Written by SatoshisAngelssubmitted by CoinExcom to btc [link] [comments]
Published by read.cash
On August 5th 2020, Satoshi’s Angels hosted an AMA for CoinEx on “How BCH and Avalanche Are Bringing Financial Freedom to 6 Billion People” on a Chinese platform Bihu. During the 100-minute event, Haipo Yang of ViaBTC and CoinEx, and Emin Gun Sirer of AVA Labs shared their in-depth views on such topics as different consensus mechanisms, community governance, IPFS, Defi. And Haipo explained why he wants to fork BCH. This is the full text.
You can check out the full AMA here (mostly in Chinese with some English translation).
Cindy Wang (Satoshi’s Angels): There are news saying that you are to fork BCH. Is it a marketing makeover? Are you serious about it?
Haipo Yang: It’s definitely not a marketing makeover. But the details are not decided yet.
Over the past three years, the BCH community has gone through multiple discussions from reducing block time, changing mining algorithms, adding smart contracts, etc. But none of these disputes have been well settled.
BCH is a big failure in terms of governance. A lack of good governance has made it fall in disorder. It is too decentralized to make progress.
You may know that the first BCH block was mined by ViaBTC. And we gave a lot of support to it indeed. But we didn’t dominate the fork. The Chinese community in particular thought I had a lot of influence, but it was not true.
I think the whole community is very dissatisfied with Bitcoin ABC, but it is difficult to replace them or change the status quo. So I am thinking of creating a new branch of BCH. The idea is still in early stage. I welcome anyone interested to participate and discuss it with me.
Wang: Professor Emin, what’s your attitude to fork? Do you think it’s a good timing to fork BCH?
Emin Gun Sirer: I am a big fan of BCH. It adheres to the original vision of Satoshi Nakamoto. I like the technical roadmap of BCH. But just like what Haipo mentioned, BCH lacks a good governance mechanism. There are always something that can cause BCH community to divide itself.
But I think it’s not enough to just have a good governance mechanism. There are many good proposals in the community but failed to be adopted in the end. I think BCH needs social leadership to encourage discussion when there are new proposals.
Wang: We are all curious to know How Avalanche got its name?
I know that Avalanche doesn’t mean well in Chinese. But in English, it’s a very powerful word. Avalanche represents a series of algorithms piling together like a mountain. When decisions slowly form, the ball (nodes in the network) on top of the mountain starts going down the hill on one side, and it gets bigger and bigger, and like an avalanche and it becomes unstoppable, making the transaction final.
Wang: Prof. Emin, I know that you are a big blocker. Have you ever considered implementing Avalanche based on BCH? Why create another chain?
Sirer: Of course I considered that. Satoshi Nakamoto consensus is wonderful, but the proof-of-work mechanism and Nakamoto consensus base protocols have some shortcomings, such as network latency, and it is hard to scale. Avalanche, instead, is totally different, and is the new biggest breakthrough in the past 45 years. It is flexible, fast, and scalable. I’d love to implement BCH on top of avalanche in the future, to make BCH even better by making 0-conf transactions much more secure.
Wang: As an old miner, why did CoinEx Chain choose to “abandon” POW, and turn to POS mechanism?
Haipo: Both POW and POS consensus algorithms have their own advantages. POW is not just a consensus algorithm, but also a more transparent and open distribution method of digital currency. Anyone can participate in it through mining.
POW is fairer. For a POS-based network, participants must have coins. For example, you need to invest ICO projects to obtain coins. But developers can get a lot of coins almost for free. In addition, POW is more open. Anyone can participate without holding tokens. For example, as long as you have a computer and mining rigs, you can participate in mining. Openness and fairness are two great features of POW. POS is more advanced, safe and efficient.
POS is jointly maintained by the token holders, and there is no problem of 51% attacks. Those who hold tokens are more inclined to protect the network than to destroy the network for their own interests. To disrupt the network, you need to buy at least two-thirds of the token, which is very difficult to achieve. And when you actually hold so many coins, it’s barely possible for you to destroy the network.
POW has the problem of 51% attack. For example, ETC just suffered the 51% attack on August 3. And the cost to do that is very low. It can be reorganized with only tens of thousands of dollars. This is also a defect of POW.
In addition, in terms of TPS and block speed, POS can achieve second-level speed and higher TPS. Therefore, CoinEx Chain chose POS because it can bring a faster transaction experience. This is very important for decentralized exchanges. Both POW and POS have their own advantages. It’s a matter of personal choice. When choosing a consensus mechanism, the choice must be made according to the characteristics of the specific project.
Wang: Ethereum is switching to ETH 2.0. If they succeed, do you think it will lead the next bull market?
Sirer: If Ethereum 2.0 can be realized, it must be a huge success.
But I doubt it can be launched anytime soon considering that it has been constantly delayed. And even if it comes out, I am not so sure if it will address the core scaling problem. And the main technology in Ethereum 2.0 is sharding. Sharding technology divides the Ethereum networks into small parallel groups, but I think what will happen is everyone wants to be in the same “shard” so the sharding advantages might not be realizable in Ethereum 2.0.
Avalanche supports Ethereum’s virtual machine, and Avalanche can realize 1 second level confirmation, while with sharding finalizing confirmation takes 5–6 seconds at best. Avalanche approach to make Ethereum scale is superior to Ethereum 2.0. There are many big players behind Ethereum 2.0, and I wish them success. But I believe that Avalanche will be the fastest and best Smart Contract platform in the crypto space, and it is compatible with Ethereum.
Wang: Why is Avalanche a real breakthrough？
Sirer: Avalanche is fundamentally different from previous consensus mechanisms. It’s very fast with TPS surpasses 6500, which is three times that of VISA. Six confirmations can be achieved in one second. Compared with the POW mechanism of Bitcoin and Bitcoin Cash, Avalanche’s participation threshold is very low. It allows multiple virtual machines to be built on the Avalanche protocol.
Avalanche is not created to compete with Bitcoin or fiat currencies such as the US dollar and RMB. It’s not made to compete with Ethereum, which is defined as the “world’s computer”. Avalanche is positioned to be an asset issuance platform to tokenize assets in the real world.
Wang: How do you rank the importance of community, development, governance, and technology to a public chain?
Sirer: These four are like the legs of a table. Every foot is very important. The table cannot stand without strong support.
A good community needs to be open to welcome developers and people. Good governance is especially important, to figure out what users need and respect their voices. Development needs to be decentralized. Avalanche has developers all over the world. And it has big companies building on top of Avalanche.
Yang: From a long-term perspective, I think governance is the most important thing, which is the same as running a company.
In the long run, technology is not important. Blockchain technology is developed based on an open source softwares that are free to the community. Community is also not the most important factor.
I think the most important thing is governance. Decentralization is more about technical. For example, Bitcoin, through a decentralized network method, ensures the openness and transparency of data assets, and the data on the chain cannot be tampered with, ensuring that the total amount of coins has a fixed upper limit.
But at the governance level, all coins are centralized at some degree. For example, BCH developers can decide to modify the protocol. In a sense, it is the same as managing a company.
Historically, the reasons for the success and failure of companies all stem from bad governance. For example, Apple succeeded based on Steve Jobs’s charisma, leadership and the pursuit of user experience. When Jobs was kicked out, Apple suffered great losses. After Jobs returned, he made Apple great again.
Issues behind Bitmain is also about governance. Simply put, governance requires leaders who have a longer-term vision and are more capable of coordinating and balancing the resources and interests of all parties to lead the community.
In the blockchain world, many people focus on technology. In fact, technology is not enough to make great products. User experience is most important. Users don’t care about the blockchain technology itself, but more concerned about whether it is easy to use and whether it can solve my problem.
We need to figure out how to deliver a product like Apple. The pursuit of user experience is also governance in nature. And governance itself lies in the soul of key leaders in the community.
Realize tokenization of assets in.
Wang: Speaking of asset tokenization, I would like to ask Haipo, do you think the market for assets on the chain is big?
Yang: It must be very big. We need to see which assets can be tokenized.
Assets that can be tokenized are standardized assets, sush as currencies and securities.
There may be only tens of thousands of stocks currently traded globally. There are also tens of thousands of tokens in the crypto space. I believe that millions or more of assets will be traded and circulated in the future. This can only be realized through decentralized technology and organization.
