Why Quantum Computing's Threat To Bitcoin And Blockchain ...

09-22 09:35 - 'Bitcoin vs Quantum Computing' (self.Bitcoin) by /u/newtoreddit2101 removed from /r/Bitcoin within 49-59min

'''
I've been a bitcoin bull for about a year and I've bought a decent amount of bitcoin even when it was at the high of around 12k this year.
I understand all the bull cases and am onboard, but there is one bear case that keeps worrying me.
How is bitcoin protected against quantum computing? Once quantum computing is viable, I believe it is one of the biggest threats to cybersecurity as it can break almost every method of cybersecurity we have today since it processes numbers and calculations at a significantly faster rate than current computers.
How do you feel about this threat? Especially in about 7-10 years when quantum computing might be much closer.
Just wanted to start a discussion and here everyone's thoughts.
Thanks!
Edit: Grammer
'''
Bitcoin vs Quantum Computing
Go1dfish undelete link
unreddit undelete link
Author: newtoreddit2101
submitted by removalbot to removalbot [link] [comments]

Which are your Top 5 favourite coins out of the Top 100? An analysis.

I am putting together my investment portfolio for 2018 and made a complete summary of the current Top 100. Interestingly, I noticed that all coins can be categorized into 12 markets. Which markets do you think will play the biggest role in the coming year?
Here is a complete overview of all coins in an excel sheet including name, market, TPS, risk profile, time since launch (negative numbers mean that they are launching that many months in the future) and market cap. You can also sort by all of these fields of course. Coins written in bold are the strongest contenders within their market either due to having the best technology or having a small market cap and still excellent technology and potential. https://docs.google.com/spreadsheets/d/1s8PHcNvvjuy848q18py_CGcu8elRGQAUIf86EYh4QZo/edit#gid=0
The 12 markets are
  1. Currency 13 coins
  2. Platform 25 coins
  3. Ecosystem 9 coins
  4. Privacy 10 coins
  5. Currency Exchange Tool 8 coins
  6. Gaming & Gambling 5 coins
  7. Misc 15 coins
  8. Social Network 4 coins
  9. Fee Token 3 coins
  10. Decentralized Data Storage 4 coins
  11. Cloud Computing 3 coins
  12. Stable Coin 2 coins
Before we look at the individual markets, we need to take a look of the overall market and its biggest issue scalability first:
Cryptocurrencies aim to be a decentralized currency that can be used worldwide. Its goal is to replace dollar, Euro, Yen, all FIAT currencies worldwide. The coin that will achieve that will be worth several trillion dollars.
Bitcoin can only process 7 transactions per second (TPS). In order to replace all FIAT, it would need to perform at at least VISA levels, which usually processes around 3,000 TPS, up to 25,000 TPS during peak times and a maximum of 64,000 TPS. That means that this cryptocurrency would need to be able to perform at least several thousand TPS. However, a ground breaking technology should not look at current technology to set a goal for its use, i.e. estimating the number of emails sent in 1990 based on the number of faxes sent wasn’t a good estimate.
For that reason, 10,000 TPS is the absolute baseline for a cryptocurrency that wants to replace FIAT. This brings me to IOTA, which wants to connect all 80 billion IoT devices that are expected to exist by 2025, which constantly communicate with each other, creating 80 billion or more transactions per second. This is the benchmark that cryptocurrencies should be aiming for. Currently, 8 billion devices are connected to the Internet.
With its Lightning network recently launched, Bitcoin is realistically looking at 50,000 possible soon. Other notable cryptocurrencies besides IOTA and Bitcoin are Nano with 7,000 TPS already tested, Dash with several billion TPS possible with Masternodes, Neo, LISK and RHOC with 100,000 TPS by 2020, Ripple with 50,000 TPS, Ethereum with 10,000 with Sharding.
However, it needs to be said that scalability usually goes at the cost of decentralization and security. So, it needs to be seen, which of these technologies can prove itself resilient and performant.
Without further ado, here are the coins of the first market

Market 1 - Currency:

  1. Bitcoin: 1st generation blockchain with currently bad scalability currently, though the implementation of the Lightning Network looks promising and could alleviate most scalability concerns, scalability and high energy use.
  2. Ripple: Centralized currency that might become very successful due to tight involvement with banks and cross-border payments for financial institutions; banks and companies like Western Union and Moneygram (who they are currently working with) as customers customers. However, it seems they are aiming for more decentralization now.https://ripple.com/dev-blog/decentralization-strategy-update/. Has high TPS due to Proof of Correctness algorithm.
  3. Bitcoin Cash: Bitcoin fork with the difference of having an 8 times bigger block size, making it 8 times more scalable than Bitcoin currently. Further block size increases are planned. Only significant difference is bigger block size while big blocks lead to further problems that don't seem to do well beyond a few thousand TPS. Opponents to a block size argue that increasing the block size limit is unimaginative, offers only temporary relief, and damages decentralization by increasing costs of participation. In order to preserve decentralization, system requirements to participate should be kept low. To understand this, consider an extreme example: very big blocks (1GB+) would require data center level resources to validate the blockchain. This would preclude all but the wealthiest individuals from participating.Community seems more open than Bitcoin's though.
  4. Litecoin : Little brother of Bitcoin. Bitcoin fork with different mining algorithm but not much else.Copies everything that Bitcoin does pretty much. Lack of real innovation.
  5. Dash: Dash (Digital Cash) is a fork of Bitcoin and focuses on user ease. It has very fast transactions within seconds, low fees and uses Proof of Service from Masternodes for consensus. They are currently building a system called Evolution which will allow users to send money using usernames and merchants will find it easy to integrate Dash using the API. You could say Dash is trying to be a PayPal of cryptocurrencies. Currently, cryptocurrencies must choose between decentralization, speed, scalability and can pick only 2. With Masternodes, Dash picked speed and scalability at some cost of decentralization, since with Masternodes the voting power is shifted towards Masternodes, which are run by Dash users who own the most Dash.
  6. IOTA: 3rd generation blockchain called Tangle, which has a high scalability, no fees and instant transactions. IOTA aims to be the connective layer between all 80 billion IOT devices that are expected to be connected to the Internet in 2025, possibly creating 80 billion transactions per second or 800 billion TPS, who knows. However, it needs to be seen if the Tangle can keep up with this scalability and iron out its security issues that have not yet been completely resolved.
  7. Nano: 3rd generation blockchain called Block Lattice with high scalability, no fees and instant transactions. Unlike IOTA, Nano only wants to be a payment processor and nothing else, for now at least. With Nano, every user has their own blockchain and has to perform a small amount of computing for each transaction, which makes Nano perform at 300 TPS with no problems and 7,000 TPS have also been tested successfully. Very promising 3rd gen technology and strong focus on only being the fastest currency without trying to be everything.
  8. Decred: As mining operations have grown, Bitcoin’s decision-making process has become more centralized, with the largest mining companies holding large amounts of power over the Bitcoin improvement process. Decred focuses heavily on decentralization with their PoW Pos hybrid governance system to become what Bitcoin was set out to be. They will soon implement the Lightning Network to scale up. While there do not seem to be more differences to Bitcoin besides the novel hybrid consensus algorithm, which Ethereum, Aeternity and Bitcoin Atom are also implementing, the welcoming and positive Decred community and professoinal team add another level of potential to the coin.
  9. Aeternity: We’ve seen recently, that it’s difficult to scale the execution of smart contracts on the blockchain. Crypto Kitties is a great example. Something as simple as creating and trading unique assets on Ethereum bogged the network down when transaction volume soared. Ethereum and Zilliqa address this problem with Sharding. Aeternity focuses on increasing the scalability of smart contracts and dapps by moving smart contracts off-chain. Instead of running on the blockchain, smart contracts on Aeternity run in private state channels between the parties involved in the contracts. State channels are lines of communication between parties in a smart contract. They don’t touch the blockchain unless they need to for adjudication or transfer of value. Because they’re off-chain, state channel contracts can operate much more efficiently. They don’t need to pay the network for every time they compute and can also operate with greater privacy. An important aspect of smart contract and dapp development is access to outside data sources. This could mean checking the weather in London, score of a football game, or price of gold. Oracles provide access to data hosted outside the blockchain. In many blockchain projects, oracles represent a security risk and potential point of failure, since they tend to be singular, centralized data streams. Aeternity proposes decentralizing oracles with their oracle machine. Doing so would make outside data immutable and unchangeable once it reaches Aeternity’s blockchain. Of course, the data source could still be hacked, so Aeternity implements a prediction market where users can bet on the accuracy and honesty of incoming data from various oracles.It also uses prediction markets for various voting and verification purposes within the platform. Aeternity’s network runs on on a hybrid of proof of work and proof of stake. Founded by a long-time crypto-enthusiast and early colleague of Vitalik Buterin, Yanislav Malahov. Promising concept though not product yet
  10. Bitcoin Atom: Atomic Swaps and hybrid consenus. This looks like the only Bitcoin clone that actually is looking to innovate next to Bitcoin Cash.
  11. Dogecoin: Litecoin fork, fantastic community, though lagging behind a bit in technology.
  12. Bitcoin Gold: A bit better security than bitcoin through ASIC resistant algorithm, but that's it. Not that interesting.
  13. Digibyte: Digibyte's PoS blockchain is spread over a 100,000+ servers, phones, computers, and nodes across the globe, aiming for the ultimate level of decentralization. DigiByte rebalances the load between the five mining algorithms by adjusting the difficulty of each so one algorithm doesn’t become dominant. The algorithm's asymmetric difficulty has gained notoriety and been deployed in many other blockchains.DigiByte’s adoption over the past four years has been slow. It’s still a relatively obscure currency compared its competitors. The DigiByte website offers a lot of great marketing copy and buzzwords. However, there’s not much technical information about what they have planned for the future. You could say Digibyte is like Bitcoin, but with shorter blocktimes and a multi-algorithm. However, that's not really a difference big enough to truly set themselves apart from Bitcoin, since these technologies could be implemented by any blockchain without much difficulty. Their decentralization is probably their strongest asset, however, this also change quickly if the currency takes off and big miners decide to go into Digibyte.
  14. Bitcoin Diamond Asic resistant Bitcoin and Copycat

Market 2 - Platform

Most of the cryptos here have smart contracts and allow dapps (Decentralized apps) to be build on their platform and to use their token as an exchange of value between dapp services.
  1. Ethereum: 2nd generation blockchain that allows the use of smart contracts. Bad scalability currently, though this concern could be alleviated by the soon to be implemented Lightning Network aka Plasma and its Sharding concept.
  2. EOS: Promising technology that wants to be able do everything, from smart contracts like Ethereum, scalability similar to Nano with 1000 tx/second + near instant transactions and zero fees, to also wanting to be a platform for dapps. However, EOS doesn't have a product yet and everything is just promises still. Highly overvalued right now. However, there are lots of red flags, have dumped $500 million Ether over the last 2 months and possibly bought back EOS to increase the size of their ICO, which has been going on for over a year and has raised several billion dollars. All in all, their market cap is way too high for that and not even having a product.
  3. Cardano: Similar to Ethereum/EOS, however, only promises made with no delivery yet, highly overrated right now. Interesting concept though. Market cap way too high for not even having a product. Somewhat promising technology.
  4. VeChain: Singapore-based project that’s building a business enterprise platform and inventory tracking system. Examples are verifying genuine luxury goods and food supply chains. Has one of the strongest communities in the crypto world. Most hyped token of all, with merit though.
  5. Neo: Neo is a platform, similar to Eth, but more extensive, allowing dapps and smart contracts, but with a different smart contract gas system, consensus mechanism (PoS vs. dBfT), governance model, fixed vs unfixed supply, expensive contracts vs nearly free contracts, different ideologies for real world adoption. There are currently only 9 nodes, each of which are being run by a company/entity hand selected by the NEO council (most of which are located in china) and are under contract. This means that although the locations of the nodes may differ, ultimately the neo council can bring them down due to their legal contracts. In fact this has been done in the past when the neo council was moving 50 million neo that had been locked up. Also dbft (or neo's implmentation of it) has failed underload causing network outages during major icos. The first step in decentralization is that the NEO Counsel will select trusted nodes (Universities, business partners, etc.) and slowly become less centralized that way. The final step in decentralization will be allowing NEO holders to vote for new nodes, similar to a DPoS system (ARK/EOS/LISK). NEO has a regulation/government friendly ideology. Finally they are trying to work undewith the Chinese government in regards to regulations. If for some reason they wanted it shut down, they could just shut it down.
  6. Stellar: PoS system, similar goals as Ripple, but more of a platform than only a currency. 80% of Stellar are owned by Stellar.org still, making the currency centralized.
  7. Ethereum classic: Original Ethereum that decided not to fork after a hack. The Ethereum that we know is its fork. Uninteresing, because it has a lot of less resources than Ethereum now and a lot less community support.
  8. Ziliqa: Zilliqa is building a new way of sharding. 2400 tpx already tested, 10,000 tps soon possible by being linearly scalable with the number of nodes. That means, the more nodes, the faster the network gets. They are looking at implementing privacy as well.
  9. QTUM: Enables Smart contracts on the Bitcoin blockchain. Useful.
  10. Icon: Korean ethereum. Decentralized application platform that's building communities in partnership with banks, insurance providers, hospitals, and universities. Focused on ID verification and payments. No big differentiators to the other 20 Ethereums, except that is has a product. That is a plus. Maybe cheap alternative to Ethereum.
  11. LISK: Lisk's difference to other BaaS is that side chains are independent to the main chain and have to have their own nodes. Similar to neo whole allows dapps to deploy their blockchain to. However, Lisk is currently somewhat centralized with a small group of members owning more than 50% of the delegated positions. Lisk plans to change the consensus algorithm for that reason in the near future.
  12. Rchain: Similar to Ethereum with smart contract, though much more scalable at an expected 40,000 TPS and possible 100,000 TPS. Not launched yet. No product launched yet, though promising technology. Not overvalued, probably at the right price right now.
  13. ARDR: Similar to Lisk. Ardor is a public blockchain platform that will allow people to utilize the blockchain technology of Nxt through the use of child chains. A child chain, which is a ‘light’ blockchain that can be customized to a certain extent, is designed to allow easy self-deploy for your own blockchain. Nxt claims that users will "not need to worry" about security, as that part is now handled by the main chain (Ardor). This is the chief innovation of Ardor. Ardor was evolved from NXT by the same company. NEM started as a NXT clone.
  14. Ontology: Similar to Neo. Interesting coin
  15. Bytom: Bytom is an interactive protocol of multiple byte assets. Heterogeneous byte-assets (indigenous digital currency, digital assets) that operate in different forms on the Bytom Blockchain and atomic assets (warrants, securities, dividends, bonds, intelligence information, forecasting information and other information that exist in the physical world) can be registered, exchanged, gambled and engaged in other more complicated and contract-based interoperations via Bytom.
  16. Nxt: Similar to Lisk
  17. Stratis: Different to LISK, Stratis will allow businesses and organizations to create their own blockchain according to their own needs, but secured on the parent Stratis chain. Stratis’s simple interface will allow organizations to quickly and easily deploy and/or test blockchain functionality of the Ethereum, BitShares, BitCoin, Lisk and Stratis environements.
  18. Status: Status provides access to all of Ethereum’s decentralized applications (dapps) through an app on your smartphone. It opens the door to mass adoption of Ethereum dapps by targeting the fastest growing computer segment in the world – smartphone users.16. Ark: Fork of Lisk that focuses on a smaller feature set. Ark wallets can only vote for one delegate at a time which forces delegates to compete against each other and makes cartel formations incredibly hard, if not impossible.
  19. Neblio: Similar to Neo, but 30x smaller market cap.
  20. NEM: Is similar to Neo No marketing team, very high market cap for little clarilty what they do.
  21. Bancor: Bancor is a Decentralized Liquidity Network that allows you to hold any Ethereum token and convert it to any other token in the network, with no counter party, at an automatically calculated price, using a simple web wallet.
  22. Dragonchain: The Purpose of DragonChain is to help companies quickly and easily incorporate blockchain into their business applications. Many companies might be interested in making this transition because of the benefits associated with serving clients over a blockchain – increased efficiency and security for transactions, a reduction of costs from eliminating potential fraud and scams, etc.
  23. Skycoin: Transactions with zero fees that take apparently two seconds, unlimited transaction rate, no need for miners and block rewards, low power usage, all of the usual cryptocurrency technical vulnerabilities fixed, a consensus mechanism superior to anything that exists, resistant to all conceivable threats (government censorship, community infighting, cybenucleaconventional warfare, etc). Skycoin has their own consensus algorithm known as Obelisk written and published academically by an early developer of Ethereum. Obelisk is a non-energy intensive consensus algorithm based on a concept called ‘web of trust dynamics’ which is completely different to PoW, PoS, and their derivatives. Skywire, the flagship application of Skycoin, has the ambitious goal of decentralizing the internet at the hardware level and is about to begin the testnet in April. However, this is just one of the many facets of the Skycoin ecosystem. Skywire will not only provide decentralized bandwidth but also storage and computation, completing the holy trinity of commodities essential for the new internet. Skycion a smear campaign launched against it, though they seem legit and reliable. Thus, they are probably undervalued.

