(1) Proper multi-signature cold wallet storage.
(a) Each private key is the personal and legal responsibility of one person - the “signatory”. Signatories have special rights and responsibilities to protect user assets. Signatories are trained and certified through a course covering (1) past hacking and fraud cases, (2) proper and secure key generation, and (3) proper safekeeping of private keys. All private keys must be generated and stored 100% offline by the signatory. If even one private keys is ever breached or suspected to be breached, the wallet must be regenerated and all funds relocated to a new wallet.
(b) All signatories must be separate background-checked individuals free of past criminal conviction. Canadians should have a right to know who holds their funds. All signing of transactions must take place with all signatories on Canadian soil or on the soil of a country with a solid legal system which agrees to uphold and support these rules (from an established white-list of countries which expands over time).
(c) 3-5 independent signatures are required for any withdrawal. There must be 1-3 spare signatories, and a maximum of 7 total signatories. The following are all valid combinations: 3of4, 3of5, 3of6, 4of5, 4of6, 4of7, 5of6, or 5of7.
(d) A security audit should be conducted to validate the cold wallet is set up correctly and provide any additional pertinent information. The primary purpose is to ensure that all signatories are acting independently and using best practices for private key storage. A report summarizing all steps taken and who did the audit will be made public. Canadians must be able to validate the right measures are in place to protect their funds.
(e) There is a simple approval process if signatories wish to visit any country outside Canada, with a potential whitelist of exempt countries. At most 2 signatories can be outside of aligned jurisdiction at any given time. All exchanges would be required to keep a compliant cold wallet for Canadian funds and have a Canadian office if they wish to serve Canadian customers.
(2) Regular and transparent solvency audits.
(a) An audit must be conducted at founding, after 3 months of operation, and at least once every 6 months to compare customer balances against all stored cryptocurrency and fiat balances. The auditor must be known, independent, and never the same twice in a row.
(b) An audit report will be published featuring the steps conducted in a readable format. This should be made available to all Canadians on the exchange website and on a government website. The report must include what percentage of each customer asset is backed on the exchange, and how those funds are stored.
(c) The auditor will independently produce a hash of each customer's identifying information and balance as they perform the audit. This will be made publicly available on the exchange and government website, along with simplified instructions that each customer can use to verify that their balance was included in the audit process.
(d) The audit needs to include a proof of ownership for any cryptocurrency wallets included. A satoshi test (spending a small amount) or partially signed transaction both qualify.
(e) Any platform without 100% reserves should be assessed on a regular basis by a government or industry watchdog. This entity should work to prevent any further drop, support any private investor to come in, or facilitate a merger so that 100% backing can be obtained as soon as possible.
(3) Protections for hot wallets and transactions.
(a) A standardized list of approved coins and procedures will be established to constitute valid cold storage wallets. Where a multi-sig process is not natively available, efforts will be undertaken to establish a suitable and stable smart contract standard. This list will be expanded and improved over time. Coins and procedures not on the list are considered hot wallets.
(b) Hot wallets can be backed by additional funds in cold storage or an acceptable third-party insurance provider with a comprehensive coverage policy.
(c) Exchanges are required to cover the full balance of all user funds as denominated in the same currency, or double the balance as denominated in bitcoin or CAD using an established trading rate. If the balance is ever insufficient due to market movements, the firm must rectify this within 24 hours by moving assets to cold storage or increasing insurance coverage.
(d) Any large transactions (above a set threshold) from cold storage to any new wallet addresses (not previously transacted with) must be tested with a smaller transaction first. Deposits of cryptocurrency must be limited to prevent economic 51% attacks. Any issues are to be covered by the exchange.
(e) Exchange platforms must provide suitable authentication for users, including making available approved forms of two-factor authentication. SMS-based authentication is not to be supported. Withdrawals must be blocked for 48 hours in the event of any account password change. Disputes on the negligence of exchanges should be governed by case law.
Quick weekly news:submitted by Kononenko_Ivan to GoodCrypto [link] [comments]
- Ethereum Classic has suffered its second 51% attack in a week after more than 4,000 blocks were reorganized Thursday morning.
- The Chicago DeFi Alliance (CDA) is launching one of the first accelerator programs for decentralized finance (DeFi) startups beginning in August.
Also, be sure to check out top altcoin gainers and losers of the week.⬇️
Ethereum Classic has suffered its second 51% attack in a week after more than 4,000 blocks were reorganized Thursday morning. A chain reorg occurs when a party gains more hashing power than the rest of the network miners, allowing them to rewrite the chain’s history and “double-spend” its crypto. Bitfly and Binance reported the reorganization, announcing all Ethereum Classic payouts, withdrawals and deposits had been suspended due to the attack. The network has suffered major reorg attacks at least twice in the last two years. In late July, hackers moved more than 807,000 ETC from unspecified crypto exchange to several wallets, according to Bitquery.
The Chicago DeFi Alliance (CDA) is launching one of the first accelerator programs for decentralized finance (DeFi) startups beginning in August. The program is modeled on Silicon Valley’s Y Combinator program and will invest $120,000 in each participating team in exchange for future token purchases. Volt Capital co-founder Imran Khan and CDA partner Qiao Wang will lead the eight-week program for early-stage startups, plus a fast-track program to introduce more established startups to relevant experts. “DeFi has all the fundamental qualities to become a real, trusted alternative to the legacy financial system,” Wang said.
Sourcesubmitted by pascalbernoulli to Yield_Farming [link] [comments]
It’s effectively July 2017 in the world of decentralized finance (DeFi), and as in the heady days of the initial coin offering (ICO) boom, the numbers are only trending up.
According to DeFi Pulse, there is $1.9 billion in crypto assets locked in DeFi right now. According to the CoinDesk ICO Tracker, the ICO market started chugging past $1 billion in July 2017, just a few months before token sales started getting talked about on TV.
Debate juxtaposing these numbers if you like, but what no one can question is this: Crypto users are putting more and more value to work in DeFi applications, driven largely by the introduction of a whole new yield-generating pasture, Compound’s COMP governance token.
Governance tokens enable users to vote on the future of decentralized protocols, sure, but they also present fresh ways for DeFi founders to entice assets onto their platforms.
That said, it’s the crypto liquidity providers who are the stars of the present moment. They even have a meme-worthy name: yield farmers.
Where it startedEthereum-based credit market Compound started distributing its governance token, COMP, to the protocol’s users this past June 15. Demand for the token (heightened by the way its automatic distribution was structured) kicked off the present craze and moved Compound into the leading position in DeFi.
The hot new term in crypto is “yield farming,” a shorthand for clever strategies where putting crypto temporarily at the disposal of some startup’s application earns its owner more cryptocurrency.
Another term floating about is “liquidity mining.”
The buzz around these concepts has evolved into a low rumble as more and more people get interested.
The casual crypto observer who only pops into the market when activity heats up might be starting to get faint vibes that something is happening right now. Take our word for it: Yield farming is the source of those vibes.
But if all these terms (“DeFi,” “liquidity mining,” “yield farming”) are so much Greek to you, fear not. We’re here to catch you up. We’ll get into all of them.
We’re going to go from very basic to more advanced, so feel free to skip ahead.
What are tokens?Most CoinDesk readers probably know this, but just in case: Tokens are like the money video-game players earn while fighting monsters, money they can use to buy gear or weapons in the universe of their favorite game.
But with blockchains, tokens aren’t limited to only one massively multiplayer online money game. They can be earned in one and used in lots of others. They usually represent either ownership in something (like a piece of a Uniswap liquidity pool, which we will get into later) or access to some service. For example, in the Brave browser, ads can only be bought using basic attention token (BAT).
If tokens are worth money, then you can bank with them or at least do things that look very much like banking. Thus: decentralized finance.
Tokens proved to be the big use case for Ethereum, the second-biggest blockchain in the world. The term of art here is “ERC-20 tokens,” which refers to a software standard that allows token creators to write rules for them. Tokens can be used a few ways. Often, they are used as a form of money within a set of applications. So the idea for Kin was to create a token that web users could spend with each other at such tiny amounts that it would almost feel like they weren’t spending anything; that is, money for the internet.
Governance tokens are different. They are not like a token at a video-game arcade, as so many tokens were described in the past. They work more like certificates to serve in an ever-changing legislature in that they give holders the right to vote on changes to a protocol.
So on the platform that proved DeFi could fly, MakerDAO, holders of its governance token, MKR, vote almost every week on small changes to parameters that govern how much it costs to borrow and how much savers earn, and so on.
Read more: Why DeFi’s Billion-Dollar Milestone Matters
One thing all crypto tokens have in common, though, is they are tradable and they have a price. So, if tokens are worth money, then you can bank with them or at least do things that look very much like banking. Thus: decentralized finance.
What is DeFi?Fair question. For folks who tuned out for a bit in 2018, we used to call this “open finance.” That construction seems to have faded, though, and “DeFi” is the new lingo.
In case that doesn’t jog your memory, DeFi is all the things that let you play with money, and the only identification you need is a crypto wallet.