The market for assets tokenization will be huge. And at present, the entire blockchain technology is still very primitive. Bitcoin and Ethereum only have a few or a dozen TPS, which is far from meeting market demand. This is why CoinEx is committed to building a decentralized Dex public chain.
Wang: Avalanche’s paper was first published on IPFS. What do you think of IPFS?
Sirer: I personally like IPFS very much. It is a decentralized storage solution.
Yang: There is no doubt that IPFS solves the problem of decentralized storage, and can be robust in the blockchain world, and can replace HPPT services. But there are still three problems:
Wang: What do you think of Defi?
Yang: I want to talk about the concept first.
Broadly speaking, the entire blockchain industry is DeFi in nature. Blockchain is to realize the circulation of currency, equity, and asset value through decentralization.
So in a broad sense, blockchain itself is DeFi. In a narrow sense, DeFi is a financial agreement based on smart contracts. DeFi, through smart contracts, can build applications more flexibly. For example, before we could only use Bitcoin to transfer and pay. Now with smart contracts, flexible functions such as lending, exchange, mortgage , etc. are available. The entire blockchain industry is gradually evolving under the conditions of DeFi. DeFi will definitely get greater development in the future.
Sirer: I think Defi will definitely have a huge impact. DeFi is not only an innovation in the cryptocurrency field, but also an innovation in the financial field. Wall Street companies have stagnated for years with no innovation. Avalanche fits different DeFi needs, including performance and compliance. In the future, not only will Wall Street simply adopt DeFi, but DeFi will grow into a huge market that will eventually replace the traditional financial system.
Questions from the community:
1. How does Avalanche integrate with DeFi?
Sirer: At present, all DeFi applications on Avalanche have surpassed Ethereum. What can be achieved on Ethereum can be achieved on Avalanche with better user experience. We are currently connecting with popular DeFi projects such as Compound and MakerDao to add part of or all of their functions.
At present, Avalanche is working on decentralized exchange (DEX). The current DEXs are limited by speed and performance but when they are built on top of Avalanche it will be real-time and very fast.
2. How many developers does BCH have?
Yang: I think it does not matter how many developers there are. What matters is what should be developed. I watched Jobs’ video the other day, and it inspired me a lot. We are not piecing together technology to see what technology can do. It’s we figure out what we want first and then we use the technology we need.
The entire blockchain community worship developers. Such as they call Vitalik “V God”. It’s not necessary to treat developers as wizards. Developers are programmers, and I myself is also a programmer.
ViaBTC has a development team of over 100 people, including core members from Copernicus (a dev team formerly belonged to Bitmain). Technically we are very confident to build faster, stabler, and better user experience products.
What are the troubles concerned in investing in cryptocurrencies
TokenizationThe idea is aimed at breaking complete units of stocks,infrastructure and so on into smaller pix,
Author: cytpoway121 https://bitcointalk.org/index.php?action=profile;u=2202709
submitted by QuarkChain to quarkchainio [link] [comments]
The picture from COINDESK related reports
On Aug. 2, Ethereum Classic Labs (ETC Labs) made an important announcement on ETC blockchain. ETC Labs said due to network attack, Ethereum Classic suffered a reorganization on August 1st. This has been the second attack on the Ethereum Classic Network this year.
Did renting-power cause the problem again?
In this ETC incident, one of the miners mined a large number of blocks offline. When the miner went online, due to its high computing power, and some versions of mining software did not support large-scale blockchain mergers, the consensus failed. Therefore, the entire network was out of sync, which produced an effect similar to a 51% attack. Finally, it caused the reorganization of 3693 blocks, starting at 10904147. The deposit and withdrawal between the exchanges and mining pools had to be suspended for troubleshooting during this period.
Media report shows that the blockchain reorganization may be caused by a miner (or a mining pool) disconnected during mining. Although it has been restored to normal after 15 hours of repair, it does reflect the vulnerability of the Proof of Work (PoW) network: once the computing power of the network is insufficient, the performance of one single mining pool can affect the entire network, which is neither distributed nor secure for the blockchain. Neither does it have efficiency.
At present, most consensus algorithms of blockchains are using PoW, which has been adopted over 10 years. In PoW, each miner solves a hashing problem. The probability to solve the problem successfully is proportional to the ratio of the miner’s hash power to the total hash power of mainnet.
Although PoW has been running for a long time, the attack model against PoW is very straightforward to understand, and has attracted people’s attention for a long time: such an attack, also known as double-spending attack, may happen when an attacker possesses 51% of the overall network hash power. The attacker can roll back any blocks in the blockchain by creating a longer and more difficult chain and as a result, modify the transaction information.
Since hash power can be rented to launch attacks, some top 30 projects have suffered from such attacks. In addition to this interference, the main attack method is through the computing power market such as Nice Hash. Hackers can rent hashpower to facilitate their attacks, which allows the computing power to rise rapidly in a short time and rewrite information. In January of this year, the Ethereum Classic was attacked once, and it was also the case that hackers can migrate computing power from the fiercely competitive Bitcoin and Ethereum, and use it to attack smaller projects, such as ETH Classic.
The picture shows the cost of attacking ETH Classic. It can be seen that it costs only $6,634 to attack ETH Classic for one hour.
The security of one network is no longer limited by whether miners within the main net take more than 51% of the total hash power, rather it is determined by whether the benevolent (non-hackers) miners take more than 51% of the total hash power from the pool of projects that use similar consensus algorithm. For example, the hash power of Ethereum is 176 TH/s and that of Ethereum Classic is 9 TH/s. In this way, if one diverts some hash power from Ethereum (176 TH/s) to Ethereum Classic, then one can easily launch a double-spending attack to Ethereum Classic. The hash power ratio for this attack between the two projects is 9/176 = 5.2%, which is a tiny number.
As one of the top 30 blockchain projects, Ethereum Classic has been attacked several times. Therefore, those small and medium-sized projects with low hash power and up-and-coming future projects are facing great potential risks. This is the reason that many emerging public chain projects abandon PoW and adopt PoS.
Proof of Stake (PoS) can prevent 51% attack but has problems of its own
In addition to PoW consensus, another well-adopted consensus algorithm is Proof of Stake (PoS). The fundamental concept is that the one who holds more tokens has the right to create the blocks. This is similar to shareholders in the stock market. The token holders also have the opportunities to get rewards. The advantages of PoS are: (i) the algorithm avoids wasting energy like that in PoW calculation; and (ii) its design determines that the PoS will not be subjected to 51% hash power attack since the algorithm requires the miner to possess tokens in order to modify the ledger. In this way, 51% attack becomes costly and meaningless.
In terms of disadvantages, nodes face the problem of accessibility. PoS requires a permission to enter the network and nodes cannot enter and exit freely and thus lacks openness. It can easily be forked. In the long run, the algorithm is short of decentralization, and leads to the Matthew effect of accumulated advantages whereby miners with more tokens will receive more rewards and perpetuate the cycle.
More importantly, the current PoS consensus has not been verified for long-term reliability. Whether it can be as stable as the PoW system is yet to be verified. For some of the PoW public chains that are already launched, if they want to switch consensus, they need to do hard fork, which divides communities and carries out a long consensus upgrade and through which Ethereum is undergoing. Is there a safer and better solution?
QuarkChain Provide THE Solution: High TPS Protection + PoSW Consensus
For new-born projects, and some small or medium-sized projects, they all are facing the problem of power attack. For PoW-based chains, there are always some chains with lower hash power than others (ETC vs. ETH, BCH vs BTC), and thus the risk of attack is increased. In addition, the interoperability among the chains, such as cross-chain operation, is also a problem. In response, QuarkChain has designed a series of mechanisms to solve this problem. This can be summed up as a two-layer structure with a calculation power allocation and Proof of Staked Work (PoSW) consensus.
First of all, there is a layer of sharding, which can be considered as some parallel chains. Each sharding chain handles the transactions relatively independently. Such design forms the basis to ensure the performance of the entire system. To avoid security issues caused by the dilution of the hash power, we also have a root chain. The blocks of the root chain do not contain transactions, but are responsible for verifying the transactions of each shard. Relying on the hash power distribution algorithm, the hash power of the root chain will always account for 51% of the net. Each shard, on the other hand, packages their transactions according to their own consensus and transaction models.