Market 3 - Ecosystem

The 3rd market with 11 coins is comprised of ecosystem coins, which aim to strengthen the ease of use within the crypto space through decentralized exchanges, open standards for apps and more
  1. Nebulas: Similar to how Google indexes webpages Nebulas will index blockchain projects, smart contracts & data using the Nebulas rank algorithm that sifts & sorts the data. Developers rewarded NAS to develop & deploy on NAS chain. Nebulas calls this developer incentive protocol – basically rewards are issued based on how often dapp/contract etc. is used, the more the better the rewards and Proof of devotion. Works like DPoS except the best, most economically incentivised developers (Bookkeeppers) get the forging spots. Ensuring brains stay with the project (Cross between PoI & PoS). 2,400 TPS+, DAG used to solve the inter-transaction dependencies in the PEE (Parallel Execution Environment) feature, first crypto Wallet that supports the Lightening Network.
  2. Waves: Decentralized exchange and crowdfunding platform. Let’s companies and projects to issue and manage their own digital coin tokens to raise money.
  3. Salt: Leveraging blockchain assets to secure cash loands. Plans to offer cash loans in traditional currencies, backed by your cryptocurrency assets. Allows lenders worldwide to skip credit checks for easier access to affordable loans.
  4. CHAINLINK: ChainLink is a decentralized oracle service, the first of its kind. Oracles are defined as an ‘agent’ that finds and verifies real-world occurrences and submits this information to a blockchain to be used in smart contracts.With ChainLink, smart contract users can use the network’s oracles to retrieve data from off-chain application program interfaces (APIs), data pools, and other resources and integrate them into the blockchain and smart contracts. Basically, ChainLink takes information that is external to blockchain applications and puts it on-chain. The difference to Aeternity is that Chainlink deploys the smart contracts on the Ethereum blockchain while Aeternity has its own chain.
  5. WTC: Combines blockchain with IoT to create a management system for supply chains Interesting
  6. Ethos unifyies all cryptos. Ethos is building a multi-cryptocurrency phone wallet. The team is also building an investment diversification tool and a social network
  7. Aion: Aion is the token that pays for services on the Aeternity platform.
  8. USDT: is no cryptocurrency really, but a replacement for dollar for trading After months of asking for proof of dollar backing, still no response from Tether.

Market 4 - Privacy

The 4th market are privacy coins. As you might know, Bitcoin is not anonymous. If the IRS or any other party asks an exchange who is the identity behind a specific Bitcoin address, they know who you are and can track back almost all of the Bitcoin transactions you have ever made and all your account balances. Privacy coins aim to prevent exactly that through address fungability, which changes addresses constantly, IP obfuscation and more. There are 2 types of privacy coins, one with completely privacy and one with optional privacy. Optional Privacy coins like Dash and Nav have the advantage of more user friendliness over completely privacy coins such as Monero and Enigma.
  1. Monero: Currently most popular privacy coin, though with a very high market cap. Since their privacy is all on chain, all prior transactions would be deanonymized if their protocol is ever cracked. This requires a quantum computing attack though. PIVX is better in that regard.
  2. Zcash: A decentralized and open-source cryptocurrency that hide the sender, recipient, and value of transactions. Offers users the option to make transactions public later for auditing. Decent privacy coin, though no default privacy
  3. Verge: Calls itself privacy coin without providing private transactions, multiple problems over the last weeks has a toxic community, and way too much hype for what they have.
  4. Bytecoin: First privacy-focused cryptocurrency with anonymous transactions. Bytecoin’s code was later adapted to create Monero, the more well-known anonymous cryptocurrency. Has several scam accusations, 80% pre-mine, bad devs, bad tech
  5. Bitcoin Private: A merge fork of Bitcoin and Zclassic with Zclassic being a fork of Zcash with the difference of a lack of a founders fee required to mine a valid block. This promotes a fair distribution, preventing centralized coin ownership and control. Bitcoin private offers the optional ability to keep the sender, receiver, and amount private in a given transaction. However, this is already offered by several good privacy coins (Monero, PIVX) and Bitcoin private doesn't offer much more beyond this.
  6. Komodo: The Komodo blockchain platform uses Komodo’s open-source cryptocurrency for doing transparent, anonymous, private, and fungible transactions. They are then made ultra-secure using Bitcoin’s blockchain via a Delayed Proof of Work (dPoW) protocol and decentralized crowdfunding (ICO) platform to remove middlemen from project funding. Offers services for startups to create and manage their own Blockchains.
  7. PIVX: As a fork of Dash, PIVX uses an advanced implementation of the Zerocoin protocol to provide it’s privacy. This is a form of zeroknowledge proofs, which allow users to spend ‘Zerocoins’ that have no link back to them. Unlike Zcash u have denominations in PIVX, so they can’t track users by their payment amount being equal to the amount of ‘minted’ coins, because everyone uses the same denominations. PIVX is also implementing Bulletproofs, just like Monero, and this will take care of arguably the biggest weakness of zeroknowledge protocols: the trusted setup.
  8. Zcoin: PoW cryptocurrency. Private financial transactions, enabled by the Zerocoin Protocol. Zcoin is the first full implementation of the Zerocoin Protocol, which allows users to have complete privacy via Zero-Knowledge cryptographic proofs.
  9. Enigma: Monero is to Bitcoin what enigma is to Ethereum. Enigma is for making the data used in smart contracts private. More of a platform for dapps than a currency like Monero. Very promising.
  10. Navcoin: Like bitcoin but with added privacy and pos and 1,170 tps, but only because of very short 30 second block times. Though, privacy is optional, but aims to be more user friendly than Monero. However, doesn't really decide if it wants to be a privacy coin or not. Same as Zcash.Strong technology, non-shady team.
  11. Tenx: Raised 80 million, offers cryptocurrency-linked credit cards that let you spend virtual money in real life. Developing a series of payment platforms to make spending cryptocurrency easier. However, the question is if full privacy coins will be hindered in growth through government regulations and optional privacy coins will become more successful through ease of use and no regulatory hindrance.

Market 5 - Currency Exchange Tool

Due to the sheer number of different cryptocurrencies, exchanging one currency for the other it still cumbersome. Further, merchants don’t want to deal with overcluttered options of accepting cryptocurrencies. This is where exchange tool like Req come in, which allow easy and simple exchange of currencies.
  1. Cryptonex: Fiat and currency exchange between various blockchain services, similar to REQ.
  2. QASH: Qash is used to fuel its liquid platform which will be an exchange that will distribute their liquidity pool. Its product, the Worldbook is a multi-exchange order book that matches crypto to crypto, and crypto to fiat and the reverse across all currencies. E.g., someone is selling Bitcoin is USD on exchange1 not owned by Quoine and someone is buying Bitcoin in EURO on exchange 2 not owned by Quoine. If the forex conversions and crypto conversions match then the trade will go through and the Worldbook will match it, it'll make the sale and the purchase on either exchange and each user will get what they wanted, which means exchanges with lower liquidity if they join the Worldbook will be able to fill orders and take trade fees they otherwise would miss out on.They turned it on to test it a few months ago for an hour or so and their exchange was the top exchange in the world by 4x volume for the day because all Worldbook trades ran through it. Binance wants BNB to be used on their one exchange. Qash wants their QASH token embedded in all of their partners. More info here https://www.reddit.com/CryptoCurrency/comments/8a8lnwhich_are_your_top_5_favourite_coins_out_of_the/dwyjcbb/?context=3
  3. Kyber: network Exchange between cryptocurrencies, similar to REQ. Features automatic coin conversions for payments. Also offers payment tools for developers and a cryptocurrency wallet.
  4. Achain: Building a boundless blockchain world like Req .
  5. Req: Exchange between cryptocurrencies.
  6. Bitshares: Exchange between cryptocurrencies. Noteworthy are the 1.5 second average block times and throughput potential of 100,000 transactions per second with currently 2,400 TPS having been proven. However, bitshares had several Scam accusations in the past.
  7. Loopring: A protocol that will enable higher liquidity between exchanges and personal wallets.
  8. ZRX: Open standard for dapps. Open, permissionless protocol allowing for ERC20 tokens to be traded on the Ethereum blockchain. In 0x protocol, orders are transported off-chain, massively reducing gas costs and eliminating blockchain bloat. Relayers help broadcast orders and collect a fee each time they facilitate a trade. Anyone can build a relayer.

Market 6 - Gaming

With an industry size of $108B worldwide, Gaming is one of the largest markets in the world. For sure, cryptocurrencies will want to have a share of that pie.
  1. Storm: Mobile game currency on a platform with 9 million players.
  2. Fun: A platform for casino operators to host trustless, provably-fair gambling through the use of smart contracts, as well as creating their own implementation of state channels for scalability.
  3. Electroneum: Mobile game currency They have lots of technical problems, such as several 51% attacks
  4. Wax: Marketplace to trade in-game items

Market 7 - Misc

There are various markets being tapped right now. They are all summed up under misc.
  1. OMG: Omise is designed to enable financial services for people without bank accounts. It works worldwide and with both traditional money and cryptocurrencies.
  2. Power ledger: Australian blockchain-based cryptocurrency and energy trading platform that allows for decentralized selling and buying of renewable energy. Unique market and rather untapped market in the crypto space.
  3. Populous: A platform that connects business owners and invoice buyers without middlemen. Invoice sellers get cash flow to fund their business and invoice buyers earn interest. Similar to OMG, small market.
  4. Monacoin: The first Japanese cryptocurrency. Focused on micro-transactions and based on a popular internet meme of a type-written cat. This makes it similar to Dogecoin. Very niche, tiny market.
  5. Revain: Legitimizing reviews via the blockchain. Interesting concept, though market not as big.
  6. Augur: Platform to forecast and make wagers on the outcome of real-world events (AKA decentralized predictions). Uses predictions for a “wisdom of the crowd” search engine. Not launched yet.
  7. Substratum: Revolutionzing hosting industry via per request billing as a decentralized internet hosting system. Uses a global network of private computers to create the free and open internet of the future. Participants earn cryptocurrency. Interesting concept.
  8. Veritaseum: Is supposed to be a peer to peer gateway, though it looks like very much like a scam.
  9. TRON: Tronix is looking to capitalize on ownership of internet data to content creators. However, they plagiarized their white paper, which is a no go. They apologized, so it needs to be seen how they will conduct themselves in the future. Extremely high market cap for not having a product, nor proof of concept.
  10. Syscoin: A cryptocurrency with a decentralized marketplace that lets people buy and sell products directly without third parties. Trying to remove middlemen like eBay and Amazon.
  11. Hshare: Most likely scam because of no code changes, most likely pump and dump scheme, dead community.
  12. BAT: An Ethereum-based token that can be exchanged between content creators, users, and advertisers. Decentralized ad-network that pays based on engagement and attention.
  13. Dent: Decentralizeed exchange of mobile data, enabling mobile data to be marketed, purchased or distributed, so that users can quickly buy or sell data from any user to another one.
  14. Ncash: End to end encrypted Identification system for retailers to better serve their customers .
  15. Factom Secure record-keeping system that allows companies to store their data directly on the Blockchain. The goal is to make records more transparent and trustworthy .

Market 8 - Social network

Web 2.0 is still going strong and Web 3.0 is not going to ignore it. There are several gaming tokens already out there and a few with decent traction already, such as Steem, which is Reddit with voting through money is a very interesting one.
  1. Mithril: As users create content via social media, they will be rewarded for their contribution, the better the contribution, the more they will earn
  2. Steem: Like Reddit, but voting with money. Already launched product and Alexa rank 1,000 Thumbs up.
  3. Rdd: Reddcoin makes the process of sending and receiving money fun and rewarding for everyone. Reddcoin is dedicated to one thing – tipping on social networks as a way to bring cryptocurrency awareness and experience to the general public.
  4. Kin: Token for the platform Kik. Kik has a massive user base of 400 million people. Replacing paying with FIAT with paying with KIN might get this token to mass adoption very quickly.

Market 9 - Fee token

Popular exchanges realized that they can make a few billion dollars more by launching their own token. Owning these tokens gives you a reduction of trading fees. Very handy and BNB (Binance Coin) has been one of the most resilient tokens, which have withstood most market drops over the last weeks and was among the very few coins that could show growth.
  1. BNB: Fee token for Binance
  2. Gas: Not a Fee token for an exchange, but it is a dividend paid out on Neo and a currency that can be used to purchase services for dapps.
  3. Kucoin: Fee token for Kucoin

Market 10 - Decentralized Data Storage

Currently, data storage happens with large companies or data centers that are prone to failure or losing data. Decentralized data storage makes loss of data almost impossible by distributing your files to numerous clients that hold tiny pieces of your data. Remember Torrents? Torrents use a peer-to-peer network. It is similar to that. Many users maintain copies of the same file, when someone wants a copy of that file, they send a request to the peer-to-peer network., users who have the file, known as seeds, send fragments of the file to the requester., he requester receives many fragments from many different seeds, and the torrent software recompiles these fragments to form the original file.
  1. Gbyte: Byteball data is stored and ordered using directed acyclic graph (DAG) rather than blockchain. This allows all users to secure each other's data by referencing earlier data units created by other users, and also removes scalability limits common for blockchains, such as blocksize issue.
  2. Siacoin: Siacoin is decentralized storage platform. Distributes encrypted files to thousands of private users who get paid for renting out their disk space. Anybody with siacoins can rent storage from hosts on Sia. This is accomplish via "smart" storage contracts stored on the Sia blockchain. The smart contract provides a payment to the host only after the host has kept the file for a given amount of time. If the host loses the file, the host does not get paid.
  3. Maidsafecoin: MaidSafe stands for Massive Array of Internet Disks, Secure Access for Everyone.Instead of working with data centers and servers that are common today and are vulnerable to data theft and monitoring, SAFE’s network uses advanced P2P technology to bring together the spare computing capacity of all SAFE users and create a global network. You can think of SAFE as a crowd-sourced internet. All data and applications reside in this network. It’s an autonomous network that automatically sets prices and distributes data and rents out hard drive disk space with a Blockchain-based storage solutions.When you upload a file to the network, such as a photo, it will be broken into pieces, hashed, and encrypted. The data is then randomly distributed across the network. Redundant copies of the data are created as well so that if someone storing your file turns off their computer, you will still have access to your data. And don’t worry, even with pieces of your data on other people’s computers, they won’t be able to read them. You can earn MadeSafeCoins by participating in storing data pieces from the network on your computer and thus earning a Proof of Resource.
  4. Storj: Storj aims to become a cloud storage platform that can’t be censored or monitored, or have downtime. Your files are encrypted, shredded into little pieces called 'shards', and stored in a decentralized network of computers around the globe. No one but you has a complete copy of your file, not even in an encrypted form.