On the normal web, you can’t buy a blender without giving the site owner enough data to learn your whole life history. In DeFi, you can borrow money without anyone even asking for your name.
I can explain this but nothing really brings it home like trying one of these applications. If you have an Ethereum wallet that has even $20 worth of crypto in it, go do something on one of these products. Pop over to Uniswap and buy yourself some FUN (a token for gambling apps) or WBTC (wrapped bitcoin). Go to MakerDAO and create $5 worth of DAI (a stablecoin that tends to be worth $1) out of the digital ether. Go to Compound and borrow $10 in USDC.
(Notice the very small amounts I’m suggesting. The old crypto saying “don’t put in more than you can afford to lose” goes double for DeFi. This stuff is uber-complex and a lot can go wrong. These may be “savings” products but they’re not for your retirement savings.)
Immature and experimental though it may be, the technology’s implications are staggering. On the normal web, you can’t buy a blender without giving the site owner enough data to learn your whole life history. In DeFi, you can borrow money without anyone even asking for your name.
DeFi applications don’t worry about trusting you because they have the collateral you put up to back your debt (on Compound, for instance, a $10 debt will require around $20 in collateral).
Read more: There Are More DAI on Compound Now Than There Are DAI in the World
If you do take this advice and try something, note that you can swap all these things back as soon as you’ve taken them out. Open the loan and close it 10 minutes later. It’s fine. Fair warning: It might cost you a tiny bit in fees, and the cost of using Ethereum itself right now is much higher than usual, in part due to this fresh new activity. But it’s nothing that should ruin a crypto user.
So what’s the point of borrowing for people who already have the money? Most people do it for some kind of trade. The most obvious example, to short a token (the act of profiting if its price falls). It’s also good for someone who wants to hold onto a token but still play the market.
Doesn’t running a bank take a lot of money up front?It does, and in DeFi that money is largely provided by strangers on the internet. That’s why the startups behind these decentralized banking applications come up with clever ways to attract HODLers with idle assets.
Liquidity is the chief concern of all these different products. That is: How much money do they have locked in their smart contracts?
“In some types of products, the product experience gets much better if you have liquidity. Instead of borrowing from VCs or debt investors, you borrow from your users,” said Electric Capital managing partner Avichal Garg.
Let’s take Uniswap as an example. Uniswap is an “automated market maker,” or AMM (another DeFi term of art). This means Uniswap is a robot on the internet that is always willing to buy and it’s also always willing to sell any cryptocurrency for which it has a market.
On Uniswap, there is at least one market pair for almost any token on Ethereum. Behind the scenes, this means Uniswap can make it look like it is making a direct trade for any two tokens, which makes it easy for users, but it’s all built around pools of two tokens. And all these market pairs work better with bigger pools.
Why do I keep hearing about ‘pools’?To illustrate why more money helps, let’s break down how Uniswap works.
Let’s say there was a market for USDC and DAI. These are two tokens (both stablecoins but with different mechanisms for retaining their value) that are meant to be worth $1 each all the time, and that generally tends to be true for both.
The price Uniswap shows for each token in any pooled market pair is based on the balance of each in the pool. So, simplifying this a lot for illustration’s sake, if someone were to set up a USDC/DAI pool, they should deposit equal amounts of both. In a pool with only 2 USDC and 2 DAI it would offer a price of 1 USDC for 1 DAI. But then imagine that someone put in 1 DAI and took out 1 USDC. Then the pool would have 1 USDC and 3 DAI. The pool would be very out of whack. A savvy investor could make an easy $0.50 profit by putting in 1 USDC and receiving 1.5 DAI. That’s a 50% arbitrage profit, and that’s the problem with limited liquidity.
(Incidentally, this is why Uniswap’s prices tend to be accurate, because traders watch it for small discrepancies from the wider market and trade them away for arbitrage profits very quickly.)
Read more: Uniswap V2 Launches With More Token-Swap Pairs, Oracle Service, Flash Loans
However, if there were 500,000 USDC and 500,000 DAI in the pool, a trade of 1 DAI for 1 USDC would have a negligible impact on the relative price. That’s why liquidity is helpful.
You can stick your assets on Compound and earn a little yield. But that’s not very creative. Users who look for angles to maximize that yield: those are the yield farmers.
Similar effects hold across DeFi, so markets want more liquidity. Uniswap solves this by charging a tiny fee on every trade. It does this by shaving off a little bit from each trade and leaving that in the pool (so one DAI would actually trade for 0.997 USDC, after the fee, growing the overall pool by 0.003 USDC). This benefits liquidity providers because when someone puts liquidity in the pool they own a share of the pool. If there has been lots of trading in that pool, it has earned a lot of fees, and the value of each share will grow.
And this brings us back to tokens.
Liquidity added to Uniswap is represented by a token, not an account. So there’s no ledger saying, “Bob owns 0.000000678% of the DAI/USDC pool.” Bob just has a token in his wallet. And Bob doesn’t have to keep that token. He could sell it. Or use it in another product. We’ll circle back to this, but it helps to explain why people like to talk about DeFi products as “money Legos.”
So how much money do people make by putting money into these products?It can be a lot more lucrative than putting money in a traditional bank, and that’s before startups started handing out governance tokens.
Compound is the current darling of this space, so let’s use it as an illustration. As of this writing, a person can put USDC into Compound and earn 2.72% on it. They can put tether (USDT) into it and earn 2.11%. Most U.S. bank accounts earn less than 0.1% these days, which is close enough to nothing.
However, there are some caveats. First, there’s a reason the interest rates are so much juicier: DeFi is a far riskier place to park your money. There’s no Federal Deposit Insurance Corporation (FDIC) protecting these funds. If there were a run on Compound, users could find themselves unable to withdraw their funds when they wanted.
Plus, the interest is quite variable. You don’t know what you’ll earn over the course of a year. USDC’s rate is high right now. It was low last week. Usually, it hovers somewhere in the 1% range.
Similarly, a user might get tempted by assets with more lucrative yields like USDT, which typically has a much higher interest rate than USDC. (Monday morning, the reverse was true, for unclear reasons; this is crypto, remember.) The trade-off here is USDT’s transparency about the real-world dollars it’s supposed to hold in a real-world bank is not nearly up to par with USDC’s. A difference in interest rates is often the market’s way of telling you the one instrument is viewed as dicier than another.
Users making big bets on these products turn to companies Opyn and Nexus Mutual to insure their positions because there’s no government protections in this nascent space – more on the ample risks later on.
So users can stick their assets in Compound or Uniswap and earn a little yield. But that’s not very creative. Users who look for angles to maximize that yield: those are the yield farmers.
OK, I already knew all of that. What is yield farming?Broadly, yield farming is any effort to put crypto assets to work and generate the most returns possible on those assets.
At the simplest level, a yield farmer might move assets around within Compound, constantly chasing whichever pool is offering the best APY from week to week. This might mean moving into riskier pools from time to time, but a yield farmer can handle risk.
“Farming opens up new price arbs [arbitrage] that can spill over to other protocols whose tokens are in the pool,” said Maya Zehavi, a blockchain consultant.
Because these positions are tokenized, though, they can go further.
This was a brand-new kind of yield on a deposit. In fact, it was a way to earn a yield on a loan. Who has ever heard of a borrower earning a return on a debt from their lender?
In a simple example, a yield farmer might put 100,000 USDT into Compound. They will get a token back for that stake, called cUSDT. Let’s say they get 100,000 cUSDT back (the formula on Compound is crazy so it’s not 1:1 like that but it doesn’t matter for our purposes here).
They can then take that cUSDT and put it into a liquidity pool that takes cUSDT on Balancer, an AMM that allows users to set up self-rebalancing crypto index funds. In normal times, this could earn a small amount more in transaction fees. This is the basic idea of yield farming. The user looks for edge cases in the system to eke out as much yield as they can across as many products as it will work on.
Right now, however, things are not normal, and they probably won’t be for a while.
Why is yield farming so hot right now?Because of liquidity mining. Liquidity mining supercharges yield farming.
Liquidity mining is when a yield farmer gets a new token as well as the usual return (that’s the “mining” part) in exchange for the farmer’s liquidity.
“The idea is that stimulating usage of the platform increases the value of the token, thereby creating a positive usage loop to attract users,” said Richard Ma of smart-contract auditor Quantstamp.
The yield farming examples above are only farming yield off the normal operations of different platforms. Supply liquidity to Compound or Uniswap and get a little cut of the business that runs over the protocols – very vanilla.
But Compound announced earlier this year it wanted to truly decentralize the product and it wanted to give a good amount of ownership to the people who made it popular by using it. That ownership would take the form of the COMP token.
Lest this sound too altruistic, keep in mind that the people who created it (the team and the investors) owned more than half of the equity. By giving away a healthy proportion to users, that was very likely to make it a much more popular place for lending. In turn, that would make everyone’s stake worth much more.
So, Compound announced this four-year period where the protocol would give out COMP tokens to users, a fixed amount every day until it was gone. These COMP tokens control the protocol, just as shareholders ultimately control publicly traded companies.