Moreover, QuarkChain relies on flexibility that allows each shard to have different consensus and transaction models. Someone who wants to launch a double-spending attack on a shard that is already contained in the root chain must attack the block on the root chain, which requires calling the 51% hash power of the root chain. That is, if there are vertical field projects that open new shards on QuarkChain, even with insufficient hash power, an attacker must first attack the root chain if he or she wants to attack a new shard. The root chain has maintained more than 51% of the network’s hash power, which makes the attack very difficult.
As illustrated in the diagram, if the attacker wants to attack the QuarkChain network, one would need to attack the shard and the root chain simultaneously.
PoW has achieved a high level of decentralization and has been verified for its stability for a long time. Combining PoW with the staking capability for PoS would make use of the advantages of both consensus mechanisms. That is what QuarkChain’s PoSW achieves exactly.
PoSW, which is Proof of Staked Work, is exclusively developed by QuarkChain and runs on shards. PoSW allows miners to enjoy the benefits of lower mining difficulty by staking original tokens (currently it’s 20 times lower). Conversely, if someone malicious with a high hash power and does not stake tokens on QuarkChain, he will be punishable by receiving 20 times the difficulty of the hash power, which increases the cost of attack. If the attacker stakes tokens in order to reduce the cost of attack, he/she needs to stake the corresponding amount of tokens, which may cost even more. Thus, the whole network is more secure.
Taking Ethereum Classics (ETC) as an example, if ETC uses the PoSW consensus, if there was another double-spending attack similar to the one in January, the attacker will need at least 110Th/s hash power or 650320 ETC (worth $3.2 million, and 8 TH/s hash power) to create this attack, which is far greater than the cost of the current attack on the network (8Th/s hash power) and revenue (219500 ETC).
Relying on multiple sets of security mechanisms, QuarkChain ensures its own security, while providing security for new shards and small and medium-sized projects. Its high level of flexibility also allows the projects to support different types of ledger models, transaction models, virtual machines, and token economics. Such great degrees of security and flexibility will facilitate the blockchain ecosystem to accelerate growth of innovative blockchain applications.
Learn more about QuarkChain
Mining is one of the key concepts in the crypto world. Everyone who comes into contact with this sphere somehow wonders about the mining of coins. How profitable is mining in 2020, and what are the current trends?submitted by Stealthex_io to StealthEX [link] [comments]
Crypto mining is a process during which a computer solves mathematical problems, resulting in the release of new blocks of information. This gives its owners a certain amount of coins, which is deposited in the total pot and registered in the public “ledger”, so-called blockchain. Machines in the network are also checking transactions with existing coins, adding this information to the blockchain as well.
As for the issue itself, the most well-known algorithm of mining is Proof-of-Work (PoW), used in the networks of Bitcoin, Litecoin, Ethereum and many others.
During the mining process, the latest transactions are verified and compiled into blocks. It is usually a series of calculations with an iteration of parameters to find a hash with the specified properties. The node which first solves this problem receives a reward. This approach was specifically designed to encourage those who provide the computing power of their mining machines to maintain the network and mine new coins.
It is usually no need for a newcomer to know and understand all the complicated details of the mining process, just how much they can earn with certain equipment and electricity costs.
Everything is designed in such a way that the complexity of calculations is steadily increasing, which then requires a constant increase in the computing power of the network. In 2009-2010, for mining bitcoin, miners only had to download and run the software on their personal computers, but very soon the network became so complicated that even with best PCs with a powerful processor, mining became unprofitable. That’s why miners started to use more effective video cards (graphics processing units or GPUs) and join them in so-called “farms”.
In most systems, the number of coins is determined in advance. Also, many networks are gradually reducing rewards for miners. Such emission restrictions were built into the algorithm to prevent inflation.
Thus, the cost of mining for smaller participants no longer pays off, which makes them turn off their hardware or switch to another coin where they can still make their profit.
In particular, on the evening of May 11, 2020, a halving took place in the bitcoin network, the reward for mining was halved, from 12.5 to 6.25 BTC. In June, the revenue of bitcoin miners decreased by 23%, to the lowest since March 2019.
However, in mid-June, the difficulty of bitcoin mining showed a record growth over the past 2.5 years. Mining the first cryptocurrency has become 15% more difficult. Although, by the beginning of July, the complexity had stabilized. The growing difficulty of mining the first cryptocurrency indicates that new miners have joined its network. Previously, some of them turned off the equipment, as it became less profitable to mine the coin due to a decrease in its cost and halving.
Now the absolute majority of new coins are generated by industrial mining. This is done by large data centers equipped with specialized computers based on the ASIC architecture. ASICs are integrated circuits that were initially optimized for a specific task, namely the mining of cryptocurrencies. They are much more productive than CPUs and video cards, and at the same time consume much less electricity. ASIC computers are the main type of equipment for the industrial production of crypto.
So now, after the halving, BTC coin mining has become even less profitable. For beginners, mining the first cryptocurrency is unlikely to be suitable. It is more often earned by large companies that have all the necessary equipment, access to cheap rental conditions, electricity and maintenance.
Hence newbies are better off starting with mining altcoins. It is even more profitable to work in a pool, that is, together with other miners. This can help to place farms in one place and negotiate a favourable price for electricity, so you can get a small but stable income dux to the total capacity of the pool.
Therefore, it has become much more difficult for regular users who have only non-specialized equipment at their disposal to generate virtual money. However, GPU developers have significantly increased the performance of their devices in recent years, so mining on a video card is still common.
Another important event that changes the situation in the mining sphere will be the hardfork of the Ethereum network with the turn to the Proof-of-Stake algorithm. For now, Ethereum is the most popular altcoin for GPU mining, but Ethereum 2.0 will not require using such powerful equipment, so then it switches to PoS, GPU owners will have to look for alternative coins to mine.
At the moment the most popular altcoins for mining on GPUs are Ethereum (ETH), Ethereum Classic (ETC), Grin (GRIN), Zcoin (XZC), Dogecoin and Ravencoin (RVN). There are actually a lot of mining programs that automatically determine which coin is more profitable to mine at the moment.
In the coming years, the market is waiting for a race of technologies. Manufacturers are investing in finding ways to increase hashing speed and reduce power consumption. Mining pools will play an increasing role. The market will also be affected by applications for mining cryptocurrencies on smartphones that require low computing power, such as Dash or Litecoin.
And remember StealthEX supports more than 250 coins and constantly updating the list, so you can easily swap your crypto haul to more popular altcoins. Our service does not require registration and allows you to remain anonymous. Why don’t you check it out? Just go to StealthEX and follow these easy steps:
✔ Choose the pair and the amount for your exchange. For example ETH to BTC.
✔ Press the “Start exchange” button.
✔ Provide the recipient address to which the coins will be transferred.
✔ Move your cryptocurrency for the exchange.
✔ Receive your coins.
Follow us on Medium, Twitter, and Reddit to get StealthEX.io updates and the latest news about the crypto world. For all requests message us via [email protected].
The views and opinions expressed here are solely those of the author. Every investment and trading move involves risk. You should conduct your own research when making a decision.
Original article was posted on https://stealthex.io/blog/2020/07/28/mining-today/
Author: Gamals Ahmed, CoinEx Business Ambassadorsubmitted by CoinEx_Institution to u/CoinEx_Institution [link] [comments]
The DFINITY blockchain computer provides a secure, performant and flexible consensus mechanism. At its core, DFINITY contains a decentralized randomness beacon, which acts as a verifiable random function (VRF) that produces a stream of outputs over time. The novel technique behind the beacon relies on the existence of a unique-deterministic, non-interactive, DKG-friendly threshold signatures scheme. The only known examples of such a scheme are pairing-based and derived from BLS.
The DFINITY blockchain is layered on top of the DFINITY beacon and uses the beacon as its source of randomness for leader selection and leader ranking. A “weight” is attributed to a chain based on the ranks of the leaders who propose the blocks in the chain, and that weight is used to select between competing chains. The DFINITY blockchain is layered on top of the DFINITY beacon and uses the beacon as its source of randomness for leader selection and leader ranking blockchain is further hardened by a notarization process which dramatically improves the time to finality and eliminates the nothing-at-stake and selfish mining attacks.