Market 11 - Cloud computing

Obviously, renting computing power, one of the biggest emerging markets as of recent years, e.g. AWS and Digital Ocean, is also a service, which can be bought and managed via the blockchain.
  1. Golem: Allows easy use of Supercomputer in exchange for tokens. People worldwide can rent out their computers to the network and get paid for that service with Golem tokens.
  2. Elf: Allows easy use of Cloud computing in exchange for tokens.

Market 12 - Stablecoin

Last but not least, there are 2 stablecoins that have established themselves within the market. A stable coin is a coin that wants to be independent of the volatility of the crypto markets. This has worked out pretty well for Maker and DGD, accomplished through a carefully diversified currency fund and backing each token by 1g or real gold respectively. DO NOT CONFUSE DGD AND MAKER with their STABLE COINS DGX and DAI. DGD and MAKER are volatile, because they are the companies of DGX and DAI. DGX and DAI are the stable coins.
  1. DGD: Platform of the Stablecoin DGX. Every DGX coin is backed by 1g of gold and make use proof of asset consensus.
  2. Maker: Platform of the Stablecoin DAI that doesn't vary much in price through widespread and smart diversification of assets.
EDIT: Added a risk factor from 0 to 10. The baseline is 2 for any crypto. Significant scandals, mishaps, shady practices, questionable technology, increase the risk factor. Not having a product yet automatically means a risk factor of 6. Strong adoption and thus strong scrutiny or positive community lower the risk factor.
EDIT2: Added a subjective potential factor from 0 to 10, where its overall potential and a small or big market cap is factored in. Bitcoin with lots of potential only gets a 9, because of its massive market cap, because if Bitcoin goes 10x, smaller coins go 100x, PIVX gets a 10 for being as good as Monero while carrying a 10x smaller market cap, which would make PIVX go 100x if Monero goes 10x.
submitted by galan77 to CryptoCurrency [link] [comments]

Electricity : Fan Theory

First off I'll start off by saying I truly believe this show to be a case of "the plot doesn't matter", it serves rather, as an engine that fuels exploration into bigger picture stuff -- commentary on capitalism, a mirror to examine our own emotion as shown through character's reactions to events. So if I'm way off base here it doesn't matter and if i'm spot on it doesn't matter.
Nonetheless, I'm going to attempt and present what may serve as a means of "understanding" the why of the season finale.
The cosmic error we were informed of this season, twins, is also seen in computers, these technically are called soft errors, but they are sometimes caused by cosmic rays. Essentially, cosmic rays have a statistically significant chance to change a piece of data stored in memory. This change in data has the power to change the way a system runs if not checked and corrected but does not imply it has affected it or will whether or not it is caught or if that data can not be recovered.
Twins present a "cosmic error" because where one sperm enters, two babies leave. The race condition of millions of sperm trying to fertilize an egg is solved by simply allowing only one sperm to do so (most of the time, maybe it happens, idk). But that doesn't stop a random split from happening that can potentially put the mom's life at greater risk of failing to give birth by doubling the load.
Concurrency in computer programming is where two processes are able to run simultaneously. A race condition is made when those two processes enter a critical part of their execution at the same time, that is to say try to access the same piece of data from memory at the same time. Put simply, if you and friend each opened a cupboard, checked how many apples were stored, add a number of apples, each exclusively, and mark down how many should now be in the cupboard you both should know how many are in the cupboard right? Nope. If there's one in the cupboard and you add two, you've marked down that there are 3 apples in the cupboard. However, your friend has decided to put one and did it before you put yours back. Now you and your friend both don't know how many apples are in the cupboard, as he thinks there are two when both of you are wrong -- there's four. So the next time you both go back to check your data is completely unreliable and subsequent calculations will compound how incorrect you are. Even if you both end up with the correct number at the end, it's a fluke and more still missing the error. This only makes sense if you take a literal blind approach in which is you only can see what was stored once when opening it and cannot double check what was written down, you have to trust what was stored after opening as it should match what's written down. The answer in programming can't always be store it twice in memory (here memory means random access, not disk stored).
One way of solving this is through the implementation of mutual exclusion, also called a mutex. The simplest example of a mutex, both actually and in our example is putting a lock on the cupboard with a single key you must use to unlock when checking, lock while adding apples, and then give up so your friend might access the cupboard. This ensures that you both have the right data each time you check. I'm skipping over some stuff because the piece that's important is that only one can be inside at any given time.
Semaphores are another way of achieving this, but instead of using a key a system of counting is put into place. this is done by knowing how many of a given resource are available at any given time and recording it. Currency, often believed to be rooted in a gold standard, uses this system to account for inflation or whatever. Funny enough bitcoin actually IS founded on a gold standard. One that so far can not be manipulated. Alchemy presents a logical problem for this, since gold cannot be created through chemistry and thus there is a finite amount of it. Same way there is a finite amount of bitcoin that will ever enter circulation.
Today, gold is still thought of as valuable. It's brought up early on in the series by Dud that the more gold that exists the less special it is, and thus would lose its value. One of the most historically valuable properties of gold is its malleability, and prettyness which allowed for more ornate objects of beauty to be crafted without the need for advanced smelting and casting. Today that is of much less concern.
Silver, on the other hand, in today's modern age, has the advantage of being the most electrically conductive metal we know about. Second comes copper and in third is gold. Guess which one we use most often in circuitry and in wiring buildings. Conductivity is literally based on the Silver standard.
While in many ways Dud may be seen as inferior to Liz, intelligence wise, money wise -- double down on a bad interest loan by paying it off with a worse interest loan vs. paying it off slowly and painfully, etc. He is often seen to be coming out ahead in terms of sheer happiness and fortitude where Liz cannot. If one sperm in a race produced two non identical babies, neither inherently came in first from the get go. As I said above, neither metal, gold or silver, wins in terms of actual utility in the conductivity battle. However, Dud enters the lodge first, and gets struck by lightning.
Given the information we are given in the first season we are not made privy to a lot of things that become important. Primarily, that the scrolls might be the solution to cracking bitcoin and thus disrupting its backed worth based on the gold standard. So, here, the "cosmic error" of twins and the challenge it presents in this concurrent system is brought into the main stage. Liz and Dud are both on a quest but neither really knows what or why. Both survive extreme conditions they are put in both voluntarily and involuntarily respectively.
This all changes when Liz enters the Lodge. Up until this point Liz has not entered the lodge out of her own "choice", free will arguments here be damned. She doesn't go in because she doesn't care. It takes Dud not answering her texts for her to enter and when she does so the Lodge corrects for it.
If detected, a soft error may be totally recovered from, but if the system has crashed, the computer needs to be "rebooted" before any data correction can occur. If they were both in the Lodge at the same time due to a cosmic error which, in terms of my example above, changes the number of apples in the cupboard while it's locked or changes the total number of apples available. If they weren't physically in the Lodge at the same time holds no bearing, it's that they were a part of the lodge. As long as Liz is accessing the Lodge Dud cannot. While humans allegedly built the Lodge, it is impossibly complex to the point where it has literal doors it can throw you backwards out of, possibly as a way of rebirth and possibly as a way of creating a "plant". Liz just as easily could have not been kept on her feet had her friends not been there the same way Duds was from his near death experiences, however they were there.
For a door that opens out, and that no one knows how to access, it sure as shit is not protected from the obvious safety-precaution; securing it from being opened from the outside. Maybe it has been attempted but it just always fell down. But when the light next to the door is being repaired for safety reasons it's not like anyone says hey if we don't know where this door leads and idk, maybe we have some voluntarily blind girl living and running around fixing her seizure problems like, let's maybe just take care of fix this other hazard.
Brute force is used to open doors all over the place in the show, even as far as being used as a "lockpick" (axe), but is never used to unlock THAT door, at least successfully or on screen. Maybe it can't be bruteforced the same way brute force can't be used to cheat bitcoin (it can't, at least today). Quantum computing poses a very real threat to this, and actually every "lock" we think is secure. Like, won't get into it too much and it's not this simple but imagine just asking the computer what your neighbors wifi password is and it just gives you the answer without having to try an approaching infinite number of possible solutions. A very real threat to bitcoin and as a matter of fact all modern encryption, however to scare you less if we're smart enough to pull it off we're at least smart enough to solve the problem before we get there (i've been assured by our friends at google that their contingency plans can't fail, they also told me the titanic never sank)

This at least approaches an explanation to the apparent deus ex machina that is Dud's death. The Lodge is not a joke, and has real control of things. While running it exposes powerful implications into the lives of its members and those around them. I think it's clear here that the duty of the knights of the lodge, to protect it, has greater meaning than we know.

To this same affect, we see another parallel for modern networked computing to work reliably -- redundancy. One man cannot keep the Lodge alive himself, nor can dwindling numbers of protectors. So make more of them, and why not spread them out so if an entire area is affected by say 10 hurricanes at once, it doesn't take down the whole lodge and working knowledge of things. Redundancy in computing means basically the same thing, keep servers in more than one place and have the data they serve backed up and available in more than one place. This also mitigates the probability of data loss, though not entirely. As the lodge in London had no idea the scrolls were removed and the xeroxes made may have gone the way of Orbis, and potentially only one copy of until they were recovered in Mexico.

So far, my only intention has been to make parallels that may have not been made so excuse me while I hurl myself over the side of the boat and bring this to my conclusion on what to make of all this. Skip ahead 2 paragraphs to ignore it.
Simulation Theory. As the always headstrong u/L_Marvin_Metz says so poignantly says "the earth is hollow". While, maybe meant to be taken at face value, it probably isn't. But figuratively speaking, definitely. So many of life's pursuits are hollow and we often see characters in the show being punished for these impure pursuits. What else could allow for impossible tunnels, resurrection, portals and magic? A lot of things but nonetheless, Simulation theory would also give a lot for credence to all the talk about "getting out", a reason why Liz and Dud can't be in the Lodge at the same time beyond some deus ex machina. Liz needs a reason to figure out the system and for her it's finding her brother. Whether or not she can (probably can't, if he is rebooted/born again why would that be up to us). Or that's what I'm going to postulate for season 3.
Either way the scrolls are there because of reasons no one intended, and all that talk about destiny and painting the future but not getting to actually make it up begin to make sense. The lodge will fulfill its purpose because it already has. The absurdity of simulation theory requires the possibility of multiple layers of simulation, as above and so too is below, also begins to make sense in this context. This could literally go anywhere so I'm gonna stop at this point. Dud is dead, for now in a sense. However, that's if him crashing out of that door covered in dirt wasn't just him falling out in the same sequence we observer it.
There may have been for a way less complex reason than I am making - that being actor availability and the inability to pay the highly in-demand Wyatt Russell both for opportunity cost on a show with a future unknown and for his actual need to have a minimum price that the show may not be able to pay.
However limited his role is has yet to be seen, and hopefully for the sake of everything will be seen next year, but we saw him get an emmy nomination in the finale -- at least I truly believe that (specifically when he denied the knighthood). But it could be from any episode this season probably. If he takes home the gold who knows what that extra prestige will do to any budgetary restraints on AMC's wallet in the future. Clearly he likes being in this show, so I see know reason why he wouldn't return as a lead if i'm at all correct about any of this.
Point of this being that we have no idea if any of this is intentional, if it was written in due to the unknown future of the show even after being renewed last year, always the plan, or not even touching on the plan. That's why deus ex machina can be both brilliant and convenient (Adaptation). If you execute it well, we, as an audience, can't say for certain how it entered the arena. I mean, specifically as a season finale. Plenty of other examples of it in the show, obviously. almost like it's part of a greater theme?
submitted by solarus to Lodge49 [link] [comments]

Is Crypto Currency truly at risk due to Quantum Computers, and what can you do about it?

Is Crypto Currency truly at risk due to Quantum Computers, and what can you do about it?

There is no denying that the Quantum revolution is coming. Security protocols for the internet, banking, telecommunications, etc... are all at risk, and your Bitcoins (and alt-cryptos) are next!
This article is not really about quantum computers[i], but, rather, how they will affect the future of cryptocurrency, and what steps a smart investor will take. Since this is a complicated subject, my intention is to provide just enough relevant information without being too “techy.”

The Quantum Evolution

In 1982, Nobel winning physicist, Richard Feynman, hypothesized how quantum computers[ii] would be used in modern life.
Just one year later, Apple released the “Apple Lisa”[iii] – a home computer with a 7.89MHz processor and a whopping 5MB hard drive, and, if you enjoy nostalgia, it used 5.25in floppy disks.
Today, we walk around with portable devices that are thousands of times more powerful, and, yet, our modern day computers still work in a simple manner, with simple math, and simple operators[iv]. They now just do it so fast and efficient that we forget what’s happening behind the scenes.
No doubt, the human race is accelerating at a remarkable speed, and we’ve become obsessed with quantifying everything - from the everyday details of life to the entire universe[v]. Not only do we know how to precisely measure elementary particles, we also know how to control their actions!
Yet, even with all this advancement, modern computers cannot “crack” cryptocurrencies without the use of a great deal more computing power, and since it’s more than the planet can currently supply, it could take millions, if not billions, of years.
However, what current computers can’t do, quantum computers can!
So, how can something that was conceptualized in the 1980’s, and, as of yet, has no practical application, compromise cryptocurrencies and take over Bitcoin?
To best answer this question, let’s begin by looking at a bitcoin address.

What exactly is a Bitcoin address?

Well, in layman terms, a Bitcoin address is used to send and receive Bitcoins, and looking a bit closer (excuse the pun), it has two parts:[vi]
A public key that is openly shared with the world to accept payments. A public key that is derived from the private key. The private key is made up of 256 bits of information in a (hopefully) random order. This 256 bit code is 64 characters long (in the range of 0-9/a-f) and further compressed into a 52 character code (using RIPEMD-160).
NOTE: Although many people talk about Bitcoin encryption, Bitcoin does not use Encryption. Instead, Bitcoin uses a hashing algorithm (for more info, please see endnote below[vii]).
Now, back to understanding the private key:
The Bitcoin address “1EHNa6Q4Jz2uvNExL497mE43ikXhwF6kZm” translates to a private key of “5HpHagT65TZzG1PH3CSu63k8DbpvD8s5ip4nEB3kEsreAnchuDf” which further translates to a 256 bit private key of “0000000000000000000000000000000000000000000000000000000000000001” (this should go without saying, but do not use this address/private key because it was compromised long ago.) Although there are a few more calculations that go behind the scenes, these are the most relevant details.
Now, to access a Bitcoin address, you first need the private key, and from this private key, the public key is derived. With current computers, it’s classically impractical to attempt to find a private key based on a public key. Simply put, you need the private key to know the public key.
However, it has already been theorized (and technically proven) that due to private key compression, multiple private keys can be used to access the same public key (aka address). This means that your Bitcoin address has multiple private keys associated with it, and, if someone accidentally discovers or “cracks” any one of those private keys, they have access to all the funds in that specific address.
There is even a pool of a few dedicated people hunting for these potential overlaps[viii], and they are, in fact, getting very efficient at it. The creator of the pool also has a website listing every possible Bitcoin private key/address in existence[ix], and, as of this writing, the pool averages 204 trillion keys per day!
But wait! Before you get scared and start panic selling, the probability of finding a Bitcoin address containing funds (or even being used) is highly unlikely – nevertheless, still possible!
However, the more Bitcoin users, the more likely a “collision” (finding overlapping private/public key pairs)! You see, the security of a Bitcoin address is simply based on large numbers! How large? Well, according to my math, 1.157920892373x1077 potential private keys exist (that number represents over 9,500 digits in length! For some perspective, this entire article contains just over 14,000 characters. Therefore, the total number of Bitcoin addresses is so great that the probability of finding an active address with funds is infinitesimal.