Every day, the Compound protocol looks at everyone who had lent money to the application and who had borrowed from it and gives them COMP proportional to their share of the day’s total business.
The results were very surprising, even to Compound’s biggest promoters.
COMP’s value will likely go down, and that’s why some investors are rushing to earn as much of it as they can right now.
This was a brand-new kind of yield on a deposit into Compound. In fact, it was a way to earn a yield on a loan, as well, which is very weird: Who has ever heard of a borrower earning a return on a debt from their lender?
COMP’s value has consistently been well over $200 since it started distributing on June 15. We did the math elsewhere but long story short: investors with fairly deep pockets can make a strong gain maximizing their daily returns in COMP. It is, in a way, free money.
It’s possible to lend to Compound, borrow from it, deposit what you borrowed and so on. This can be done multiple times and DeFi startup Instadapp even built a tool to make it as capital-efficient as possible.
“Yield farmers are extremely creative. They find ways to ‘stack’ yields and even earn multiple governance tokens at once,” said Spencer Noon of DTC Capital.
COMP’s value spike is a temporary situation. The COMP distribution will only last four years and then there won’t be any more. Further, most people agree that the high price now is driven by the low float (that is, how much COMP is actually free to trade on the market – it will never be this low again). So the value will probably gradually go down, and that’s why savvy investors are trying to earn as much as they can now.
Appealing to the speculative instincts of diehard crypto traders has proven to be a great way to increase liquidity on Compound. This fattens some pockets but also improves the user experience for all kinds of Compound users, including those who would use it whether they were going to earn COMP or not.
As usual in crypto, when entrepreneurs see something successful, they imitate it. Balancer was the next protocol to start distributing a governance token, BAL, to liquidity providers. Flash loan provider bZx has announced a plan. Ren, Curve and Synthetix also teamed up to promote a liquidity pool on Curve.
It is a fair bet many of the more well-known DeFi projects will announce some kind of coin that can be mined by providing liquidity.
The case to watch here is Uniswap versus Balancer. Balancer can do the same thing Uniswap does, but most users who want to do a quick token trade through their wallet use Uniswap. It will be interesting to see if Balancer’s BAL token convinces Uniswap’s liquidity providers to defect.
So far, though, more liquidity has gone into Uniswap since the BAL announcement, according to its data site. That said, even more has gone into Balancer.
Did liquidity mining start with COMP?No, but it was the most-used protocol with the most carefully designed liquidity mining scheme.
This point is debated but the origins of liquidity mining probably date back to Fcoin, a Chinese exchange that created a token in 2018 that rewarded people for making trades. You won’t believe what happened next! Just kidding, you will: People just started running bots to do pointless trades with themselves to earn the token.
Similarly, EOS is a blockchain where transactions are basically free, but since nothing is really free the absence of friction was an invitation for spam. Some malicious hacker who didn’t like EOS created a token called EIDOS on the network in late 2019. It rewarded people for tons of pointless transactions and somehow got an exchange listing.
These initiatives illustrated how quickly crypto users respond to incentives.
Read more: Compound Changes COMP Distribution Rules Following ‘Yield Farming’ Frenzy
Fcoin aside, liquidity mining as we now know it first showed up on Ethereum when the marketplace for synthetic tokens, Synthetix, announced in July 2019 an award in its SNX token for users who helped add liquidity to the sETH/ETH pool on Uniswap. By October, that was one of Uniswap’s biggest pools.
When Compound Labs, the company that launched the Compound protocol, decided to create COMP, the governance token, the firm took months designing just what kind of behavior it wanted and how to incentivize it. Even still, Compound Labs was surprised by the response. It led to unintended consequences such as crowding into a previously unpopular market (lending and borrowing BAT) in order to mine as much COMP as possible.
Just last week, 115 different COMP wallet addresses – senators in Compound’s ever-changing legislature – voted to change the distribution mechanism in hopes of spreading liquidity out across the markets again.
Is there DeFi for bitcoin?Yes, on Ethereum.
Nothing has beaten bitcoin over time for returns, but there’s one thing bitcoin can’t do on its own: create more bitcoin.
A smart trader can get in and out of bitcoin and dollars in a way that will earn them more bitcoin, but this is tedious and risky. It takes a certain kind of person.
DeFi, however, offers ways to grow one’s bitcoin holdings – though somewhat indirectly.
A long HODLer is happy to gain fresh BTC off their counterparty’s short-term win. That’s the game.
For example, a user can create a simulated bitcoin on Ethereum using BitGo’s WBTC system. They put BTC in and get the same amount back out in freshly minted WBTC. WBTC can be traded back for BTC at any time, so it tends to be worth the same as BTC.
Then the user can take that WBTC, stake it on Compound and earn a few percent each year in yield on their BTC. Odds are, the people who borrow that WBTC are probably doing it to short BTC (that is, they will sell it immediately, buy it back when the price goes down, close the loan and keep the difference).
A long HODLer is happy to gain fresh BTC off their counterparty’s short-term win. That’s the game.
How risky is it?Enough.
“DeFi, with the combination of an assortment of digital funds, automation of key processes, and more complex incentive structures that work across protocols – each with their own rapidly changing tech and governance practices – make for new types of security risks,” said Liz Steininger of Least Authority, a crypto security auditor. “Yet, despite these risks, the high yields are undeniably attractive to draw more users.”
We’ve seen big failures in DeFi products. MakerDAO had one so bad this year it’s called “Black Thursday.” There was also the exploit against flash loan provider bZx. These things do break and when they do money gets taken.
As this sector gets more robust, we could see token holders greenlighting more ways for investors to profit from DeFi niches.
Right now, the deal is too good for certain funds to resist, so they are moving a lot of money into these protocols to liquidity mine all the new governance tokens they can. But the funds – entities that pool the resources of typically well-to-do crypto investors – are also hedging. Nexus Mutual, a DeFi insurance provider of sorts, told CoinDesk it has maxed out its available coverage on these liquidity applications. Opyn, the trustless derivatives maker, created a way to short COMP, just in case this game comes to naught.
And weird things have arisen. For example, there’s currently more DAI on Compound than have been minted in the world. This makes sense once unpacked but it still feels dicey to everyone.
That said, distributing governance tokens might make things a lot less risky for startups, at least with regard to the money cops.
“Protocols distributing their tokens to the public, meaning that there’s a new secondary listing for SAFT tokens, [gives] plausible deniability from any security accusation,” Zehavi wrote. (The Simple Agreement for Future Tokens was a legal structure favored by many token issuers during the ICO craze.)
Whether a cryptocurrency is adequately decentralized has been a key feature of ICO settlements with the U.S. Securities and Exchange Commission (SEC).
What’s next for yield farming? (A prediction)COMP turned out to be a bit of a surprise to the DeFi world, in technical ways and others. It has inspired a wave of new thinking.
“Other projects are working on similar things,” said Nexus Mutual founder Hugh Karp. In fact, informed sources tell CoinDesk brand-new projects will launch with these models.
We might soon see more prosaic yield farming applications. For example, forms of profit-sharing that reward certain kinds of behavior.
Imagine if COMP holders decided, for example, that the protocol needed more people to put money in and leave it there longer. The community could create a proposal that shaved off a little of each token’s yield and paid that portion out only to the tokens that were older than six months. It probably wouldn’t be much, but an investor with the right time horizon and risk profile might take it into consideration before making a withdrawal.
(There are precedents for this in traditional finance: A 10-year Treasury bond normally yields more than a one-month T-bill even though they’re both backed by the full faith and credit of Uncle Sam, a 12-month certificate of deposit pays higher interest than a checking account at the same bank, and so on.)
As this sector gets more robust, its architects will come up with ever more robust ways to optimize liquidity incentives in increasingly refined ways. We could see token holders greenlighting more ways for investors to profit from DeFi niches.
Questions abound for this nascent industry: What will MakerDAO do to restore its spot as the king of DeFi? Will Uniswap join the liquidity mining trend? Will anyone stick all these governance tokens into a decentralized autonomous organization (DAO)? Or would that be a yield farmers co-op?
Whatever happens, crypto’s yield farmers will keep moving fast. Some fresh fields may open and some may soon bear much less luscious fruit.
But that’s the nice thing about farming in DeFi: It is very easy to switch fields.
A whirlwind tour of Defi, paying close attention to protocols that we’re leveraging at Genesis Block.submitted by mickhagen to genesisblockhq [link] [comments]
This is the third post of Crypto-Powered — a new series that examines what it means for Genesis Block to be a digital bank that’s powered by crypto, blockchain, and decentralized protocols.
Last week we explored how building on legacy finance is a fool’s errand. The future of money belongs to those who build with crypto and blockchain at their core. We also started down the crypto rabbit hole, introducing Bitcoin, Ethereum, and DeFi (decentralized finance). That post is required reading if you hope to glean any value from the rest of this series.
97% of all activity on Ethereum in the last quarter has been DeFi-related. The total value sitting inside DeFi protocols is roughly $2B — double what it was a month ago. The explosive growth cannot be ignored. All signs suggest that Ethereum & DeFi are a Match Made in Heaven, and both on their way to finding strong product/market fit.