DFINITY consensus algorithm is made to scale through continuous quorum selections driven by the random beacon. In practice, DFINITY achieves block times of a few seconds and transaction finality after only two confirmations. The system gracefully handles temporary losses of network synchrony including network splits, while it is provably secure under synchrony.
1.INTRODUCTIONDFINITY is building a new kind of public decentralized cloud computing resource. The company’s platform uses blockchain technology which is aimed at building a new kind of public decentralized cloud computing resource with unlimited capacity, performance and algorithmic governance shared by the world, with the capability to power autonomous self-updating software systems, enabling organizations to design and deploy custom-tailored cloud computing projects, thereby reducing enterprise IT system costs by 90%.
DFINITY aims to explore new territory and prove that the blockchain opportunity is far broader and deeper than anyone has hitherto realized, unlocking the opportunity with powerful new crypto.
Although a standalone project, DFINITY is not maximalist minded and is a great supporter of Ethereum.
The DFINITY blockchain computer provides a secure, performant and flexible consensus mechanism. At its core, DFINITY contains a decentralized randomness beacon, which acts as a verifiable random function (VRF) that produces a stream of outputs over time. The novel technique behind the beacon relies on the existence of a unique-deterministic, non-interactive, DKG-friendly threshold signatures scheme. The only known examples of such a scheme are pairing-based and derived from BLS.
DFINITY’s consensus mechanism has four layers: notary (provides fast finality guarantees to clients and external observers), blockchain (builds a blockchain from validated transactions via the Probabilistic Slot Protocol driven by the random beacon), random beacon (provides the source of randomness for all higher layers like smart contract applications), and identity (provides a registry of all clients).
DFINITY’s consensus mechanism has four layers
Figure1: DFINITY’s consensus mechanism layers
1. Identity layer:
Active participants in the DFINITY Network are called clients. Where clients are registered with permanent identities under a pseudonym. Moreover, DFINITY supports open membership by providing a protocol for registering new clients by depositing a stake with an insurance period. This is the responsibility of the first layer.
2. Random Beacon layer:
Provides the source of randomness (VRF) for all higher layers including ap- plications (smart contracts). The random beacon in the second layer is an unbiasable, verifiable random function (VRF) that is produced jointly by registered clients. Each random output of the VRF is unpredictable by anyone until just before it becomes avail- able to everyone. This is a key technology of the DFINITY system, which relies on a threshold signature scheme with the properties of uniqueness and non-interactivity.
3. Blockchain layer:
The third layer deploys the “probabilistic slot protocol” (PSP). This protocol ranks the clients for each height of the chain, in an order that is derived determin- istically from the unbiased output of the random beacon for that height. A weight is then assigned to block proposals based on the proposer’s rank such that blocks from clients at the top of the list receive a higher weight. Forks are resolved by giving favor to the “heaviest” chain in terms of accumulated block weight — quite sim- ilar to how traditional proof-of-work consensus is based on the highest accumulated amount of work.
The first advantage of the PSP protocol is that the ranking is available instantaneously, which allows for a predictable, constant block time. The second advantage is that there is always a single highest-ranked client, which allows for a homogenous network bandwidth utilization. Instead, a race between clients would favor a usage in bursts.
4. Notarization layer:
Provides fast finality guarantees to clients and external observers. DFINITY deploys the novel technique of block notarization in its fourth layer to speed up finality. A notarization is a threshold signature under a block created jointly by registered clients. Only notarized blocks can be included in a chain. Of all RSA-based alternatives exist but suffer from an impracticality of setting up the thresh- old keys without a trusted dealer.
DFINITY achieves its high speed and short block times exactly because notarization is not full consensus.
DFINITY does not suffer from selfish mining attack or a problem nothing at stake because the authentication step is impossible for the opponent to build and maintain a series of linked and trusted blocks in secret.
DFINITY’s consensus is designed to operate on a network of millions of clients. To en- able scalability to this extent, the random beacon and notarization protocols are designed such as that they can be safely and efficiently delegated to a committee
1.1 OVERVIEW ABOUT DFINITYDFINITY is a blockchain-based cloud-computing project that aims to develop an open, public network, referred to as the “internet computer,” to host the next generation of software and data. and it is a decentralized and non-proprietary network to run the next generation of mega-applications. It dubbed this public network “Cloud 3.0”.
DFINITY is a third generation virtual blockchain network that sets out to function as an “intelligent decentralised cloud,”¹ strongly focused on delivering a viable corporate cloud solution. The DFINITY project is overseen, supported and promoted by DFINITY Stiftung a not-for-profit foundation based in Zug, Switzerland.
DFINITY is a decentralized network design whose protocols generate a reliable “virtual blockchain computer” running on top of a peer-to-peer network upon which software can be installed and can operate in the tamperproof mode of smart contracts.
DFINITY introduces algorithmic governance in the form of a “Blockchain Nervous System” that can protect users from attacks and help restart broken systems, dynamically optimize network security and efficiency, upgrade the protocol and mitigate misuse of the platform, for example by those wishing to run illegal or immoral systems.
DFINITY is an Ethereum-compatible smart contract platform that is implementing some revolutionary ideas to address blockchain performance, scaling, and governance. Whereas
DFINITY could pose a credible threat to Ethereum’s extinction, the project is pursuing a coevolutionary strategy by contributing funding and effort to Ethereum projects and freely offering their technology to Ethereum for adoption. DFINITY has labeled itself Ethereum’s “crazy sister” to express it’s close genetic resemblance to Ethereum, differentiated by its obsession with performance and neuron-inspired governance model.
Dfinity raised $61 million from Andreesen Horowitz and Polychain Capital in a February 2018 funding round. At the time, Dfinity said it wanted to create an “internet computer” to cut the costs of running cloud-based business applications. A further $102 million funding round in August 2018 brought the project’s total funding to $195 million.
In May 2018, Dfinity announced plans to distribute around $35 million worth of Dfinity tokens in an airdrop. It was part of the company’s plan to create a “Cloud 3.0.” Because of regulatory concerns, none of the tokens went to US residents.
DFINITY be broadening and strengthening the EVM ecosystem by giving applications a choice of platforms with different characteristics. However, if DFINITY succeeds in delivering a fully EVM-compatible smart contract platform with higher transaction throughput, faster confirmation times, and governance mechanisms that can resolve public disputes without causing community splits, then it will represent a clearly superior choice for deploying new applications and, as its network effects grow, an attractive place to bring existing ones. Of course the challenge for DFINITY will be to deliver on these promises while meeting the security demands of a public chain with significant value at risk.
1.1.1 DFINITY FUTURE
1.1.2 DFINITY’S VISIONDFINITY’s vision is its new internet infrastructure can support a wide variety of end-user and enterprise applications. Social media, messaging, search, storage, and peer-to-peer Internet interactions are all examples of functionalities that DFINITY plans to host atop its public Web 3.0 cloud-like computing resource. In order to provide the transaction and data capacity necessary to support this ambitious vision, DFINITY features a unique consensus model (dubbed Threshold Relay) and algorithmic governance via its Blockchain Nervous System (BNS) — sometimes also referred to as the Network Nervous System or NNS.
1.2 DFINITY COMMUNITYThe DFINITY community brings people and organizations together to learn and collaborate on products that help steward the next-generation of internet software and services. The Internet Computer allows developers to take on the monopolization of the internet, and return the internet back to its free and open roots. We’re committed to connecting those who believe the same through our events, content, and discussions.
1.3 DFINITY ROADMAP (TIMELINE) February 15, 2017February 15, 2017
Ethereum based community seed round raises 4M Swiss francs (CHF)
The DFINITY Stiftung, a not-for-profit foundation entity based in Zug, Switzerland, raised the round. The foundation held $10M of assets as of April 2017.
February 8, 2018
Dfinity announces a $61M fundraising round led by Polychain Capital and Andreessen Horowitz
The round $61M round led by Polychain Capital and Andreessen Horowitz, along with an DFINITY Ecosystem Venture Fund which will be used to support projects developing on the DFINITY platform, and an Ethereum based raise in 2017 brings the total funding for the project over $100 million. This is the first cryptocurrency token that Andressen Horowitz has invested in, led by Chris Dixon.
Dfinity raises a $102,000,000 venture round from Multicoin Capital, Village Global, Aspect Ventures, Andreessen Horowitz, Polychain Capital, Scalar Capital, Amino Capital and SV Angel.