So, how do Quantum Computers present a threat?

At this point, you might be thinking, “How can a quantum computer defeat this overwhelming number of possibilities?” Well, to put it simple; Superposition and Entanglement[x].
Superposition allows a quantum bit (qbit) to be in multiple states at the same time. Entanglement allows an observer to know the measurement of a particle in any location in the universe. If you have ever heard Einstein’s quote, “Spooky Action at a Distance,” he was talking about Entanglement!
To give you an idea of how this works, imagine how efficient you would be if you could make your coffee, drive your car, and walk your dog all at the same time, while also knowing the temperature of your coffee before drinking, the current maintenance requirements for your car, and even what your dog is thinking! In a nutshell, quantum computers have the ability to process and analyze countless bits of information simultaneously – and so fast, and in such a different way, that no human mind can comprehend!
At this stage, it is estimated that the Bitcoin address hash algorithm will be defeated by quantum computers before 2028 (and quite possibly much sooner)! The NSA has even stated that the SHA256 hash algorithm (the same hash algorithm that Bitcoin uses) is no longer considered secure, and, as a result, the NSA has now moved to new hashing techniques, and that was in 2016! Prior to that, in 2014, the NSA also invested a large amount of money in a research program called “Penetrating Hard Targets project”[xi] which was used for further Quantum Computer study and how to break “strong encryption and hashing algorithms.” Does NSA know something they’re not saying or are they just preemptively preparing?
Nonetheless, before long, we will be in a post-quantum cryptography world where quantum computers can crack crypto addresses and take all the funds in any wallet.

What are Bitcoin core developers doing about this threat?

Well, as of now, absolutely nothing. Quantum computers are not considered a threat by Bitcoin developers nor by most of the crypto-community. I’m sure when the time comes, Bitcoin core developers will implement a new cryptographic algorithm that all future addresses/transactions will utilize. However, will this happen before post-quantum cryptography[xii]?
Moreover, even after new cryptographic implementation, what about all the old addresses? Well, if your address has been actively used on the network (sending funds), it will be in imminent danger of a quantum attack. Therefore, everyone who is holding funds in an old address will need to send their funds to a new address (using a quantum safe crypto-format). If you think network congestion is a problem now, just wait…
Additionally, there is the potential that the transition to a new hashing algorithm will require a hard fork (a soft fork may also suffice), and this could result in a serious problem because there should not be multiple copies of the same blockchain/ledger. If one fork gets attacked, the address on the other fork is also compromised. As a side-note, the blockchain Nebulas[xiii] will have the ability to modify the base blockchain software without any forks. This includes adding new and more secure hashing algorithms over time! Nebulas is due to be released in 2018.

Who would want to attack Bitcoin?

Bitcoin and cryptocurrency represent a threat to the controlling financial system of our modern economy. Entire countries have outright banned cryptocurrency[xiv] and even arrested people[xv], and while discrediting it, some countries are copying cryptocurrency to use (and control) in their economy[xvi]!
Furthermore, Visa[xvii], Mastercard[xviii], Discover[xix], and most banks act like they want nothing to do with cryptocurrency, all the while seeing the potential of blockchain technology and developing their own[xx]. Just like any disruptive technology, Bitcoin and cryptocurrencies have their fair share of enemies!
As of now, quantum computers are being developed by some of the largest companies in the world, as well as private government agencies.
No doubt, we will see a post-quantum cryptography world sooner than most realize. By that point, who knows how long “3 letter agencies” will have been using quantum technology - and what they’ll be capable of!

What can we do to protect ourselves today?

Of course, the best option is to start looking at how Bitcoin can implement new cryptographic features immediately, but it will take time, and we have seen how slow the process can be just for scaling[xxi].
The other thing we can do is use a Bitcoin address only once for outgoing transactions. When quantum computers attack Bitcoin (and other crypto currencies), their first target will be addresses that have outgoing transactions on the blockchain that contain funds.
This is due to the fact that when computers first attempt to crack a Bitcoin address, the starting point is when a transaction becomes public. In other words, when the transaction is first signed – a signed transaction is a digital signature derived from the private key, and it validates the transaction on the network. Compared to classical computers, quantum computers can exponentially extrapolate this information.
Initially, Bitcoin Core Software might provide some level of protection because it only uses an address once, and then sends the remaining balance (if any) to another address in your keypool. However, third party Bitcoin wallets can and do use an address multiple times for outgoing transactions. For instance, this could be a big problem for users that accept donations (if they don’t update their donation address every time they remove funds). The biggest downside to Bitcoin Core Software is the amount of hard-drive space required, as well as diligently retaining an up-to-date copy of the entire blockchain ledger.
Nonetheless, as quantum computers evolve, they will inevitably render SHA256 vulnerable, and although this will be one of the first hash algorithms cracked by quantum computers, it won’t be the last!

Are any cryptocurrencies planning for the post-quantum cryptography world?

Yes, indeed, there are! Here is a short list of ones you may want to know more about:

Full disclosure:

Although I am in no way associated with any project listed above, I do hold coins in all as well as Bitcoin, Litecoin and many others.
The thoughts above are based on my personal research, but I make no claims to being a quantum scientist or cryptographer. So, don’t take my word for anything. Instead, do your own research and draw your own conclusions. I’ve included many references below, but there are many more to explore.
In conclusion, the intention of this article is not to create fear or panic, nor any other negative effects. It is simply to educate. If you see an error in any of my statements, please, politely, let me know, and I will do my best to update the error.
Thanks for reading!

References

[i] https://www.youtube.com/watch?v=JhHMJCUmq28 – A great video explaining quantum computers.
[ii] https://www.doc.ic.ac.uk/~nd/surprise_97/journal/vol4/spb3/ - A brief history of quantum computing.
[iii] https://en.wikipedia.org/wiki/Apple_Lisa - More than you would ever want to know about the Apple Lisa.
[iv] https://www.youtube.com/watch?v=tpIctyqH29Q&list=PL8dPuuaLjXtNlUrzyH5r6jN9ulIgZBpdo - Want to learn more about computer science? Here is a great crash course for it!
[v] https://www.collinsdictionary.com/dictionary/english/quantify - What does quantify mean?
[vi] https://en.bitcoin.it/wiki/Private_key - More info about Bitcoin private keys.
[vii] https://www.securityinnovationeurope.com/blog/page/whats-the-difference-between-hashing-and-encrypting - A good example of the deference between Hash and Encryption
[viii] https://lbc.cryptoguru.org/stats - The Large Bitcoin Collider.
[ix] http://directory.io/ - A list of every possible Bitcoin private key. This website is a clever way of converting the 64 character uncompressed key to the private key 128 at a time. Since it is impossible to save all this data in a database and search, it is not considered a threat! It’s equated with looking for a single needle on the entire planet.
[x] https://uwaterloo.ca/institute-for-quantum-computing/quantum-computing-101#Superposition-and-entanglement – Brief overview of Superposition and Entanglement.
[xi] https://www.washingtonpost.com/world/national-security/nsa-seeks-to-build-quantum-computer-that-could-crack-most-types-of-encryption/2014/01/02/8fff297e-7195-11e3-8def-a33011492df2_story.html?utm_term=.e05a9dfb6333 – A review of the Penetrating Hard Targets project.
[xii] https://en.wikipedia.org/wiki/Post-quantum_cryptography - Explains post-quantum cryptography.
[xiii] https://www.nebulas.io/ - The nebulas project has some amazing technology planned in their roadmap. They are currently in testnet stage with initial launch expected taking place in a few weeks. If you don’t know about Nebulas, you should check them out. [xiv] https://en.wikipedia.org/wiki/Legality_of_bitcoin_by_country_or_territory - Country’s stance on crypto currencies.
[xv] https://www.cnbc.com/2017/08/30/venezuela-is-one-of-the-worlds-most-dangerous-places-to-mine-bitcoin.html - Don’t be a miner in Venezuela!
[xvi] http://www.newsweek.com/russia-bitcoin-avoid-us-sanctions-cryptocurrency-768742 - Russia’s plan for their own crypto currency.
[xvii] http://www.telegraph.co.uk/technology/2018/01/05/visa-locks-bitcoin-payment-cards-crackdown-card-issue - Recent attack from visa against crypto currency.
[xviii] https://www.ccn.com/non-government-digital-currency-junk-says-mastercard-ceo-rejecting-bitcoin/ - Mastercards position about Bitcoin.
[xix] http://www.livebitcoinnews.com/discover-joins-visa-mastercard-barring-bitcoin-support/ - Discovers position about Bitcoin.
[xx] http://fortune.com/2017/10/20/mastercard-blockchain-bitcoin/ - Mastercard is making their own blockchain.
[xxi] https://bitcoincore.org/en/2015/12/21/capacity-increase/ - News about Bitcoin capacity. Not a lot of news…
[xxii] https://learn.iota.org/faq/what-makes-iota-quantum-secure - IOTA and quantum encryption.
[xxiii] https://eprint.iacr.org/2011/191.pdf - The whitepaper of Winternitz One-Time Signature Scheme
[xxiv] https://cardanoroadmap.com/ - The Cardano project roadmap.
[xxv] https://eprint.iacr.org/2017/490 - More about the BLISS hash system.
[xxvi] https://www.ethereum.org/ - Home of the Ethereum project.
[xxvii] https://en.wikipedia.org/wiki/SHA-3#Security_against_quantum_attacks – SHA3 hash algorithm vs quantum computers.
[xxviii] https://en.wikipedia.org/wiki/Lamport_signature - Lamport signature information.
[xxix] https://theqrl.org/ - Home of the Quantum Resistant Ledger project.
submitted by satoshibytes to CryptoCurrency [link] [comments]

Which are your top 5 coins out of the top100? An analysis.

I am putting together my investment portfolio for 2018 and made a complete summary of the current Top 100. Interestingly, I noticed that all coins can be categorized into 12 markets. Which markets do you think will play the biggest role in the coming year?
Here is a complete overview of all coins in an excel sheet including name, a full description, market, TPS, risk profile, time since launch (negative numbers mean that they are launching that many months in the future) and market cap. You can also sort by all of these fields of course. Coins written in bold are the strongest contenders within their market either due to having the best technology or having a small market cap and still excellent technology and potential. https://docs.google.com/spreadsheets/d/1s8PHcNvvjuy848q18py_CGcu8elRGQAUIf86EYh4QZo/edit#gid=0
The 12 markets are
  1. Currency 13 coins
  2. Platform 25 coins
  3. Ecosystem 9 coins
  4. Privacy 9 coins
  5. Currency Exchange Tool 8 coins
  6. Gaming & Gambling 4 coins
  7. Misc 15 coins
  8. Social Network 4 coins
  9. Fee Token 3 coins
  10. Decentralized Data Storage 4 coins
  11. Cloud Computing 2 coins
  12. Stable Coin 3 coins
Before we look at the individual markets, we need to take a look of the overall market and its biggest issue, scalability, first:
Cryptocurrencies aim to be a decentralized currency that can be used worldwide. Their goal is to replace dollar, Euro, Yen, all FIAT currencies globally. The coin that will achieve that will be worth several trillion dollars.
Bitcoin can only process 7 transactions per second (TPS) currently. In order to replace all FIAT, it would need to perform at least at VISA levels, which usually processes around 3,000 TPS, up to 25,000 TPS during peak times and a maximum of 64,000 TPS. That means that this cryptocurrency would need to be able to perform at least several thousand TPS. However, a ground breaking technology should not look at current technology to set a goal for its use, i.e. estimating the number of emails sent in 1990 based on the number of faxes sent wasn’t a good estimate.
For that reason, 10,000 TPS is the absolute baseline for a cryptocurrency that wants to replace FIAT. This brings me to IOTA, which wants to connect all 80 billion IoT devices that are expected to exist by 2025, which constantly communicate with each other, possibly creating 80 billion or more transactions per second. This is the benchmark that cryptocurrencies should be aiming for. Currently, 8 billion devices are connected to the Internet.
With its Lightning network recently launched, Bitcoin is realistically looking at 50,000 possible TPS soon. Other notable cryptocurrencies besides IOTA and Bitcoin are Nano with 7,000 TPS already tested, Dash with several billion TPS possible with Masternodes, Neo, LISK and RHOC with 100,000 TPS by 2020, Ripple with 50,000 TPS, Ethereum with 10,000 TPS with Sharding.
However, it needs to be said that scalability usually goes at the cost of decentralization and security. So, it needs to be seen, which of these technologies can prove themselves decentralized while maintaining high TPS.
Without further ado, here are the coins of the first market. Each market is sorted by market cap.

Market 1 - Currency:

  1. Bitcoin: 1st generation blockchain with currently bad scalability, though the implementation of the Lightning Network looks promising and could alleviate most scalability and high energy use concerns.
  2. Ripple: Centralized currency that might become very successful due to tight involvement with banks and cross-border payments for financial institutions; banks and companies like Western Union and Moneygram (who they are currently working with) as customers customers. However, it seems they are aiming for more decentralization now.https://ripple.com/dev-blog/decentralization-strategy-update/. Has high TPS due to Proof of Correctness algorithm.
  3. Bitcoin Cash: Bitcoin fork with the difference of having an 8 times bigger block size, making it 8 times more scalable than Bitcoin currently. Further block size increases are planned. Only significant difference is bigger block size while big blocks lead to further problems that don't seem to do well beyond a few thousand TPS. Opponents to a block size argue that increasing the block size limit is unimaginative, offers only temporary relief, and damages decentralization by increasing costs of participation. In order to preserve decentralization, system requirements to participate should be kept low. To understand this, consider an extreme example: very big blocks (1GB+) would require data center level resources to validate the blockchain. This would preclude all but the wealthiest individuals from participating.Community seems more open than Bitcoin's though.
  4. Litecoin : Little brother of Bitcoin. Bitcoin fork with different mining algorithm but not much else.Copies everything that Bitcoin does pretty much. Lack of real innovation.
  5. Dash: Dash (Digital Cash) is a fork of Bitcoin and focuses on user ease. It has very fast transactions within seconds, low fees and uses Proof of Service from Masternodes for consensus. They are currently building a system called Evolution which will allow users to send money using usernames and merchants will find it easy to integrate Dash using the API. You could say Dash is trying to be a PayPal of cryptocurrencies. Currently, cryptocurrencies must choose between decentralization, speed, scalability and can pick only 2. With Masternodes, Dash picked speed and scalability at some cost of decentralization, since with Masternodes the voting power is shifted towards Masternodes, which are run by Dash users who own the most Dash.
  6. IOTA: 3rd generation blockchain called Tangle, which has a high scalability, no fees and instant transactions. IOTA aims to be the connective layer between all 80 billion IOT devices that are expected to be connected to the Internet in 2025, possibly creating 80 billion transactions per second or 800 billion TPS, who knows. However, it needs to be seen if the Tangle can keep up with this scalability and iron out its security issues that have not yet been completely resolved.
  7. Nano: 3rd generation blockchain called Block Lattice with high scalability, no fees and instant transactions. Unlike IOTA, Nano only wants to be a payment processor and nothing else, for now at least. With Nano, every user has their own blockchain and has to perform a small amount of computing for each transaction, which makes Nano perform at 300 TPS with no problems and 7,000 TPS have also been tested successfully. Very promising 3rd gen technology and strong focus on only being the fastest currency without trying to be everything.
  8. Decred: As mining operations have grown, Bitcoin’s decision-making process has become more centralized, with the largest mining companies holding large amounts of power over the Bitcoin improvement process. Decred focuses heavily on decentralization with their PoW Pos hybrid governance system to become what Bitcoin was set out to be. They will soon implement the Lightning Network to scale up. While there do not seem to be more differences to Bitcoin besides the novel hybrid consensus algorithm, which Ethereum, Aeternity and Bitcoin Atom are also implementing, the welcoming and positive Decred community and professoinal team add another level of potential to the coin.
  9. Bitcoin Atom: Atomic Swaps and hybrid consenus. This looks like the only Bitcoin clone that actually is looking to innovate next to Bitcoin Cash.
  10. Dogecoin: Litecoin fork, fantastic community, though lagging behind a bit in technology.
  11. Bitcoin Gold: A bit better security than bitcoin through ASIC resistant algorithm, but that's it. Not that interesting.
  12. Digibyte: Digibyte's PoS blockchain is spread over a 100,000+ servers, phones, computers, and nodes across the globe, aiming for the ultimate level of decentralization. DigiByte’s adoption over the past four years has been slow. The DigiByte website offers a lot of great marketing copy and buzzwords. However, there’s not much technical information about what they have planned for the future. You could say Digibyte is like Bitcoin, but with shorter blocktimes and a multi-algorithm. However, that's not really a difference big enough to truly set themselves apart from Bitcoin, since these technologies could be implemented by any blockchain without much difficulty. Their decentralization is probably their strongest asset, however, this also change quickly if the currency takes off and big miners decide to go into Digibyte.
  13. Bitcoin Diamond Asic resistant Bitcoin and Copycat

