches you, hands you a gold trinket, and asks for a donation. He holds either a notebook with names and amounts of donation (usually everyone else has donated $5+), or a leaflet with generic info. This is fairly common in NYC, and these guys get aggressive quickly. Friendship Bracelet Scam More common in western Europe, you're approached by someone selling bracelets. They quickly wrap a loop of fabric around your finger and pull it tight, starting to quickly weave a bracelet. The only way to (easily) get it off your hand is to pay. Leftover sales This scam involves many different items, but the idea is usually the same: you are approached by someone who claims to have a large amount of excess inventory and offers to sell it to you at a great price. The scammer actually has low quality items and will lie to you about the price/origin of the items. Dent repair scams Scammers will approach you in public about a dent in your car and offer to fix it for a low price. Often they will claim that they are mechanics. They will not fix the dent in your car, but they will apply large amounts of wax or other substances to hide the dent while they claim that the substance requires time to harden. Gold ring/jewelry/valuable item scam A scammer will "find" a gold ring or other valuable item and offers to sell it to you. The item is fake and you will never see the scammer again. Distraction theft One person will approach you and distract you, while their accomplice picks your pockets. The distraction can take many forms, but if you are a tourist and are approached in public, watch closely for people getting close to you.
Digital money that’s instant, private, and free from bank fees. Download our official wallet app and start using Bitcoin today. Read news, start mining, and buy BTC or BCH. Trezor Bitcoin Hardware Storage: Image Source. Hardware wallet: Trezor is one of the best example of one of the most secure Bitcoin Storage. It is a USB wallet which generates keys. It generates ... Redeeming bitcoin from cold storage. When you are ready to spend from your cold storage wallet, you will need to import the private key to a Bitcoin wallet that is online. Any wallet that supports importing private keys will work. For example, if you download the Bitcoin.com Wallet (which is a full Bitcoin client) you can import the private key ... Bitcoin Wallet oder 'Schildbach Wallet' war die erste mobile Bitcoin-Wallet. Bitcoin Wallet ist sicherer als die meisten anderen Bitcoin-Wallets, weil sie einen direkt mit dem Bitcoin-Netzwerk verbindet. Bitcoin Wallet hat ein simples Interface und genau die richtige Menge an Funktionen, die sie zu einer großartigen Wallet und einem großartigen Lernhilfsmittel für Bitcoin-Anfänger macht. Bitcoin ATMs are machines that will send bitcoin to your wallet in exchange for cash. They operate in a similar way to bank ATMs – you feed in the bills, hold your wallet’s QR code up to a ...
SAFEST COLD STORAGE WALLET (It's NOT what you think!!!)
Bitcoin 101 - Intro to Paper Wallets & Cold Storage - Bitcoin Security & Fun with Sloppy Wallets - Duration: 26:57. CRI 112,185 views. 26:57 . Mycelium Wallet - New Features & What's Next ... 15$ Bitcoin Cold Storage Wallet - Duration: 5:00. Kingcolex 37,261 views. 5:00. Getting Started With Bitcoin - Top 5 Things To Know - Duration: 9:01. BTC Sessions Recommended for you. 9:01 . How ... How to Create a Bitcoin Cold Storage Wallet Using Electrum - Duration: 35:15. Rex Kneisley 6,419 views. 35:15. LIVE market coverage: Wednesday, March 25 Yahoo Finance Yahoo Finance 2,674 watching ... Instructions: https://www.reddit.com/r/Bitcoin/comments/5tmxx6/using_old_phone_for_cold_storage/ Bitcoin Bitcoin wallet Bitcoin cold storage Bitcoin mining B... Hardware wallets offer the most complex and robust security of any type of bitcoin wallet. That’s because the physical hardware device must be connected to a computer or smartphone to execute a ...