January 23, 2020
Dfinity launches an open source platform aimed at the social networking giants
2.DFINITY TECHNOLOGYDfinity is building what it calls the internet computer, a decentralized technology spread across a network of independent data centers that allows software to run anywhere on the internet rather than in server farms that are increasingly controlled by large firms, such as Amazon Web Services or Google Cloud. This week Dfinity is releasing its software to third-party developers, who it hopes will start making the internet computer’s killer apps. It is planning a public release later this year.
At its core, the DFINITY consensus mechanism is a variation of the Proof of Stake (PoS) model, but offers an alternative to traditional Proof of Work (PoW) and delegated PoS (dPoS) networks. Threshold Relay intends to strike a balance between inefficiencies of decentralized PoW blockchains (generally characterized by slow block times) and the less robust game theory involved in vote delegation (as seen in dPoS blockchains). In DFINITY, a committee of “miners” is randomly selected to add a new block to the chain. An individual miner’s probability of being elected to the committee proposing and computing the next block (or blocks) is proportional to the number of dfinities the miner has staked on the network. Further, a “weight” is attributed to a DFINITY chain based on the ranks of the miners who propose blocks in the chain, and that weight is used to choose between competing chains (i.e. resolve chain forks).
A decentralized random beacon manages the random selection process of temporary block producers. This beacon is a Variable Random Function (VRF), which is a pseudo-random function that provides publicly verifiable proofs of its outputs’ correctness. A core component of the random beacon is the use of Boneh-Lynn-Shacham (BLS) signatures. By leveraging the BLS signature scheme, the DFINITY protocol ensures no actor in the network can determine the outcome of the next random assignment.
Dfinity is introducing a new standard, which it calls the internet computer protocol (ICP). These new rules let developers move software around the internet as well as data. All software needs computers to run on, but with ICP the computers could be anywhere. Instead of running on a dedicated server in Google Cloud, for example, the software would have no fixed physical address, moving between servers owned by independent data centers around the world. “Conceptually, it’s kind of running everywhere,” says Dfinity engineering manager Stanley Jones.
DFINITY also features a native programming language, called ActorScript (name may be subject to change), and a virtual machine for smart contract creation and execution. The new smart contract language is intended to simplify the management of application state for programmers via an orthogonal persistence environment (which means active programs are
not required to retrieve or save their state). All ActorScript contracts are eventually compiled down to WebAssembly instructions so the DFINITY virtual machine layer can execute the logic of applications running on the network. The advantage of using the WebAssembly standard is that all major browsers support it and a variety of programming languages can compile down to Wasm (not just ActorScript).
Dfinity is moving fast. Recently, Dfinity showed off a TikTok clone called CanCan. In January it demoed a LinkedIn-alike called LinkedUp. Neither app is being made public, but they make a convincing case that apps made for the internet computer can rival the real things.
2.1 DFINITY CORE APPLICATIONSThe DFINITY cloud has two core applications:
Whilst conceptually similar to Ethereum, DFINITY employs original and new cryptography methods and protocols (crypto:3) at the network level, in concert with AI and network-fuelled systemic governance (Blockchain Nervous System — BNS) to facilitate Corporate adoption.
DFINITY recognises that different users value different properties and sees itself as more of a fully compatible extension of the Ethereum ecosystem rather than a competitor of the Ethereum network.
In the future, DFINITY hopes that much of their “new crypto might be used within the Ethereum network and are also working hard on shared technology components.”
As the DFINITY project develops over time, the DFINITY Stiftung foundation intends to steadily increase the BNS’ decision-making responsibilities over time, eventually resulting in the dissolution of its own involvement entirely, once the BNS is sufficiently sophisticated.
DFINITY consensus mechanism is a heavily optimized proof of stake (PoS) model. It places a strong emphasis on transaction finality through implementing a Threshold Relay technique in conjunction with the BLS signature scheme and a notarization method to address many of the problems associated with PoS consensus.
2.2 THRESHOLD RELAYAs a public cloud computing resource, DFINITY targets business applications by substantially reducing cloud computing costs for IT systems. They aim to achieve this with a highly scalable and powerful network with potentially unlimited capacity. The DFINITY platform is chalk full of innovative designs and features like their Blockchain Nervous System (BNS) for algorithmic governance.
One of the primary components of the platform is its novel Threshold Relay Consensus model from which randomness is produced, driving the other systems that the network depends on to operate effectively. The consensus system was first designed for a permissioned participation model but can be paired with any method of Sybil resistance for an open participation model.
“The Threshold Relay is the mechanism by which Dfinity randomly samples replicas into groups, sets the groups (committees) up for threshold operation, chooses the current committee, and relays from one committee to the next is called the threshold relay.”
Threshold Relay consists of four layers (As mentioned previously):
2.2.1 HOW DOES THRESHOLD RELAY WORK?Threshold Relay produces an endogenous random beacon, and each new value defines random group(s) of clients that may independently try and form into a “threshold group”. The composition of each group is entirely random such that they can intersect and clients can be presented in multiple groups. In DFINITY, each group is comprised of 400 members. When a group is defined, the members attempt to set up a BLS threshold signature system using a distributed key generation protocol. If they are successful within some fixed number of blocks, they then register the public key (“identity”) created for their group on the global blockchain using a special transaction, such that it will become part of the set of active groups in a following “epoch”. The network begins at “genesis” with some number of predefined groups, one of which is nominated to create a signature on some default value. Such signatures are random values — if they were not then the group’s signatures on messages would be predictable and the threshold signature system insecure — and each random value produced thus is used to select a random successor group. This next group then signs the previous random value to produce a new random value and select another group, relaying between groups ad infinitum and producing a sequence of random values.
In a cryptographic threshold signature system a group can produce a signature on a message upon the cooperation of some minimum threshold of its members, which is set to 51% in the DFINITY network. To produce the threshold signature, group members sign the message
individually (here the preceding group’s threshold signature) creating individual “signature shares” that are then broadcast to other group members. The group threshold signature can be constructed upon combination of a sufficient threshold of signature shares. So for example, if the group size is 400, if the threshold is set at 201 any client that collects that many shares will be able to construct the group’s signature on the message. Other group members can validate each signature share, and any client using the group’s public key can validate the single group threshold signature produced by combining them. The magic of the BLS scheme is that it is “unique and deterministic” meaning that from whatever subset of group members the required number of signature shares are collected, the single threshold signature created is always the same and only a single correct value is possible.
Consequently, the sequence of random values produced is entirely deterministic and unmanipulable, and signatures generated by relaying between groups produces a Verifiable Random Function, or VRF. Although the sequence of random values is pre-determined given some set of participating groups, each new random value can only be produced upon the minimal agreement of a threshold of the current group. Conversely, in order for relaying to stall because a random number was not produced, the number of correct processes must be below the threshold. Thresholds are configured so that this is extremely unlikely. For example, if the group size is set to 400, and the threshold is 201, 200 or more of the processes must become faulty to prevent production. If there are 10,000 processes in the network, of which 3,000 are faulty, the probability this will occur is less than 10e-17.
2.3 DFINITY TOKENThe DFINITY blockchain also supports a native token, called dfinities (DFN), which perform multiple roles within the network, including:
Neuron operators can earn Dfinities by participating in network-wide votes, which could be concerning protocol upgrades, a new economic policy, etc. DFN rewards for participating in the governance system are proportional to the number of tokens staked inside a neuron.
2.4 SCALABILITYDFINITY is constantly developing with a structure that separates consensus, validation, and storage into separate layers. The storage layer is divided into multiple strings, each of which is responsible for processing transactions that occur in the fragment state. The verification layer is responsible for combining hashes of all fragments in a Merkle-like structure that results in a global state fractionation that is stored in blocks in the top-level chain.
2.5 DFINITY CONSENSUS ALGORITHMThe single most important aspect of the user experience is certainly the time required before a transaction becomes final. This is not solved by a short block time alone — Dfinity’s team also had to reduce the number of confirmations required to a small constant. DFINITY moreover had to provide a provably secure proof-of-stake algorithm that scales to millions of active participants without compromising any bit on decentralization.