Market 2 - Platform

Most of the cryptos here have smart contracts and allow dapps (Decentralized apps) to be build on their platform and to use their token as an exchange of value between dapp services.
  1. Ethereum: 2nd generation blockchain that allows the use of smart contracts. Bad scalability currently, though this concern could be alleviated by the soon to be implemented Lightning Network aka the Raiden Network, Plasma and its Sharding concept.
  2. EOS: Promising technology that wants to be able do everything, from smart contracts like Ethereum, scalability similar to Nano with 1000 tx/second + near instant transactions and zero fees, to also wanting to be a platform for dapps. However, EOS doesn't have a product yet and everything is just promises still. There are lots of red flags, e.g. having dumped $500 million Ether over the last 2 months and possibly bought back EOS to increase the size of their ICO, which has been going on for over a year and has raised several billion dollars. All in all, their market cap is way too high for that and not even having a product. However, Mainnet release is in 1 month, which could change everything.
  3. Cardano: Similar to Ethereum/EOS, however, only promises made with no delivery yet, highly overrated right now. Interesting concept though. Market cap way too high for not even having a product. Somewhat promising technology.
  4. VeChain: Singapore-based project that’s building a business enterprise platform and inventory tracking system. Examples are verifying genuine luxury goods and food supply chains. Has one of the strongest communities in the crypto world. Most hyped token of all, with merit though.
  5. Neo: Neo is a platform, similar to Eth, but more extensive, allowing dapps and smart contracts, but with a different smart contract gas system, consensus mechanism (PoS vs. dBfT), governance model, fixed vs unfixed supply, expensive contracts vs nearly free contracts, different ideologies for real world adoption. There are currently only 9 nodes, each of which are being run by a company/entity hand selected by the NEO council (most of which are located in china) and are under contract. This means that although the locations of the nodes may differ, ultimately the neo council can bring them down due to their legal contracts. In fact this has been done in the past when the neo council was moving 50 million neo that had been locked up. Also dbft (or neo's implmentation of it) has failed underload causing network outages during major icos. The first step in decentralization is that the NEO Counsel will select trusted nodes (Universities, business partners, etc.) and slowly become less centralized that way. The final step in decentralization will be allowing NEO holders to vote for new nodes, similar to a DPoS system (ARK/EOS/LISK). NEO has a regulation/government friendly ideology. Finally they are trying to work undewith the Chinese government in regards to regulations. If for some reason they wanted it shut down, they could just shut it down.
  6. Stellar:PoS system, similar goals as Ripple, but more of a platform than only a currency. 80% of Stellar are owned by Stellar.org still, making the currency centralized.
  7. Ethereum classic: Original Ethereum that decided not to fork after a hack. The Ethereum that we know is its fork. Uninteresing, because it has a lot of less resources than Ethereum now and a lot less community support.
  8. Ziliqa: Zilliqa is building a new way of sharding. 2400 tpx already tested, 10,000 tps soon possible by being linearly scalable with the number of nodes. That means, the more nodes, the faster the network gets. They are looking at implementing privacy as well.
  9. QTUM: Enables Smart contracts on the Bitcoin blockchain. Useful.
  10. Icon: Korean ethereum. Decentralized application platform that's building communities in partnership with banks, insurance providers, hospitals, and universities. Focused on ID verification and payments.
  11. LISK: Lisk's difference to other BaaS is that side chains are independent to the main chain and have to have their own nodes. Similar to neo whole allows dapps to deploy their blockchain to. Like most cryptocurrencies, Lisk is currently somewhat centralized with a small group of members owning more than 50% of the delegated positions. Lisk plans to change the consensus algorithm for that reason in the near future.
  12. Rchain: Similar to Ethereum with smart contract, though much more scalable at an expected 40,000 TPS and possible 100,000 TPS. Not launched yet. No product launched yet, though promising technology. Not overvalued, probably at the right price right now.
  13. ARDR: Similar to Lisk. Ardor is a public blockchain platform that will allow people to utilize the blockchain technology of Nxt through the use of child chains. A child chain, which is a ‘light’ blockchain that can be customized to a certain extent, is designed to allow easy self-deploy for your own blockchain. Nxt claims that users will "not need to worry" about security, as that part is now handled by the main chain (Ardor). This is the chief innovation of Ardor. Ardor was evolved from NXT by the same company. NEM started as a NXT clone.
  14. Ontology: Similar to Neo. Interesting coin
  15. Bytom: Bytom is an interactive protocol of multiple byte assets. Heterogeneous byte-assets (indigenous digital currency, digital assets) that operate in different forms on the Bytom Blockchain and atomic assets (warrants, securities, dividends, bonds, intelligence information, forecasting information and other information that exist in the physical world) can be registered, exchanged, gambled and engaged in other more complicated and contract-based interoperations via Bytom.
  16. Nxt: Similar to Lisk
  17. Aeternity: We’ve seen recently, that it’s difficult to scale the execution of smart contracts on the blockchain. Crypto Kitties is a great example. Something as simple as creating and trading unique assets on Ethereum bogged the network down when transaction volume soared. Ethereum and Zilliqa address this problem with Sharding. Aeternity focuses on increasing the scalability of smart contracts and dapps by moving smart contracts off-chain. Instead of running on the blockchain, smart contracts on Aeternity run in private state channels between the parties involved in the contracts. State channels are lines of communication between parties in a smart contract. They don’t touch the blockchain unless they need to for adjudication or transfer of value. Because they’re off-chain, state channel contracts can operate much more efficiently. An important aspect of smart contract and dapp development is access to outside data sources. This could mean checking the weather in London, score of a football game, or price of gold. Oracles provide access to data hosted outside the blockchain. In many blockchain projects, oracles represent a security risk and potential point of failure, since they tend to be singular, centralized data streams. Aeternity proposes decentralizing oracles with their oracle machine. Doing so would make outside data immutable and unchangeable once it reaches Aeternity’s blockchain. Aeternity’s network runs on on a hybrid of proof of work and proof of stake. Founded by a long-time crypto-enthusiast and early colleague of Vitalik Buterin, Yanislav Malahov. Promising concept though not product yet
  18. Stratis: Different to LISK, Stratis will allow businesses and organizations to create their own blockchain according to their own needs, but secured on the parent Stratis chain. Stratis’s simple interface will allow organizations to quickly and easily deploy and/or test blockchain functionality of the Ethereum, BitShares, BitCoin, Lisk and Stratis environements.
  19. Status: Status provides access to all of Ethereum’s decentralized applications (dapps) through an app on your smartphone. It opens the door to mass adoption of Ethereum dapps by targeting the fastest growing computer segment in the world – smartphone users.
  20. Ark: Fork of Lisk that focuses on a smaller feature set. Ark wallets can only vote for one delegate at a time which forces delegates to compete against each other and makes cartel formations incredibly hard, if not impossible.
  21. Neblio: Similar to Neo, but at a 30x smaller market cap.
  22. NEM: Is similar to Neo. However, it has no marketing team, very high market cap for little clarilty what they do.
  23. Bancor: Bancor is a Decentralized Liquidity Network that allows you to hold any Ethereum token and convert it to any other token in the network, with no counter party, at an automatically calculated price, using a simple web wallet.
  24. Dragonchain: The Purpose of DragonChain is to help companies quickly and easily incorporate blockchain into their business applications. Many companies might be interested in making this transition because of the benefits associated with serving clients over a blockchain – increased efficiency and security for transactions, a reduction of costs from eliminating potential fraud and scams, etc.
  25. Skycoin: Transactions with zero fees that take apparently two seconds, unlimited transaction rate, no need for miners and block rewards, low power usage, all of the usual cryptocurrency technical vulnerabilities fixed, a consensus mechanism superior to anything that exists, resistant to all conceivable threats (government censorship, community infighting, cybenucleaconventional warfare, etc). Skycoin has their own consensus algorithm known as Obelisk written and published academically by an early developer of Ethereum. Obelisk is a non-energy intensive consensus algorithm based on a concept called ‘web of trust dynamics’ which is completely different to PoW, PoS, and their derivatives. Skywire, the flagship application of Skycoin, has the ambitious goal of decentralizing the internet at the hardware level and is about to begin the testnet in April. However, this is just one of the many facets of the Skycoin ecosystem. Skywire will not only provide decentralized bandwidth but also storage and computation, completing the holy trinity of commodities essential for the new internet. Skycion a smear campaign launched against it, though they seem legit and reliable. Thus, they are probably undervalued.

Market 3 - Ecosystem

The 3rd market with 11 coins is comprised of ecosystem coins, which aim to strengthen the ease of use within the crypto space through decentralized exchanges, open standards for apps and more
  1. Nebulas: Similar to how Google indexes webpages Nebulas will index blockchain projects, smart contracts & data using the Nebulas rank algorithm that sifts & sorts the data. Developers rewarded NAS to develop & deploy on NAS chain. Nebulas calls this developer incentive protocol – basically rewards are issued based on how often dapp/contract etc. is used, the more the better the rewards and Proof of devotion. Works like DPoS except the best, most economically incentivised developers (Bookkeeppers) get the forging spots. Ensuring brains stay with the project (Cross between PoI & PoS). 2,400 TPS+, DAG used to solve the inter-transaction dependencies in the PEE (Parallel Execution Environment) feature, first crypto Wallet that supports the Lightening Network.
  2. Waves: Decentralized exchange and crowdfunding platform. Let’s companies and projects to issue and manage their own digital coin tokens to raise money.
  3. Salt: Leveraging blockchain assets to secure cash loands. Plans to offer cash loans in traditional currencies, backed by your cryptocurrency assets. Allows lenders worldwide to skip credit checks for easier access to affordable loans.
  4. CHAINLINK: ChainLink is a decentralized oracle service, the first of its kind. Oracles are defined as an ‘agent’ that finds and verifies real-world occurrences and submits this information to a blockchain to be used in smart contracts.With ChainLink, smart contract users can use the network’s oracles to retrieve data from off-chain application program interfaces (APIs), data pools, and other resources and integrate them into the blockchain and smart contracts. Basically, ChainLink takes information that is external to blockchain applications and puts it on-chain. The difference to Aeternity is that Chainlink deploys the smart contracts on the Ethereum blockchain while Aeternity has its own chain.
  5. WTC: Combines blockchain with IoT to create a management system for supply chains Interesting
  6. Ethos unifyies all cryptos. Ethos is building a multi-cryptocurrency phone wallet. The team is also building an investment diversification tool and a social network
  7. Komodo: The Komodo blockchain platform uses Komodo’s open-source cryptocurrency for doing transparent, anonymous, private, and fungible transactions. They are then made ultra-secure using Bitcoin’s blockchain via a Delayed Proof of Work (dPoW) protocol and decentralized crowdfunding (ICO) platform to remove middlemen from project funding. Offers services for startups to create and manage their own Blockchains.
  8. Aion: Today, there are hundreds of blockchains. In the coming years, with widespread adoption by mainstream business and government, these will be thousands or millions. Blockchains don’t talk to each other at all right now, they are like the PCs of the 1980s. The Aion network is able to support custom blockchain architectures while still allowing for cross-chain interoperability by enabling users to exchange data between any Aion-compliant blockchains by making use of an interchain framework that allows for messages to be relayed between blockchains in a completely trust-free manner.
  9. Tenx: Raised 80 million, offers cryptocurrency-linked credit cards that let you spend virtual money in real life. Developing a series of payment platforms to make spending cryptocurrency easier.

Market 4 - Privacy

The 4th market are privacy coins. As you might know, Bitcoin is not anonymous. If the IRS or any other party asks an exchange who is the identity behind a specific Bitcoin address, they know who you are and can track back almost all of the Bitcoin transactions you have ever made and all your account balances. Privacy coins aim to prevent exactly that through address fungability, which changes addresses constantly, IP obfuscation and more. There are 2 types of privacy coins, one with completely privacy and one with optional privacy. Optional Privacy coins like Dash and Nav have the advantage of more user friendliness over completely privacy coins such as Monero and Enigma.
  1. Monero: Currently most popular privacy coin, though with a very high market cap. Since their privacy is all on chain, all prior transactions would be deanonymized if their protocol is ever cracked. This requires a quantum computing attack though. PIVX is better in that regard.
  2. Zcash: A decentralized and open-source cryptocurrency that hide the sender, recipient, and value of transactions. Offers users the option to make transactions public later for auditing. Decent privacy coin, though no default privacy
  3. Verge: Calls itself privacy coin without providing private transactions, multiple problems over the last weeks has a toxic community, and way too much hype for what they have.
  4. Bytecoin: First privacy-focused cryptocurrency with anonymous transactions. Bytecoin’s code was later adapted to create Monero, the more well-known anonymous cryptocurrency. Has several scam accusations, 80% pre-mine, bad devs, bad tech
  5. Bitcoin Private: A merge fork of Bitcoin and Zclassic with Zclassic being a fork of Zcash with the difference of a lack of a founders fee required to mine a valid block. This promotes a fair distribution, preventing centralized coin ownership and control. Bitcoin private offers the optional ability to keep the sender, receiver, and amount private in a given transaction. However, this is already offered by several good privacy coins (Monero, PIVX) and Bitcoin private doesn't offer much more beyond this.
  6. PIVX: As a fork of Dash, PIVX uses an advanced implementation of the Zerocoin protocol to provide it’s privacy. This is a form of zeroknowledge proofs, which allow users to spend ‘Zerocoins’ that have no link back to them. Unlike Zcash u have denominations in PIVX, so they can’t track users by their payment amount being equal to the amount of ‘minted’ coins, because everyone uses the same denominations. PIVX is also implementing Bulletproofs, just like Monero, and this will take care of arguably the biggest weakness of zeroknowledge protocols: the trusted setup.
  7. Zcoin: PoW cryptocurrency. Private financial transactions, enabled by the Zerocoin Protocol. Zcoin is the first full implementation of the Zerocoin Protocol, which allows users to have complete privacy via Zero-Knowledge cryptographic proofs.
  8. Enigma: Monero is to Bitcoin what enigma is to Ethereum. Enigma is for making the data used in smart contracts private. More of a platform for dapps than a currency like Monero. Very promising.
  9. Navcoin: Like bitcoin but with added privacy and pos and 1,170 tps, but only because of very short 30 second block times. Though, privacy is optional, but aims to be more user friendly than Monero. However, doesn't really decide if it wants to be a privacy coin or not. Same as Zcash.Strong technology, non-shady team.