So in this post, we’re doing a whirlwind tour of DeFi. We look at specific examples and use-cases already in the wild and seeing strong growth. And we pay close attention to protocols that Genesis Block is integrating with. Alright, let’s dive in.
StablecoinsStablecoins are exactly what they sound like: cryptocurrencies that are stable. They are not meant to be volatile (like Bitcoin). These assets attempt to peg their price to some external reference (eg. USD or Gold). A non-volatile crypto asset can be incredibly useful for things like merchant payments, cross-border transfers, or storing wealth — becoming your own bank but without the stress of constant price volatility.
There are major governments and central banks that are experimenting with or soon launching their own stablecoins like China with their digital yuan and the US Federal Reserve with their digital dollar. There are also major corporations working in this area like JP Morgan with their JPM Coin, and of course Facebook with their Libra Project.
Stablecoin activity has grown 800% in the last year, with $290B of transaction volume (funds moving on-chain).The most popular USD-pegged stablecoins include:
tablecoins are playing an increasingly important role in the world of DeFi. In a way, they serve as common pipes & bridges between the various protocols.https://preview.redd.it/v9ki2qro12b51.png?width=700&format=png&auto=webp&s=dbf591b122fc4b3d83b381389145b88e2505b51d
Lending & BorrowingThree of the top five DeFi protocols relate to lending & borrowing. These popular lending protocols look very similar to traditional money markets. Users who want to earn interest/yield can deposit (lend) their funds into a pool of liquidity. Because it behaves similarly to traditional money markets, their funds are not locked, they can withdraw at any time. It’s highly liquid.
Borrowers can tap into this pool of liquidity and take out loans. Interest rates depend on the utilization rate of the pool — how much of the deposits in the pool have already been borrowed. Supply & demand. Thus, interest rates are variable and borrowers can pay their loans back at any time.
So, who decides how much a borrower can take? What’s the process like? Are there credit checks? How is credit-worthiness determined?These protocols are decentralized, borderless, permissionless. The people participating in these markets are from all over the world. There is no simple way to verify identity or check credit history. So none of that happens.
Credit-worthiness is determined simply by how much crypto collateral the borrower puts into the protocol. For example, if a user wants to borrow $5k of USDC, then they’ll need to deposit $10k of BTC or ETH. The exact amount of collateral depends on the rules of the protocol — usually the more liquid the collateral asset, the more borrowing power the user can receive.
The most prominent lending protocols include Compound, Aave, Maker, and Atomic Loans. Recently, Compound has seen meteoric growth with the introduction of their COMP token — a token used to incentivize and reward participants of the protocol. There’s almost $1B in outstanding debt in the Compound protocol. Mainframe is also working on an exciting protocol in this area and the latest iteration of their white paper should be coming out soon.
There is very little economic risk to these protocols because all loans are overcollateralized.I repeat, all loans are overcollateralized. If the value of the collateral depreciates significantly due to price volatility, there are sophisticated liquidation systems to ensure the loan always gets paid back.
InvestmentsBuying, selling, and trading crypto assets is certainly one form of investing (though not for the faint of heart). But there are now DeFi protocols to facilitate making and managing traditional-style investments.
Through DeFi, you can invest in Gold. You can invest in stocks like Amazon and Apple. You can short Tesla. You can access the S&P 500. This is done through crypto-based synthetics — which gives users exposure to assets without needing to hold or own the underlying asset. This is all possible with protocols like UMA, Synthetix, or Market protocol.
Maybe your style of investing is more passive. With PoolTogether , you can participate in a no-loss lottery.
Maybe you’re an advanced trader and want to trade options or futures. You can do that with DeFi protocols like Convexity, Futureswap, and dYdX. Maybe you live on the wild side and trade on margin or leverage, you can do that with protocols like Fulcrum, Nuo, and DDEX. Or maybe you’re a degenerate gambler and want to bet against Trump in the upcoming election, you can do that on Augur.
And there are plenty of DeFi protocols to help with crypto investing. You could use Set Protocol if you need automated trading strategies. You could use Melonport if you’re an asset manager. You could use Balancer to automatically rebalance your portfolio.
With as little as $1, people all over the world can have access to the same investment opportunities and tools that used to be reserved for only the wealthy, or those lucky enough to be born in the right country.
You can start to imagine how services like Etrade, TD Ameritrade, Schwab, and even Robinhood could be massively disrupted by a crypto-native company that builds with these types of protocols at their foundation.https://preview.redd.it/agco8msx12b51.png?width=700&format=png&auto=webp&s=3bbb595f9ecc84758d276dbf82bc5ddd9e329ff8
InsuranceAs mentioned in our previous post, there are near-infinite applications one can build on Ethereum. As a result, sometimes the code doesn’t work as expected. Bugs get through, it breaks. We’re still early in our industry. The tools, frameworks, and best practices are all still being established. Things can go wrong.
Sometimes the application just gets in a weird or bad state where funds can’t be recovered — like with what happened with Parity where $280M got frozen (yes, I lost some money in that). Sometimes, there are hackers who discover a vulnerability in the code and maliciously steal funds — like how dForce lost $25M a few months ago, or how The DAO lost $50M a few years ago. And sometimes the system works as designed, but the economic model behind it is flawed, so a clever user takes advantage of the system— like what recently happened with Balancer where they lost $500k.
There are a lot of risks when interacting with smart contracts and decentralized applications — especially for ones that haven’t stood the test of time. This is why insurance is such an important development in DeFi.
Insurance will be an essential component in helping this technology reach the masses.Two protocols that are leading the way on DeFi insurance are Nexus Mutual and Opyn. Though they are both still just getting started, many people are already using them. And we’re excited to start working with them at Genesis Block.
Exchanges & LiquidityDecentralized Exchanges (DEX) were one of the first and most developed categories in DeFi. A DEX allows a user to easily exchange one crypto asset for another crypto asset — but without needing to sign up for an account, verify identity, etc. It’s all via decentralized protocols.
Within the first 5 months of 2020, the top 7 DEX already achieved the 2019 trading volume. That was $2.5B. DeFi is fueling a lot of this growth.
There are many different flavors of DEX. Some of the early ones included 0x, IDEX, and EtherDelta — all of which had a traditional order book model where buyers are matched with sellers.
Another flavor is the pooled liquidity approach where the price is determined algorithmically based on how much liquidity there is and how much the user wants to buy. This is known as an AMM (Automated Market Maker) — Uniswap and Bancor were early leaders here. Though lately, Balancer has seen incredible growth due mostly to their strong incentives for participation — similar to Compound.
There are some DEXs that are more specialized — for example, Curve and mStable focus mostly only stablecoins. Because of the proliferation of these decentralized exchanges, there are now aggregators that combine and connect the liquidity of many sources. Those include Kyber, Totle, 1Inch, and Dex.ag.
These decentralized exchanges are becoming more and more connected to DeFi because they provide an opportunity for yield and earning interest.Users can earn passive income by supplying liquidity to these markets. It usually comes in the form of sharing transaction fee revenue (Uniswap) or token rewards (Balancer).
PaymentsAs it relates to making payments, much of the world is still stuck on plastic cards. We’re grateful to partner with Visa and launch the Genesis Block debit card… but we still don’t believe that's the future of payments. We see that as an important bridge between the past (legacy finance) and the future (crypto).
Our first post in this series shared more on why legacy finance is broken. We talked about the countless unnecessary middle-men on every card swipe (merchant, acquiring bank, processor, card network, issuing bank). We talked about the slow settlement times.
The future of payments will be much better. Yes, it’ll be from a mobile phone and the user experience will be similar to ApplePay (NFC) or WePay (QR Code).
But more importantly, the underlying assets being moved/exchanged will all be crypto — digital, permissionless, and open source.Someone making a payment at the grocery store check-out line will be able to open up Genesis Block, use contactless tech or scan a QR code, and instantly pay for their goods. All using crypto. Likely a stablecoin. Settlement will be instant. All the middlemen getting their pound of flesh will be disintermediated. The merchant can make more and the user can spend less. Blockchain FTW!
Now let’s talk about a few projects working in this area. The xDai Burner Wallet experience was incredible at the ETHDenver event a few years ago, but that speed came at the expense of full decentralization (can it be censored or shut down?). Of course, Facebook’s Libra wants to become the new standard for global payments, but many are afraid to give Facebook that much control (newsflash: it isn’t very decentralized).
Bitcoin is decentralized… but it’s slow and volatile. There are strong projects like Lightning Network (Zap example) that are still trying to make it happen. Projects like Connext and OmiseGo are trying to help bring payments to Ethereum. The Flexa project is leveraging the gift card rails, which is a nice hack to leverage existing pipes. And if ETH 2.0 is as fast as they say it will be, then the future of payments could just be a stablecoin like DAI (a token on Ethereum).
In a way, being able to spend crypto on daily expenses is the holy grail of use-cases. It’s still early. It hasn’t yet been solved. But once we achieve this, then we can ultimately and finally say goodbye to the legacy banking & finance world. Employees can be paid in crypto. Employees can spend in crypto. It changes everything.