Dfinity soon realized that the key to scalability lay in having an unmanipulable source of randomness available. Hence they built a scalable decentralized random beacon, based on what they call the Threshold Relay technique, right into the foundation of the protocol. This strong foundation drives a scalable and fast consensus layer: On top of the beacon runs a blockchain which utilizes notarization by threshold groups to achieve near-instant finality. Details can be found in the overview paper that we are releasing today.
The roots of the DFINITY consensus mechanism date back to 2014 when thair Chief Scientist, Dominic Williams, started to look for more efficient ways to drive large consensus networks. Since then, much research has gone into the protocol and it took several iterations to reach its current design.
For any practical consensus system the difficulty lies in navigating the tight terrain that one is given between the boundaries imposed by theoretical impossibility-results and practical performance limitations.
The first key milestone was the novel Threshold Relay technique for decentralized, deterministic randomness, which is made possible by certain unique characteristics of the BLS signature system. The next breakthrough was the notarization technique, which allows DFINITY consensus to solve the traditional problems that come with proof-of-stake systems. Getting the security proofs sound was the final step before publication.
DFINITY consensus has made the proper trade-offs between the practical side (realistic threat models and security assumptions) and the theoretical side (provable security). Out came a flexible, tunable algorithm, which we expect will establish itself as the best performing proof-of-stake algorithm. In particular, having the built-in random beacon will prove to be indispensable when building out sharding and scalable validation techniques.
2.6 LINKEDUPThe startup has rather cheekily called this “an open version of LinkedIn,” the Microsoft-owned social network for professionals. Unlike LinkedIn, LinkedUp, which runs on any browser, is not owned or controlled by a corporate entity.
LinkedUp is built on Dfinity’s so-called Internet Computer, its name for the platform it is building to distribute the next generation of software and open internet services.
The software is hosted directly on the internet on a Switzerland-based independent data center, but in the concept of the Internet Computer, it could be hosted at your house or mine. The compute power to run the application LinkedUp, in this case — is coming not from Amazon AWS, Google Cloud or Microsoft Azure, but is instead based on the distributed architecture that Dfinity is building.
Specifically, Dfinity notes that when enterprises and developers run their web apps and enterprise systems on the Internet Computer, the content is decentralized across a minimum of four or a maximum of an unlimited number of nodes in Dfinity’s global network of independent data centers.
Dfinity is an open source for LinkedUp to developers for creating other types of open internet services on the architecture it has built.
“Open Social Network for Professional Profiles” suggests that on Dfinity model one can create “Open WhatsApp”, “Open eBay”, “Open Salesforce” or “Open Facebook”.
The tools include a Canister Software Developer Kit and a simple programming language called Motoko that is optimized for Dfinity’s Internet Computer.
“The Internet Computer is conceived as an alternative to the $3.8 trillion legacy IT stack, and empowers the next generation of developers to build a new breed of tamper-proof enterprise software systems and open internet services. We are democratizing software development,” Williams said. “The Bronze release of the Internet Computer provides developers and enterprises a glimpse into the infinite possibilities of building on the Internet Computer — which also reflects the strength of the Dfinity team we have built so far.”
Dfinity says its “Internet Computer Protocol” allows for a new type of software called autonomous software, which can guarantee permanent APIs that cannot be revoked. When all these open internet services (e.g. open versions of WhatsApp, Facebook, eBay, Salesforce, etc.) are combined with other open software and services it creates “mutual network effects” where everyone benefits.
On 1 November, DFINITY has released 13 new public versions of the SDK, to our second major milestone [at WEF Davos] of demoing a decentralized web app called LinkedUp on the Internet Computer. Subsequent milestones towards the public launch of the Internet Computer will involve:
2.7 WHAT IS MOTOKO?Motoko is a new software language being developed by the DFINITY Foundation, with an accompanying SDK, that is designed to help the broadest possible audience of developers create reliable and maintainable websites, enterprise systems and internet services on the Internet Computer with ease. By developing the Motoko language, the DFINITY Foundation will ensure that a language that is highly optimized for the new environment is available. However, the Internet Computer can support any number of different software frameworks, and the DFINITY Foundation is also working on SDKs that support the Rust and C languages. Eventually, it is expected there will be many different SDKs that target the Internet Computer.
Written by TokenInsightsubmitted by CoinExcom to btc [link] [comments]
Published by tokenin.cn
OutlookThe development of CoinEx Chain contributes to the future development of CoinEx’s centralized and decentralized exchanges; the concept of trichain operation simplifies the functions of each chain, improving their performance. At present, there are few exchanges working on the public chain, and no fierce competition has occurred.
ConclusionConsidering the status and development prospects of the project, TokenInsight gives CoinEx a rating of BB with a stable outlook.
1. Multidimensional evaluation
2. Project analysisCoinEx (CoinEx Technology Limited) was established in December 2017 and is headquartered in Hong Kong, China. It is a sub-brand of the ViaBTC mining pool. At present, CoinEx’s business scope includes CoinEx exchange, CoinEx public chain, and CoinEx decentralized exchange. The current development focus of the CoinEx platform are public chain and exchange. The main purpose of the public chain is to build a decentralized exchange (DEX) infrastructure and an ecosystem around DEX.
CoinEx business structure，Source: CoinEx; TokenInsight
2.1 Introduction“ CoinEx Chain uses the parallel operation of three chains which are DEX, Smart, and Privacy, as well as cross-chain technologies to create a rich decentralized exchange ecosystem and blockchain financial infrastructure.
The core of CoinEx’s early business was the exchange, consisted of two major categories which were spot and derivatives trading. Currently, there are 123 trading currencies online, covering 302 trading pairs. On June 28, 2019, CoinEx released the CoinEx Chain public chain white paper, aiming to build a decentralized trading system (CoinEx DEX) with community-based operations and transparent transaction rules, and providing user-controlled asset trading scenario by the highest technical standards in the industry; CoinEx Chain has become another development focus of CoinEx. CoinEx Token (CET), which was originally a native token of the CoinEx exchange, will also be developed mainly as a built-in token of the public chain.
CoinEx Chain is a public chain based on the Tendermint consensus protocol and Cosmos SDK, and it uses POS mechanism. CoinEx Chain plans to support 42 nodes when the project starts, and any entity in the ecosystem can participate in the validator’s campaign by staking CET. CoinEx Chain will use the new block reward and the transaction fee contained in the block as the reward for running the node.
CoinEx Chain has developed three public chains with different positioning and different functions in order to meet the needs of blockchain transactions for transaction performance, smart contracts, and privacy protection at the same time. They operate in parallel and collaborate with each other through cross-chain technology. At present, the block time of the public chain is between 2–3 seconds. According to the observation of TokenInsight, the block time is stable, but the number of transactions through the CoinEx public chain is still low at present, the number of transactions in 24 hours is about 30,000; The TPS on public chain disclosed by CoinEx can reach up to 1500 per second.
CoinEx Chain uses a trichain parallel model to build a more vibrant ecosystem around DEX. The three chains are DEX public chain, Smart public chain, and Privacy public chain, respectively responsible for decentralized transactions, smart contracts, and on-chain privacy protection.
CETs that need to participate in complex financial contracts can be transferred to the Smart public chain through the DEX public chain, then moved back to the DEX public chain after that. CET tokens that need to participate in token confusion can also be carried out through the privacy transaction of the Privacy public chain, and can eventually be returned to the DEX public chain. The three public chains are responsible for their respective duties, and they are interconnected through the cross-chain technology through the relay mechanism. In addition to ensuring their respective transaction processing speed and functional attributes, they can also jointly provide richer and safer functions, and synergistically constitute the CoinEx decentralized public chain ecosystem.
In addition, CoinEx Chain also supports any participant to issue new tokens on the chain and create new trading pairs for the issued tokens. CoinEx Chain guarantees the circulation of new tokens by establishing a trading pair between the new token and CET.
2.2 Component architecture“ Tendermint Core and Cosmos SDK have improved the performance and operation capability of the blockchain. The SDK packaging reduces the consideration of non-related logic, hence reducing the development complexity.
CoinEx Chain is based on Tendermint Core and Cosmos SDK, both of which have brought a big boost to the development of CoinEx public chain performance. Cosmos-SDK will implement the application logic of the blockchain. Together with the Tendermint consensus engine, it implements the three-layer architecture of the CoinEx public chain: the application layer, the consensus layer, and the network layer.