Market 5 - Currency Exchange Tool

Due to the sheer number of different cryptocurrencies, exchanging one currency for the other it still cumbersome. Further, merchants don’t want to deal with overcluttered options of accepting cryptocurrencies. This is where exchange tool like Req come in, which allow easy and simple exchange of currencies.
  1. Cryptonex: Fiat and currency exchange between various blockchain services, similar to REQ.
  2. QASH: Qash is used to fuel its liquid platform which will be an exchange that will distribute their liquidity pool. Its product, the Worldbook is a multi-exchange order book that matches crypto to crypto, and crypto to fiat and the reverse across all currencies. E.g., someone is selling Bitcoin is USD on exchange1 not owned by Quoine and someone is buying Bitcoin in EURO on exchange 2 not owned by Quoine. They turned it on to test it a few months ago for an hour or so and their exchange was the top exchange in the world by 4x volume for the day because all Worldbook trades ran through it. Binance wants BNB to be used on their one exchange. Qash wants their QASH token embedded in all of their partners.
  3. Kyber: network Exchange between cryptocurrencies, similar to REQ. Features automatic coin conversions for payments. Also offers payment tools for developers and a cryptocurrency wallet.
  4. Achain: Building a boundless blockchain world like Req .
  5. Centrality: Centrality is a decentralized market place for dapps that are all connected together on a blockchain-powered system. Centrality aims to allow businesses to work together using blockchain technology. With Centrality, startups can collaborate through shared acquisition of customers, data, merchants, and content. That shared acquisition occurs across the Centrality blockchain, which hosts a number of decentralized apps called Scenes. Companies can use CENTRA tokens to purchase Scenes for their app, then leverage the power of the Centrality ecosystem to quickly scale. Some of Centrality's top dapps are, Skoot, a travel experience marketplace that consists of a virtual companion designed for free independent travelers and inbound visitors, Belong, a marketplace and an employee engagement platform that seems at helping business provide rewards for employees, Merge, a smart travel app that acts as a time management system, Ushare, a transports application that works across rental cars, public transport, taxi services, electric bikes and more. All of these dapps are able to communicate with each other and exchange data through Centrality.
  6. Bitshares: Exchange between cryptocurrencies. Noteworthy are the 1.5 second average block times and throughput potential of 100,000 transactions per second with currently 2,400 TPS having been proven. However, Bitshares had several Scam accusations in the past.
  7. Loopring: A protocol that will enable higher liquidity between exchanges and personal wallets by pooling all orders sent to its network and fill these orders through the order books of multiple exchanges. When using Loopring, traders never have to deposit funds into an exchange to begin trading. Even with decentralized exchanges like Ether Delta, IDex, or Bitshares, you’d have to deposit your funds onto the platform, usually via an Ethereum smart contract. But with Loopring, funds always remain in user wallets and are never locked by orders. This gives you complete autonomy over your funds while trading, allowing you to cancel, trim, or increase an order before it is executed.
  8. ZRX: Open standard for dapps. Open, permissionless protocol allowing for ERC20 tokens to be traded on the Ethereum blockchain. In 0x protocol, orders are transported off-chain, massively reducing gas costs and eliminating blockchain bloat. Relayers help broadcast orders and collect a fee each time they facilitate a trade. Anyone can build a relayer.

Market 6 - Gaming

With an industry size of $108B worldwide, Gaming is one of the largest markets in the world. For sure, cryptocurrencies will want to have a share of that pie.
  1. Storm: Mobile game currency on a platform with 9 million players.
  2. Fun: A platform for casino operators to host trustless, provably-fair gambling through the use of smart contracts, as well as creating their own implementation of state channels for scalability.
  3. Electroneum: Mobile game currency They have lots of technical problems, such as several 51% attacks
  4. Wax: Marketplace to trade in-game items

Market 7 - Misc

There are various markets being tapped right now. They are all summed up under misc.
  1. OMG: Omise is designed to enable financial services for people without bank accounts. It works worldwide and with both traditional money and cryptocurrencies.
  2. Power ledger: Australian blockchain-based cryptocurrency and energy trading platform that allows for decentralized selling and buying of renewable energy. Unique market and rather untapped market in the crypto space.
  3. Populous: Populous is a platform that connects business owners and invoice buyers without middlemen. Furthermore, it is a peer-to-peer (P2P) platform that uses blockchain to provide small and medium-sized enterprises (SMEs) a more efficient way to participate in invoice financing. Businesses can sell their outstanding invoices at a discount to quickly free up some cash. Invoice sellers get cash flow to fund their business and invoice buyers earn interest.
  4. Monacoin: The first Japanese cryptocurrency. Focused on micro-transactions and based on a popular internet meme of a type-written cat. This makes it similar to Dogecoin. Very niche, tiny market.
  5. Revain: Legitimizing reviews via the blockchain. Interesting concept, though market not as big.
  6. Augur: Platform to forecast and make wagers on the outcome of real-world events (AKA decentralized predictions). Uses predictions for a “wisdom of the crowd” search engine. Not launched yet.
  7. Substratum: Revolutionzing hosting industry via per request billing as a decentralized internet hosting system. Uses a global network of private computers to create the free and open internet of the future. Participants earn cryptocurrency. Interesting concept.
  8. Veritaseum: Is supposed to be a peer to peer gateway, though it looks like very much like a scam.
  9. TRON: Tronix is looking to capitalize on ownership of internet data to content creators. However, they plagiarized their white paper, which is a no go. They apologized, so it needs to be seen how they will conduct themselves in the future. Extremely high market cap for not having a product, nor proof of concept.
  10. Syscoin: A cryptocurrency with a decentralized marketplace that lets people buy and sell products directly without third parties. Trying to remove middlemen like eBay and Amazon.
  11. Hshare: Most likely scam because of no code changes, most likely pump and dump scheme, dead community.
  12. BAT: An Ethereum-based token that can be exchanged between content creators, users, and advertisers. Decentralized ad-network that pays based on engagement and attention.
  13. Dent: Decentralizeed exchange of mobile data, enabling mobile data to be marketed, purchased or distributed, so that users can quickly buy or sell data from any user to another one.
  14. Ncash: End to end encrypted Identification system for retailers to better serve their customers .
  15. Factom Secure record-keeping system that allows companies to store their data directly on the Blockchain. The goal is to make records more transparent and trustworthy .

Market 8 - Social network

Web 2.0 is still going strong and Web 3.0 is not going to ignore it. There are several gaming tokens already out there and a few with decent traction already, such as Steem, which is Reddit with voting through money is a very interesting one.
  1. Mithril: As users create content via social media, they will be rewarded for their contribution, the better the contribution, the more they will earn
  2. Steem: Like Reddit, but voting with money. Already launched product and Alexa rank 1,000 Thumbs up.
  3. Rdd: Reddcoin makes the process of sending and receiving money fun and rewarding for everyone. Reddcoin is dedicated to one thing – tipping on social networks as a way to bring cryptocurrency awareness and experience to the general public.
  4. Kin: Token for the platform Kik. Kik has a massive user base of 400 million people. Replacing paying with FIAT with paying with KIN might get this token to mass adoption very quickly.

Market 9 - Fee token

Popular exchanges realized that they can make a few billion dollars more by launching their own token. Owning these tokens gives you a reduction of trading fees. Very handy and BNB (Binance Coin) has been one of the most resilient tokens, which have withstood most market drops over the last weeks and was among the very few coins that could show growth.
  1. BNB: Fee token for Binance
  2. Gas: Not a Fee token for an exchange, but it is a dividend paid out on Neo and a currency that can be used to purchase services for dapps.
  3. Kucoin: Fee token for Kucoin

Market 10 - Decentralized Data Storage

Currently, data storage happens with large companies or data centers that are prone to failure or losing data. Decentralized data storage makes loss of data almost impossible by distributing your files to numerous clients that hold tiny pieces of your data. Remember Torrents? Torrents use a peer-to-peer network. It is similar to that. Many users maintain copies of the same file, when someone wants a copy of that file, they send a request to the peer-to-peer network., users who have the file, known as seeds, send fragments of the file to the requester. The requester receives many fragments from many different seeds, and the torrent software recompiles these fragments to form the original file.
  1. Gbyte: Byteball data is stored and ordered using directed acyclic graph (DAG) rather than blockchain. This allows all users to secure each other's data by referencing earlier data units created by other users, and also removes scalability limits common for blockchains, such as blocksize issue.
  2. Siacoin: Siacoin is decentralized storage platform. Distributes encrypted files to thousands of private users who get paid for renting out their disk space. Anybody with siacoins can rent storage from hosts on Sia. This is accomplish via "smart" storage contracts stored on the Sia blockchain. The smart contract provides a payment to the host only after the host has kept the file for a given amount of time. If the host loses the file, the host does not get paid.
  3. Maidsafecoin: MaidSafe stands for Massive Array of Internet Disks, Secure Access for Everyone.Instead of working with data centers and servers that are common today and are vulnerable to data theft and monitoring, You can think of SAFE as a crowd-sourced internet. It’s an autonomous network that automatically sets prices and distributes data and rents out hard drive disk space with a Blockchain-based storage solutions.When you upload a file to the network, such as a photo, it will be broken into pieces, hashed, and encrypted. Then, redundant copies of the data are created as well so that if someone storing your file turns off their computer, you will still have access to your data. And don’t worry, even with pieces of your data on other people’s computers, they won’t be able to read them. You can earn MadeSafeCoins by participating in storing data pieces from the network on your computer and thus earning a Proof of Resource.
  4. Storj: Storj aims to become a cloud storage platform that can’t be censored or monitored, or have downtime. Your files are encrypted, shredded into little pieces called 'shards', and stored in a decentralized network of computers around the globe. No one but you has a complete copy of your file, not even in an encrypted form.

Market 11 - Cloud computing

Obviously, renting computing power, one of the biggest emerging markets as of recent years, e.g. AWS and Digital Ocean, is also a service, which can be bought and managed via the blockchain.
  1. Golem: Allows easy use of Supercomputer in exchange for tokens. People worldwide can rent out their computers to the network and get paid for that service with Golem tokens.
  2. Elf: Allows easy use of Cloud computing in exchange for tokens.

Market 12 - Stablecoin

Last but not least, there are 2 stablecoins that have established themselves within the market. A stable coin is a coin that wants to be independent of the volatility of the crypto markets. This has worked out pretty well for Maker and DGD, accomplished through a carefully diversified currency fund and backing each token by 1g or real gold respectively. DO NOT CONFUSE DGD AND MAKER with their STABLE COINS DGX and DAI. DGD and MAKER are volatile, because they are the companies of DGX and DAI. DGX and DAI are the stable coins.
  1. DGD: Platform of the Stablecoin DGX. Every DGX coin is backed by 1g of gold and make use proof of asset consensus.
  2. Maker: Platform of the Stablecoin DAI that doesn't vary much in price through widespread and smart diversification of assets.
  3. USDT: is no cryptocurrency really, but a replacement for dollar for trading After months of asking for proof of dollar backing, still no response from Tether.
EDIT: Added a risk factor from 0 to 10. Significant scandals, mishaps, shady practices, questionable technology, increase the risk factor. Not having a product yet automatically means a risk factor of 6. Strong adoption and thus strong scrutiny or positive community lower the risk factor.
EDIT2: Added a subjective potential factor from 0 to 10, where its overall potential and a small or big market cap is factored in. Bitcoin with lots of potential only gets a 9, because of its massive market cap, because if Bitcoin goes 10x, smaller coins go 100x.
submitted by galan77 to ethtrader [link] [comments]

Part 5. I'm writing a series about blockchain tech and possible future security risks. This is the fifth part of the series talking about an advanced vulnerability of BTC.

The previous parts will give you usefull basic blockchain knowledge and insights on quantum resistance vs blockchain that are not explained in this part.
Part 1, what makes blockchain reliable?
Part 2, The mathematical concepts Hashing and Public key cryptography.
Part 3, Quantum resistant blockchain vs Quantum computing.
Part 4A, The advantages of quantum resistance from genesis block, A
Part 4B, The advantages of quantum resistance from genesis block, A

Why BTC is vulnerable for quantum attacks sooner than you would think.
Content:
The BTC misconception: “Original public keys are not visible until you make a transaction, so BTC is quantum resistant.”
Already exposed public keys.
Hijacking transactions.
Hijacks during blocktime
Hijacks pre-blocktime.
MITM attacks