Legacy finance is hanging on by a thread, and it’s this use-case that they are still clinging to. Once solved, DeFi domination will be complete.https://preview.redd.it/svft1ce422b51.png?width=700&format=png&auto=webp&s=9a6afc9e9339a3fec29ee2ae743c07c3042ea4ce
Impact on Genesis BlockAt Genesis Block, we’re excited to leverage these protocols and take this incredible technology to the world. Many of these protocols are already deeply integrated with our product. In fact, many are essential. The masses won’t know (or care about) what Tether, USDC, or DAI is. They think in dollars, euros, pounds and pesos. So while the user sees their local currency in the app, the underlying technology is all leveraging stablecoins. It’s all on “crypto rails.”
When users deposit assets into their Genesis Block account, they expect to earn interest. They expect that money to grow. We leverage many of these low-risk lending/exchange DeFi protocols. We lend into decentralized money markets like Compound — where all loans are overcollateralized. Or we supply liquidity to AMM exchanges like Balancer. This allows us to earn interest and generate yield for our depositors. We’re the experts so our users don’t need to be.
We haven’t yet integrated with any of the insurance or investment protocols — but we certainly plan on it. Our infrastructure is built with blockchain technology at the heart and our system is extensible — we’re ready to add assets and protocols when we feel they are ready, safe, secure, and stable. Many of these protocols are still in the experimental phase. It’s still early.
At Genesis Block we’re excited to continue to be at the frontlines of this incredible, innovative, technological revolution called DeFi.---
None of these powerful DeFi protocols will be replacing Robinhood, SoFi, or Venmo anytime soon. They never will. They aren’t meant to! We’ve discussed this before, these are low-level protocols that need killer applications, like Genesis Block.
So now that we’ve gone a little deeper down the rabbit hole and we’ve done this whirlwind tour of DeFi, the natural next question is: why?
Why does any of it matter?Most of these financial services that DeFi offers already exist in the real world. So why does it need to be on a blockchain? Why does it need to be decentralized? What new value is unlocked? Next post, we answer these important questions.
To look at more projects in DeFi, check out DeFi Prime, DeFi Pulse, or Consensys.
Other Ways to Consume Today's Episode:
Download the app. We're a digital bank that's powered by crypto:https://genesisblock.com/download
Bitcoin hacks and thefts have exploded since bitcoin's epic 2017 bull run saw the price balloon to around $20,000.submitted by MIEX_Official to u/MIEX_Official [link] [comments]
The bitcoin price has fallen by more than half since its late-2017 all-time high but bitcoin users remain a popular target for hackers.
Now, researchers have warned "millions" of bitcoin users might have been exposed by a newly discovered vulnerability in a number of popular bitcoin wallets.
Bitcoin transactions across three major bitcoin wallets were vulnerable to what some might call a double-spending attack, researchers at Tel Aviv-based bitcoin and crypto company ZenGo have revealed, adding other wallets beyond the nine they tested could be compromised.
The bitcoin wallets known to be affected—Ledger Live, Edge and BRD—have been updated in an effort to prevent the attack after their developers were alerted by ZenGo.
The vulnerability, named BigSpender, allows the attacker to make the wallet holder believe a payment has been received while in fact it has been replaced by the sender. The exploit could prevent the wallet's owner from accessing its funds, though not everyone agrees on the nature of the vulnerability.
"The core issue at the heart of the BigSpender vulnerability is that vulnerable wallets are not prepared for the option that a transaction might be canceled and implicitly assume it will get confirmed eventually," ZenGo's senior software engineer, Oded Leiba, wrote in a blog post revealing the weakness.
"This negligence has many faces. First and foremost, a user’s balance is increased on an incoming transaction while unconfirmed and is not decreased if the transaction is double-spent and thus effectively canceled."
Ledger and BRD have questioned the language used by ZenGo researchers.
"There is no actual double spend being performed," the Ledger security team said via email. "The user funds stay safe. Nevertheless, the display of received transactions could be misleading."
The bitcoin wallets that were found to be susceptible to the attack are some of the most widely used—something ZenGo researchers said highlights the bug's seriousness.
"Potentially several millions of users were exposed before the fix based on the user base of Ledger and BRD public numbers," ZenGo's chief executive Ouriel Ohayon said via email. BRD recently passed the 5 million user mark, its chief technology officer told bitcoin and crypto news outlet Coindesk.
While the bitcoin wallet developers dispute the exploit's risk, Ohayon insists the threat could actually be worse than is known.
"It does not mean that there are no other issues or that other wallets are not exposed to the BigSpender attack," Ohayon said, adding other wallets ZenGo researchers tested, including its own, were not vulnerable to the attack.
"Considering that this could result in the impossibility to spend your funds and the fact that this could be done at scale, this [exploit] can be considered serious."
"Hacks are constant. Security is an on-going battle fought by the industry and one that cannot be won by a single player or a single product, let alone a version update. To allow mass adoption it is critical that wallets invest as much effort in research and security and they do in product development and services."
submitted by tkeycoin to Tkeycoin_Official [link] [comments]
Version 1.3.0 is a powerful update to TkeySpace that our team has been carefully preparing. since version 1.2.0, we have been laying the foundation for implementing new features that are already available in the current version.
Who cares about the security and privacy of their assets is an update for you.
TkeySpace — was designed to give You full control over your digital assets while maintaining an exceptional level of security, which is why there is no personal data in the wallet: phone number, the email address that could be compromised by hackers — no identity checks and other hassles, just securely save the backup phrase consisting of 12 words.
Briefly about the TkeySpace 1.3.0 update :
Code optimization and switching to AndroidXA lot of work has been done on optimizing the code to speed up the application, improving the logic, synchronization speed, calculating the hash of cryptocurrencies, and successfully switching to AndroidX.
New section: Privacy
TORStarting with the current update, the TkeySpace wallet can communicate via the TOR network, includes new privacy algorithms, and supports 59 different currencies.
Tor is a powerful privacy feature for those who own large assets or live in places where the Internet is heavily censored.
Tor technology provides protection against traffic analysis mechanisms that compromise not only Internet privacy, but also the confidentiality of trade secrets, business contacts, and communications in General.When you enable TOR settings, all outgoing traffic from the wallet will be encrypted and routed through an anonymous network of servers, periodically forming a chain through the Tor network, which uses multi-level encryption, effectively hiding any information about the sender: location, IP address, and other data.
This means that if your provider blocks the connection, you can rest easy — after all, by running this function, you will get an encrypted connection to the network without restrictions.
In TOR mode, the wallet may work noticeably slower and in some cases, there may be problems with the network, due to encryption, some blockchain browsers may temporarily not work. However, TOR encryption is very important when Internet providers completely block traffic and switching to this mode, you get complete freedom and no blocks for transactions.
Confidentiality of transactions (the Blockchain transaction)The wallet can change the model of a standard transaction, mixing inputs and outputs, making it difficult to identify certain cryptocurrencies. In the current update, you can select one of several modes for the transaction privacy level: deterministic lexicographic sorting or shuffle mode.
Mode: Lexicographic indexingImplemented deterministic lexicographic sorting using hashes of previous transactions and output indexes for sorting transaction input data, as well as values and scriptPubKeys for sorting transaction output data;
We understand that information must remain confidential not only in the interests of consumers but also in higher orders, financial systems must be kept secret to prevent fraud. One way to address these privacy shortcomings is to randomize the order of inputs and outputs.
Lexicographic ordering is a comparison algorithm used to sort two sets based on their Cartesian order within their common superset. Lexicographic order is also often referred to as alphabetical order or dictionary order. The hashes of previous transactions (in reverse byte order) are sorted in ascending order, lexicographically.In the case of two matching transaction hashes, the corresponding previous output indexes will be compared by their integer value in ascending order. If the previous output indexes match, the input data is considered equal.
Shuffle Mode: mixing (random indexing)To learn more about how “shuffle mode” works, we will first analyze the mechanisms using the example of a classic transaction. Current balance Of your wallet: 100 TKEY, coins are stored at different addresses:
x1. Address-contains 10 TKEY. x2. Address-contains 20 TKEY. x3. Address-contains 30 TKEY. x4. Address-contains 15 TKEY. x5. Address-contains 25 TKEY.
Addresses in the blockchain are identifiers that you use to send cryptocurrency to another person or to receive digital currency.In a classic transaction, if you need to send, for example, 19 TKEY — 100 TKEY will be sent to the network for “melting” coins, 19 TKEY will be sent to the Recipient, and ~80.9 TKEY will return to the newly generated address for “change” in your wallet.
In the blockchain explorer, you will see the transaction amount in the amount of 100 TKEY, where 80.99999679 TKEY is your change, 19 TKEY is the amount you sent and 0.00000321 is the transaction fee. Thus, in the blockchain search engine, most of your balance is shown in the transaction.
How does the shuffle mode work?Let’s look at a similar example: you have 100 TKEY on your balance, and you need to send 19 TKEY.
x1. Address-contains 10 TKEY. x2. Address-contains 20 TKEY. x3. Address-contains 30 TKEY. x4. Address-contains 15 TKEY. x5. Address-contains 25 TKEY.