Tendermint is based on the state machine replication technology and is suitable for blockchain ledger storage. It is a list of transactions making consensus with Byzantine fault tolerance, the transactions are executed in the same order, and eventually the same state is obtained. Tendermint can be used to build various distributed applications.
Cosmos-SDK is a blockchain framework that supports the construction of multiple assets with a consensus mechanism of POS (Proof of Stake) or POA (Proof of Authority). The goal of the Cosmos SDK is to allow developers to easily build custom blockchains from 0, while enabling the interaction with other blockchains.
Cosmos-SDK is a blockchain framework that supports the construction of multiple assets with a consensus mechanism of POS (Proof of Stake) or POA (Proof of Authority). The goal of the Cosmos SDK is to allow developers to easily build custom blockchains from 0, while enabling the interaction with other blockchains. The blockchain development framework Cosmos SDK implements general functions such as account management, community governance, and staking in a modular form. Therefore, using the Cosmos SDK to build a public chain can simplify development procedures and facilitate operation. Tendermint is a fixed protocol in a partially synchronized environment, which can achieve throughput within a delay range of the network and each process itself. The CoinEx public chain is developed based on both, improving the performance and operability of the blockchain. The SDK packaging further reduces considerations of non-related logic and reduces the complexity of developers creating. The two components of Tendermint and Cosmos SDK are connected and interacted through the Application Blockchain Interface.
Cosmos SDK and Tendermint interworking structure，Source:CoinEx; TokenInsight
2.3 Project public chain planningThe development plan of the CoinEx public chain is to create a series of public chains with specific application directions, including:
2.4 Operation analysis“ The CoinEx platform publishes monthly ecosystem reports with high transparency; but the monthly reports are limited to contents about transactions and development, and lack progress in ecosystem and community construction, making them relatively simple.
2.4.1 Disclosure of ecosystem information
Operational risks have a direct impact on platform users. Whether platform operations are smooth and whether there is transparency are issues that platform users care about.
The CoinEx platform was established in 2017 and has around 3 years of development. It is also one of the platforms that has been developing for a long time in the exchange industry. It has obtained a digital currency trading license issued by the Estonian Financial Intelligence Unit (FIU), and the platform’s compliance is guaranteed to some degree.
The actual operation of the CoinEx platform will be displayed in the form of ecosystem monthly reports. The monthly report contains various types of content such as online currencies, new activities, plans for the next month, and ecosystem dynamics. It involves multiple business dimensions including the CoinEx exchange, CoinEx Public Chain, and CET token.
Snippet of a CoinEx ecosystem monthly report，Source: CoinEx; TokenInsight
CoinEx Chain released its development roadmap for the four quarters of 2020 in January 2020. The roadmap shows that CoinEx Chain will undergo major updates on smart contracts and DEX hard fork upgrades. The project roadmap is basically planned on a monthly basis, with a clear plan and a clear direction of development.
CoinEx Public Chain 2020 Development Roadmap，Source: CoinEx; TokenInsight
In addition to the development route planned in the roadmap, CoinEx public chain also discloses its goals for next month in its monthly ecological report. The project’s main net was launched online in November 2019. According to TokenInsight’s review of the development of CoinEx public chain from January to April and the disclosure of the project’s ecosystem monthly report, the project’s plan about development of the smart contract Demo in February failed to be completed as planned; the project completed launching of the new version of the blockchain browser and the Asian Atlantis upgrade; the smart contract virtual machine development was planned to be completed in April, but the progress related to supporting cross-chain agreements was not disclosed yet.
Overall, the project’s development route planning is clear, and the project’s development schedule is consistent with the plan, but there are still some discrepancies. Operation and development information is disclosed every month, and information transparency is high.
3. Industry & CompetitorsThe earliest origin of the exchange layout in the public chain field began in early 2018 when Binance released an announcement to start the development of the Binance Public Chain officially. In June of the same year, Huobi announced at its brand upgrade conference that it will combine the technical capabilities of the Huobi technical team and the community developers to develop the Huobi public chain called “Huobi Chain”. In December of the same year, OK Group announced the launch of its self-developed public chain OKchain, dedicating to provide underlying technical support and services for startups stationed in B-Labs.
The successful launch of the public chain brings huge strategic significance to the exchange, which can not only improve the performance of the existing business of the exchange but also achieve further expansion of its influence. As one of the most important blockchain infrastructures, the public chain can benefit the exchanges behind it.
As a platform for developing public chain technology exchanges, CoinEx’s main competitors in the field of public chain development include Binance, Huobi, and OKEx. Although they are all exchange platforms for deploying public chains, the above four are different in terms of specific functions, economic models, and critical points of the public chain.
3.1 Development progress comparisonIn 2019, Binance became the first exchange to launch a public chain among all digital asset exchanges, and its main product is Binance exchange (DEX). In April 2020, Binance announced the launch of a second smart contract chain, using Ethereum’s virtual machine, so that developers can build decentralized applications without affecting the performance and functionality of their original chain.
OKEx launched OKChain’s testnet in February 2020 and completed open source two months later. OKChain is designed as the basis of large-scale blockchain-driven business applications, with the characteristics of source code decentralization, point-to-point, irreversibility, and efficient autonomy.
Huobi released Huobi Chain for the first time in July 2019, the code is open source, and the testnet was released in February 2020. As a “regulator-friendly financial blockchain”, Huobi Chain focuses on providing compliance services for companies and financial institutions.
The CoinEx public chain officially completed the main online launch in November 2019 and completed the new block browser’s launch in March 2020. On April 3, 2020, CoinEx DEX uploaded the underlying code to Github to achieve open source. The CoinEx public chain is more inclined to build a full DEX ecosystem to achieve a one-stop solution for issuing, listing, storing, and trading. The long-term goal is to create a blockchain financial infrastructure.
3.2 Comparison of economic modelsAt present, the exchange is more inclined to use its existing platform currency as the native token of the public chain in the construction of public chain ecology. CoinEx’s CET, Binance’s BNB, and Huobi’s HT all fall into this category. OKEx is the only exchange that issues new tokens for its OKChain, which means OKT is the only ‘inflation token’ in the exchange’s public chain, while CET, HT, and BNB are all deflationary.
3.3 Decentralization of public chainThe initial number of CoinEx public chain verification nodes is 42, which is currently the most decentralized among all exchange public chains, and able to take both efficiency and decentralization into account; OKChain also currently has a relatively high degree of decentralization in the exchange public chain (21 verification nodes), its nodes have a high degree of autonomy; by contrast, Binance still firmly controls the operation of nodes and transactions; In terms of encourages cooperation between regulators and the private financial aspects, Huobi provides a lesser degree of decentralization. Huobi Chain uses a variant of the DPoS consensus algorithm to provide functions such as “supervision nodes”, allowing regulators to become validators.
Comparison of some dimensions of CoinEx, Huobi, Binance and OKEx public chain，Source: TokenInsight
4. Token EconomyCoinEx Token (CET) is a native token of the CoinEx ecosystem. It was issued in January 2018. Token holders can enjoy some user value-added services within the ecosystem. Currently, it is mainly used as a native token on the CoinEx Chain. As of 11 am on April 23, 2020, the current circulation of CET tokens in the market is 3,215,354,906.31, with a total of 5,842,177,609.53. CET tokens will not be further issued or inflated. Currently, daily repurchase and quarterly destruction are carried out. The repurchase destruction dynamics can now be tracked real-time on the CET repurchase system on the platform.
4.1 Token DistributionThe CET token used to be based on the ERC-20 token developed by Ethereum. Since the CoinEx Chain mainnet was launched in November 2019, some ERC-20 CET tokens have been mapped to the mainnet CET, and the rest of the CET will be mapped before November 10, 2020. CET holders need to deposit ERC-20 CET to the COinEX exchange, and the exchange will conduct the main network mapping.
At present, CET is mainly circulated in the form of mainnet tokens, and only a small portion of ERC-20 CET has not been mapped. The distribution of token holdings currently circulating on the mainnet can be seen in the figure below. At present, the number of tokens held by the top ten holders accounts for about 60.44% of all mainnet CET tokens.