- Why BTC is vulnerable for quantum attacks sooner than you would think. -

Blockchain transactions are secured by public-private key cryptography. The keypairs used today will be at risk when quantum computers reach a certain critical level: Quantum computers can at a certain point of development, derive private keys from public keys. See for more sourced info on this subject in part 3. So if a public key can be obtained by an attacker, he can then use a quantum computer to find the private key. And as he has both the public key and the private key, he can control and send the funds to an address he owns.
Just to make sure there will be no misconceptions: When public-private key cryptography such as ECDSA and RSA can be broken by a quantum computer, this will be an issue for all blockchains who don't use quantum resistant cryptography. The reason this article is about BTC is because I take this paper as a reference point: https://arxiv.org/pdf/1710.10377.pdf Here they calculate an estimate when BTC will be at risk while taking the BTC blocktime as the window of opportunity.
The BTC misconception: “Original public keys are not visible until you make a transaction, so BTC is quantum resistant.”
In pretty much every discussion I've read and had on the subject, I notice that people are under the impression that BTC is quantum resistant as long as you use your address only once. BTC uses a hashed version of the public key as a send-to address. So in theory, all funds are registered on the chain on hashed public keys instead of to the full, original public keys, which means that the original public key is (again in theory) not public. Even a quantum computer can't derive the original public key from a hashed public key, therefore there is no risk that a quantum computer can derive the private key from the public key. If you make a transaction, however, the public key of the address you sent your funds from will be registered in full form in the blockchain. So if you were to only send part of your funds, leaving the rest on the old address, your remaining funds would be on a published public key, and therefore vulnerable to quantum attacks. So the workaround would be to transfer the remaining funds, within the same transaction, to a new address. In that way, your funds would be once again registered on the blockchain on a hashed public key instead of a full, original public key.
If you feel lost already because you are not very familiar with the tech behind blockchain, I will try to explain the above in a more familiar way:
You control your funds through your public- private key pair. Your funds are registered on your public key. And you can create transactions, which you need to sign to be valid. You can only create a signature if you have your private key. See it as your e-mail address (public key) and your password (Private key). Many people got your email address, but only you have your password. So the analogy is, that if you got your address and your password, then you can access your mail and send emails (Transactions). If the right quantum computer would be available, people could use that to calculate your password (private key), if they have your email address (public key).
Now, because BTC doesn’t show your full public key anywhere until you make a transaction. That sounds pretty safe. It means that your public key is private until you make a transaction. The only thing related to your public key that is public is the hash of your public key. Here is a short explanation of what a hash is: a hash is an outcome of an equation. Usually one-way hash functions are used, where you can not derive the original input from the output; but every time you use the same hash function on the same original input (For example IFUHE8392ISHF), you will always get the same output (For example G). That way you can have your coins on public key "IFUHE8392ISHF", while on the chain, they are registered on "G".
So your funds are registered on the blockchain on the "Hash" of the public key. The Hash of the public key is also your "email address" in this case. So you give "G" as your address to send BTC to.
As said before: since it is, even for a quantum computer, impossible to derive a public key from the Hash of a public key, your coins are safe for quantum computers as long as the public key is only registered in hashed form. The obvious safe method would be, never to reuse an address, and always make sure that when you make a payment, you send your remaining funds to a fresh new address. (There are wallets that can do this for you.) In theory, this would make BTC quantum resistant, if used correctly. This, however, is not as simple as it seems. Even though the above is correct, there is a way to get to your funds.
Already exposed public keys.
But before we get to that, there is another point that is often overlooked: Not only is the security of your personal BTC is important, but also the security of funds of other users. If others got hacked, the news of the hack itself and the reaction of the market to that news, would influence the marketprice. Or, if a big account like the Satoshi account were to be hacked and dumped, the dump itself, combined with the news of the hack, could be even worse. An individual does not have the control of other people’s actions. So even though one might make sure his public key is only registered in hashed form, others might not do so, or might no know their public key is exposed. There are several reasons why a substantial amount of addresses actually have exposed full public keys:
In total, about 36% of all BTC are on addresses with exposed public keys Of which about 20% is on lost addresses. and here
Hijacking transactions.
But even if you consider the above an acceptable risk, just because you yourself will make sure you never reuse an address, then still, the fact that only the hashed public key is published until you make a transaction is a false sense of security. It only works, if you never make a transaction. Why? Public keys are revealed while making a transaction, so transactions can be hijacked while being made.
Here it is important to understand two things:
1.) How is a transaction sent?
The owner has the private key and the public key and uses that to log into the secured environment, the wallet. This can be online or offline. Once he is in his wallet, he states how much he wants to send and to what address.
When he sends the transaction, it will be broadcasted to the blockchain network. But before the actual transaction will be sent, it is formed into a package, created by the wallet. This happens out of sight of the sender.
That package ends up carrying roughly the following info: the public key to point to the address where the funds will be coming from, the amount that will be transferred, the address the funds will be transferred to (depending on the blockchain this could be the hashed public key, or the original public key of the address the funds will be transferred to). This package also carries the most important thing: a signature, created by the wallet, derived from the private- public key combination. This signature proves to the miners that you are the rightful owner and you can send funds from that public key.
Then this package is sent out of the secure wallet environment to multiple nodes. The nodes don’t need to trust the sender or establish the sender’s "identity”, because the sender proofs he is the rightful owner by adding the signature that corresponds with the public key. And because the transaction is signed and contains no confidential information, private keys, or credentials, it can be publicly broadcast using any underlying network transport that is convenient. As long as the transaction can reach a node that will propagate it into the network, it doesn’t matter how it is transported to the first node.
2.) How is a transaction confirmed/ fulfilled and registered on the blockchain?
After the transaction is sent to the network, it is ready to be processed. The nodes have a bundle of transactions to verify and register on the next block. This is done during a period called the block time. In the case of BTC that is 10 minutes.
If we process the information written above, we will see that there are two moments where you can actually see the public key, while the transaction is not fulfilled and registered on the blockchain yet.
1: during the time the transaction is sent from the sender to the nodes
2: during the time the nodes verify the transaction. (The blocktime)
Hijacks during blocktime
This paper describes how you could hijack a transaction and make a new transaction of your own, using someone else’s address and send his coins to an address you own during moment 2: the time the nodes verify the transaction:
https://arxiv.org/pdf/1710.10377.pdf
"(Unprocessed transactions) After a transaction has been broadcast to the network, but before it is placed on the blockchain it is at risk from a quantum attack. If the secret key can be derived from the broadcast public key before the transaction is placed on the blockchain, then an attacker could use this secret key to broadcast a new transaction from the same address to his own address. If the attacker then ensures that this new transaction is placed on the blockchain first, then he can effectively steal all the bitcoin behind the original address." (Page 8, point 3.)
So this means that BTC obviously is not a quantum secure blockchain. Because as soon as you will touch your funds and use them for payment, or send them to another address, you will have to make a transaction and you risk a quantum attack.
Hijacks pre-blocktime.
The story doesn't end here. The paper doesn't describe the posibility of a pre-blocktime hijack.
So back to the paper: as explained, while making a transaction your public key is exposed for at least the transaction time. This transaction time is 10 minutes where your transaction is being confirmed during the 10 minute block time. That is the period where your public key is visible and where, as described in the paper, a transaction can be hijacked, and by using quantum computers, a forged transaction can be made. So the critical point is determined to be the moment where quantum computers can derive private keys from public keys within 10 minutes. Based on that 10 minute period, they calculate (estimate) how long it will take before QC's start forming a threat to BTC. (“ By our most optimistic estimates, as early as 2027 a quantum computer could exist that can break the elliptic curve signature scheme in less than 10 minutes, the block time used in Bitcoin.“ This is also shown in figure 4 on page 10 and later more in depth calculated in appendix C, where the pessimistic estimate is around 2037.) But you could extend that 10 minutes through network based attacks like DDoS, BGP routing attacks, NSA Quantum Insert, Eclipse attacks, MITM attacks or anything like that. (And I don’t mean you extend the block time by using a network based attack, but you extend the time you have access to the public key before the transaction is confirmed.) Bitcoin would be earlier at risk than calculated in this paper.
Also other Blockchains with way shorter block times imagine themselves safe for a longer period than BTC, but with this extension of the timeframe within which you can derive the private key, they too will be vulnerable way sooner.
Not so long ago an eclipse attack demonstrated it could have done the trick. and here Causing the blockchain to work over max capacity, means the transactions will be waiting to be added to a block for a longer time. This time needs to be added on the blocktime, expanding the period one would have time to derive the private key from the public key.
That seems to be fixed now, but it shows there are always new attacks possible and when the incentive is right (Like a few billion $ kind of right) these could be specifically designed for certain blockchains.
MITM attacks
An MITM attack could find the public key in the first moment the public key is exposed. (During the time the transaction is sent from the sender to the nodes) So these transactions that are sent to the network, contain public keys that you could intercept. So that means that if you intercept transactions (and with that the private keys) and simultaneously delay their arrival to the blockchain network, you create extra time to derive the private key from the public key using a quantum computer. When you done that, you send a transaction of your own before the original transaction has arrived and is confirmed and send funds from that stolen address to an address of your choosing. The result would be that you have an extra 10, 20, 30 minutes (or however long you can delay the original transactions), to derive the public key. This can be done without ever needing to mess with a blockchain network, because the attack happens outside the network. Therefore, slower quantum computers form a threat. Meaning that earlier models of quantum computers can form a threat than they assume now.
When MITM attacks and hijacking transactions will form a threat to BTC, other blockchains will be vulnerable to the same attacks, especially MITM attacks. There are ways to prevent hijacking after arrival at the nodes. I will elaborate on that in the next article. At this point of time, the pub key would be useless to an attacker due to the fact there is no quantum computer available now. Once a quantum computer of the right size is available, it becomes a problem. For quantum resistant blockchains this is differetn. MITM attacks and hijacking is useless to quantum resistant blockchains like QRL and Mochimo because these projects use quantum resistant keys.
submitted by QRCollector to CryptoTechnology [link] [comments]

Information and FAQ

Welcome to the official IOTA subreddit.
If you are new you can find lots of information here, in the sidebar and please use the search button to see if your questions have been asked before. Please focus discussion on IOTA technology, ecosystem announcements, project development, apps, etc. Please direct help questions to /IOTASupport, and price discussions and market talk to /IOTAmarkets.
Before getting started it is recommended to read the IOTA_Whitepaper.pdf. I also suggest watching these videos first to gain a better understanding.
IOTA BREAKDOWN: The Tangle Vs. Blockchain Explained
IOTA tutorial 1: What is IOTA and some terminology explained

Information

Firstly, what is IOTA?

IOTA is an open-source distributed ledger protocol launched in 2015 that goes 'beyond blockchain' through its core invention of the blockless ‘Tangle’. The IOTA Tangle is a quantum-resistant Directed Acyclic Graph (DAG), whose digital currency 'iota' has a fixed money supply with zero inflationary cost.
IOTA uniquely offers zero-fee transactions & no fixed limit on how many transactions can be confirmed per second. Scaling limitations have been removed, since throughput grows in conjunction with activity; the more activity, the more transactions can be processed & the faster the network. Further, unlike blockchain architecture, IOTA has no separation between users and validators (miners / stakers); rather, validation is an intrinsic property of using the ledger, thus avoiding centralization.
IOTA is focused on being useful for the emerging machine-to-machine (m2m) economy of the Internet-of-Things (IoT), data integrity, micro-/nano- payments, and other applications where a scalable decentralized system is warranted.
More information can be found here.

Seeds

A seed is a unique identifier that can be described as a combined username and password that grants you access to your IOTA.
Your seed is used to generate the addresses and private keys you will use to store and send IOTA, so this should be kept private and not shared with anyone. If anyone obtains your seed, they can generate the private keys associated with your addresses and access your IOTA.

Non reusable addresses

Contrary to traditional blockchain based systems such as Bitcoin, where your wallet addresses can be reused, IOTA's addresses should only be used once (for outgoing transfers). That means there is no limit to the number of transactions an address can receive, but as soon as you've used funds from that address to make a transaction, this address should not be used anymore.
Why?
When an address is used to make an outgoing transaction, a random 50% of the private key of that particular address is revealed in the transaction signature, which effectively reduces the security of the key. A typical IOTA private key of 81-trits has 2781 possible combinations ( 8.7 x 10115 ) but after a single use, this number drops to around 2754 ( 2 x 1077 ), which coincidentally is close to the number of combinations of a 256-bit Bitcoin private key. Hence, after a single use an IOTA private key has about the same level of security as that of Bitcoin and is basically impractical to brute-force using modern technology. However, after a second use, another random 50% of the private key is revealed and the number of combinations that an attacker has to guess decreases very sharply to approximately 1.554 (~3 billion) which makes brute-forcing trivial even with an average computer.
Note: your seed is never revealed at at time; only private keys specific to each address.
The current light wallet prevents address reuse automatically for you by doing 2 things:
  1. Whenever you make an outgoing transaction from an address that does not consume its entire balance (e.g. address holds 10 Mi but you send only 5 Mi), the wallet automatically creates a new address and sends the change (5 Mi) to the new address.
  2. The wallet prevents you from performing a second outgoing transaction using the same address (it will display a “Private key reuse detected!” error).
This piggy bank diagram can help visualize non reusable addresses. imgur link
[Insert new Safe analogy].

Address Index

When a new address is generated it is calculated from the combination of a seed + Address Index, where the Address Index can be any positive Integer (including "0"). The wallet usually starts from Address Index 0, but it will skip any Address Index where it sees that the corresponding address has already been attached to the tangle.

Private Keys

Private keys are derived from a seeds key index. From that private key you then generate an address. The key index starting at 0, can be incremented to get a new private key, and thus address.
It is important to keep in mind that all security-sensitive functions are implemented client side. What this means is that you can generate private keys and addresses securely in the browser, or on an offline computer. All libraries provide this functionality.
IOTA uses winternitz one-time signatures, as such you should ensure that you know which private key (and which address) has already been used in order to not reuse it. Subsequently reusing private keys can lead to the loss of funds (an attacker is able to forge the signature after continuous reuse).
Exchanges are advised to store seeds, not private keys.

FAQ

Buying IOTA

How do I to buy IOTA?

Currently not all exchanges support IOTA and those that do may not support the option to buy with fiat currencies.
Visit this website for a Guide: How to buy IOTA
or Click Here for a detailed guide made by 450LbsGorilla

Cheapest way to buy IOTA?

You can track the current cheapest way to buy IOTA at IOTA Prices.
It tells you where & how to get the most IOTA for your money right now. There's an overview of the exchanges available to you and a buying guide to help you along.
IOTAPrices.com monitors all major fiat exchanges for their BTC & ETH rates and combines them with current IOTA rates from IOTA exchanges for easy comparison. Rates are taken directly from each exchange's official websocket. For fiat exchanges or exchanges that don't offer websockets, rates are refreshed every 60 seconds.

What is MIOTA?

MIOTA is a unit of IOTA, 1 Mega IOTA or 1 Mi. It is equivalent to 1,000,000 IOTA and is the unit which is currently exchanged.
We can use the metric prefixes when describing IOTA e.g 2,500,000,000 i is equivalent to 2.5 Gi.
Note: some exchanges will display IOTA when they mean MIOTA.

Can I mine IOTA?

No you can not mine IOTA, all the supply of IOTA exist now and no more can be made.
If you want to send IOTA, your 'fee' is you have to verify 2 other transactions, thereby acting like a minenode.

Storing IOTA

Where should I store IOTA?

It is not recommended to store large amounts of IOTA on the exchange as you will not have access to the private keys of the addresses generated.

Wallets

GUI Desktop (Full Node + Light Node)
Version = 2.5.6
Download: GUI v2.5.6
Guide: Download/Login Guide
Nodes: Status
Headless IRI (Full Node)
Version = 1.4.1.4
Download: Mainnet v1.4.1.4
Guide:
Find Neighbours: /nodesharing
UCL Desktop/Android/iOS (Light Node)
Version = Private Alpha Testing
Website: iota-ucl (Medium)
Android (Light Node)
Version = Beta
Download: Google Play
iOS (Light Node)
Version = Beta Testing
Website: https://iota.tools/wallet
Paper Wallet
Version = v1.3.6
Repo: GitHub
Seed Vault
Version = v1.0.2
Repo: GitHub7

What is a seed?

A seed is a unique identifier that can be described as a combined username and password that grants you access to your wallet.
Your seed is used to generate the addresses linked to your account and so this should be kept private and not shared with anyone. If anyone obtains your seed, they can login and access your IOTA.

How do I generate a seed?

You must generate a random 81 character seed using only A-Z and the number 9.
It is recommended to use offline methods to generate a seed, and not recommended to use any non community verified techniques. To generate a seed you could:

On a Linux Terminal

use the following command:
 cat /dev/urandom |tr -dc A-Z9|head -c${1:-81} 

On a Mac Terminal

use the following command:
 cat /dev/urandom |LC_ALL=C tr -dc 'A-Z9' | fold -w 81 | head -n 1 

With KeePass on PC

A helpful guide for generating a secure seed on KeePass can be found here.

With a dice

Dice roll template

Is my seed secure?

  1. All seeds should be 81 characters in random order composed of A-Z and 9.
  2. Do not give your seed to anyone, and don’t keep it saved in a plain text document.
  3. Don’t input your seed into any websites that you don’t trust.
Is Someone Going To Guess My IOTA Seed?
What are the odds of someone guessing your seed?
  • IOTA seed = 81 characters long, and you can use A-Z, 9
  • Giving 2781 = 8.7x10115 possible combinations for IOTA seeds
  • Now let's say you have a "super computer" letting you generate and read every address associated with 1 trillion different seeds per second.
  • 8.7x10115 seeds / 1x1012 generated per second = 8.7x10103 seconds = 2.8x1096 years to process all IOTA seeds.

Why does balance appear to be 0 after a snapshot?

When a snapshot happens, all transactions are being deleted from the Tangle, leaving only the record of how many IOTA are owned by each address. However, the next time the wallet scans the Tangle to look for used addresses, the transactions will be gone because of the snapshot and the wallet will not know anymore that an address belongs to it. This is the reason for the need to regenerate addresses, so that the wallet can check the balance of each address. The more transactions were made before a snapshot, the further away the balance moves from address index 0 and the more addresses have to be (re-) generated after the snapshot.

What happens if you reuse an address?

It is important to understand that only outgoing transactions reveal the private key and incoming transactions do not. If you somehow manage to receive iotas using an address after having used it previously to send iotas—let's say your friend sends iotas to an old address of yours—these iotas may be at risk.
Recall that after a single use an iota address still has the equivalent of 256-bit security (like Bitcoin) so technically, the iotas will still be safe if you do not try to send them out. However, you would want to move these iotas out eventually and the moment you try to send them out, your private key will be revealed a second time and it now becomes feasible for an attacker to brute-force the private key. If someone is monitoring your address and spots a second use, they can easily crack the key and then use it to make a second transaction that will compete with yours. It then becomes a race to see whose transaction gets confirmed first.
Note: The current wallet prevents you from reusing an address to make a second transaction so any iotas you receive with a 'used' address will be stuck. This is a feature of wallet and has nothing to do with the fundamental workings of IOTA.

Sending IOTA

What does attach to the tangle mean?