You send 19 TKEY, the system analyzes all your addresses and balances on them and selects the most suitable ones for the transaction. To send 19 TKEY, the miners will be given coins with x2. Addresses, for a total of 20 TKEY. Of these, 19 TKEY will be sent to the recipient, and 0.99999679 TKEY will be returned to Your new address as change minus the transaction fee.
In the blockchain explorer, you will see the transaction amount in the amount of 20 TKEY, where 0.99999679 TKEY is Your change, 19 TKEY is the amount you sent and 0.00000321 is the transaction fee.
The shuffle mode has a cumulative effect. with each new transaction, delivery Addresses will be created and the selection of debit addresses/s that are most suitable for the transaction will change. Thus, if you store 1,000,000 TKEY in your wallet and want to send 1 TKEY to the recipient, the transaction amount will not display most of your balance but will select 1 or more addresses for the transaction.
Selecting the recovery method for each digital currency (Blockchain restore)Now you can choose the recovery method for each currency: API + Blockchain or blockchain.
Note: This is not a syncing process, but rather the choice of a recovery method for your wallet. Syncing takes place with the blockchain — regardless of the method you choose.https://preview.redd.it/gxsssuxrttx41.png?width=1080&format=png&auto=webp&s=cd9fe383618dda0e990e86485652ff95652a8481
What are the differences between recovery methods?
API + BlockchainIn order not to load the entire history of the blockchain, i.e. block and transaction headers, the API helps you quickly get point information about previous transactions. For example, If your transactions are located in block 67325 and block 71775, the API will indicate to the node the necessary points for restoring Your balance, which will speed up the “recovery” process.
As soon as the information is received, communication with the peers takes place and synchronization begins from the control point, then from this moment, all subsequent block loading is carried out through the blockchain. This method allows you to quickly restore Your existing wallet.
‘’-’’ The API server may fail.
BlockchainThis method loads all block headers (block headers + Merkle) starting from the BIP44 checkpoint and manually validates transactions.
‘’+’’ It always works and is decentralized. ‘’-’’ Loading the entire blockchain may take a long time.
Why do I need to switch the recovery method?If when creating a wallet or restoring it, a notification (!) lights up in red near the selected cryptocurrency, then most likely the API has failed, so go to Settings — Security Center — Privacy — Blockchain Restore — switch to Blockchain. Syncing will be successful.
Selecting the address formatYou can choose the address format not only for Bitcoin but also for Litecoin. Legacy, SegWit, Native SegWit. Go to Settings — Manage Wallets — Address Format.
Working at the code level
Enhanced validation of transactions and blocks in the networkDue to the increased complexity in the Tkeycoin network, we have implemented enhanced validation of the tkeycoin consensus algorithm, and this algorithm is also available for other cryptocurrencies.
What is the advantage of the enhanced validation algorithm for the userFirst, the name itself speaks for itself — it increases the security of the network, and second, by implementing the function — we have accelerated the work of the TkeySpace blockchain node, the application consumes even fewer resources than before.
High complexity is converted to 3 bytes, which ensures fast code processing and the least resource consumption on your device.
SynchronizationThe synchronization process has been upgraded. Node addresses are added to the local storage, and instant synchronization with nodes occurs when you log in again.
Checking for double-spendingTkeySpace eliminates “double-spending” in blockchains, which is very valuable in the Bitcoin and Litecoin networks.
For example, using another application, you may be sent a fake transaction, and the funds will eventually disappear from the network and your wallet because this feature is almost absent in most applications.Using TkeySpace — you are 100% sure that your funds are safe and protected from fraudulent transactions in the form of “fake” transactions.
The bloom filter to check for nodesAll nodes are checked through the bloom filter. This allows you to exclude fraudulent nodes that try to connect to the network as real nodes of a particular blockchain.
In practice, this verification is not available in applications, Tkeycoin — decided to follow a new trend and change the stereotypes, so new features such as node verification using the bloom filter and double-spending verification are a kind of innovation in applications that work with cryptocurrencies.
Updating the Binance and Ethereum librariesUpdated Binance and Ethereum libraries for interaction with the TOR network.
Function — to hide the balanceThis function allows you to hide the entire balance from the main screen.
Advanced currency charts and charts without authenticationDetailed market statistics are available, including volumes, both for 1 day and several years. Select the period of interest: 1 day, 7 days, 1 month, 3 months, 6 months, 1 year, 2 years.
In version 1.3.0, you can access charts without authentication. You can monitor the cryptocurrency exchange rate without even logging in to the app. If you have a pin code for logging in, when you open the app, swipe to the left and you will see a list of currencies.
NewsIn the market data section — in the tkeyspace added a section with current news of the cryptocurrency market.
Blockchain Explorer for TkeycoinTransaction verification for Tkeycoin is now available directly in the app.
Independent Commission entry for BitcoinTaking into account the large volume of the Bitcoin network, we have implemented independent Commission entry — you can specify any Commission amount.
For other currencies, smart Commission calculation is enabled based on data from the network. The network independently regulates the most profitable Commission for the sender.
New digital currenciesThe TkeySpace wallet supports +59 cryptocurrencies and tokens.
CryptocurrenciesTkeycoin (TKEY), Bitcoin (BTC), Litecoin (LTC), Ethereum (ETH), Bitcoin Cash (BCH), DASH, Binance (BNB), EOS.
StablecoinsTrueUSD (TUSD), Tether USD (USDT), USD Coin (USDC), Gemini Dollar (GUSD), STASIS EURO (EURS), Digix Gold Token (DGX), Paxos Standard (PAX), PAX Gold (PAXG), Binance USD (BUSD), EOSDT, Prospectors Gold (PGL).
ERC-20, BEP2, and EOS tokensNewdex (NDX), DigixDAO ERC-20 (DGD), Chainlink ERC-20 (LINK), Decentraland ERC-20 (MANA), EnjinCoin ERC-20 (ENJ), the Native Utility (NUT), 0x Protocol ERC-20 (ZRX), Aelf ERC-20 (ELF), Dawn DAO ERC-20 (AURA), Cashaaa BEP2 (CAS), Bancor ERC-20 (BNT), the Basic Attention Token ERC-20 (BAT), Golem ERC-20 (GNT), Mithril ERC-20 (MITH), MEETONE, NEXO ERC-20, Holo ERC-20 (HOT), Huobi Token ERC-20 (HT), IDEX ERC-20, IDEX Membership ERC-20 (IDXM), Bitcoin BEP2 (BTCB), Waltonchain ERC-20 (WTC), KuCoin Shares ERC-20 (KCS), Kyber Network Crystal ERC-20 (KNC), Loom Network ERC-20 (LOOM), Ripple (XRP), Everipedia (IQ), Loopring ERC-20 (LRC), Maker ERC-20 (MKR), the Status of the ERC-20 (SNT), Ankr Network BEP2 (ANKR), OmiseGO ERC-20 (OMG), ^ american English ERC-20 (^american English), Polymath ERC-20 (POLY), Populous ERC-20 (PPT), Pundi X ERC-20 (NPXS), Parser ERC-20 (REP), Revain ERC-20 (R), Binance ERC20 (BNB-ERC20), Gifto BEP2 (GTO).
Exchange of cryptocurrencyThe “Limitless Crypto Exchange” tab is available for a quick transition to an unlimited exchange in 200 digital currencies — 10,000 currency pairs.
How do I update TkeySpace to version 1.3.0?
submitted by tkeycoin to Tkeycoin_Official [link] [comments]
Meet a major update in TKEYSPACE. We were debugging the engine, so to speak-modified the Tkeycoin Engine. This is a really powerful update — large scale code-level improvements and new features.
Someone may think that an application is just ten lines of code, but an expert who thinks this is wrong.
TkeySpace is a combination of many libraries, support for C++, Java), Kotlin), Swift), Objective-C, cryptography and blockchain, and a combination of best practices with new technologies. To ensure the operation of many supported blockchains, the team has done a great job to ensure that you already use the most secure multi-currency wallet TkeySpace.
For iOS development, we use the stack: C++, Swift, Objective-C. For Android development: C++, Java, Kotlin. Cryptography and blockchain parameters are applied on both platforms.When creating TkeySpace, we primarily looked at security, decentralization, and convenience. TkeySpace is a strong programming code inside and a light intuitive interface outside.
TkeySpace eliminates hacker attacks, hacks, and sanctions from third parties, ensuring the comfortable use of your assets.
Remember that using the so-called “blockchain wallets”, of which there are a lot on the market — you risk losing funds. There are only a few truly working applications on the blockchain, which distinguishes the technical uniqueness of TkeySpace from other wallets. How TkeySpace works, we told you in the review: TKEYSPACE is a blockchain on your mobile.
What updates are available in TkeySpace 1.2.1 on iOS
Localization in the AppStore in 8 languagesNow the TkeySpace page in the AppStore is available in 8 languages: Russian, German, English, Spanish, French, Korean, Turkish, and Chinese.