Distribution of CET token holding addresses，Source: Etherscan; TokenInsight
The following figure shows the initial distribution of tokens after the mainnet mapping preset by CoinEx. From the initial distribution map of CET, it shows that, after mapping, a large portion of CET remains concentrated in the hands of the team (31%), and the actual number of CET circulating in the market only accounts for 49% of the total.
The initial distribution of CET token，Source: CoinEx; TokenInsight
After the main net mapping, the 31% of the total CET (1.8 billion) held by the team will be gradually unlocked in the five years from 2020 to 2024, and 360 million CET will be unlocked each year. By 2024, the CET held by the team will be completely unlocked. From the current CET dynamics, the CET share held by some teams has been used for destruction purposes to achieve the purpose of CET austerity. If the frozen 1.8 billion CET held by the team are used for similar purposes, the development of CET and its platform can benefit from it.
Team’s CET unlocking plan，Source: CoinEx; TokenInsight
4.2 Token economic model4.2.1 Deflation mechanism
Since the CET token went online in January 2018, CoinEx has increased the circulation of CET through airdrops, transaction fee refunds, operation promotion, and team unlocking. As one of the existing platform coins with long development time, the deflation mechanism of CET token has undergone a series of changes with the development of the industry. In 2018, when the concept of coin-based mining prevailed, CET used transaction mining, stake mining, and pending order mining, which were cancelled in October, December and, April respectively of the following year.
The repurchase and destruction model currently used by CET was updated by CoinEx on April 11, 2020. The original CET quarterly repurchase and destruction policy of the platform will be adjusted to daily repurchase and quarterly destruction. After the implementation of the daily repurchase policy, CoinEx will take out 50% of the daily fee income for CET repurchase in the secondary market and implement quarterly destruction until the total remaining circulation is 3 billion (currently about 5.8 billion).
At the same time that CoinEx updated the repurchase and destruction plan on April 11, the platform also launched a page dedicated to displaying CET repurchase information, so that users can clearly understand the progress of CET repurchase and destruction.
As of April 23, 2020, the platform has destroyed 4,157,822,390.46 CET tokens, accounting for 41.6% of the initial total issuance. At the end of January 2019, it had destroyed 4 billion CETs (single destruction volume peak) at the end of this quarter. The number of CETs to be destroyed is 3,422,983.56.
CET historical destruction data，Source: CoinEx; TokenInsight
4.2.2 Application scenarios
The current usage scenarios of CET are discounted platform transaction fees, VIP services, special activities rights and interests, CoinEx Chain internal circulation fuel, and use of external scenarios.
Deduction and discount of platform transaction fees
CoinEx platform users can use CET to deduct transaction fees when conducting transactions within the platform. At the same time, using CET to pay transaction fees can enjoy the exclusive preferential rates provided by the platform.
CET fee discount amount，Source：CoinEx; TokenInsight
Holding a certain number of CETs can make a user become a platform VIP user. Users can also use CET to purchase platform VIPs to obtain corresponding privileges such as discounted rates, accelerated withdrawals, and exclusive customers.
Special activity rights
CET holders can enjoy special rights and interests in platform marketing activities, such as participating in the airdrop of tokens on the platform or accelerating opportunities for high-quality projects.
CoinEx Chain built-in token
CET will serve as a native token of CoinEx Chain, circulate and serve as fuel in CoinEx Chain, and users can also use CET to invest or trade other digital assets. In addition, CET can also serve as transaction fees and function fees (issuing Token, creating new trading pairs, account activation), etc. in the platform, and users can also participate in the campaign of validators by staking CET tokens.
CET is currently used as a circulation token as well for CoinEx DEX to issue tokens, create orders, Bancor, address activation, set address aliases, and other application scenarios.
In general, the types of application scenarios of CET are not plenty enough. In order to better develop the internal ecosystem of the platform, it is necessary to design and develop more CET usage scenarios and incentive mechanisms to increase the retention rate of users while adding new users.
4.2.3 Token incentive
As the native token of the CoinEx public chain, CET will be used as a block incentive to increase community participation after the mainnet of the public chain launched. The 315 million CET held by the foundation in the total CET issuance will be used to incentivize initial verification nodes and Staking participants.
CET annual incentive information，Source：CoinEx; TokenInsight
5. Team & Partners
5.1 Core team membersAmong the core team members of CoinEx, the technical members account for a relatively large proportion. The technical team’s overall ability is good and the team members have different technical experience backgrounds including cryptography, underlying protocols, marketing, and operations. The team has rich blockchain industry experience, especially the chief developer, who has about 13 years of development industry experience.
5.2 Investment institutions and partnersCoinEx’s investment is led by Bitmain and its main partners include Matrixport, Bitcoin.com, CoinBull, Consensus Lab, BTC.com, BTC.top, Hoo Exchange, Wa Yi, ChainFor.com, etc.
Investment institutions and major partners have rich experience in the industry, which can promote the development of projects to a certain extent. However, the current industry involved by the partners is not wide enough, and it will have a limited role in promoting the future of CoinEx’s enriching business lines and increasing ecosystem functions.
6. Community AnalysisAccording to TokenInsight’s research of the CoinEx platform community, as of April 23, 2020, its official Twitter has 19,800 followers and 932 tweets; the official Telegram has 45 official groups, 3 in Chinese and English, and the other is Korean, Arabic, Vietnamese, Indian and other small language groups, with a total number of 56088 people; the current number of followers on Facebook accounts is 3,107. The overall community followers still have a lot of room for improvement, and community activeness needs to be improved.
Number of followers on the CoinEx social platform，Source:TokenInsight
At present, the project’s search popularity and official website visits are both top-notch, and monthly visits have slowly returned to their previous visit levels after experiencing a significant decline in December 2019.
CoinEx visit popularity，Source: TokenInsight, Similarweb, Google
At present, the visitors of the CoinEx website are distributed in multiple countries, and there are no visits concentration from a single country or region. Therefore, CoinEx’s comprehensive global influence is widely distributed and has a reasonable degree of internationalization.
CoinEx official website’s top 5 countries by number of visitors，Source: CoinEx, TokenInsight
Click here to register on CoinEx!
On the 1st of December 2016, Microsoft released their new Nvidia-powered Virtual Machines(VMs) to the general public. They came with two options of GPUs: NVIDIA Tesla K80 or the NVIDIA Tesla M60 ... Besides, you don’t want Mr. Bezos knocking on your door for his share of mining profits (always read the fine print). But on a serious note, if you want to start mining for hobby or profit, you’ll do much better picking up some equipment of your own. You can easily find used ASIC miners or GPUs on Amazon or eBay. Hobbyists can take the time ... That said, Bitcoin might be hard to grasp on at first, it’s a form of crypto-currency that acts as a currency only live digitally on the internet. This isn’t a guide on understanding what Bitcoin is, but rather a step-by-step guide on how to spin off a virtual machine on your own to start mining Bitcoins. USB Bitcoin mining was only profitable when Bitcoin was in its early years. If you just want bitcoins then invest in serious mining hardware or just buy bitcoins. Halong Mining. The world of crypto was in disbelief when Halong Mining, a new ASIC startup, announced their brand new Dragonmint T16. Halong claimed it to be the most powerful – and ... Bitcoin’s stability throughout an eventful week shows traders are confident that the bullish uptrend will resume soon. Read more. BitMex has bled 45k Bitcoin since US gov charges, allowing other exchanges to benefit. October 3, 2020 vm_admin Bitcoin.
[index]          
-------------------------------------------------------------------------------- Download: https://anonfiles.com/j4m326Lco7 -------------------------------... ️ Download for free from http://bitsoftmachine.com/?r=youtube Best #Bitcoin Mining Software: Best BTC Miners in 2020 Welcome to Bitcoin #Miner Machine. Bitc... Bitcoin mining video and how to Build Null video plug - Duration: ... Windows Server 2008 Hyper-V : Creating a Virtual Machine - Duration: 8:27. Pluralsight IT - Training Archive 170,120 views. 8:27. Best Bitcoin Mining Software: Best BTC Miners in 2020 Welcome to Bitcoin Miner Machine this software is real but it need fee first but as soon as you pay fee... Donate for reboot: 3KuKcH8qhLAMFYzg4ueMmEQAB8BjNeQtQM For more interesting Google Play Store App. © Bitcoin Project 2009-2020 Released under the MIT license