The process of making an transaction can be divided into two main steps:
  1. The local signing of a transaction, for which your seed is required.
  2. Taking the prepared transaction data, choosing two transactions from the tangle and doing the POW. This step is also called “attaching”.
The following analogy makes it easier to understand:
Step one is like writing a letter. You take a piece of paper, write some information on it, sign it at the bottom with your signature to authenticate that it was indeed you who wrote it, put it in an envelope and then write the recipient's address on it.
Step two: In order to attach our “letter” (transaction), we go to the tangle, pick randomly two of the newest “letters” and tie a connection between our “letter” and each of the “letters” we choose to reference.
The “Attach address” function in the wallet is actually doing nothing else than making an 0 value transaction to the address that is being attached.

Why is my transaction pending?

IOTA's current Tangle implementation (IOTA is in constant development, so this may change in the future) has a confirmation rate that is ~66% at first attempt.
So, if a transaction does not confirm within 1 hour, it is necessary to "reattach" (also known as "replay") the transaction one time. Doing so one time increases probability of confirmation from ~66% to ~89%.
Repeating the process a second time increases the probability from ~89% to ~99.9%.

How do I reattach a transaction.

Reattaching a transaction is different depending on where you send your transaction from. To reattach using the GUI Desktop wallet follow these steps:
  1. Click 'History'.
  2. Click 'Show Bundle' on the 'pending' transaction.
  3. Click 'Reattach'.
  4. Click 'Rebroadcast'. (optional, usually not required)
  5. Wait 1 Hour.
  6. If still 'pending', repeat steps 1-5 once more.

Does the private key get revealed each time you reattach a transaction?

When you use the reattach function in the desktop wallet, a new transaction will be created but it will have the same signature as the original transaction and hence, your private key will not revealed a second time.

What happens to pending transactions after a snapshot?

IOTA Network and Nodes

What incentives are there for running a full node?

IOTA is made for m2m economy, once wide spread adoption by businesses and the IOT, there will be a lot of investment by these businesses to support the IOTA network. In the meantime if you would like to help the network and speed up p2p transactions at your own cost, you can support the IOTA network by setting up a Full Node.
Running a full node also means you don't have to trust a 3rd party light node provider. By running a full node you get to take advantage of new features that might not be installed on 3rd party nodes.

How to set up a full node?

To set up a full node you will need to follow these steps:
  1. Download the full node software: either GUI, or headless CLI for lower system requirements and better performance.
  2. Get a static IP for your node.
  3. Join the network by adding 7-9 neighbours.
  4. Keep your full node up and running as much as possible.
A detailed user guide on how to set up a VTS IOTA Full Node from scratch can be found here.

How do I get a static IP?

To learn how to setup a hostname (~static IP) so you can use the newest IOTA versions that have no automated peer discovery please follow this guide.

How do I find a neighbour?

Are you a single IOTA full node looking for a partner? You can look for partners in these place:

Resources

You can find a wiki I have been making here.
More to come...
If you have any contributions or spot a mistake or clarification, please PM me or leave a comment.
submitted by Boltzmanns_Constant to Iota [link] [comments]

My Intern Experience

My Intern Experience
Shreemoon Rajbhandari
My Intern Experience
During my time as an undergraduate, one of the key experiences recommended is to do an internship. Gaining work experience as an intern overseas will improve a skill set in my area of interest. Working somewhere as culturally different and economically significant as China is a talking point in any interviews. There are many reasons that made me choose to do an internship in China. Definitively the best part of the experience has been living out of your comfort zone. Encountering new situations and experiences, that increase my self awareness, my capabilities and also to discover my weaknesses.
Over the past 2 years, we have seen many digital currencies/cryptocurrencies being introduced globally.These have added the aspect of using this financial ecosystem to eventually solve social issues. This could be the application of Blockchain technology in areas like logistics/supply chain to food security. Eventually, there would be many more areas where blockchain and related technology developers would be needed. It's emerging to change the way we solve the many roadblocks that we face.
Blockchain is considered to be one of the most trending topics. This is the right time for me to learn about the technology and start implementing. Blockchain is a notion that can be implemented directly or indirectly to any sector as such. Only two months prior, I had a minimal amount of knowledge about blockchain innovation, and my insight into blockchain comprised distinctly of an obscure comprehension of bitcoin and cryptographic money all in all.
During my internship, I was given investigation material to help assemble my base comprehension of Loopring and the blockchain innovation that it depends on. In the wake of beginning at Loopring, I have been given significantly more prominent chance to learn. While my comprehension of blockchain is still new, it has improved extensively since my first day at the organisation.
In this post, I would like to talk about two cryptographic methods aiming to give privacy to blockchain technology ; the zk-SNARKS and zk-STARKS protocols are two significant examples. We will look into their advantages and disadvantages, comparison between two protocols, and conclusion.
ZK-SNARKS vs ZK-STARKS
Along with the countless benefits of the Internet from which we can benefit, when we use it for social media or business company purposes, privacy is at greater risk. Approximately 90 million of Facebook users information were damaged by Cambridge Analytical data. The Wall Street stated that “ this is just the beginning, and the results are expected to grow”. The Equifax data breach revealed information on social media channels from private users. Thus, birth dates were exposed to the majority of the populations. Due to the Uber hack, data from over 55 million customers were also shared and exposed.
Privacy has consistently been seen as a valuable element within the cryptocurrency community. There is always a growing focus on improving privacy within the cryptocurrency space. Bitcoin, Ethereum, Litecoin and many other cryptocurrencies are all actively searching for the most convenient approaches to increase their security. It is the antecedent to fungibility, which is vital for a broadly used form of money. Additionally, most crypto-asset holders do not want their transaction history to be completely public to the world. Among the different cryptographic methods aiming to give privacy to blockchain technology; the zk-SNARK and zk-STARKS protocols are two main significant examples.
Two leading technologies today offer their cryptocurrencies - Monero and zcash— and strive to address protection issues. Monero uses the technology of Ring Confidential Signature. By contrast, Z-Cash uses zk-SNARK( Zero-Knowledge transparent knowledge argument), a technology that provides the ability to conduct anonymous transactions.
In recent years, zk-SNARKS has exploded as the most promising technology to solve blockchain privacy. It is a technology derived from proofs of zero-knowledge, a type of proof that anyone with a verification key can check this “proof” without disclosing the information itself. If the statement holds, a verifier will be convinced by a correct proof. If the statement is false, it is true that no prover can convince a verified statement.
zk-SNARK stands for :
- Zero-knowledge : if the statement is true, there is nothing the verifier learns beyond the fact that the statement is true.
- Succinct : The proof size needs to be small enough in a few milliseconds to be verified.
- Non-interactive :Only one set of information is sent to the verifier for verification, therefore there is no back and forth communication between the prover and verifier.
- Argument of Knowledge : A computationally soundproof: soundness runs counter to a prover leveraging polynomial-time, i.e. limited computing. Also, Without access to the witness (the private input needed to prove the statement), the evidence can not be constructed.
zk-SNARKS aims to provide fast, scalable solutions to ensure financial security. Therefore, transaction encryption is possible.When zk-SNARK is applied to a cryptocurrency, it implies you can conceal the majority of the transaction data information. This incorporates the sender address, collector address, just as the transaction sum amount. zk-SNARKS enables us to shroud the majority of this data information, while likewise enabling the system to affirm and verify the transactions. It amplifies security while maintaining consensus. In the realm of blockchain, it is one of the most exceptional blockchain level protection innovation being used.
With the launch of version 3.0, Loopring’s decentralised protocol solution struck a noteworthy milestone in early May- adding off-chain scaling and fee optimisation using zk-SNARKs. Low fees, liquidity, transparency and security are the key goal of the loopring solution. Loopring says the new Loopring 3.0 based zk-SNARK will increase trade speeds and on-chain activity efficiency tenfold. The data previously stored on-chain in Loopring 3.0 is now stored off-chain in a Merkle tree and then used as required in zk-SNARKS, updating the tree.
Be that as it may, there are a few issues with zk-SNARKS. The main problem has been the need for a trusted setup. zk-SNARKS rely on a permission private key. This essentially undermines the entire purpose of decentralised public blockchain. By introducing the need to trust a person rather than code, you threaten the entire concept of trustlessness. In theory, a prover with sufficient computational power could create fake proofs, and this is one of the reasons why many consider quantum computers as a threat to zk-SNARKs (and blockchain systems).
Last year zk-SNARKS were incorporated on a MIT Tech Review list of the top 10 Breakthrough Technologies of 2018 among AI advancements. zk-SNARKS allows both a tremendous speedup in verifying the correctness of a computation while at the same time it hides the private details from prying eyes. Some of the potential uses citied in MIT article were verifying you’re over 18 without having to share your date of birth, and providing you have a enough money in your back account as collateral without having to give away account details like your exact balance. It establishes trust which you need to interact on the blockchain. Zk-SNARK proofs are as of now being used on Zcash, on JP Morgan Pursue's blockchain-based payment system, and as an approach to safely validate customers to servers.
The more developed version of zk-SNARKS is called zk-STARKS which stands for :
Zero-Knowledge
Scalable
Transparent
Argument of Knowledge
zk-STARKS verifications are currently being touted as the better than ever form of the convention, tending to a considerable lot of the past disadvantages of zk-SNARKs. It has demonstrated an approach to accomplish a similar degree of privacy as zk-SNARKS without the requirement for the trusted setup. Starks are practically superior to Snarks as they require weaker crypto suppositions, they don't require a trusted setup and are post-quantum resistant. zk-SNARKs are based on Elliptic-Curve Cryptography, which is susceptible to advances in Quantum-Computers. zk-STARKs, on the other hand are Post-Quantum system meaning that even if Quantum-computers become powerful and ubiquitous they will not have an advantage, compared to classical computers, in breaking zk-STARKs. Anyway they have a noteworthy downside, as in the proof being too enormous. Their problem is their storage requirements. STARKs are doubly scalable, which means the proof verification is exponentially faster than the original computation’s time but the drawback is the size of the proof they create being too large, possibly 2 or 3 orders of magnitude more than those produced by zk-SNARKs. One example : StarkWare solves the inherent problems of scalability and privacy of blockchains. Using STARK technology, they generate a full proof-stack to produce and verify computer integrity tests. They utilise STARKs to batch transactions into a single proof that is verified on Ethereum. Matt Taylor states that the present iteration of StarkDEX demonstrates the viability of using STARKs for the scalability of Layer-2 by showing a substantial rise in the amount of blockchain transaction.
The idea of zk-STARKS was proposed by Eli-Ben Sasson, a professor at the Technion-Israel institute of Technology. zk-STARKS provide proofs that can be verified a lot quicker than zk-SNARKS. At the present time, Z-cash and Ethereum are on the whole considering to utilize zk-STARKS. zk-STARKS have solved the trusted setup issue. They have totally expel the requirement for multiple parties to create the private key required for the string. Rather everything needed to produce the proofs is public and the verifications are generated from arbitrary numbers. zk-STARKS actually removed the necessity in zk-SNARKS for unbalanced cryptography and rather utilizes the hash fuctions like those found in Bitcoin mining. In addition, they ought to have longer timeframe of realistic usability as far as their crytographic resilience than zk-SNARKS. However, there are some impediment of zk-STARKS, the main issue with zk-STARKS is their size. The verifications it uses are basically too enormous to use in many blockchains as they stand. As indicated by Vitalik Buterin, zk-STARKS will result in proofs of a couple of hundreds kilobytes versus the 288 bytes seen in zk-SNARKS.

The Difference Between zk-STARKS and zk-SNARKS.

https://preview.redd.it/k1fap29yd4m31.png?width=411&format=png&auto=webp&s=769ef7be2646a2d0ac31a5334f7e7249e2e2e246

Source : The Medium - Coinmonks
The complexity of communication : With the computation’s expanded complexity, the zk-SNARKS communication complexity also increases linearly, whereas zk-STARKs develops in the opposite direction and grows slowly as the computation size grows.The graph above shows that the communication required by the zk-STARKs to complete the calculation rises much slower than zk-snarks as the underlying evidence increases in complexity.

Source : The Medium - Coinmonks
The complexity of the verifier : zk-STARKs slightly widening with the development in computation size. On the other side, for confirmation evidence, zk-SNARKs requires less time than zk-STARKs. zk-STARKs, for instance need up to 100 ms to verify and zk-SNARKs need only up to 10ms. The graph above illustrates the the time taken by the zk-STARK to verify an evidence rises very slowly compared to the zk-SNARK as the underlying evidence increases in complexity.

Overall these two protocols have excellent potential in the cryptocurrency globe and can be a breakthrough avenue for mainstream implementation. Both conventions are truly needed steps to protect our privacy.


Reference
https://www.technologyreview.com/lists/technologies/2018/
https://www.google.co.uk/amp/s/themerkle.com/mit-review-acclaims-zk-snarks-but-zk-starks-may-steal-the-show/amp/
https://ethereum.stackexchange.com/questions/59145/zk-snarks-vs-zk-starks-vs-bulletproofs-updated
https://www.binance.vision/blockchain/zk-snarks-and-zk-starks-explained?amp=1
https://applicature.com/blog/blockchain-technology/can-zk-snarks-and-zk-starks-solve-privacy-issues
https://eprint.iacr.org/2018/046.pdf
https://medium.com/coinmonks/zk-starks-create-verifiable-trust-even-against-quantum-computers-dd9c6a2bb13d
https://blog.0xproject.com/starkdex-bringing-starks-to-ethereum-6a03fffc0eb7
submitted by Shreemoon to loopringorg [link] [comments]

Is Quantum Computing a threat to Bitcoin? Bitcoin Q&A: Migrating to post-quantum cryptography Quantum Computing for Computer Scientists - YouTube Can Quantum Computers Hack Bitcoin / Ethereum? - YouTube Can quantum computers crack bitcoin? - YouTube

Student Loan Refinance Calculator. Auto Loan Calculator ... if researchers build a quantum computer that outperforms ... 2017 to get a sense of the threat quantum computing posed to Bitcoin's ... Quantum computers, first theorized by physicist Richard Feynman in 1982, have promised a new era of computing. The theory has only recently translated into significant real-world advances, with NASA, the CIA and Google working on a quantum computer. Computer scientists now warn the machines will cripple existing encryption methods and destroy bitcoin’s technological foundations. r/Bitcoin: A community dedicated to Bitcoin, the currency of the Internet. Bitcoin is a distributed, worldwide, decentralized digital money … Practically asking if a quantum computer could be a threat to BTC just because it achieved 'quantum supremacy', essentially a state that proves a quantum computer could compete and beat a traditional computer in a certain task, does not necessarily mean that it is aware of how to mine Bitcoin, what even is Bitcoin or where it should start ... Quantum Computing Vs. Blockchain: Impact on Cryptography. Breaking News. How would you best describe yourself? Individual Investor Institutional Investor Financial Advisor Active Trader.

[index] [20710] [33481] [25514] [33950] [18493] [29582] [16571] [4426] [26608] [28969]

Is Quantum Computing a threat to Bitcoin?

Start making money everyday with us! Click Here - http://www.tradegeniusacademy.com Use Promo Code "fall" For 40% OFF All Non Bundled Items! Pay attention an... Keywords/phrases: Quantum cryptography, quantum cryptoanalysis, quantum computing. Bitcoin uses SHA-256. In cryptography there is a 20-30 year lifecycle for an algorithm before it gets exceeded by ... This talk discards hand-wavy pop-science metaphors and answers a simple question: from a computer science perspective, how can a quantum computer outperform ... Quantum Computing is hailed as a technical breakthrough and a lot of people are scared by it. What's the engineering reality? What can it do to Bitcoin? Part 1 of this question. https://twitter ... Quantum computers are coming online this year - and they might pose a threat to bitcoin, ethereum, and even modern cryptography. Find out what they can do an...

#