Update on the code levelA large-scale work was done at the code level-optimization, interaction with libraries, new functions, and fixed errors that occurred during the wallet operation.
SynchronizationFixed a local error displaying incorrect synchronization status, which affected the sending of transactions and interaction with blockchains.
The synchronization process has been completely fixed, and now the connection to the nodes is running correctly.
Node addresses are added to the local storage, and instant synchronization with nodes occurs when you log in again.
TransactionsDue to the correction of the synchronization process, errors that could occur when sending transactions have been fixed.
Added a synchronization check before sending transactions, now the wallet checks for synchronization with the network before performing any operation with digital currencies. If syncing isn’t set to 100% yet, then TkeySpace won’t let you send the transaction.
Enhanced validation of transactions and blocks in the networkEnhanced validation of the algorithm for consensus of Tkeycoin and other cryptocurrencies is enabled. This increases the security of the network, as well as speeds up the work of the TkeySpace blockchain node, the application consumes even fewer resources than before. High complexity is converted to 3 bytes, which ensures fast code processing and the least resource consumption on your device.
Checking “ Double spending”TkeySpace now eliminates “double spending” in blockchains, which is very valuable in the Bitcoin and Litecoin networks. Your funds are safe and protected from fraudulent transactions in the form of “fake” transactions.
The bloom filter to check for nodesAll nodes are checked through the bloom filter. This allows you to exclude fraudulent nodes that try to connect to the network as real nodes of a particular blockchain.
MiningFixed a zero-byte decoding error that could cause the “mining reward” to not display in TkeySpace. Now all miners can extract currencies Tkeycoin, DASH, Litecoin, Bitcoin Cash, Bitcoin, Ethereum directly to Addresses from the TkeySpace app, which is very convenient, and most importantly, safe and always at hand.
The increased privacy of transactionImplemented deterministic lexicographic sorting using hashes of previous transactions and output indexes for sorting transaction input data, as well as values and scriptPubKeys for sorting transaction output data.
The new transaction model makes it harder to identify certain wallets and increases privacy by using smart contracts.
Improvements at the TkeySpace interface level:
Upgraded currency ratesNow you can get detailed market statistics, both for 1 day and for several years. Statistics are available for periods: 1 day, 7 days, 1 month, 3 months, 6 months, 1 year, 2 years. Statistics on volumes are available for both 1 hour and 24 hours.
NewsIn the market data section, there is a section with current news of the cryptocurrency market.
Function — to hide the balanceOn the main screen of the TkeySpace app, you can completely hide your balance. Tap on the Balance, it will be automatically hidden from the main screen. This feature allows you to further enhance your privacy.
To upgrade to the TkeySpace version-1.2.1 — we recommend completely reinstalling the TkeySpace app:Delete the app — Install the app — Launch the wallet — click Restore Wallet — enter Backup phrases separated by a space — wait for syncing — now your TkeySpace wallet is fully ready to work.
App store: https://apps.apple.com/app/tkeyspace-future-focused/id1500778512 The official website of the keyspace: https://wallet.tkeycoin.com/
Suggestions for improving the app, errors that occur in the wallet, please send to our support service — [[email protected]](mailto:[email protected]).
submitted by SwipeWallet to Swipe_io [link] [comments]
Last May 16, J.K. Rowling the popular author of the all-time bestseller series, Harry Potter, tweeted her followers asking to help her understand Bitcoin.
How can we explain Bitcoin to someone with zero knowledge of it easily?
Truth to be told, when I first encountered Bitcoin a few years ago, I wasn’t very much invested in the idea of it. I thought it was too technical, and it would be better to leave for the IT experts to enjoy its full features.In our first two blog articles, we talked about cryptocurrencies in general, and how to secure these using cryptocurrency wallets. These two blogs are really helpful, especially those who are not yet familiar with cryptocurrencies.
Bitcoin in General
(See Bitcoin history here.)
Tracing back our history, people before didn’t need any central authority to pay or trade for something. Instead, they use gold or existing valuable possession in exchange for the things that they wanted. This is the basic ideology of Bitcoin. To be able to do transactions fast and easy again anytime and anywhere without any central authority through the use of modern technology.
Without getting too technical, Bitcoin solves the current difficulty of making financial transactions. At present, monetary transactions involve a third party (bank) and it comes along, most of the time, with exorbitant service fees. To put it simply, the peer-to-peer transaction is possible with the use of Bitcoin as people don’t need any central authority to confirm and verify their own monetary transactions.
Bitcoin transactions run in a blockchain, a decentralized ledger run by a peer-to-peer (P2P) network that processes and stores cryptocurrency transactions. Blockchain solves the digital transaction problems or double-spending that people are very afraid to encounter. Transactions within the blockchain use a special algorithm system that is stored in a “block” and linking or “chaining” them together after, thus making these records nearly impossible to get altered or change.
This technology makes Bitcoin transactions secure as each blockchain network have the same set of records of the entire blockchain data. It will be almost close to impossible to manipulate the system, as it requires the hacker to alter all the millions of blocks connected in the network, or else the other networks will reject his or her attempt as it doesn’t match with the existing records in the chain.
Bitcoin transactions can be viewed by everyone, as it has transparent ledger or blockchain, through a bitcoin address without revealing any of your identity and who is the person behind these transactions.
What makes Bitcoin unique is the fact that it only has a finite supply of 21 million. Unlike fiat currencies that can be printed out by the government anytime, Bitcoin’s prearranged supply makes technically scarce.
Bitcoin was first launched in 2009 and had a block subsidy of 50 BTC. In November 2012, the first Bitcoin halving commenced and reduced the 50 BTC subsidy to 25 BTC. It further dropped on the second halving in 2016 by 12.5 BTC per block. Recently, last May 12 of this year, people witnessed the third halving where BTC is further reduced to 6.25 per block.
Bitcoin halving, a pre-programmed event where the number of Bitcoin rewards per block is literally halved or divided by two, usually happens every four years. There are many theories as to why it was programmatically designed in such way. Nevertheless, this unique scarcity makes it more valuable as the more it becomes rare, the demand for it goes higher so does its price.
Where can I Spend Bitcoin?
Though the price of Bitcoin in the market is very volatile due to its relatively new system, Bitcoin is as good as your local currency which can be converted anytime. There are also a growing number of merchants and business who are embracing Bitcoin payments.
How to get a Bitcoin? There are a lot of free cryptocurrency wallets available in the market today. These wallets will help you generate your first Bitcoin address, which you can use for transactions. Some of these have instant Bitcoin to local currency exchanges, and also offer debit card services linked to their wallet, making it easier to spend.
Cryptocurrency wallets like Swipe offer a multi-asset digital wallet solution that supports Bitcoin together with other cryptocurrencies. Upon verification, Swipe users can buy, sell, and spend cryptocurrencies, including Bitcoin, within the app. It also has a Swipe Visa Card linked to its platform and has existing partnerships with Apple, Samsung, and Google Play, making it conveniently accessible for users across the world.
Swipe users can also enjoy up to five percent cashback paid in BTC as Swipe acknowledges the big role that Bitcoin played in the cryptocurrency industry.
Bitcoins paved the way for easier financial management. Through this discovery, people realized that there is a possibility of managing their own funds without going through any authorities to validate their transactions. Lastly, since this is a digital currency with no physical existence, people can find new solutions to further strengthen its security and accessibility. In time, people will realize the need for financial security upgrades on fiat currencies through the example given by the growth and expansion of Bitcoin and other cryptocurrencies.
How about you? How will you explain Bitcoin to peers who don’t understand it?
This blog article is also posted at https://sw.pe/blogbitcoin
submitted by tkeycoin to Tkeycoin_Official [link] [comments]
Someone says that the blockchain in the phone is marketing. This is possible for most applications, but not for Tkeycoin. Today we will talk about how the blockchain works in the TkeySpace app.
Who else is not in the topic, TkeySpace is a financial application for decentralized and efficient management of various cryptocurrencies, based on a distributed architecture without using a client-server.
In simple words, it is a blockchain in the user’s mobile device that excludes hacking and hacker attacks, and all data is encrypted using modern cryptographic methods.
BlockchainLet’s start with the most important thing — the blockchain works on the principles of P2P networks, when there is no central server and each device is both a server and a client, such an organization allows you to maintain the network performance with any number and any combination of available nodes.
For example, there are 12 machines in the network, and anyone can contact anyone. As a client (resource consumer), each of these machines can send requests for the provision of some resources to other machines within this network and receive them. As a server, each machine must process requests from other machines in the network, send what was requested, and perform some auxiliary and administrative functions.
With traditional client-server systems, we can get a completely disabled social network, messenger, or another service, given that we rely on a centralized infrastructure — we have a very specific number of points of failure. If the main data center is damaged due to an earthquake or any other event, access to information will be slowed down or completely disabled.
With a P2P solution, the failure of one network member does not affect the network operation in any way. P2P networks can easily switch to offline mode when the channel is broken — in which it will exist completely independently and without any interaction.
Instead of storing information in a single central point, as traditional recording methods do, multiple copies of the same data are stored in different locations and on different devices on the network, such as computers or mobile devices.
This means that even if one storage point is damaged or lost, multiple copies remain secure in other locations. Similarly, if one part of the information is changed without the consent of the rightful owners, there are many other copies where the information is correct, which makes the false record invalid.
The information recorded in the blockchain can take any form, whether it is a transfer of money, ownership, transaction, someone’s identity, an agreement between two parties, or even how much electricity a light bulb used.
However, this requires confirmation from multiple devices, such as nodes in the network. Once an agreement, otherwise known as consensus, is reached between these devices to store something on the blockchain — it can’t be challenged, deleted, or changed.
The technology also allows you to perform a truly huge amount of computing in a relatively short time, which even on supercomputers would require, depending on the complexity of the task, many years or even centuries of work. This performance is achieved because a certain global task is divided into a large number of blocks, which are simultaneously performed by hundreds of thousands of devices participating in the project.
P2P messaging and syncing in TkeySpaceTkeySpace is a node of the TKEY network and other supported networks. when you launch the app, your mobile node connects to an extensive network of supported blockchains, syncs with full nodes to validate transactions and incoming information between nodes, so the nodes organize a graph of connections between them.
You can always check the node information in the TkeySpace app in the ⚙ Settings — Contact and peer info — App Status;
TkeySpace creates initiating connections to servers registered in the blockchain Protocol as the main ones, from these servers it gets the addresses of nodes to which it can join, in turn, the nodes to which the connection occurred share information about other nodes.
TkeySpace sends network messages to nodes from supported blockchains in the app to get up-to-date data from the network.
The Protocol uses data structures for communication between nodes, such as block propagation over the network, so before network messages are read, nodes check the “magic number”, check the first bytes, and determine the type of data structure. In the blockchain, the “magic number” is the network ID used to filter messages and block traffic from other p2p networks.
Magic numbers are used in computer science, both for files and protocols. They identify the type of file/data structure. A program that receives such a file/data structure can check the magic number and immediately find out the intended type of this file/data structure.The first message that your node sends is called a Version Message. In response, the node waits for a Verack message to establish a connection between other peers. The exchange of such messages is called a “handshake”.
After the “handshake” is set, TkeySpace will start connecting to other nodes in the network to determine the last block at the end of the required blockchain. At this point — nodes request information about blocks they know using GetBlock messages — in response, your node receives an inv (Inventory Message) from another node with the information that it has the information that was requested by the TkeySpace node.
In response to the received message, inv — TkeySpace sends a GetData message containing a list of blocks starting immediately after the last known hash.
Loading and storing blocksAfter exchanging messages, the block information is loaded and transactions are uploaded to your node. To avoid storing tons of information and optimize hard disk space and data processing speed, we use RDBMS — PostgreSQL in full nodes (local computer wallet).
In the TkeySpace mobile app, we use SQLite, and validation takes place by uploading block headers through the Merkle Tree, using the bloom filter — this allows you to optimize the storage of your mobile device as much as possible.
The block header includes its hash, the hash of the previous block, transaction hashes, and additional service information.
Block headers in the Tkeycoin network=84 bytes due to the extension of parameters to support nChains, which will soon be launched in “combat” mode. The titles of the Bitcoin block, Dash, Litecoin=80 bytes.
And so, let’s continue — application nodes receive information from the blockchain by uploading block headers, all data is synchronized using the Merkle Tree, or rather your node receives and validates information from the Merkle root.
The hash tree was developed in 1979 by Ralph Merkle and named in his honor. The structure of the system has received this name also because it resembles a tree.The Merkle tree is a complete binary tree with leaf vertexes containing hashes from data blocks, and inner vertexes containing hashes from adding values in child vertexes. The root node of the tree contains a hash from the entire data set, meaning the hash tree is a unidirectional hash function. The Merkle tree is used for the efficient storage of transactions in the cryptocurrency blockchain. It allows you to get a “fingerprint” of all transactions in the block, as well as effectively verify transactions.
Hash trees have an advantage over hash chains or hash functions. When using hash trees, it is much less expensive to prove that a certain block of data belongs to a set. Since different blocks are often independent data, such as transactions or parts of files, we are interested in being able to check only one block without recalculating the hashes for the other nodes in the tree.
The Merkle Tree scheme allows you to check whether the hash value of a particular transaction is included in Merkle Root, without having all the other transactions in the block. So by having the transaction, block header, and Merkle Branch for that transaction requested from the full node, the digital wallet can make sure that the transaction was confirmed in a specific block.
The Merkle tree, which is used to prove that a transaction is included in a block, is also very well scaled. Because each new “layer” added to the tree doubles the total number of “leaves” it can represent. You don’t need a deep tree to compactly prove transaction inclusion, even among blocks with millions of transactions.
Statistical constants and nChainsTo support the Tkeycoin cryptocurrency, the TkeySpace application uses additional statistical constants to prevent serialization of Merkle tree hashes, which provides an additional layer of security.
Also, for Tkeycoin, support for multi-chains (nChains) is already included in the TkeySpace app, which will allow you to use the app in the future with most of the features of the TKEY Protocol, including instant transactions.
The Bloom FilterAn additional level of privacy is provided by the bloom filter — which is a probabilistic data structure that allows you to check whether an element belongs to a set.
The bloom filter looks for whether a particular transaction is linked to Alice, not whether Alice has a specific cryptocurrency. In this way, transactions and received IDs are analyzed through a bloom filter. When “Alice wants to know about transaction X”, an ID is requested for transaction X, which is compared with the filled segments in her bloom filter. If “Yes” is received, the node can get the information and verify the transaction.
HD supportThe multi-currency wallet TkeySpace is based on HD (or hierarchical determinism), a privacy-oriented method for generating and managing addresses. Each wallet address is generated from an xPub wallet (or extended public key). The app is completely anonymous — and individual address is generated for each transaction to accept a particular cryptocurrency. Even for low-level programming, using the same address is negative for the system, not to mention your privacy. We recommend that you always use a new address for transactions to ensure the necessary level of privacy and security.
The EXT_PUBLIC_KEY and EXT_SECRET_KEY values for DASH, Bitcoin, and Litecoin are completely identical. Tkeycoin uses its values, as well as other methods for storing transactions and blocks (RDBMS), and of course — nChains.
Secret keyWallets in the blockchain have public and private keys.
Centralized applications usually store users’ private keys on their servers, which makes users’ funds vulnerable to hacker attacks or theft.
A private key is a special combination of characters that provides access to cryptocurrencies stored on the account. Only a person who knows the key can move and spend digital assets.TkeySpace — stores the encrypted key only on the user’s device and in encrypted form. The encrypted key is displayed as a mnemonic phrase (backup phrase), which is very convenient for users. Unlike complex cryptographic ciphers, the phrase is easy to save or write. A backup keyword provides the maximum level of security.
A mnemonic phrase is 12 or 24 words that are generated using random number entropy. If a phrase consists of 12 words, then the number of possible combinations is 204⁸¹² or 21¹³² — the phrase will have 132 security bits. To restore the wallet, you must enter the mnemonic phrase in strict order, as it was presented after generation.
ResultNow we understand that your application TkeySpace is a node of the blockchain that communicates with other nodes using p2p messages, stores block headers and validate information using the Merkle Tree, verifies transactions, filters information using the bloom filter, and operates completely in a decentralized model. The application code contains all the necessary blockchain settings for communicating with the network, the so-called chain parameters.
TkeySpace is a new generation mobile app. A completely new level of security, easy user-friendly interfaces and all the necessary features that are required to work with cryptocurrency.
The numbers I've seen quoted for a double spend attach on Bitcoin Cash (assuming guaranteed block space) are that it would cost about 50K to double spend on a 0-conf transaction. So really, you can confidently accept 0-conf for <1K reasonably. More that that you can accept 1-conf or more which can take a minute or two. An unidentified hacker has mounted several "double spend" attacks on the infrastructure of the Bitcoin Gold cryptocurrency and has managed to amass over $18 million worth of BTG (Bitcoin Gold ... Initially, Coinbase identified nine reorganizations containing double spends, amounted to 88,500 ETC (about $460,000), but the latest update on its blog post suggests that at least 12 additional reorganizations included double spends, totaling 219,500 ETC (nearly $1.1Million). Bitcoin Gold (BTG) is subject to a blockchain double spending attack worth around $72,000 as a result of a 51 percent mining attack to take control of the Bitcoin Gold blockchain. The attacks came on Thursday and Friday, dated 23rd and 24th of January, where the first attack costed the blockchain around 1900 BTG, and the second attack wave ... For those who revel in this factor and act speedy sufficient can probably “double-spend” over the transaction if the hacker used a low sufficient rate. For everybody else, let this be a reminder to stay your device up to the moment and to depend on chilly garage strategies on every occasion imaginable.
[index]          
سلام عليكم و رحمة الله في هذا الفيديو سنتعرف على الفرق بين مرحلتي ico و ieo في العملات الرقمية، كما سأشارك معكم ... La chaîne officielle du site backtothegeek.com, de l'actus, des tests et des dossiers sur un univers bien geek !